• Title/Summary/Keyword: 리드 인증

Search Result 9, Processing Time 0.023 seconds

An Effect Analysis for Improvement of Information Lead Time on Supply Chains : A Case Study of Manufacturing Industry (제조업 공급체인에서 정보리드타임 개선의 효과 사례분석)

  • Kim, Chul-Soo;Kim, Garp-Choong
    • The KIPS Transactions:PartD
    • /
    • v.10D no.1
    • /
    • pp.161-166
    • /
    • 2003
  • Information lead time is defined as the time spent by processing orders from some buyers, whereas order lead time is defined as producing and supplying the products. The information lead time significantly serve to magnify the increase in variability due to demand forecasting. This paper models a decentralized supply chain composed of cascade type which has four type phases (or divisions) such as retailer, wholesaler, distributor, and factory. Each phases is managed by different centers individually with their own local inventory information. We investigate whether each phase's Information lead time affects companies networked a value chain. In particular, on several experiments performed with a programmed simulation (like a MIT beer game), we study the following question ; Can information lead times do better than material lead times in cost-benefit perspective\ulcorner Can more much Information lead times in downstream reasonably do worser than in upstream when playing the simulation\ulcorner In the conclusion, we show the importance of information lead time on a SC and, besides, guarantee that improvement of information lead time in upstream do more effective than one in downstream in cost-benefit perspective.

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

Improved RFID Authentication Protocol Based on SSG (SSG기반 개선된 RFID 인증 프로토콜)

  • Park, Taek-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.4
    • /
    • pp.311-317
    • /
    • 2011
  • Recently, RFID is substituted for bar codes according to advance in the ubiquitous computing environments, but the RFID system has several problems such as security and privacy because it uses radio frequencies. Firstly, unauthorized reader can easily read the ID information of any Tag. Secondly, Attacker can easily fake the legitimate reader using the collected Tag ID information,such as the any legitimate tag. This paper proposed improved RFID authentication protocol based on SSG. SSG is organized only one LFSR and selection logic. Thus SSG is suitable for implementation of hardware logic in system with extremely limited resources such as RFID tag and it has resistance to known various attacks because of output bit stream for the use as pseudorandom generator. The proposed protocol is secure and effective because it is based on SSG.

A Study of The Use of Multidata and Euclidean Distance for The Robust Iris Recognition System (홍채인식시스템 성능향상을 위한 유클리드 거리값과 멀티데이터 사용에 관한 연구)

  • 손진호;장자인;이일병
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04b
    • /
    • pp.628-630
    • /
    • 2004
  • 홍채 인식 시스템은 영상 획득과 전처리, 특징 추출, 등록, 인증/증명의 다섯 단계로 나누어진다. 시스템의 성능 향상을 위해서는 모든 부분이 중요하나 본 논문에서는 특징 추출에 중심을 두고 양쪽 눈의 홍채 정보를 결합하여 실험하였다. 양쪽 눈의 홍채 정보를 결합했다 함은 영상 획득과 전처리를 거쳐 얻어진 양쪽 눈 영상에서 하위 90도 영역을 잘라 붙여서 홍채 영상을 만들고 그 데이터를 사용했음을 의미한다. 특징 추출에는 2단계의 wavelet transform을, 인식에는 유크리드 거리값을 사용하였다. 실험을 통해서 단일 홍채 시스템에 비해 향상된 결과를 얻을 수 있었다.

  • PDF

Principles of Design for Hybrid Information Service Model (하이브리드 정보서비스 모델의 설계원칙)

  • 노진구
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.3
    • /
    • pp.87-114
    • /
    • 2001
  • A hybrid information environment can be described as one where an appropriate range of heterogeneous information services is presented to the user in a consistent and integrated way via a single interface. The purpose of this study is to suggest a need of hybrid information services through understanding of the hybrid information environment and hybrid library. Additionally, this study deal with basic concepts of design for a hybrid information service model and address a number of hybrid library projects based on these concepts, such as Agora, BUILDER, HealdLine, HyLife, and MALIBU. Finally, this study survey generic a model of hybrid library and suggest basic principles for building of hybrid information service model, such as integration, seamlessness, authentication, interconnectivity, and personalization of information seeking process environment.

  • PDF

An Improved High-Performance Protocol for Security Vulnerability of GSM based on SIM Card (SIM 카드 기반 보안 취약성을 개선한 고성능 GSM 보안 프로토콜)

  • Kim, Hee-Jung;Jeon, Ha-Yong;Lee, Ju-Hwa;Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.7
    • /
    • pp.902-911
    • /
    • 2007
  • GSM platform is a hugely successful wireless technology and an unprecedented story of global achievement. In less than ten years since the first GSM network was commercially launched, it became the world's leading and fastest growing mobile standard, using over 1 billion GSM subscribers across more than 200 countries of the world. GSM platform evolved into 3th generation mobile communication which includes not only voice call services but also the international roaming and various kinds of the multimedia services. GSM is an essential element techniques a safe data transmission and a personal private protection while support services. However, a crypto algorithm and a secure protocol for a safe data communication using GSM are indicating various kinds of problems. In this paper, we propose a more safer and more efficient authentication protocol in 3th generation network through analysis of GSM security mechanism of 2th/2.5th generation. This security protocol offers enforced security efficiency by using user verification between SIM/ME and reduction of authentication and key agreement step between SIM/ME/AuC.

  • PDF

A Study on the Sustainable University Building Planning Case Study - Focused on the Case Study of Recent Overseas Universities Building Planning - (지속가능한 대학 건물 계획사례 연구 -최근의 해외 대학 사례를 중심으로-)

  • Ahn, Yong-Hwan
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.19 no.2
    • /
    • pp.51-58
    • /
    • 2012
  • In the 21st century numerous universities continue to have an interest in building a more sustainable campus. The concept related to sustainable development and sustainability is applied to new master plan of university or university building planning. The field of sustainable development can be conceptually broken into three constituent parts: environmental sustainability, economic sustainability and social sustainability. The realization of sustainable development will become when considered eco-friendly life of users, not only environmentally friendly technologies. This study aims to research the method of sustainable access to university building planning in Europe and Canada. First, certification and standards will focused on acquisition Green Building Certification. Then we look at trends of sustainability based on users and community through the system of prior consultation between university and users. For the desirable development of the sustainable campus, the sustainable planning of campus should be investigated with campus community, members and local residents considering the generation, the preservation, the maintenance of existing building.

A Study on the Design and Implementation of a DSSS-based MODEM for a Right Termination System(FTS) (대역확산방식 비행종단시스템의 모뎀설계와 구현에 관한 연구)

  • Lim Keumsang;Kim Jaehwan;Cho Hyangduck;Kim Wooshik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2C
    • /
    • pp.175-183
    • /
    • 2006
  • This letter proposes a Direct Sequence Spread Spectrum (DS-SS)-based Flight Termination System(FTS) and show the simulation results and implements the system using FRGAs. The DS-SS FTS has immunity interference signals and the influence of jamming signal. Moreover, a DS-SS FTS can provides effects on an authentication and encryption with spread codes. And the system uses more less power than an analog FM system. We used Reed-Solomon (32, 28) code and triple Data Encryption Standard(3DES) for error correction and data encryption. Also we used counter algorithm for unauthenticated device's attack The spread codes of In-phase channel and Quadrature channel were generated by Gold sequence generators. The system was implemented in Altera APEX20K100E FPGA for the ground system and EPF10K100ARC240-3 for the airborne system.

Experimental Verification of Heat Sink for FPGA Thermal Control (FPGA 열제어용 히트싱크 효과의 실험적 검증)

  • Park, Jin-Han;Kim, Hyeon-Soo;Ko, Hyun-Suk;Jin, Bong-Cheol;Seo, Hak-Keum
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.42 no.9
    • /
    • pp.789-794
    • /
    • 2014
  • The FPGA is used to the high speed digital satellite communication on the Digital Signal Process Unit of the next generation GEO communication satellite. The high capacity FPGA has the high power dissipation and it is difficult to satisfy the derating requirement of temperature. This matter is the major factor to degrade the equipment life and reliability. The thermal control at the equipment level has been worked through thermal conduction in the space environment. The FPGA of CCGA or BGA package type was mounted on printed circuit board, but the PCB has low efficient to the thermal control. For the FPGA heat dissipation, the heat sink was applied between part lid and housing of equipment and the performance of heat sink was confirmed via thermal vacuum test under the condition of space qualification level. The FPGA of high power dissipation has been difficult to apply for space application, but FPGA with heat sink could be used to space application with the derating temperature margin.