• Title/Summary/Keyword: 안전인증

Search Result 2,790, Processing Time 0.033 seconds

Compliance procedure for type certification of civil aircraft under KAS 23 (KAS 23급 민간항공기 형식증명을 위한 적합성 입증절차)

  • Kim, Jong Yoon;Lee, Wonjoong;Kim, Kwang Hae
    • Aerospace Engineering and Technology
    • /
    • v.11 no.2
    • /
    • pp.216-224
    • /
    • 2012
  • This study described about the procedure and method to type certification of KAS 23 civil aircraft that is developed in domestic. It is important to obtain type certification within defined period based on the proposed process and method to prove compliance through certification basis according to certification plan. This process referred to FAA Order 8110.4 C, "Type Certification" and domestic regulation and showed example of compliance check list(CCL) defining means of compliance(MOC). Also, proposed method to prove compliance according to means of compliance and classified item of test & evaluation.

A Study on Multi-Media Contents Security Using Android Phone (안드로이드 폰을 이용한 멀티미디어 콘텐츠 보안에 관한 연구)

  • Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.1
    • /
    • pp.19-25
    • /
    • 2012
  • This paper tries to solve the problems which previous methods have such as the WCDRM(Watermark and Cryptography DRM) and the model using smart card for protecting digital contents. This study provides a contents distribution model to protect the rights of author, distributor, and user as well as user's information by using technologies such as cryptography, DRM(Digital Right Management), access control, etc. The proposed system is evaluated as the most safety model compared with previous methods because it not only solves the problems which the previous methods have, but also protects four type of risks such as use of contents which other mobile devices download, the attack on the key to decode the message, the attack on leaking the contents, and the internal attack such as an illegal reproduction.

Certificate Management System of MANET for Stable Ubiquitous Service (안전한 유비쿼터스 서비스를 위한 MANET의 인증서 관리 시스템에 관한 연구)

  • Oh Suk-Sim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.9
    • /
    • pp.1558-1564
    • /
    • 2006
  • This study addressed security requirements for ad-hoc network environments, which lies at the hour of the ubiquitous computing revolution and proposed a partially-distributed certificate management system that can ensure security in mobile ad-hoc networks. The proposed model is characterized by ie ability to handle dynamic mobility of nodes, minimize routing load and enhance expandability of network by allowing participating nodes to authenticate each other without being interrupted by joining the cluster. The security, efficiency and robustness of the proposed model were evaluated through simulation.

On a Enhanced Mobile OTP generator design using Transaction (이체정보를 활용한 강화된 모바일 OTP 생성기 설계)

  • Park, Beum-Su;Cho, Sang-Il;Kim, Tae-Yong;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.227-228
    • /
    • 2010
  • Generated One-Time Password (OTP) is used only once. This attributes is to safety than to repeated use the same password. Recently, Park's proposed on "Design of A One-time Password Generator on A Mobile Phone Providing An Additional Authentication for A Particular Transaction" use challenge-response based one-time password generator. However, Challenge exchange problem and currently OTP the same security level. In this paper, Park's proposed OTP generator design for us analysis. And then presents a resolution to the problem and new system logic. New system strong to Man-In-Middle attack and replay attack. In addition, OTP security level is higher.

  • PDF

A Design and Implementation of A Rule-based Security Evaluation System for W Security Engine (IP Security 엔진을 위한 규칙기반 보안평가 시스템의 설계 및 구현)

  • Gwon, Hyeok-Chan;Hyeon, Jeong-Sik;Kim, Sang-Chun;Na, Jae-Hun;Son, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.367-374
    • /
    • 2002
  • IPsec offers not odd Internet security service such as Internet secure communication and authentication but also the safe key exchange and anti-replay attack mechanism. Recently IPsec is implemented on the various operating systems. But there is no existing tool that checks the servers, which provide IPsec services, work properly and provide their network security services well. In this paper, we design and implement the rule based security evaluation system for IPsec engine. This system operated on Windows and UNX platform. We developed the system using Java and C language.

A Framework and Evaluation Index Design for Establishing Agricultural Work Safety and Health Farm Certification Systems in Korea (한국형 농작업 안전보건 농가 인증제도 수립을 위한 프레임워크 및 평가항목 설계)

  • Kim, Insoo;Chae, Hye-Seon;Lee, Kyung-Suk;Kim, Kyung-Ran
    • The Korean Journal of Community Living Science
    • /
    • v.26 no.4
    • /
    • pp.749-760
    • /
    • 2015
  • This study establishes a safe and healthy farm certification system for Korean farmers and presents the certification system and assessment items. Existing certification systems for safety and health were compared through a review of local and international studies as well as an examination of advanced examples. Then the certification system and assessment items were objectively verified through an expert evaluation process. As a result, four domains of certification participation, implementation, certification evaluation, and post management were identified as components of the certification system. For assessment measures, 6 categories, 21 factors, and 96 items were derived. The results are expected to be used as basic data in establishing a foundation for the implementation and operation of a certification system appropriate for distinct characteristics of the Korean agricultural sector.

Development of an Hazard Analysis Critical Control Point (HACCP) Application Model for Dried Anchovy Workplace (마른멸치 작업장의 식품안전관리인증기준(HACCP)모델 개발)

  • YOON, Hyun-Jin;HAM, In-Tae;Kim, Sang-Hyeon;CHOI, Jong-Duck
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.3
    • /
    • pp.713-726
    • /
    • 2016
  • This study were attempted to apply the HACCP system adopted in the dried anchovy workplace to ensure the hygiene safety of dried anchovy workplace. In this study, HACCP system procedures, including HACCP team organization, determination of critical control point(CCP), establishment of critical limits, mornitering and verification etc., were established using KFDA 12 procedures. To determine whether hazards were critical elements, we evaluated the likelihood and seriousness of each hazard element. The likelihood of residual microorganism and metal piece exceeding the acceptable limit in dried anchovy products were demonstrated to be a critical hazard element. Management of the boiling(CCP-1B) and metal detection(CCP-2P) were determined to be a critical control point. The standards for acceptable residual microorganism and metal piece were set based on relevant laws and regulations, and then the limits were adapted and established for the CCP. An HACCP plan applicable to dried anchovy workplace was established.

An Efficient Security Protocol for Transaction in Mobile Data Network (모바일 데이터 망에서의 거래를 위한 효율적인 보안 프로토콜)

  • Kim, Jang-Hwan;Rhee, Chung-Sei
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.43-51
    • /
    • 2006
  • The existing electronic transaction protocol uses a cryptography algorithm that is not suitable for mobile environment because of limited memory and process ability. In this paper, we propose an efficient transaction protocol suitable for mobile embedded system. The proposed protocol reduces computation and process time by using ID-based cryptography algorithm and ECC (elliptic curve cryptosystem). It uses vendor authentication only in the first transaction, and from the second transaction, it requires transaction after authentication with session created by applying ECC technique. Therefore, the creation number of authentication for the vendor can be reduced from n to one. And it reduces process time because it provides the same security with 160 bits as with 1024 bits of RSA.

  • PDF

Analysis of Mobility and Security Requirements for Mobile IPTV (모바일 IPTV의 이동성에 대한 침해 분석 및 대응방안)

  • Lee, Sun-Young
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.37-44
    • /
    • 2010
  • The mobility is one of the most important factor for mobile IPTV. However, mobility is highly vulnerable to eavesdropping and unauthorized access. Generally mobility of mobile services is based on handover techniques. But we showed that mobile IPTV must use other techniques to confirm mobility. In this paper, we analyzed security of wibro mobile IPTV from the viewpoint of mobility. We considered DCAS host must include new addresses of mobile devices. We analyzed total number of authentication for the proposed method. So we showed that proposed method was more efficient than wibro-mobile IPTV. We compared the security of our proposal to the security requirements of TTA.

The proposal of improved secure cookies system based on public-key certificate (인증서 기반의 개선된 보안 쿠키의 설계와 구현)

  • 양종필;이경현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.11C
    • /
    • pp.1090-1096
    • /
    • 2002
  • The HTTP does not support continuity for browser-server interaction between successive visits or a user due to a stateless feature. Cookies were invented to maintain continuity and state on the Web. Because cookies are transmitted in plain and contain text-character strings encoding relevant information about the user, the attacker can easily copy and modify them for his undue profit. In this paper, we design a secure cookies scheme based on X.509 public key certificate for solving these security weakness of typical web cookies. Our secure cookies scheme provides not only mutual authentication between client and server but also confidentiality and integrity of user information. Additionally, we implement our secure cookies scheme and compare it to the performance with SSL(Secure Socket Layer) protocol that is widely used for security of HTTP environment.