• Title/Summary/Keyword: 코드 서명

Search Result 54, Processing Time 0.025 seconds

Converting Paper and Image Formats of EMR to XML for Electronic Signature (EMR 서식 및 이미지 형식 기록의 전자인증을 위한 XML 변환)

  • Moon, Woo-Young;Kim, Byung-Ki
    • Annual Conference of KIPS
    • /
    • 2006.11a
    • /
    • pp.629-632
    • /
    • 2006
  • 최근 EMR(Electronic Medical Record, 전자의무기록)에 대한 관심이 높아지면서 EMR을 도입하는 병원이 늘어나는 추세이다. EMR은 법적 효력과 증거력의 보유하기 위하여 정부가 인정하는 공인 인증기관으로부터 인증서를 발급받아 전자서명법에 따라 암호화 및 기명날인하여 별도의 저장장치에 관리하도록 하고 있다. 이러한 일련의 과정에서 EMR 데이터를 XML 문서나 다른 형식의 문서로 변환하게 된다. 본 논문은 XML 스키마에 따른 문서 생성이 용이한 텍스트나 코드화된 의무기록 뿐만 아니라 각종서식, 이미지 및 검사지 등 다양한 형식 기록의 전자인증을 위해 XML 문서로 변환하는 연구이며, 특히 표준화되기 힘든 비정형 기록들에 대한 XML 문서 변환 방법을 제안하고 이를 구현하였다.

  • PDF

A Design of Authentication Method for Secure Communication based on Wearable Device (웨어러블 디바이스 기반의 안전한 통신을 위한 인증기법 설계)

  • Park, Jung-Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.41-46
    • /
    • 2016
  • Recently, many domestic and foreign corporates are concentrating in investment to wearable devices and users are provided with various service based on wearable devices 26% more than compared to last year. It is widely used in previous healthcare, smart work, smart home environment, and it is now introduced to get connection to fused service environment. However, as products of G company are commercialized, the security issue of personal information is causing dispute in society, and the danger of data management and security regarding telecommunication is increasing. Also, because the password system used in previous wireless environment is still in use, there are possible vulnerability considering the new and mutant security threat. This thesis conducted study about protocols that can exercise safe telecommunication in the basis of wearable devices. In the registration and certification process, the signature value is created based on the code value. The telecommunication method is designed to conduct safe telecommunication based on the signature value. As for the attack method occurring in the wearable device environment, the safety was analyzed and conducted performance evaluation of previous password system and proposal system, and verified about 14% of efficiency.

Secure Component Composition for Practical Systems (실용적인 시스템을 위한 안전한 소프트웨어 컴포넌트 조합)

  • Lee Eun-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.43-57
    • /
    • 2006
  • When building a software system out of software components, the composition is not simple because of the complexity caused by diverse versions, digital signatures, static type information, and off-the-shelf components from various vendors. Well-established linking policies are one of the best solutions to solve the complexity problem at linking time. Secure Linking (SL) enables users to specify their linking policies which can be enforced at link time. Secure Linking framework is a framework based on a higher-order logic in order to help build a SL system. This paper shows that the Secure Linking logic is expressive enough to describe a real-world component composition system, the linking protocol of.NET. The paper also demonstrates the advantage of the logic-based linking framework by discussing the weakness of the code signing protocol in.NET which was found while we encoded the assembly linking system of.NET.

Asymmetric Watermarking Using Public Key Infrastructure (공개키 기반 구조를 이용한 비대칭 워터마킹)

  • Jun Young-Min;Yang Sun-Ouk;Kim Gye-Young
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.9
    • /
    • pp.1282-1293
    • /
    • 2004
  • This paper proposes an asymmetric watermarking system using Public Key Infrastructure. The distinguishing characteristic of the proposed method connects between the two different techniques, cryptography technique and watermarking technique, by using the authentication technique. The connection between the two techniques are established based on the special qualities of each technique. Watermarks that are inserted into the digital contents consist of a digital signature described as an encrypted copyright information with the private key of a distributor or a copyright holder, and an authentication code. In the situation where the ownership of the digital contents has to be decided, authentication technique examines the data integrity of the digital contents based on an authentication and decides the ownership of the digital contents by examining whether it satisfies or not satisfies the integrity test. The formal case uses decryption method which compares the user defined copyright information, and the decrypted copyright information extracted from the watermark in the digital contents that are decrypted by distributors' public key The latter case determines the ownership by comparing the similarity between encrypted copyright information separated from the watermark that are extracted from the digital contents, and the user defined encrypted copyright information that are separated from the watermark The proposed method provides protection from the assault which attempts to identify or erase the encoding key.

  • PDF

Feedback Scheme for STBC-Spatial Multiplexing OFDM System with outdated channel feedback (지연된 귀환 채널 정보를 가지는 STBC-공간다중화 OFDM 시스템을 위한 귀환 기법)

  • Lim Jong-Kyoung;Hwang Hyeon-Chyeol;Seo Myoung-Seok;Kwak Kyung-Sup
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.4 s.346
    • /
    • pp.31-38
    • /
    • 2006
  • In this paper, we propose an efficient preceding scheme for STBC-Spatial Muiltiplexing OFDM systems. In MIMO systems, the precoder is designed on the assumption that feedback channel information is perfectly known to transmitter and receiver. However, feedback delay and link errors in real environment make the transmitter use the incorrect channel information and consequently cause the performance degradation. The proposed precoder is designed to compensate for the performance degradation by the diversity gain provided by STBC. At the transmitter, the precoder for each subcarrier is constructed by using the index of codebook, subcarrier correlation, and auto correlation of channel. From the simulation results, STBC-spatial multiplexing OFDM outperforms the preceded-spatial multiplexing OFDM at $SER=10^{-3}$ when the Doppler frequency is greater than 60Hz.

Implementation of Adult Authentication System Using Smartphone and Near-Field Communication (스마트폰과 근거리 무선 통신을 이용한 성인 인증 시스템의 개발)

  • Lee, Chongho;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.19 no.4
    • /
    • pp.617-624
    • /
    • 2015
  • In this paper, an adult authentication system based on authentication certificate was designed and implemented using smartphone and near-field communication. It has three advantages. First, it achieves easy, convenient, and fast authentication by using smartphone and near-field communication. Second, it achieves extremely high security and reliability by exploiting authentication certificate. Third, it achieves extremely low risk of personal information leakage by generating and sending only virtual identification code. Finally, it has a proper legal basis by Digital Signature Act. It consists of adult authentication module, near-field communication control module, policy server module, and database server module. A prototype of the proposed system was designed and implemented, and it was verified to have correct operation.

Draft Design of 2-Factor Authentication Technique for NFC-based Security-enriched Electronic Payment System (보안 강화를 위한 NFC 기반 전자결제 시스템의 2 팩터 인증 기술의 초안 설계)

  • Cha, ByungRae;Choi, MyeongSoo;Park, Sun;Kim, JongWon
    • Smart Media Journal
    • /
    • v.5 no.2
    • /
    • pp.77-83
    • /
    • 2016
  • Today, the great revolution in all financial industrial such as bank have been progressing through the utilization of IT technology actively, it is called the fintech. In this paper, we draw the draft design of NFC-based electronic payment and coupon system using FIDO framework to apply the 2 factor authentication technique for strength security. In detailed, we will study that the terminal device in front-end will be applied the 2 factor authentication and electric signature, and cloud-based payment gateway in back-end will be applied malicious code detection technique of distributed avoidance type.

A Forgery detection protocol for protection of mobile agent execution results (이동 에이전트 수행 결과에 대한 부정 검출 프로토콜)

  • Kim, Hee-Yeon;Shin, Jung-Hwa;Shin, Weon;Rhee, Kyung-Hyune
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.517-522
    • /
    • 2002
  • Mobile agent systems offer a new paradigm for distributed computation and a one of solution for limitation of existent Client-server model. Mobile agent systems provide interface that can migrate from host to host in a heterogenous network. For secure execution, it must solve security problem of mobile code before. In this paper, we are propose the protocol that applied signature technique and hash chain technique. This protocol enable one to offer forward integrity, non-repudiation, and forgery detection, when mobile agents are perform the task by migrating a network.

Low Density Parity Check (LDPC) Coded OFDM System Using Unitary Matrix Modulation (UMM) (UMM(Unitary Matrix Modulation)을 이용한 LDPC(Low Density Parity Check) 코디드 OFDM 시스템)

  • Kim Nam Soo;Kang Hwan Min;Cho Sung Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5A
    • /
    • pp.436-444
    • /
    • 2005
  • Unitary matrix modulation (UMM) is investigated in multiple antennas system that is called unitary space-time modulation (USTM). In an OFDM, the diagonal components of UMM with splitting over the coherence bandwidth (UMM-S/OFDM) have been proposed. Recently LDPC code is strongly attended and studied due to simple decoding property with good error correction property. In this paper, we propose LDPC coded UMM-S/OFDM for increasing the system performance. Our proposed system can obtain frequency diversity using UMM-S/OFDM like USTM/OFDM, and large coding gain using LDPC code. The superior characteristics of the proposed UMM-S/OFDM are demonstrated by extensive computer simulations in multi-path Rayleigh fading channel.

Preliminary Analysis of Dose Rate Variation on the Containment Building Wall of Dry Interim Storage Facilities for PWR Spent Nuclear Fuel (경수로 사용후핵연료 건식 중간저장시설의 격납건물 크기에 따른 건물 벽면에서의 방사선량률 추이 예비 분석)

  • Seo, M.H.;Yoon, J.H.;Cha, G.Y.
    • Journal of Radiation Protection and Research
    • /
    • v.38 no.4
    • /
    • pp.189-193
    • /
    • 2013
  • Annual dose on the containment building wall of the interim storage facility at normal condition was calculated to estimate the dose rate transition of the facility of PWR spent nuclear fuel. In this study, source term was generated by ORIGEN-ARP with 4.5 wt% initial enrichment, 45,000 MWd/MTU burnup and 10 years cooling time. Modeling of the storage facility and the containment building and radiation shielding evaluations were conducted by MCNP code depending on the distance between the wall and the facility in the building. In the case of the centralized storage system, the distance required for the annual dose rate limit from 10CFR72 was estimated to be 50 m.