• Title/Summary/Keyword: 공인 인증

Search Result 965, Processing Time 0.029 seconds

Autoencoder and Semi-Supervised GAN-based candidate identity verification system in qualifying examination (자격시험에서 오토인코더 및 Semi-Supervised GAN 기반의 응시자 본인 확인 시스템 제안)

  • Lim, Se-Jin;Kim, Hyun-Ji;Kang, Yea-Jun;Kim, Won-Woong;Song, Gyeong-Ju;Yang, Yu-Jin;Oh, Yu-Jin;Jang, Kyung-Bae;Seo, Hwa-Jeong
    • Annual Conference of KIPS
    • /
    • 2021.11a
    • /
    • pp.659-662
    • /
    • 2021
  • 국내에서는 매년 많은 수의 자격시험이 치러지고 있다. 현재 대부분의 시험장에서 응시자 본인 확인 절차는 감독관이 응시자의 얼굴과 신분증 사진을 비교하는 방식으로 이루어진다. 하지만 이 방식은 사람에 따라 오차가 클 수 있으며, 사진과 눈에 띄는 차이가 없으면 동일인물로 판단하기 쉽다. 최근까지도 대리응시 이슈가 발생하고 있어 근절을 위한 보다 강력한 조치가 필요하다. 본 논문에서는 지문과 오토인코더, SGAN을 이용하여 대리응시방지를 강화할 수 있는 본인 확인 시스템을 제안한다. 이때 응시자의 지문정보가 그대로 인증 서버에 저장되면 응시자의 생체정보가 노출될 수 있다는 문제점이 존재한다. 따라서 오토인코더를 통해 지문의 특징점만 추출하여 인증용 이미지를 생성하고 이 이미지를 서버에 저장하여 학습시키도록 한다. 적은 학습데이터 환경에서 분류기로써 좋은 성능을 갖는 SGAN을 통해 인증 이미지와 응시자가 동일인물인지 확인할 수 있다. 서버가 공격을 받더라도 응시자의 지문데이터가 그대로 노출되지 않게 되어 보안 취약점을 극복할 수 있다.

Inter-Domain Verifiable Self-certified public keys (상이한 도메인에서 검증 가능한 자체 인증 공개키)

  • 정영석;한종수;오수현;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.71-84
    • /
    • 2003
  • Self-certified public keys need not be accompanied with a separate certificate to be authenticated by other users because the public keys are computed by both the authority and the user. At this point, verifiable self-certified public keys are proposed that can determine which is wrong signatures or public keys if public keys are used in signature scheme and then verification of signatures does not succeed. To verify these public keys, key generation center's public key trusted by users is required. If all users trust same key generation center, public keys can be verified simply. But among users in different domains, rusty relationship between two key generation centers must be accomplished. In this paper we propose inter-domain verifiable self-certified public keys that can be verified without certificate between users under key generation centers whose trusty relationship is accomplished. Also we present the execution of signature and key distribution between users under key generation centers use different public key parameters.

User Authentication Scheme for WiFi Access in a WiBro-based BWAN through Nomadic Access Relay Station (와이브로 기반의 광대역 무선 액세스 망에서 WiFi 액세스 사용자 인증 방안 설계 및 분석)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.11
    • /
    • pp.37-44
    • /
    • 2008
  • Recently, there have been intensive researches on the wireless Internet access through WiFi WLAN using WiBro network as backhaul link in the Internet service providing business area. However, in the wireless Internet access method, we need to solve the compatibility problem for different user authentications between licensed WiBro network and unlicensed WiFi network for billing and user management. In this paper, we propose an authentication method for WiFi users by BWAN operators through WiNNERs which is RS connecting the two networks, and discuss the effectiveness of the method.

A study on Certification System Model Development of Information and Communication Interoperability testing (정보통신 상호운용성 시험의 인증 체계 모델 개발에 관한 연구)

  • 김영태;박기식;김광현;조정호;이태훈
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7B
    • /
    • pp.1305-1312
    • /
    • 1999
  • To improve the quality of standards of information and communication, well-structured testing and certification procedure for interoperability must be established. Thus, the testing and certification by well-known organizations is very imperative to verify whether standards meet requirements of minimum components properly that are essential to implement products and services in practice focusing on interoperability testing area. In this paper, we investigate cases of abroad and the current situation of our country in order to establish the well-structured testing and certification system and promote researches for the testing and certification system as a national policy in coincidence with revision of relating systems in interoperability testing area. And then we intend to introduce desirable direction for the testing and certification system.

  • PDF

Design of an RFID Authentication Protocol Using Token Key and Hash Function (토큰키와 해쉬함수를 이용한 RFID 인증 프로토콜 설계)

  • Na, Young-Nam;Han, Jae-Kyun
    • 전자공학회논문지 IE
    • /
    • v.48 no.2
    • /
    • pp.52-60
    • /
    • 2011
  • RFID is method used on wireless system. However, this mechanism is not used for authentication and security. Therefore, it is very vulnerable to attacks such as dropping attacks and traffic attacks. the RFID Tags are of the limited nature due to environment factors and there is greater constraints in designing authentication protocol. If we do not RFID to secure corporate information and product all the information will be exposed. The attacker will break into the RFID system and stop the distribution system. So, this paper proposes a new authentication protocol which provides not only unlimited access to Tag&Reader and connection between Tag and Reader bet also provides authentication mechanism by defining the key distribution.

Design of Wireless LAM Authentication Mechanism for Fast Handoff Service based on PKI (공개키 기반구조에서 빠른 핸드오프를 위한 무선랜 인증 기법 설계)

  • 정종민;이주남;이구연
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.45-55
    • /
    • 2003
  • Wireless LAM has the advantage of extension, flexibility and easiness of installation and maintenance. However, due to the characteristics of wireless media, it is vulnerable to security attacks. PKI(Public Key Infrastructure) is estimated to be a good solution offering security function to wireless LAM including global roaming. It offers high security functions as authentication confidentiality and digital signature while it generates big overheads such as CRL search and certificate verification. The overheads can not be avoided during the initial authentication. However, when we consider the case of handoff, it can be minimized through the fast handoff. In this paper, we design a fast handoff authentication mechanism based on PKI in the wireless LAM and analyze the performance of the scheme.

Development of Material Qualification Method for LCM(Liquid Composite Molding) Process (항공기용 액상성형공정(Liquid Composite Molding) 복합재료 인증방안 개발)

  • Sung-In Cho
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.2
    • /
    • pp.71-77
    • /
    • 2023
  • Liquid Composite Molding (LCM), an Out of Autoclave (OoA) composite manufacturing process, has big advantages when making large and complex structures of airplanes. Since the importance of LCM process is increasing, FAA has suggested recommended guidance and criteria for the development of material and process specifications for LCM materials and process. The importance of LCM process is also raised by domestic composite material suppliers and OEM. This study suggested structures of material specifications and process specification of LCM materials. Material qualification method for LCM process and material was also developed in this study.