• Title/Summary/Keyword: 이용자 통합인증체계

Search Result 6, Processing Time 0.02 seconds

Authentication System Construction in a high-speed IP Infrastructure using Spam Sever (SPAM 서버를 이용한 초고속 IP 기반의 인증시스템 구축)

  • Lee Jae-Wan;Ko Nam-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.7
    • /
    • pp.1501-1505
    • /
    • 2004
  • The authentication system of high-speed internet in IP-infra is not warm enough to administration of systematic authentication information for user's legalization, connection right and resources allocation in order to both methods of authentication-unauthentication connection system according to transmission method . Also unauthentication connection raises a difficulty condition to user's needs satisfaction in order to a load weighting of system and network and a drop of transmission speed. Accordingly, this study brings forth authentication system construction in a high-speed IP infrastructure using spam sever able to construct the suitable network condition according to unifying authentication-unauthentication system for single authentication system.

A Study on the Building of Integrated Service for Science and Technology Knowledge Infrastructure Supporting the Entire R&D Cycle (R&D 전주기 지원형 과학기술 지식인프라 통합서비스 구축에 관한 연구)

  • Lee, Seok Hyoung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.31 no.3
    • /
    • pp.235-256
    • /
    • 2020
  • The purpose of this study is to define a method of building an integrated service to provide various science and technology knowledge infrastructures that are helpful in R&D activities, and to show the cases that are adapted the methodologies. Knowledge infrastructures scattered throughout the entire R&D cycle, such as generating/development of ideas, finding the R&D project, performing the project, and spreading results, are segmented in terms of services, functions, information, and data, and links and converges to provide the knowledge infrastructure that desired by users in one place. We define the integrated service classification, integration level model, integrated architecture, and integrated user authentication system in consideration of logical linkage and integration rather than physical integration of individual knowledge infrastructures. Also, we considered the extensibility as the reference model for building of similar integrated service.

A Design for Single Web Authentication at Network Service Foundation (네트워크 서비스 기반의 단일 웹 인증 설계)

  • Lee, Jae-Wan;Ban, Kyung-Sig;Kim, Hyoung-Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.457-460
    • /
    • 2007
  • Recently, Network companies have introduced security solutions to protect the network from intrusions, attacks and viruses but the network has still weakness and vulnerability. It is time to bring more stable and reliable authentication system that would meet the Internet user's need. In this study, Current broadband networks don't have hierarchic and stable authentication solutions. And so, an integrated and hierarchic system is needed to provide a various kinds of application services.

  • PDF

A Design for Unified Web Authentication at Network Service Foundation (네트워크 서비스 기반의 단일 웹 인증설계)

  • Ban, Kyung-Sig;Lee, Jae-Wan;Kim, Hyoung-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2171-2178
    • /
    • 2008
  • Recently, Network companies have introduced security solutions to protect the network from intrusions, attacks and viruses but the network has still weakness and vulnerability. It is time to bring more stable and reliable authentication system that would meet the Internet user's need. In this study, Current broadband networks don't have hierarchic and stable authentication solutions. And so, an integrated and hierarchic system is needed to provide a various kinds of application services. I'd like to present a new authentication system which is based on unified web authentication design. It will unit various authentication systems that have been deployed in various network environment and reinforce network security to provice a various kinds of application services in a stable and safe environment. that is a simple and more secure method for fighting a rise in card-not-present fraud.

Improvement of the Certification Model for Enhancing Information Security Management Efficiency for the Financial Sector (금융권 정보보호 관리 효율을 제고하기 위한 인증모형 개선방안)

  • Oh, Eun;Kim, Tae-Sung;Cho, Tae-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.541-550
    • /
    • 2016
  • Considering the results of the 3.20 Cyber Attack, leaks of personal information by card companies, and so on, convenience and efficiency cannot be guaranteed without security as a prerequisite. In addition, it is more likely that customers' interests seem to be interfered with in financial institutions than in any other industry. Therefore, when a security accident occurs, users may suffer mental damage and monetary loss, leading to class action, customer defection, loss of reputation, and falloff in international credibility, which all may have a significant effect on the business continuity of corporations. This study integrates the representative information security certification systems in order to improve the efficiency of information security management and demonstrate the necessity of information security management system certification for the financial sector. If the certification is needed, we would like to recommend the desirable development direction.

A Study on the Introduction of Library Services Based on Blockchain (블록체인 기반의 도서관 서비스 도입 및 활용방안에 관한 연구)

  • Ro, Ji-Yoon;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.371-401
    • /
    • 2022
  • If the blockchain means storing information in a distributed environment that cannot be forged or altered, it is mentioned that this is similar to what librarians collect, preserve, and share authoritative information. In this way, this study examined blockchain technology as a way to collect and provide reliable information, increase work efficiency inside and outside the library, and strengthen cooperative networks. This study attempted to propose various ways to utilize blockchain technology in book relations based on literature surveys and case studies in other fields. To this end, this study first analyzed the field and cases of blockchain application to confirm the possibility and value of blockchain application in the library field, and proposed 12 ways to utilize it based on this. The utilization model was proposed by dividing it into operation and service sectors. In the operation sector, it is a digital identity-based user record storage and authentication function, transparent management and traceable monitoring function, voting-based personnel and recruitment system, blockchain governance-based network efficiency function, and blockchain-based next-generation device management and information integration function. The service sector includes improved book purchase and sharing efficiency due to simplification of intermediaries, digital content copyright protection and management functions, customized service provision based on customer behavior analysis, blockchain-based online learning platforms, sharing platforms, and P2P-based reliable information sharing platforms.