• Title/Summary/Keyword: 한국정보인증

Search Result 5,260, Processing Time 0.031 seconds

A Verification Strategy for the Origin of Electronic Records (전자기록의 출처확인 지원전략)

  • Song, Byoungho
    • The Korean Journal of Archival Studies
    • /
    • no.25
    • /
    • pp.47-89
    • /
    • 2010
  • The target of managing electronic records should be the trusted record services to the end-users. The natural characteristics of electronic records yields the drawback in the authenticity aspect and in the integrity aspect, and current standards and methodologies have beed developed to treat this drawback. However the authenticity and the integrity concepts is hardly separated each other and too completed, so alternative "source" concept is introduced and a verification strategy for the origin of electronic records is discussed in this paper. According to this concept, current standards and methodologies may be criticized for the negligence of necessary information organizing/verification, the doubtful long-term verification, and the missing counter-strategy for the verification-failed records. To solve this, needed facters for origin verification is described, new preservation format divided into temporally-fluctuating (variable) part and immutable (fixed) part is proposed, and a strategy to prevent, avoidance, and detection/recovery important records is suggested.

Influence Factors of Innovation Resistance of Cloud Computing Service: Focus on Small and Medium Enterprises (클라우드 컴퓨팅 서비스의 혁신저항 영향요인: 중소기업을 대상으로)

  • Lee, Sanghoon;Choi, Jeong Min
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.105-115
    • /
    • 2020
  • The purpose of this study is to investigate the factors influencing the innovation resistance of cloud computing services and to suggest policy alternatives to increase the use of domestic cloud computing services. For this, a survey was conducted on 178 SMEs that introduced cloud computing services with government support. As a result, technostress, CEO informatization leadership and organizational structure concentration had a significant influence on innovation resistance. Therefore, in the future, first, it is necessary to provide user-centered cloud computing services in the direction of reducing technostress. Second, it is necessary to apply cloud computing services through a deeper understanding of the organizational characteristics of each small and medium enterprise. Third, there is a need for advanced security authentication and a compensation system. In order to promote the use of cloud computing services, an environment in which users can safely use should be prepared first.

Enhancement of Security Monitoring & Control System in Zero Trust Security Models (제로트러스트 보안 모델에서 보안관제 시스템 강화 연구)

  • Wonhyung Park
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.51-57
    • /
    • 2022
  • Recently, the concept of zero trust has been introduced, and it is necessary to strengthen the security elements required for the next-generation security control system. Also, the security paradigm in the era of the 4th industrial revolution is changing. Cloud computing and the cybersecurity problems caused by the dramatic changes in the work environment due to the corona 19 virus continue to occur. And at the same time, new cyber attack techniques are becoming more intelligent and advanced, so a future security control system is needed to strengthen security. Based on the core concept of doubting and trusting everything, Zero Trust Security increases security by monitoring all communications and allowing strict authentication and minimal access rights for access requesters. In this paper, we propose a security enhancement plan in the security control field through a zero trust security model that can understand the problems of the existing security control system and solve them.

A Study of Quantitative Characterization of Physically Uncloanble Functions (물리적 복제 불가능 회로 정량적 특성 평가 방법 연구)

  • Moon-Seok Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.143-150
    • /
    • 2023
  • Applications on physically unclonable circuits (PUFs) for implementing and utilizing security protocols with hardware is on the rise. PUFs have the capability to perform functions such as authentication, prevention of replication, and secure storage of critical information in integrated circuits and security systems. Through the implementation of physically unclonable circuits, a wide range of security features, including confidentiality, integrity, and availability, can be applied. Therefore, PUFs are promising candidate to build secure integrated circuits and hardware systems. However, in order that PUFs possess security features, PUFs should possess characteristics such as unpredictability, uniqueness, and robustness characteristics. This study provides a detailed explanation and introduction of the methods to characterize the PUF properties. By applying the results, it becomes possible to quantitatively evaluate the characteristics of implemented PUFs and assess their availabilities for security system applications.

Development of segmentation-based electric scooter parking/non-parking zone classification technology (Segmentation 기반 전동킥보드 주차/비주차 구역 분류 기술의 개발)

  • Yong-Hyeon Jo;Jin Young Choi
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.125-133
    • /
    • 2023
  • This paper proposes an AI model that determines parking and non-parking zones based on return authentication photos to address parking issues that may arise in shared electric scooter systems. In this study, we used a pre-trained Segformer_b0 model on ADE20K and fine-tuned it on tactile blocks and electric scooters to extract segmentation maps of objects related to parking and non-parking areas. We also presented a method to perform binary classification of parking and non-parking zones using the Swin model. Finally, after labeling a total of 1,689 images and fine-tuning the SegFomer model, it achieved an mAP of 81.26%, recognizing electric scooters and tactile blocks. The classification model, trained on a total of 2,817 images, achieved an accuracy of 92.11% and an F1-Score of 91.50% for classifying parking and non-parking areas.

A Study on Integrated Anti-counterfeiting Strategy to stop the forgery for Korean cosmetics in China (중국에서 한국 화장품의 위조근절을 위한 통합적 위조방지 전략 연구)

  • Koh, Joong Hyun
    • International Commerce and Information Review
    • /
    • v.18 no.4
    • /
    • pp.81-112
    • /
    • 2016
  • About 60 percent of cosmetic products sold in the dominant Taobao internet shopping mall proved recently to be counterfeit products made in China. This paper is to investigate the anti-counterfeiting strategies to clean up fake goods for Korean cosmetics which have been exported to China. Using the scienter rule the paper classified the forgery action for Korean cosmetics into four broad groups - counterfeit, piracy, illegally distributed product, and brand prior register. This paper suggested interior company's anti-counterfeiting strategies for each group, focusing on the construction for an integrated anti-counterfeiting system including consumer's rationality through the government cooperation between Korea and China.

  • PDF

Revisiting the e-Government Maturity Model: Significance, Limitations, and Suggestions (전자정부 성숙도 모델의 재검토: 모델의 의의와 한계, 실증분석을 통한 제언)

  • SUNG, WOOKJOON
    • Informatization Policy
    • /
    • v.30 no.3
    • /
    • pp.3-28
    • /
    • 2023
  • This study aims to analyze the usage behavior of e-government service users based on the e-government maturity model and provide suggestions for advancement of the e-government services. The changes in Korea's e-government services were analyzed as follows; 1) Proportion of use of e-government services in Korean public services, 2) E-government service types/stages use, 3) Service use by platform 4) User response to e-government service 5) Users' requests for future e-government service usage methods. For the analysis, this study used data from Korea's 2012-2020 e-government usage behavior survey data. As a result of the analysis, first, the proportion of e-government service has been continuously increasing, and second, the use of the e-participation stage is relatively low compared to the presenting information, interaction, and transaction stages. Third, by platform, e-government service has been expanded to various access platforms such as mobile, kiosk, and SNS centering on the web. Fourth, users' satisfaction with e-government service is very high. However, to vitalize e-government services, users requested improvements such as providing one-stop integrated services and simplifying authentication procedures. Based on the analysis results, this study 1) reflects the user's point of view in the maturity model of e-government, 2) considers access to various platforms according to the development of digital technology, 3) improves the e-government maturity model through data-based analysis such as user usage behavior suggested the need.

The Study on Analysis Method and Performance Evaluation of Portable GC/MS (휴대용 GC/MS 성능검사 및 분석방법 연구)

  • Park, Yuonshin;Noh, Hyeran;Yang, Heeseon;Seok, Gwanseol
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.3
    • /
    • pp.249-258
    • /
    • 2013
  • Recieved Mar. 06, 2013 Revised Mar. 29, 2013 Accepted Sep. 11, 2013In this study, we evaluated the method performance and the optimum sample injection method of the portable GC/MS(HAPSITE) which were designed to operate on scene of chemical accidents. Chemicals used for performance test were vinyl chloride(VC), methyl chloride(MC), benzene(Bz), toluene(Tol). CRM(Certified Reference Material) Manufactured by KRISS(Korea Research Institute of Standards and Science) was used as the standard gas. The results showed that 1) Among three sample injection methods(Cylinder, Silico canister, and Bag), bag was identified as the most appropriate sample injection method. Bag material and capacity did not significantly affect the results. The most ideal reproducibility occurred at the 2-minute point of the purge time in the loop and tenax methods. 2) Performance evaluation of HAPSITE was conducted. Evaluation items were reproducibility, linearity, method detection limit, etc. Tenax concentration method was appropriate for larger molecules and Carbopack concentration method was suitable for smaller molecules.

Pre/Post processor for structural analysis simulation integration with open source solver (Calculix, Code_Aster) (오픈소스 솔버(Calculix, Code_Aster)를 통합한 구조해석 시뮬레이션 전·후처리기 개발)

  • Seo, Dong-Woo;Kim, Jae-Sung;Kim, Myung-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.9
    • /
    • pp.425-435
    • /
    • 2017
  • Structural analysis is used not only for large enterprises, but also for small and medium sized ones, as a necessary procedure for strengthening the certification process for product delivery and shortening the time in the process from concept design to detailed design. Open-source solvers that can be used atlow cost differ from commercial solvers. If there is a problem with the input data, such as with the grid, errors or failures can occur in the calculation step. In this paper, we propose a pre- and post-processor that can be easily applied to the analysis of mechanical structural problems by using the existing structural analysis open source solver (Caculix, Code_Aster). In particular, we propose algorithms for analyzing different types of data using open source solvers in order to extract and generate accurate information,such as 3D models, grids and simulation conditions, and develop and apply information analysis. In addition, to improve the accuracy of open source solvers and to prevent errors, we created a grid that matches the solver characteristics and developed an automatic healing function for the grid model. Finally, to verify the accuracy of the system, the verification and utilization results are compared with the software used.

Virtual core point detection and ROI extraction for finger vein recognition (지정맥 인식을 위한 가상 코어점 검출 및 ROI 추출)

  • Lee, Ju-Won;Lee, Byeong-Ro
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.3
    • /
    • pp.249-255
    • /
    • 2017
  • The finger vein recognition technology is a method to acquire a finger vein image by illuminating infrared light to the finger and to authenticate a person through processes such as feature extraction and matching. In order to recognize a finger vein, a 2D mask-based two-dimensional convolution method can be used to detect a finger edge but it takes too much computation time when it is applied to a low cost micro-processor or micro-controller. To solve this problem and improve the recognition rate, this study proposed an extraction method for the region of interest based on virtual core points and moving average filtering based on the threshold and absolute value of difference between pixels without using 2D convolution and 2D masks. To evaluate the performance of the proposed method, 600 finger vein images were used to compare the edge extraction speed and accuracy of ROI extraction between the proposed method and existing methods. The comparison result showed that a processing speed of the proposed method was at least twice faster than those of the existing methods and the accuracy of ROI extraction was 6% higher than those of the existing methods. From the results, the proposed method is expected to have high processing speed and high recognition rate when it is applied to inexpensive microprocessors.