• Title/Summary/Keyword: 오픈 인증

Search Result 46, Processing Time 0.033 seconds

Design and Consideration of Aids to Navigation service platform (항로표지 서비스 플랫폼 설계 및 고려 사항)

  • Gyeong-Min Jo;Tae-Hee Kim
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.301-302
    • /
    • 2023
  • A service platform was designed to provide smart aids to navigation services with the standardized format and to manage user authentication and access rights. To meet the requirements of the service platform, Keycloak, an open source OIDC implementation, was used for user authentication, and the S-100 feature catalogue versioning method was used for service management. To standardize internal service data to S-100, we designed a minimum standard format for mapping internal service data to S-100 data using JSON Schema.

  • PDF

A study on WBAN based Kerberos Authentication System using PIDS of OpenEMed (WBAN을 기반으로 한 OpenEMed의 PIDS를 이용한 Kerberos 인증)

  • Lee, Jae-Gwang;Kim, Young-Hyuk;Lim, Il-Kown;Lee, Jae-Pill;Lee, Jae-Kwang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.734-737
    • /
    • 2012
  • 인체 무선망이란 USN(Ubiquitous Sensor Network)을 통해 환자의 생체 정보를 실시간으로 수집하는 환경이다. 이를 기반으로 원격지에서 생체 정보를 전달 받는 시스템이 u-RPMS(USN Remote Patient Monitoring System)이다. u-RPMS에서 실시간으로 환자의 정보들이 발생하는데 이때 실시간으로 발생한 정보들은 공유가 불가피하다. 환자의 생체 정보는 생명과 연결되기 때문에 공유할 때 안전이 중요하다. 하지만 u-RPMS에서는 무선 통신으로 동작하기 때문에 보안에 취약하며, 이를 보안하기 위해서 서버와 DB(Data Base) 사이에 인증 서버를 통해서 해결 할 것을 제시한다. 본 연구에서는 인체 무선망을 기반으로 해서 모듈화 된 오픈 소스 원격진료 플랫폼인 OpenEMed의 개인 확인 서비스(PIDS, Personal Identification Service)를 이용해 네트워크를 기반으로 한 Kerberos 인증을 제안한다.

A study on the FIDO authentication system using OpenSource (OpenSource를 이용한 FIDO 인증 시스템에 관한 연구)

  • Lee, Hyun-Jo;Cho, Han-Jin;Kim, Yong-Ki;Chae, Cheol-Joo
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.5
    • /
    • pp.19-25
    • /
    • 2020
  • As the number of mobile device users increases, research on various user authentication methods has been actively conducted to protect sensitive personal information. Knowledge-based techniques have the disadvantage that security is deteriorated due to easy exposure of authentication means, and proprietary-based techniques have a problem of increasing construction cost and low user convenience to use the service. In order to solve this problem, a FIDO authentication system, which is a user authentication method using a smart device, has been proposed. Since the FIDO authentication system performs authentication based on the biometric information of the user, the risk of the authentication means being leaked is low, and since the authentication information is stored in the user's smart device, the user information due to server hacking is solved. Through this, it is possible to select and utilize user authentication technology suitable for the security level of the service. In this paper, we introduce the FIDO authentication system, explain the main parts required for FIDO UAF client-server development, and show examples of implementation using UAF open source provided by ebay.

Design and Implementation of eduroam Authentication-Delegation System (eduroam 사용자 대리인증 시스템의 설계 및 구현)

  • Lee, KyoungMin;Jo, Jinyong;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1730-1740
    • /
    • 2016
  • This paper introduces a guest identity provider system for eduroam which is a global Wi-Fi service targeting users enrolled in higher education and research institutions. Developed eduroam AND (AutheNtication Delegation) system enables users to create their eduroam user accounts and to access eduroam regardless of their locations. Users with no organizational eduroam account therefore can freely access eduroam using the system. A federated authentication model is implemented in the system, and thus the system has merits of having high accessibility, indirectly verifying users and organizations possible, saving management overhead. Status monitoring is essential because authentication request and response messages are routed by eduroam network. eduroam AND performs active monitoring to check service availability and visualizes the results, which increases operational and management efficiency. We leveraged open-source libraries to implement eduroam AND and run the system on KREONET (Korea REsearch Open NETwork). Lastly, we present implementation details and qualitively evaluate the system.

Java Card-based User Authentication and Personalized IPTV Services in 3G Mobile Environment (개인 맞춤형 IPTV 서비스를 위한 자바카드 기반의 사용자 인증 메커니즘)

  • Park, Youn-Kyoung;Lim, Sun-Hee;Yun, Seung-Hwan;Yi, Ok-Yeon;Lee, Sang-Jin
    • Journal of Broadcast Engineering
    • /
    • v.13 no.4
    • /
    • pp.528-543
    • /
    • 2008
  • Internet Protocol Television (IPTV) provides an interactive and personalized service for realizing integrated broadcasting and telecommunication services. Set-top box (SIB) connected to TV is an essential component required for IPTV and has a unique hardware identifier used in identification and authentication. It means that subscriber authentication based on box-level identification is inconsistent with IPTV's main intention of providing personalized services. The proposed solution is to provide an opportunity to use the flexible user-centric authentication mechanism through Java Card applets in IPTV application server and 3G networks. This paper suggests personalized services by moving the user's private data and authentication management beyond the STB to a truly personalized device, the ubiquitous mobile phone. In addition, this paper presents effectiveness and security analysis for verifying the proposal.

Pre/Post processor for structural analysis simulation integration with open source solver (Calculix, Code_Aster) (오픈소스 솔버(Calculix, Code_Aster)를 통합한 구조해석 시뮬레이션 전·후처리기 개발)

  • Seo, Dong-Woo;Kim, Jae-Sung;Kim, Myung-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.9
    • /
    • pp.425-435
    • /
    • 2017
  • Structural analysis is used not only for large enterprises, but also for small and medium sized ones, as a necessary procedure for strengthening the certification process for product delivery and shortening the time in the process from concept design to detailed design. Open-source solvers that can be used atlow cost differ from commercial solvers. If there is a problem with the input data, such as with the grid, errors or failures can occur in the calculation step. In this paper, we propose a pre- and post-processor that can be easily applied to the analysis of mechanical structural problems by using the existing structural analysis open source solver (Caculix, Code_Aster). In particular, we propose algorithms for analyzing different types of data using open source solvers in order to extract and generate accurate information,such as 3D models, grids and simulation conditions, and develop and apply information analysis. In addition, to improve the accuracy of open source solvers and to prevent errors, we created a grid that matches the solver characteristics and developed an automatic healing function for the grid model. Finally, to verify the accuracy of the system, the verification and utilization results are compared with the software used.

A Study on the Method of Creating Variables for MQ-based Signature Schemes Using a Drone Sensor as a Seed (드론 센서를 시드로 활용한 MQ 기반 서명 기법의 변수 생성 방안)

  • Cho, Seong-Min;Hong, Eun-Gi;Kim, Ae-Young;Seo, Seung-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.204-207
    • /
    • 2018
  • IoT 기기 및 드론의 사용자 인증 및 기기 인증을 위해 RSA, ECDSA 등의 여러 전자서명 기법이 기본적으로 사용되고 있다. 그러나 양자 컴퓨터의 개발에 따라 Shor 알고리즘을 이용한 기존 암호 알고리즘의 공격이 가능해지고, 그에 따라 기존 암호 알고리즘의 보안성이 취약해지는 문제가 있다. 따라서 양자 내성 암호를 활용한 보안 체계의 필요성이 대두되고 있는 가운데, 본 논문에서는 양자 내성 암호인 다변수 이차식 기반의 전자서명 기법 중 Rainbow를 드론에 최적화하여 구현하기 위한 방안을 검토 및 분석하고자 한다. 그러나 기존의 Rainbow에서 사용하는 openssl 등의 오픈소스 암호 라이브러리는 PC에 맞춰 설계되었기 때문에 드론에서 난수를 생성할 때 적용이 어려운 점이 있다. 드론에는 각종 센서들이 내장되어 있으며, 센서 데이터들은 난수성을 보장하기에 용이하다. 따라서 드론의 각종 센서들을 시드로 활용하며, XOR 보정기를 통해 난수성을 해치지 않으면서 드론에서 난수를 생성할 수 있는 방안을 제안해 보고자 한다.

안전한 IoT 서비스를 위한 디바이스 보안과 플랫폼 보안 연동

  • Kim, Haeyong;Ji, JangHyun;Awaludin, Asep Muhamad;Kim, Howon
    • Review of KIISC
    • /
    • v.28 no.5
    • /
    • pp.26-30
    • /
    • 2018
  • 사물인터넷 서비스는 다양한 기능과 성능을 갖는 디바이스와 게이트웨이, 플랫폼, 서비스가 서로 상호 연동/통신함으로써 실현된다. 해당 서비스의 안전성 및 신뢰성을 보장하기 위해선 서비스 각 구성 요소에 적절한 보안 기술이 필요하다. 서비스 및 API 수준에서는 OpenID-connect, OAuth2, SAML, XACML과 같은 인증/인가, 접근 제어 기법이 필요하며, 플랫폼 및 프로토콜 수준에서는 MQTT, CoAP, HTTPS, RSPF 프로토콜 및 보안 절차가 필요하다. 한편, 이들 보안 기술은 공통적으로 TLS/DTLS 보안 프로토콜을 사용한다는 특성을 가진다. 이에, 본 논문에서는 사물인터넷의 디바이스, 게이트웨이, 플랫폼에서 손쉽게 사용될 수 있도록 TLS/DTLS 보안 칩 개발 사례를 소개하고 이를 TLS 오픈 소프트웨어 스택인 mbedTLS와의 연동 사례를 소개함으로써 사물인터넷 구성 요소에 공통적으로 활용 가능한 보안 기술 구현 사례를 살펴본다.

An Analysis of the Growth, Education and Academic Research Trends of iSchools (iSchool 대학의 발전, 교육 및 연구 동향 분석)

  • Chang, Yunkeum
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.48 no.1
    • /
    • pp.369-386
    • /
    • 2014
  • The iSchool movement has been rapidly spread out since the foundation of iSchool Caucus (iCaucus) in 2005, which currently 52 schools have joined across 16 countries. This research aims to investigate the advances in this movement and its impact on education and research in the field of library and information science (LIS) in order to explore future trends in LIS education and research. To do so, this study classifies 21 ALA-accredited iSchools into three groups suggested by King (2006) and comparatively analyzes each group in terms of its temporal advances and curriculum characteristics. Moreover, as the new movement of Massive Open Online Courses (MOOCs) has been rapidly progressing with the initiative of North American schools since 2012, this study also intends to diagnose the possibility of its spillover effect in LIS education by examining application cases.

Static Analysis and Improvement Opportunities for Open Source of UAV Flight Control Software (무인비행체 비행제어 Open Source 소프트웨어에 대한 정적분석 및 개선방안)

  • Jang, Jeong-hoon;Kang, Yu-sun;Lee, Ji-hyun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.6
    • /
    • pp.473-480
    • /
    • 2021
  • In this paper, We analyze and present improvements to problems in software quality through Static Analysis for Open Source, which is widely used as the Flight Controller software for small unmanned aerial vehicle drones. MISRA coding rules, which are widely applied based on software quality, have been selected. Static analysis tools were used by LDRA tools certified international tools used in all industries, including automobiles, railways, nuclear power and healthcare, as well as aviation. We have identified some safety-threatening problems across the quality of the software, such as structure of open source modules, analysis of usage data, compliance with coding rules, and quality indicators (complexity and testability), and have presented improvements.