• Title/Summary/Keyword: 자체인증

Search Result 294, Processing Time 0.027 seconds

Analysis of Security Function of Smart Card & Requirement of Security Module (스마트카드의 보안 기능 및 사용자 보안 모듈의 요구사항에 관한 연구)

  • 김수진;안기범;문종철;윤혁중;원동호
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.68-71
    • /
    • 2002
  • 스마트카드는 휴대하기에 간편하고 사용하기에 편리하다는 장점으로 인해 세계 각국에서 전자상거래를 비롯한 다양한 분야에서 그 이용범위가 급속히 확대되고 있다. 현재 사용되고 있는 스마트카드가 자체적으로 어느 정도의 보안과 인증기능을 갖추고 있기는 하지만 아직까지 사용자 보안 모듈로서의 기능은 미비한 실정이다. 본 논문에서는 스마트카드가 가지고 있는 자체적 보안 특징과 기능적 보안 특징을 분석한 후, 이를 이용하여 스마트카드가 사용자 보안 모듈로 사용되기 위해 필요한 요구사항을 제안하고자 한다.

  • PDF

Verifiable Self-Certified Identification and Key-Distribution Protocols (검증 가능한 자체인증 개인식별 및 키분배 프로토콜)

  • Kim, Gyeong-Guk;Yu, Jun-Seok;Won, Dong-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.10
    • /
    • pp.2722-2727
    • /
    • 1999
  • In this paper we propose verifiable self-certified identification and key distribution protocols which has advantages of certificate-based scheme and Girault's self-certified public key. The security of the proposed protocols is based on ${\gamma}$\ulcorner-residuosity problem and discrete logarithm problem.

  • PDF

2-factor authentication using Keygen and Local-Storage in HTML5 on multiple devices (다중 디바이스에서 HTML5의 keygen과 Local-storage 기반의 2-factor 인증)

  • Lee, Gyu-Seok;Choi, Jin-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.853-856
    • /
    • 2012
  • 모바일 디바이스의 대중화와 SNS(Social Networking Service)의 발전은 각 개인이 데이터와 정보를 생성하는 Web 2.0 의 페러다임을 앞당겼으며 최근 SNS 서비스를 통하여 새로운 형태의 커뮤니케이션 형태가 생성되었다. 이러한 커뮤니케이션 도구를 이용하는 유저는 대부분 ID 와 Password를 기반으로 사용자를 인증하여 서비스를 제공받는다. 이와 같은 서비스에서는 각 사용자의 정보자체보다 사용자의 사회적 위치와 사용자간의 관계를 이용한 보안사고가 우려된다. 근래의 ID/Password로 인증하는 방식의 웹서비스 또는 정보서비스들은 대부분 개인 PC, 스마트폰, 업무 PC 등에서 접근하는 추세이며, 임의적 장소에서 임의의 기기로 해당 서비스에 접근하는 양상은 과거에 비하여 감소하는 추세다. 이 같은 추세에 따라, 주로 사용하는 기기에 HTML5의 keygen과 Web-Storage 기능을 사용하여 암호화된 Key를 생성하고 저장하여 ID 와 Password가 노출되어도 해당 기기가 아니면 인증되지 않는 시스템을 구현 할 수 있으며 타 기기의 경우 일회성을 갖는 인증 방식을 사용하여, 기존 보다 안전한 인증 시스템을 적은 비용으로 구축 할 수 있다.

Block-based Image Authentication Algorithm using Differential Histogram-based Reversible Watermarking (차이값 히스토그램 기반 가역 워터마킹을 이용한 블록 단위 영상 인증 알고리즘)

  • Yeo, Dong-Gyu;Lee, Hae-Yeoun
    • The KIPS Transactions:PartB
    • /
    • v.18B no.6
    • /
    • pp.355-364
    • /
    • 2011
  • In most applications requiring high-confidential images, reversible watermarking is an effective way to ensure the integrity of images. Many watermarking researches which have been adapted to authenticate contents cannot recover the original image after authentication. However, reversible watermarking inserts the watermark signal into digital contents in such a way that the original contents can be restored without any quality loss while preserving visual quality. To detect malicious tampering, this paper presents a new block-based image authentication algorithm using differential histogram-based reversible watermarking. To generate an authentication code, the DCT-based authentication feature from each image block is extracted and combined with user-specific code. Then, the authentication code is embedded into image itself with reversible watermarking. The image can be authenticated by comparing the extracted code and the newly generated code and restored into the original image. Through experiments using multiple images, we prove that the presented algorithm has achieved over 97% authentication rate with high visual quality and complete reversibility.

Effects of the Innovative Company Certification System on Technological Innovation Activities and Performance of SMEs (혁신형 기업 인증 제도가 중소기업의 기술적 혁신 활동과 성과에 미치는 영향)

  • Yoo, Hyoung Sun;Jun, Seung-pyo;Kim, Ji Hui
    • Journal of Korea Technology Innovation Society
    • /
    • v.20 no.4
    • /
    • pp.1212-1242
    • /
    • 2017
  • In this study, the effectiveness of the innovative company certification system, which is one of the important means of the SME innovation promotion policies, was examined in terms of technological innovation activity and performance. To this end, we used the results of 'SME Technology Statistical Survey' conducted by the Small and Medium Business Administration and the Korea Federation of Small and Medium Business in 2013~2015 to compare the innovative SMEs that have received the certifications such as Venture Certification, Innobiz Certification, and Mainbiz Certification with the general SMEs that did not. As a result, it was found that the innovative SMEs have comparative advantage in many detailed indicators related to the technological innovation activity and performance. However, the ratio of external use of R&D expenditure, the number of technology development attempts and the number of successes were not different according to the survey year, so it is necessary to strengthen the follow-up management of the system. On the other hand, the proportion of self-procurement R&D expenditure of the general SMEs was significantly higher than that of the innovative SMEs in all three-year surveys. Therefore, it is necessary to regulate the government funding for the innovative SMEs to be used as a complementary material, not as a substitute for their own R&D investment. In addition, the technological innovation activity and performance of a company were more influenced by the size of the company and the participating industry rather than by the certification, so it is necessary to consider it when establishing the technology innovation promotion policies.

A Study on Network Reliability Analysis for Information Security (정보 보호를 위한 네트워크 신뢰성 분석에 관한 연구)

  • Yu, Hyoung-Seok;Park, Hong-Keun;Ryu, In-Ho;Kim, Hyoung-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.10
    • /
    • pp.3935-3941
    • /
    • 2010
  • With the advent of high-speed communications networks, many authentication and access control systems are being introduced to combat network security issues like system hacking. But the fact is that the security systems for protecting information used in these networks are themselves weak. In response to the mounting demands of existing users, there is a clear need for a new authentication system that provides both safety and reliability. This research presents an authentication method with excellent access authorization (explicit and implicit authentication) and safety performance, demonstrated through its use in online networks.

A Framework for Establishing Cloud Service Certification Systems (클라우드 서비스 인증제도 수립을 위한 프레임워크)

  • Seo, Kwang-Kyu
    • Informatization Policy
    • /
    • v.18 no.1
    • /
    • pp.24-44
    • /
    • 2011
  • The evolution of cloud computing over the past few years is potentially one of the major advances in information technology. However, if cloud computing is to achieve its potential, there needs to be a clear identification and understanding of the various issues involved, both from the perspectives of the providers and the consumers of the technology. While a lot of research is currently taking place in the technology itself, there is an equally urgent need for understanding the business-related issues surrounding cloud computing service. As more and more information on individuals and companies are placed in the cloud service, concerns are beginning to grow about just how safe and reliable an environment it is. For successful implementation of cloud services, it is necessary to establish the certification systems to ensure the safety and reliability of cloud services. This paper provides a safe and reliable framework for cloud service certification systems. In order to develop it, the critical issues related to service quality and certification of cloud services have been identified and the systematic framework for certification systems of cloud services and service provider domains have been developed. An evaluation method for the developed certification systems is also proposed.

  • PDF

KSR-III 1단 롤 자세제어 시스템 인증시험

  • Jung, Ho-Lac;Jeon, Sang-Woon;Kim, Ji-Hun
    • Aerospace Engineering and Technology
    • /
    • v.2 no.1
    • /
    • pp.124-132
    • /
    • 2003
  • The function and performance test of the developed sub-system should be conducted before integrating into the total system. For the successful achievement of the flight test, the integration tests of sub-systems must be performed to eliminate and prevent abnormal conditions, which may happen due to ground problems, Electro-Magnetic Interference noises, and so on. This paper describes the certification test procedure and results for the roll axis attitude control system of Korea Sounding Rocket-III.

  • PDF

Home Observation System using Multimedia Streaming and Personalized Activate Pattern Analysis (멀티미디어 스트리밍 기술과 개인화된 행동 패턴 분석을 통한 홈 내 상황 감시 시스템)

  • Sung, Kyung-Sang;Kim, Hyun-Chul;Kim, Tae-Wook;Oh, Hae-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.241-244
    • /
    • 2005
  • 정보통신 기술의 급격한 발전으로 등장한 첨단 시스템의 활용과 지능형 홈에 대한 관심이 확산되고 있다. 홈 네트워킹 기술과 다양한 멀티미디어 응용의 발달로 생활의 편리화를 추구하기 위한 많은 노력들이 진행되고 있다. 본 논문에서는 유비퀴터스 컴퓨팅 환경에서 다양한 어플리케이션 서비스를 개발하기 위한 필수적인 요소인 멀티미디어를 기반으로 하며, 사용자의 신원확인을 위해 인증 및 접근 제어를 통한 사용자의 행동 패턴을 분석하여 그 정보를 이용한 자동화 처리 시스템에 적용하는 단일화 된 어플리케이션 모델을 제안한다. 또한 일정시간을 두어 캡쳐되어진 영상 이미지에 대한 일정 허용 범위에 대해 픽셀 단위로 비교를 하여 이상 유무를 확인하며, 12byte의 salt 함수를 해쉬화 알고리즘에 이용한 자체 인증 기법을 취함으로써 사용자 인증에 안전을 꾀했다.

  • PDF

Purchase Information Extraction Model From Scanned Invoice Document Image By Classification Of Invoice Table Header Texts (인보이스 서류 영상의 테이블 헤더 문자 분류를 통한 구매 정보 추출 모델)

  • Shin, Hyunkyung
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.383-387
    • /
    • 2012
  • Development of automated document management system specified for scanned invoice images suffers from rigorous accuracy requirements for extraction of monetary data, which necessiate automatic validation on the extracted values for a generative invoice table model. Use of certain internal constraints such as "amount = unit price times quantity" is typical implementation. In this paper, we propose a noble invoice information extraction model with improved auto-validation method by utilizing table header detection and column classification.