• Title/Summary/Keyword: 인증 프로그램

Search Result 496, Processing Time 0.03 seconds

Course Embeded Program Outcome Assesment-Based on the Exams and the Reports (교과목 성취도에 근거한 학습성과의 평가 -시험과 보고서를 위주로)

  • Park, Yoon-Kook
    • Journal of Engineering Education Research
    • /
    • v.9 no.3
    • /
    • pp.62-66
    • /
    • 2006
  • Although it has taken some time to apply the accreditation system in Korea, most programs have a very difficult time in assessing program outcomes, one of the most important standards in accreditation. The major purpose of this work is to suggest a method, so called course embedded assessment, by which to assess a course that includes several program outcomes. The course was evaluated based on student performance on each exam taken in the course as well as a report submitted by the students. The course embedded assessment provides not only an effective tool by which to assess course-set program outcomes, but also allow the instructor to follow up and/or modify the course material to be offered in next semester.

A Study on Developing the Evaluation Items for the Green Libraries Certification (녹색도서관 인증을 위한 평가항목 개발에 관한 연구)

  • Noh, Younghee
    • Journal of the Korean Society for information Management
    • /
    • v.32 no.3
    • /
    • pp.99-130
    • /
    • 2015
  • This study was conducted to develop and propose the evaluation indicators to evaluate the eco-friendliness of the library, when certified as the eco-friendly Green Libraries. To do this, we extracted the green library components through an analysis of the green library literatures and case studies, and surveyed the perceptions of the library staffs about the assessment factors. Finally, we developed the green library evaluation index with 11 evaluation areas, 31 evaluation items, and 135 evaluation indicators. The 11 evaluation areas are as follows; Land use and transportation, energy and environmental protection, materials and resources, water cycle management, maintenance management, ecological environment, the indoor environment, the library resources, the eco-education programs and campaigns, the staff and operations, and the computerization.

A Study on Conditional Access System for Data Confidential using Smart-Card (스마트 카드를 이용한 자료 유출 제한 시스템에 대한 연구)

  • 김신홍;이광제
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.5
    • /
    • pp.125-131
    • /
    • 2000
  • In this paper, we proposed conditional access algorithm for data confidential using smart card. This algorithm is constructed smart card and E-mail gateway for restricting of user's illegal confidential data transmission. After processing of certification procedure in smart card, each E-mail forwarded to E-mail gateway(EG). The EG selects outgoing E-mail and it is sent to fire-wall E-mail processing program, it is checked attached file in transmission mail and if it is attached file, it writes to database. This time, it can be used evidence data about user's illegal confidential data transmission, because of using registered content and smart card certification data in database. in addition to, we can get psychologically effect of prevention to send illegally, and this system can prevent spam mail in EG, also.

  • PDF

Authentication Design for Digital Signature Algorithm in P2P Base (P2P상에 전자서명 알고리즘 인증 설계)

  • Lee, Jeong-Ki;Moon, Jung-hwan;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.888-891
    • /
    • 2003
  • 개방형 네트워크를 통한 전자거래는 무엇보다도 거래의 신뢰성 제고 측면에서 집중적으로 논의되고 있는데 이를 확보하기 위한 중요한 수단으로서 전자서명과 인증제도 방안이 가장 주목을 받고 있다. 전자서명은 기술적으로 암호기술을 이용하여 통신내용의 무결성과 기밀성을 보장받고, 법적으로는 근거법의 제정을 통하여 전자문서와 전자서명의 효력을 부여받아 그 신뢰성을 확보하게 되는 것이다. 특히 P2P기반의 개방형 시스템 환경에서 신뢰성, 무결성, 부인금지와 같은 각종 기술적 선결과 제들을 해결하고 거래의 신뢰성을 제고하기 위한 여러 가지 전자서명 방안들 중에서도 현재까지 공개키 암호화방식과 일방적 해쉬함수의 추출물 알고리즘을 결합한 디지털서명이 가장 믿을 만한 전자서명 방안으로 인정받고 있는 실정이다. 본 연구는 P2P 전자서명 모델에 개인 간 전자서명모델 이론을 조명하고 P2P 전자문서를 안전하고 신뢰성 있게 이용 할 수 있는 여건을 조성 할 수 있도록 공개키 암호기술에 기반을 두었으며 P2P상에서 전자서명 프로그램이 원활히 작동하도록 설계하고 전자 서명된 문서가 변질되지 않고 상호간의 사용자에게 신뢰할 수 있도록 하였다.

  • PDF

RAM(Rolling Airframe missile) Canister Localization on development of technical process and Quality Assurance procedure establishment (RAM(Rolling Airframe Missile) 발사관 국산화에 대한 공정 기술 개발 및 품질 인증 절차 확립)

  • Lee, Sang-Woo;Jo, Jung-Pyo;Lee, Sang-Jae
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2010.11a
    • /
    • pp.541-547
    • /
    • 2010
  • This document presents the research and result about localization of the fiber-based launching canister of rolling missile which has helical rails. This document is about the technical process development which is included with the manufacturing of helical rails and application of the flame spaying which is different with other the fiber-based launching canister in korea. and And this document is about quality Assurance procedure through the qualification test and structural evaluation in conditions that the canister has to have in real shipboard environment.

  • PDF

The Hardware Design of Integrated Security Core for IoT Devices (사물인터넷 기기를 위한 통합 보안 코어의 하드웨어 설계)

  • Gookyi, Dennis A.N.;Ryoo, Kwangki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.584-586
    • /
    • 2017
  • In this paper we provide a unified crypto core that integrates lightweight symmetric cryptography and authentication. The crypto core implements a unified 128 bit key architecture of PRESENT encryption algorithm and a new lightweight encryption algorithm. The crypto core also consist of an authentication unit which neglects the use of hashing algorithms. Four algorithms are used for authentication which come from the Hopper-Blum (HB) and Hopper-Blum-Munilla-Penado (HB-MP) family of lightweight authentication algorithms: HB, HB+, HB-MP and HB-MP+. A unified architecture of these algorithms is implemented in this paper. The unified cryptosystem is designed using Verilog HDL, simulated with Modelsim SE and synthesized with Xilinx Design Suite 14.3. The crypto core synthesized to 1130 slices at 189Mhz frequency on Spartan6 FPGA device.

  • PDF

Enhancement of Iris Masking Security using DNN and Blurring (DNN과 블러링을 활용한 홍채 마스킹 보안 강화 기술)

  • Seungmin Baek;Younghae Choi;Chanwoo Hong;Wonhyung Park
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.141-146
    • /
    • 2022
  • The iris, a biometric information, is safe, unique, and reliable, such as fingerprints, and is personal information that can significantly lower the misrecognition rate than other biometric authentication. However, due to the nature of biometric authentication, it is impossible to replace it if it is stolen. There is a case in which an actual iris photo is taken and 3d printed so that the eyes work as if they were in front of the camera. As such, there is a possibility of iris leakage through high-definition images and photos. In this paper, we propose to improve iris masking performance by supplementing iris region masking research based on existing blurring techniques. Based on the results derived in this study, it is expected that it can be used for the security of video conference programs and electronic devices.

The Secure Key Store to prevent leakage accident of a Private Key and a Certificate (인증서와 개인키 유출 방지를 위한 보안키 저장소 Secure Key Store)

  • Park, Young-Jin;Kim, Seon-Jong;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.31-40
    • /
    • 2014
  • In Korea, the Public Key Infrastructure (PKI) has been introduced. For secure information transmission and identification, the electronic signature authorization system of a certificate-based is built, and then the service provide.The certificate is stored in location what users can easily access and copy. Thus, there is a risk that can be stolen by malware or web account hacking. In addition, private key passwords can be exposed by the logging tool, after keyboard security features are disabled. Each of these security weaknesses is a potential conduit for identity theft, property/asset theft, and theft of the actual certificates. The present study proposes a method to prevent the private key file access illegally. When a certificate is stored, the private key is encrypted by the dependent element of the device, and it is stored securely. If private key leakage occurs, the retrieved key could not be used on other devices.

Implementation of Embedded Biometrics Technologies : A Case of a Security Token for Fingerprints (임베디드 생체 인식 기술 구현 : 지문 보안 토큰 사례)

  • 김영진;문대성;반성범;정용화;정교일
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.6
    • /
    • pp.39-46
    • /
    • 2003
  • Biometric technologies using biometric information like fingerprints features are in wide use for the secure user authentication in many services including log-in of computer systems, entrance ID and E-commercial security. Nowadays, biometric technologies are ported into small embedded systems like security tokens or smart cards due to the merit of being secure and automatic in comparison with the previous method in user authentication such as using a PIN. In this paper, the security token developed as an embedded system and tile user authentication system implemented and tested using fingerprints information are described. Communications between the security token and tile host are tested and verified with USB. And, execution time and runtime memory on tile security token board was measured and performance improvement was described. In addition, requisites for the transit from the security token to the match-on-card was mentioned.

Design and Implementation of File Access Control System using Java Card (자바카드를 이용한 파일 접근제어 시스템의 설계 및 구현)

  • Koo, Eun-Bee;Woo, Chan-Il
    • 전자공학회논문지 IE
    • /
    • v.43 no.1
    • /
    • pp.46-51
    • /
    • 2006
  • Recently, smart card system which is known as easy to portable and also safe from physical, electrical, and software attack is observed to manage information that becomes the target of security in safety. And java card graft upon java technology to smart card platform is having very good advantage with object-oriented techniques and also, java card have the open type OS that can show the same action in different hardware characteristic which allows various application programs. In this paper, we introduced independent execution characteristic of java platform because being set to each smart card was uncomfortable till now and we designed access control member card that allows several administrators in different access privilege by single card using java card. Several administrators can approach to various information of file type that is included on issued card to user by using different PIN. In the proposed method, confirmation of personal information, administration contents update, demand by contents, is possible by single card. At this moment, wish to do safer user certification that improve security limitation which is from PIN, used for user certification, and signature data. In the proposed method, as design and implementation of utilization technology of java card, biometrics, user certification which uses multi PIN, provide that more safety and conveniently.