• Title/Summary/Keyword: 전자인증

Search Result 1,516, Processing Time 0.024 seconds

Design of V2I Based Vehicle Identification number In a VANET Environment (VANET 환경에서 차대번호를 활용한 V2I기반의 통신 프로토콜 설계)

  • Lee, Joo-Kwan;Park, Byeong-Il;Park, Jae-Pyo;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.12
    • /
    • pp.7292-7301
    • /
    • 2014
  • With the development of IT Info-Communications technology, the vehicle with a combination of wireless-communication technology has resulted in significant research into the convergence of the component of existing traffic with information, electronics and communication technology. Intelligent Vehicle Communication is a Machine-to-Machine (M2M) concept of the Vehicle-to-Vehicle. The Vehicle-to-Infrastructure communication consists of safety and the ease of transportation. Security technologies must precede the effective Intelligent Vehicle Communication Structure, unlike the existing internet environment, where high-speed vehicle communication is with the security threats of a wireless communication environment and can receive unusual vehicle messages. In this paper, the Vehicle Identification number between the V2I and the secure message communication protocol was proposed using hash functions and a time stamp, and the validity of the vehicle was assessed. The proposed system was the performance evaluation section compared to the conventional technique at a rate VPKI aspect showed an approximate 44% reduction. The safety, including authentication, confidentiality, and privacy threats, were analyzed.

Analysis of Near Field for Base Station Panel Antenna(4 X 2 Dipole Array) (기지국용 판넬 안테나(4 X 2 Dipole Array)의 근역장 분석)

  • Lee, Dugro;Park, Ju-Derk;Choi, Jae-Ic;Kim, Nam
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.15 no.5
    • /
    • pp.473-479
    • /
    • 2004
  • In this paper, power density in near field is calculated about analytic object which has comparatively large volume in considering used wavelength such as cellular base station antenna. Panel sector antenna which is used widespreadly in domestic cellular wireless communication system is modeled and electromagnetic field distribution in reactive near field region is calculated by FDTD (Finite Difference Time Domain) method. After that, antenna gain in far field region is obtain by near to far transformation. Power spectral density in radiated near field is calculated in applying to gain-based model with antenna gain in far field. Finally, compliance distance is obtained in considering the result from radiated near field calculation and basic restrictions on occupational and general public exposure limits in ICNIRP guideline. In the center of main radiating position, the result from gain-based model is -14.55 ㏈m and the result from surface scanning method is -15.75 ㏈m. When the losses from cables and connectors used in measurement are considered, the results from gain-based model and surface scanning method are nearly coincident.

A Web Accessability Compliance Framework for Website Development: A Case of W Bank Internet Banking Project - (웹사이트 개발을 위한 웹접근성 준수 프레임워크: - W 은행 인터넷 뱅킹 시스템 구축 사례 -)

  • Kim, Yoosin;Jeong, Seung Ryul
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.87-99
    • /
    • 2013
  • As Internet advances, websites with simpel HTML pages are changing to complex web application systems with enormous contents and various services. With this trend, it is noted that situations where Web accessibility of the old and the handicapped is inhibited are growing. To solve this problem, The Disability Discrimination Act has been enacted since April 2013. This act triggers massive website reorganization efforts. However, in order for the huge and sophisticated web applications and web sites to ensure a web accessibility, a framework is required to throughout the web site development. Based on thorough review of website development methodologies, web accessibility compliance standards, and various web accessibility issues related to website characteristics, this study proposes a practice oriented "Web Accessibility Compliance Framework". The current study also examines the usefulness and value of this framework by applying it to the internet banking development project of W bank and receiving a certificate for high quality website complying web accessibility standards.

RMCS Plan and the Embodiment for the Home Network Service which is Safeent (안전한 Home Network 서비스를 위한 RMCS 설계 및 구현)

  • Sun, Jae-Hoon;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.19-27
    • /
    • 2005
  • As home network is increasing to use, home network industry is developing too. Also, it is to be a popular subject in the network's topics. In this reasons, home network become a important thing because home gateway function is working between access network and home network. In the home network, it relates on the personal computer, home pad, and digital television. But, home gateway is not prepared standard point about techniques. Therefore, many kind of technique want to try for developing of home gateway's functions. Usually, we use ID/PASSWORD method in network control system. But, we found a lot of problems about classical network system while we experienced Jan/25 big trouble. We are considering about that home network system are using same network net. Therefore, seriously we have to check about security and safety at the home network's environment. This report focus on the home network's environment to control for using and efficiency and then it wants to find ways to protect from the internal and external attacks. Existing ID/PASSWORD method it used a electronic signature and the security against the approach from of external watch, the MIB structure of role base and the security of the Home network which leads the authority control which is safe even from the Home network inside it strengthened it used compared to it proposed.

  • PDF

Improvement of ICT SMEs Technology Support Programs using Exploratory FGI and Delphi techniques (탐색적 FGI와 Delphi기법을 활용한 ICT 중소기업 기술지원 프로그램 개선 방안 연구)

  • Lee, Hyung-Ju;Lee, Yong-Hun;Park, So-Ra;Lee, Il-Jin
    • Journal of Digital Convergence
    • /
    • v.15 no.9
    • /
    • pp.35-46
    • /
    • 2017
  • This study aim to figure out the limitation of existing ICT SMEs technology support programs conducted by Government Funded Research Institute. To investigate the limitations of SMEs programs, we conducted Focus Group Interview(FGI) with staff in charge of R&D department of beneficiaries(ICT SMEs). The results of FGI show that SMEs have troubles with the lack of R&D manpower, R&D infrastructure and non-R&D activities. Then, we conducted Delphi survey(derived from FGI) with related field experts to ask the problems and limitations of SMEs programs. The Results of Delphi show that SMEs programs has limitations with avoiding of SMEs support staff, lack of public R&D infrastructure sharing center, incompleteness of policies. Based on the results of FGI and Delphi, we suggest the several ways to improving SMEs programs.

Message Interoperability in e-Logistics System (e-Logistics시스템의 메시지 상호운용성)

  • Seo Sungbo;Lee Young Joon;Hwang Jaegak;Ryu Keun Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.5
    • /
    • pp.436-450
    • /
    • 2005
  • Existing B2B, B2C computer systems and applications that executed business trans-actions were the client- server based architecture which consists of heterogeneous hardware and software including personal computers and mainframes. Due to the active boom of electronic business, integration and compatibility of exchanged data, applications and hardwares have emerged as hot issue. This paper designs and implements a message transport system and a document transformation system in order to solve the interoperability problem of integrated logistics system in e-Business when doing electronic business. Message transport system integrated ebMS 2.0 which is standard business message exchange format of ebXML, the international standard electronic commerce framework, and JMS of J2EE enable to ensure reliable messaging. The document transformation system could convert non-standard XML documents into standard XML documents and provide the web services after integrating message system. Using suggested business scenario and various test data, our message oriented system preyed to be interoperable and stable. We participated ebXML messaging interoperability test organized by ebXML Asia Committee ITG in oder to evaluate and certify the suitability for message system.

Differenciation Test on Food Safety Factor′s for Purchasing Rice (식품의 안전성요인이 쌀 구매에 미치는 차별성 검정)

  • 이순석;오상헌;이상용;박주섭;김용희
    • Food Science and Preservation
    • /
    • v.11 no.1
    • /
    • pp.122-125
    • /
    • 2004
  • Factor analysis is estimated using housewives's intention data in Seoul province. Rice consumers considered safety, high nutritive value, shape and cultivation region as important factors in buying rice. The factors of food safety are brand and quality certification mark. The differences of two housewife groups on safety factor are caused by residence type, employment existence and residence region. The marketing strategies for rice containing food safety target housewives living in apartment, Gang Nam region. Also selling extension for target consumers housewives should be employed.

Implementation of a Credit Authentication System (전자상거래에서 상점에 대한 신용 보증 시스템 구현)

  • 백기영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.37-48
    • /
    • 1999
  • The Internet has been used as the academic researching purposes. Nowadays accordance with improving and being familiar with the World-Wide Web Many people are giving it a try to use the Internet as commerce markets. The noticeable example of internet-based use of the commerce is the Internet shopping mall. Using the WWW companies exhibit their products and users select the ones and take the payment for ones in the on-line Increasing the the Internet shopping mall there needs to be the countermeasure that companies and clients must verify each other. In this paper there are explained the development credit authentication system of the Internet shopping mall and the construction of the trusted environment clients can use Internet shopping mall. That is to develop the credit authentication system the credit-rating of Internet shopping mall can be sent securely and easily to clients and the information of credit-ranting cannot be eavesdropped.

A Study on Court Auction System using Ethereum-based Ether (이더리움 기반의 이더를 사용한 법원 경매 시스템에 관한 연구)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.2
    • /
    • pp.31-40
    • /
    • 2021
  • Blockchain technology is also actively studied in the real estate transaction field, and real estate transactions have various ways. In this paper, we propose a model that simplifies the authentication procedure of auction systems using Ethereum's Ether to solve the problem of offline court auctions. The proposed model is written in Ethereum's Solidity language, the court registers the sale date and the sale date with the DApp browser, and the bidder accesses the address of the individual's wallet created through Metamask's private key. The bidder then selects the desired sale and enters the bid price amount to participate in the auction. The bidder's record of the highest bid price for the sale he wants is written on the Ethereum test network as a smart contract. and creates a block. Finally, smart contracts written on the network are distributed by the court auction manager to all nodes in the blockchain network, and each node in the blockchain network can be viewed and contract verified. As a result of analyzing the smart contracts of the proposed model and the performance of the system, there are fees incurred due to the creation and use of Ether on platforms using Ethereum, and participation. Ether's changes in value affect the price of the sale, resulting in inconsistent fees in smart contracts each time. However, in future work, we issue our own tokens to solve the market volatility problem and commission problem with the value change of Ether, and refine complex court auction systems.

Development of Software-Defined Perimeter-based Access Control System for Security of Cloud and IoT System (Cloud 및 IoT 시스템의 보안을 위한 소프트웨어 정의 경계기반의 접근제어시스템 개발)

  • Park, Seung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.15-26
    • /
    • 2021
  • Recently, as the introduction of cloud, mobile, and IoT has become active, there is a growing need for technology development that can supplement the limitations of traditional security solutions based on fixed perimeters such as firewalls and Network Access Control (NAC). In response to this, SDP (Software Defined Perimeter) has recently emerged as a new base technology. Unlike existing security technologies, SDP can sets security boundaries (install Gateway S/W) regardless of the location of the protected resources (servers, IoT gateways, etc.) and neutralize most of the network-based hacking attacks that are becoming increasingly sofiscated. In particular, SDP is regarded as a security technology suitable for the cloud and IoT fields. In this study, a new access control system was proposed by combining SDP and hash tree-based large-scale data high-speed signature technology. Through the process authentication function using large-scale data high-speed signature technology, it prevents the threat of unknown malware intruding into the endpoint in advance, and implements a kernel-level security technology that makes it impossible for user-level attacks during the backup and recovery of major data. As a result, endpoint security, which is a weak part of SDP, has been strengthened. The proposed system was developed as a prototype, and the performance test was completed through a test of an authorized testing agency (TTA V&V Test). The SDP-based access control solution is a technology with high potential that can be used in smart car security.