• Title/Summary/Keyword: 인증구조

Search Result 906, Processing Time 0.034 seconds

Development of the First LNG Bunkering Barge System in Korea (한국 최초의 LNG벙커링 바지시스템 개발)

  • Jung, Dong-Ho;Oh, Seung-Hoon;Jung, Jae-Hwan;Hwang, Sung-Chul;Sung, Hong-Gun;Lee, Jae-Ik;Kim, Eun-Seok
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2018.11a
    • /
    • pp.162-163
    • /
    • 2018
  • This study introduces the R&D project of development of the 1st LNG bunkering barge in Korea. The Design and pilot test of Barge-To-Ship 500cbm LNG bunkering barge system for coastal trading LNG-fueled ship is proposed. The following technologies will be developed from the project ; Basic/Detail design and pilot test of LNG Bunkering barge system, Basic/Detail design and pilot test of LNG bunkering process system considering LNG loading/unloading, Basic/Detail design and pilot test of 500cbm LNG tank in type-C, Evaluation of bunkering performance according to conditions (environment, SIMOPs) by numerical simulation, Performance evaluation of bunkering barge, towed barge and Barge-To-Ship motion considering ocean environment load, and scenario in Barge-To-Ship LNG bunkering. This project will contribute expansion to LNG-fueled ship industry and pave the way to establish LNG bunkering hub port.

  • PDF

Proposal for a Custody and Federated Service Model for the Decentralized Identity (분산 ID 보관 및 연계 서비스 모델 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.513-525
    • /
    • 2020
  • Until today, the personal information of subjects has been centralized in many companies or institutions. However, in recent days, the paradigm has gradually changed in the direction that subjects control their personal information and persue their self-sovereignty. Globally, individual data sovereignty is strengthened by the European Union's General Data Protection Regulation(GDPR) and the US California Consumer Privacy Act(CCPA). In Korea, a few alliances consist of various companies are creating technology research and service application cases for decentralized ID service model. In this paper, the current decentralized ID service model and its limitations are studied, and a improved decentralized ID service model that can solve them is proposed. The proposed model has a function of securely storing decentralized ID to the third party and a linkage function that can be interoperated even if different decentralized ID services are generated. In addition, a more secure and convenient model by identifying the security threats of the proposed model and deriving the security requirements, is proposed. It is expected that the decentralized ID technology will be applied not only to the proof of people but also to the device ID authentication management of the IoT in the future.

Improvement of Performance for Online Certificate Status Validation (실시간 인증서 상태검증의 성능개선)

  • Jung, Jai-Dong;Oh, Hae-Seok
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.433-440
    • /
    • 2003
  • According as the real economic activities are carried out in the cyber world and the identity problem of a trade counterpart emerges, digital signature has been diffused. Due to the weakness for real-time validation using the validation method of digital signature, Certificate Revocation List, On-line Certificate Status Protocol was introduced. In this case, every transaction workload requested to verify digital signature is concentrated of a validation server node. Currently this method has been utilized on domestic financial transactions, but sooner or later the limitation will be revealed. In this paper, the validation method will be introduced which not only it can guarantee real-time validation but also the requesting node of certificate validation can maintain real-time certificate status information. This method makes the revocation management node update the certificate status information in real-time to the validation node while revoking certificate. The characteristic of this method is that the revocation management node should memorize the validation nodes which a certificate holder uses. If a certificate holder connects a validation node for the first time, the validation node should request its certificate status information to the above revocation management node and the revocation management node memorizes the validation node at the time. After that, the revocation management node inform the revocation information in real-time to all the validation node registered when a request of revocation happens. The benefits of this method are the fact that we can reduce the validation time because the certificate validation can be completed at the validation node and that we can avoid the concentration of requesting certificate status information to a revocation node.

The Development of High Pressure Long Distance Fire-fighting Hose with Phosphorescent Performance (축광 성능을 갖는 고압용 장거리 호스 개발에 관한 연구)

  • Han, Yong-Taek;Na, Byung-Gyun;Choi, Jin-Seong;Min, Se-Hong
    • Fire Science and Engineering
    • /
    • v.31 no.5
    • /
    • pp.63-69
    • /
    • 2017
  • This study describes the development of a long-distance hose for ultra-high pressure operation, which can be used in conjunction with an ultra-high pressure pump and can be effectively applied to the fire suppression of high-rise buildings and a long, large tunnels. Also, it has phosphorescent properties, which can help to secure the withdrawal route of the fire-fighters when they are threatened by the fire. We developed an ultra-high pressure hose aiming at a pressure of 3 MPa and a flow rate of 2000 lpm and developed an ultra-high pressure fire hose that can withstand this very high pressure by using a double jacket, triple polyurethane coating and warf (Wp) of 52. In order to ensure the performance of the developed ultra-high pressure hose, its structure, appearance, leakage at high pressure, length and elongation were inspected by a certified certification agency, who also subjected it to a peeling test, friction test, breaking pressure test and free fall test. Also, it was studied in addition to the luminescent high-pressure hose for fire-fighting. In the phosphorescence test, the luminance measurement value was more than the reference value of the luminance test after 40 minutes, which confirmed that its performance was satisfactory for fire-fighting products. In the future, if such an ultra-high pressure fire hose were commercialized and applied in the field, it could contribute to securing improved fire suppression and safer exit from fires, as compared to the fire hoses currently used in the suppression of fires in skyscraper buildings and long tunnels.

A Case Study on the Development of Technology Rating Model for Investment (투자용 기술평가모형 개발사례 연구)

  • Hong, Jae-bum;Bae, Do Yong;Shim, Ki Jun;Hwang, Yujin;Kim, Sung-tae
    • Journal of the Korean Data Analysis Society
    • /
    • v.20 no.6
    • /
    • pp.2993-3002
    • /
    • 2018
  • This case study introduces the process of developing the technology rating evaluation model for investment. The technology evaluation rating model for investment is a project that the Financial Services Commission and the Ministry of Commerce, Industry and Energy collaborated to expand the scope of technology finance from loan to investment. The technology evaluation model for investment was developed with the aim of predicting high growth companies. The model consists of a statistical model and an expert model. Here, statistical models were modeled by using logistic regression analysis. Expert models gathered opinions of experts and identified the weight of each evaluation item and set the model. The rating system of the model is composed of 10 grades. The distribution of the model was consistent with KTRS grade distribution. Interestingly, the emphasis is on technology and marketability. In the technology valuation grade model for the goddess, there is a considerable difference from the emphasis on managerial competence or business performance.

Development of Safety Performance Functions and Level of Service of Safety on National Roads Using Traffic Big Data (교통 빅데이터를 이용한 전국 도로 안전성능함수 및 안전등급 개발 연구)

  • Kwon, Kenan;Park, Sangmin;Jeong, Harim;Kwon, Cheolwoo;Yun, Ilsoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.5
    • /
    • pp.34-48
    • /
    • 2019
  • The purpose of this study was two-fold; first, to develop safety performance functions (SPF) using transportation-related big data for all types of roads in Korea were developed, Second, to provide basic information to develop measures for relatively dangerous roads by evaluating the safety grade for various roads based on it. The coordinates of traffic accident data are used to match roads across the country based on the national standard node and link system. As independent variables, this study effort uses link length, the number of traffic volume data from ViewT established by the Korea Transport Research Institute, and the number of dangerous driving behaviors based on the digital tachograph system installed on commercial vehicles. Based on the methodology and result of analysis used in this study, it is expected that the transportation safety improvement projects can be properly selected, and the effects can be clearly monitored and quantified.

Secure Key Exchange Protocols against Leakage of Long-tenn Private Keys for Financial Security Servers (금융 보안 서버의 개인키 유출 사고에 안전한 키 교환 프로토콜)

  • Kim, Seon-Jong;Kwon, Jeong-Ok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.119-131
    • /
    • 2009
  • The world's widely used key exchange protocols are open cryptographic communication protocols, such as TLS/SSL, whereas in the financial field in Korea, key exchange protocols developed by industrial classification group have been used that are based on PKI(Public Key Infrastructure) which is suitable for the financial environments of Korea. However, the key exchange protocols are not only vulnerable to client impersonation attacks and known-key attacks, but also do not provide forward secrecy. Especially, an attacker with the private keys of the financial security server can easily get an old session-key that can decrypt the encrypted messages between the clients and the server. The exposure of the server's private keys by internal management problems, etc, results in a huge problem, such as exposure of a lot of private information and financial information of clients. In this paper, we analyze the weaknesses of the cryptographic communication protocols in use in Korea. We then propose two key exchange protocols which reduce the replacement cost of protocols and are also secure against client impersonation attacks and session-key and private key reveal attacks. The forward secrecy of the second protocol is reduced to the HDH(Hash Diffie-Hellman) problem.

A Study on the Policy Agenda for Activating PC Apartment using Focus Group Interview(FGI) (FGI를 사용한 PC공동주택 활성화 정책과제 모색)

  • Bae, Byung-Yun;Kang, Tai-Kyung;Shin, Eun-Young;Kim, Kyong-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.12
    • /
    • pp.888-895
    • /
    • 2020
  • In the construction industry, off-site construction (OSC) is drawing attention as a production method due to changes in working hours and the supply and demand of manpower. In 1991, there was a policy of spreading and expanding the use of precast concrete (PC) apartment homes, but they have not been actively used so far since they were discontinued due to quality problems. In this study, policy tasks were analyzed to motivate the application of OSC-based PCs in the apartment housing sector, and policy directions were derived by conducting focus group interviews (FGI). Nine policies are suggested regarding the following topics: PC apartment supply quantity provision, priority application of public housing, priority supply of public housing, preferential floor area ratio, funding, tax support, improvement of business area structure, improvement of delivery method, factory certification system, and training of experts. The results of the FGIs are as follows. First, in order to revitalize PC apartment homes, leading efforts from the public sector are required. Second, rather than reorganizing the business sector or introducing a new delivery method, a policy direction that induces the strengthening of cooperation is desirable. Third, PC activation should be promoted on an institutional basis for securing appropriate construction costs and quality.

An Analysis of Road User Acceptance Factors for Fully Autonomous Vehicles : For Drivers and Pedestrians (완전 자율주행자동차에 대한 도로이용자 수용성 요인 분석 : 운전자 및 보행자를 대상으로)

  • Jeong, Mi-Kyeong;Choi, Mee-Sun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.5
    • /
    • pp.117-132
    • /
    • 2022
  • The purpose of this study is to analyze factors that affect road users' acceptance of fully autonomous vehicles (level 4 or higher). A survey was done with drivers of general cars and pedestrians who share roads with fully autonomous vehicles. Five acceptability factors were selected: trust towards technology, compatibility, policy, perceived safety, and perceived usefulness. The effect on behavioral intention was analyzed using structural equation modeling (SEM). The perceived safety and trust towards technology were found to be very important in the acceptance of fully autonomous vehicles, regardless of the respondent, and policy was not influential. Compatibility and perceived usefulness were particularly influential factors for drivers. In order to improve the acceptance by road users, securing technical completeness of fully autonomous vehicles is important. Certification and evaluation of the safe driving ability of fully autonomous vehicles should be thoroughly performed, and based on the results, it is necessary to improve the perception by road users. It is necessary to positively recognize fully autonomous vehicles through education and publicity for road users and to support their smooth interaction.

Workflow Procedures and Applications in BIM-based Design for Safety (DfS) (BIM 기반 설계안전성검토의 업무 절차와 활용 방안에 관한 연구)

  • Jaewoong Hwang;Heetaek Yoon;Junhyun Bae;Youngkon Park
    • Land and Housing Review
    • /
    • v.15 no.2
    • /
    • pp.125-137
    • /
    • 2024
  • A conventional Design for Safety (DfS), introduced to eliminate potential hazards in the design phase proactively, has encountered persistent challenges, such as perfunctory risk assessments and hazard identifications based on 2D drawings and inefficient workflow processes. This study proposes a BIM-based approach to Design for Safety (DfS) to address the limitations of conventional methods, aiming to enhance efficiency and achieve practical safety management benefits. The proposed workflow process for BIM-based DfS has been refined and validated for on-site applicability through various case studies, including risk assessments during the design phase and field applications for safety management activities during the construction phase. Specifically, the critical process of risk assessment within the DfS methodology has also been transitioned to a BIM-based approach. This BIM-based risk assessment process has been evaluated through case studies, encompassing safety reviews for structural design, construction equipment operation, and construction methodology with sequence in design projects. Additionally, the proposed BIM-based DfS has demonstrated exceptional on-site applicability and efficiency, as validated by the application of a BIM deliverable embedded in DfS information for CDE-based daily activity briefing, VR-based safety training, AR-based mitigation measures inspections, and other safety management activities in the construction phase.