• 제목/요약/키워드: 안전인증

Search Result 2,790, Processing Time 0.03 seconds

Software Implementation of WAVE Security Algorithms (WAVE 보안 알고리즘의 소프트웨어 구현)

  • Kang, Jung-Ha;Ok, Sung-Jin;Kim, Jae Young;Kim, Eun-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.3
    • /
    • pp.1691-1699
    • /
    • 2014
  • IEEE developing WAVE specifications are able to support V2V and V2I wireless communications, and these functionalities can be used to enhance vehicle operational safety. To overcome any security weaknesses that are inherent in wireless communications, WAVE specification should support message encryption and authentication functions. In this study, we have implemented WAVE security algorithms in IEEE P1609.2 with openssl library and C language. We have verified the normal operation of implemented software, using the test vectors of related specifications, and measured their performance. Our software is platform independent, and can be used for the full implementation of WAVE specification.

B2B Security Design of XML Signature (XML Signature를 이용한 기업간(B2B) 보안모듈 설계)

  • Park, Jung-Hwan;Jee, Seok-Jin;Jang, Woo-Young;Im, Doo-Wook;Shin, Dong-Kyoo;Shin, Dong-Il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10a
    • /
    • pp.141-144
    • /
    • 2000
  • XML은 단순함과 융통성이라는 특징을 가지고 있기 때문에 Internet B2B(Business to Business) 메세지 송수신을 용이하게 한다. Internet B2B에서 메세지 송수신을 하는 데 있어서 보안이 점차 중요하게 대두되고 있다. 인터넷은 공용 네트워크이므로 도청과 위조와 같은 공격에 어떠한 보호장치도 있지 않기 때문에 메시지가 송수신되는 동안 자신의 중요한 정보가 다른곳으로 유출되거나 손실될 경우 B2B 메시지 송수신에 있어서 크나큰 손실을 가져올 수 있다. SSL(Secure Socket Layer)은 transport-level 보안 프로토콜이 제공하는 인증, 무결성, 기밀성을 제공하고 있다. 하지만 부인방지를 제공하고 있지 못하고 있는 실정이다. 하지만 XML-Signature를 이용하면 이러한 문제점을 해결할 수 있고 프로토콜 차원이 아닌 어플리케이션 차원에서 보안 시스템을 설계하므로 B2B 간 메시지 송수신하는데 있어서 서버와 클라이언트에 각각 XML-Signature 사용하여 안전하게 통신 할 수 있도록 해주는 보안모들 설계를 소개한다.

  • PDF

A Study for Method of the User Authentication and Security apply to the Type of Function password in the Embedded System and Electronic Commerce (임베디드 시스템과 전자상거래에서 함수형 패스워드방식의 사용자 인증 및 보안 방법에 대한 연구)

  • Lee, Eun-Ser;Moon, Ho-Young;Lee, Sang-Ho
    • The KIPS Transactions:PartD
    • /
    • v.14D no.4 s.114
    • /
    • pp.363-372
    • /
    • 2007
  • Password, a traditional user confirmation method that is used for more than 100 years, has become useless as a lot of transactions are dealt by indirect contacts. As a result, an alternative for password is required now. In this paper, we propose a novel confirmation method, which is called Brain-Key. It uses an indirect password input method. It reduces the risks due to hacking, and prevents a big credit accident because it prevents passwords to be reused. Our proposed model has general applicability so that it can be applied in domestic market as well as international markets. This research may provide solutions for the security problems in the electronic commerce.

Investigation on Damage Tolerance of Thick Laminate for Aircraft Composite Structure (항공기 복합재 구조에 적용된 두꺼운 적층판의 손상 허용 기준 평가)

  • Park, Hyun-Bum;Kong, Chang-Duk;Shin, Chul-Jin
    • Composites Research
    • /
    • v.25 no.4
    • /
    • pp.105-109
    • /
    • 2012
  • Recently, development of a small aircraft has been carried out for the BASA(Bilateral Aviation Safety Agreement) program in Korea. This aircraft adopted all composite structures for environmental friendly by low fuel consumption due to its lightness behavior. However the composite structure has disadvantage which is very weak against impact damages. Therefore, damage allowable design of aircraft structure must be performed considering compressive fracture strength. This point is very important for certification of composite structure aircraft. In this paper, it is performed the research on damage tolerance of thick laminate adopting aircraft structure. The damage tolerance of three different types of thick laminates such as no damage, open hole and impact damage is evaluated under compression loading.

Electronic Payment Protocol using GDHP Blind Signature Scheme (GDHP 은닉서명기법을 이용한 전자지불 프로토콜)

  • Lee, Hyun-Ju;Rhee, Chung-Sei
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.12-20
    • /
    • 2006
  • In this paper, we propose electronic payment protocol using GDHP blind signature scheme to activate e-business in the wire/wireless integrated environment. The protocol applied elliptic curve algorithm on the GDHP base and improved the efficiency of the existing blind signature technique on the basis of communication frequency and calculation number. And the protocol accelerated speed and strengthened safety against man-in-the-middle attacks and forward secrecy because the certification between individuals is performed by the session key created by Weil paring using elliptic curve cryptosystem in the limited entity $F_q$ instead of the certification used in the existing PayWord protocol.

  • PDF

Comparison Study on Take-Off and Landing Flight Test Using Ground Observation and DGPS Method (지상관측법 및 DGPS 기법을 활용한 이/착륙 성능 비행시험 비교)

  • Lee, Sang-Jong;Chang, Jae-Won;Jeon, Byoung-Ho;Seong, Kiej-Jeong;Yeom, Chan-Hong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.37 no.9
    • /
    • pp.931-938
    • /
    • 2009
  • The flight test is last means of compliance to satisfy airworthiness standards and important to evaluate the performance and safety of the developed aircraft. The flight test technologies are obtained from great numbers of experiences and know-hows and protected. In addition, flight test should be conducted efficiently since its various test conditions and items. Therefore, it is requisite to secure efficient flight test methods. This paper discusses the flight test methods for take-off and landing performance and two kinds of techniques are proposed. By performing real flight tests, they are compared with each other and analyzed through the flight analysis.

Research of specification development & application methods for Occupational Health and Safety management System in industry (산업안전 및 보건(OH&S)경영체제 인증규격 개발과 적응 방법에 관한 연구)

  • 문재승;유왕진;우태희
    • Journal of Korean Society for Quality Management
    • /
    • v.29 no.1
    • /
    • pp.184-190
    • /
    • 2001
  • Industrial structure is more developed, the economical value of human resources and the cases which risks worker's Health & Safety is expended. The Safety & Health issues are focused on elements of control for management activity simultaneously with work environment as well as the risk elements which risks worker's life and body. The activity for combination of basic management System and Safety & Health management is progressing with active discussion in ILO, BS 8800 is specified the guidance of Occupational Safety & Health Management System in UK. 1996. This research refers to BS 8800:1996, specification as a basic model, and introduce of the result of certification development result in Occupational Safety & Health management System with in ISO 14001 Environmental System Standards & ISO 9001 Quality Management System Standards and Systemic Factors. Through this applicability and efficiency evaluation, we make an effort to support and to improve the specification. Also applicability evaluation of Occupational Safety & Health management System and the specification developed for the purpose of the third party certification is applied with expending in industry, and the method is presented through the case which is required to support for method review and activities.

  • PDF

A Study on the Localized Key Management Using AAA in Mobile IPv6 (Mobile IPv6 상에서 AAA 기반의 지역화된 키 관리 기법에 관한 연구)

  • Kim Mi-Young;Mun Young-Song
    • Journal of Internet Computing and Services
    • /
    • v.4 no.1
    • /
    • pp.19-25
    • /
    • 2003
  • Mobile IPv6 services exposes its vulnerability when a mobile node is roaming across the subnets which belongs to the different domains. The AAA Infrastructure Is strongly recommended when the ISPs need to authenticate the mobile user come from the different domains. In addition to the basic requirements for AAA service, the authentication latency and AAA message overhead should be minimized for contiguity of the service. This paper considers the roaming service with AAA infra structure in Mobile IPv6 and proposes the key distribution method to authenticate the mobile node with secure manner by reducing and optimizing the exchanged messages for AAA entities.

  • PDF

Integrity Metadata Based of Multi CMSs System Providing Protection Copyright of Web Contents (웹 콘텐츠 저작권 보호를 제공하는 통합 메타데이터 기반의 다중 CMS 시스템)

  • Cho, Young-Bok;Li, Yong-Zhen;Sun, Ning;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.6C
    • /
    • pp.520-528
    • /
    • 2008
  • At present Content Management Systems (CMS) with various and diverse web contents have been in wide applications. But, for CMS of each enterprise has its own metadata which is very different from others, it causes the serious problem of web contents repetition. Also, it's a difficult technology to support protecting copyright of web contents which are in separated CMSs. Therefore, in this paper, we solved the problem of contents repetition through metadata integration between mutually heterogeneous CMSs. We also propose the technology of web contents authentication code for avoiding contents repetition and applying digital rights protection by supporting safe ship in vast quantity of contents.

A Framework for Biometric Security based on OTP in Mobile Devices (모바일 장치에서 OTP 기반의 바이오 인식 보안을 위한 프레임워크)

  • Han, Seung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.4
    • /
    • pp.121-127
    • /
    • 2012
  • Biometric technology has been proposed as a new means to replace conventional PIN or password because it is hard to be lost and has the low possibility of illegal use. However, unlike a PIN or password, there is no way to modify the exposure if it is exposed and used illegally. To solve the problems, we propose to apply OTP using biometric information to mobile devices for more secure and adaptable authentication. In this paper, we propose a secure framework for delivering biometric information as mobile OTP to the server (TTP) and compared this paper with existed methods about security and performance.