• Title/Summary/Keyword: Authentication

Search Result 4,138, Processing Time 0.036 seconds

Vulnerability Analysis of Bluetooth Communication based on GNU Radio (GNU Radio 기반 블루투스 통신 취약점 분석)

  • Kim, Tae-Yong;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2014-2020
    • /
    • 2016
  • In general, automatic access control management system using smart door-lock must be always exposed to security vulnerability during wireless communication based on Bluetooth. In particular, important information such as a secrete key can be exposed to the attacker when the authentication protocol has been operating in the wireless section. Therefore important information exchanged in the radio section needs to be properly encrypted. In order to analyze security vulnerability for automatic access control management system of public facilities such as subway vent, GNU Radio platform and HackRF device will be considered and experimented. Proposed experimental system to perform software based power analysis attack could be very effectively applied. As a result, important information such as packet type, CRC, length of data, and data value can be easily decoded from wireless packet obtained from HackRF device on GNU Radio platform. Constructed experimental system will be applied to avoid some security problems.

Genuine discrimination application using image matching (칼러정보 및 망점 정보를 활용한 코드인증시스템 개발)

  • Choi, Do-young;Kim, Jin-su;Kim, Ji-su;Han, Ga-young;Han, Ha-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.170-172
    • /
    • 2017
  • Due to the technological advances in modern society, the distinction between mask and authenticity is becoming very difficult. to solve these problems, this paper describes a high-level improvement of the image processing technique of the code authentication system which discriminates the good and the bad by using the color information and the dot information. Labels were given to each genuine article and the article, which can not be distinguished from each other. In the proposed method, image matching of labels is performed using the opencv library, and genuine and good products are discriminated by using the halftone dots and w dot dots of each label. In this paper, the proposed method stores genuine and good labels on the server and compares them with the user's labels to determine genuine products.

  • PDF

Development of Secure Entrance System using AOP and Design Pattern (관점지향 소프트웨어 개발 방법론과 디자인 패턴을 적용한 출입 보안 시스템 개발)

  • Kim, Tae-Ho;Cheon, Hyeon-Jae;Lee, Hong-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.943-950
    • /
    • 2010
  • A secure entrance system is complicated because it should have various functions like monitoring, logging, tracing, authentication, authorization, staff locating, managing staff enter-and-leave, and gate control. In this paper, we built and applied a secure entrance system for a domestic nuclear plant using Aspect Oriented Programming(AOP) and design pattern. Using AOP has an advantage of clearly distinguishing the role for each functional module because building a system separated independently from the system's business logic and security logic is possible. It can manage system alternation flexibility by frequent change of external environment, building a more flexible system based on increased code reuse, efficient functioning is possible which is an original advantage of AOP. Using design pattern enables to design by structuring the complicated problems that arise in general software development. Therefore, the safety of the system can also be guaranteed.

Design and Implementation of a Secure E-Mail System using Elliptic Curve Cryptosystem (타원곡선 암호 시스템을 이용한 보안 메일 시스템의 설계 및 구현)

  • Lee, Won-Goo;Kim, Sung-Jun;Lee, Hee-Gyu;Mun, Ki-Young;Lee, Jae-Kwang
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.333-345
    • /
    • 2002
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mail is gaining popularity abroad and domestically because of their nature of providing security. That is. It has been used a variety of fields such as general mail and e-mail for advertisement. But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mail system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design and implement secure mail system with secure key agreement algorithm, non-repudiation service, and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

An Extended SNMP Scheme for a Digital Convergence Device with Control Functions (제어 기능을 갖는 디지털 컨버전스 장비를 위한 SNMP 확장에 관한 연구)

  • Heo, Gil;Kim, Eun-Hoe;Choi, Jae-Young
    • The KIPS Transactions:PartA
    • /
    • v.16A no.5
    • /
    • pp.369-380
    • /
    • 2009
  • SNMP (Simple Network Management Protocol) is a standard protocol for management of network devices, and it provides excellent features such as scalability, information management, authentication, encryption, and access control. However, SNMP has a structural weakness to fully support control functions for integrated management of digital convergence devices, and it has a limitation of message length in SNMP communication. In this paper, we present an extended SNMP scheme for integrated management of digital convergence devices with control functions. We modified the SNMP architecture by adding DDS (Device Driver Subsystem) to SNMP engine for controlling different devices and by defining CADM (Control Agent Driver Model), therefore we solved the ambiguity problem between 'set' and 'control' of SNMP. And the extended SNMP made it easy for SNMP applications to use various control functions. The extended SNMP can transport massive high-level information by adding three new SNMP commands which eliminate the limit of message length.

Design and Implementation of J2ME-based Wired/Wireless Interworking Mobile Wallet (J2ME 기반 유.무선 연동의 모바일 전자지갑 설계 및 구현)

  • Park, Nam-Je;Song, You-Jin
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.687-698
    • /
    • 2002
  • Together with the activation of wireless Internet, the interest for various integrated methods of the existing wired and wireless e-commerces is on the rise. For the integrated wired and wireless e-commerce, firstly, the optimized security and authentication under the radio communication environment should be decided. And also the user-friendly usage is important. In this paper, we designed and implemented wired and wireless interworking Mobile Wallet on terminal that can be used through both wired and wireless methods by developing electronic wallet module for electronic payment using MIDP (Mobile Information Device Profile) based on J2ME (Java 2 Micro Edition). The characteristics of mobile wallet implemented in this paper provide the stability through encoding/decoding payment information and on-line usage on wired/wireless environments through downloading electronic wallet. In addition, we also present safe and convenient payment method for e-commerce based on wired/wireless Internet.

Evaluation of Pharmacognostical Characters and Comparative Morphoanatomical Study of Saussurea costus (Falc.) Lipchitz and Arctium lappa L. Roots

  • Pandey, Madan Mohan;Rastogi, Subha;Rawat, Ajay Kumar Singh
    • Natural Product Sciences
    • /
    • v.13 no.4
    • /
    • pp.304-310
    • /
    • 2007
  • Saussurea costus (Falc.) Lipchitz syn S. lappa C. B. Clarke (commonly known as 'Kuth') belonging to the family Asteraceae is a well known medicinal plant which finds wide usage in different indigenous systems of medicine of India, China, Korea & Tibet. In different folk medicines the roots of S. costus are used to treat various disorders like ulcer, stomachache, malaria, leprosy, dysentery and toothache. However due to over exploitation, it has become endangered and has become the concern of different governmental bodies in India. The increasing demand of this endangered Himalayan species has resulted in a situation where it is often substituted, knowingly or unknowingly, by other morphologically similar species. Arctium lappa, belonging to the same family, is one such plant that has often been found to be present in the market samples of 'Kuth'. The present study was thus carried out and morphoanatomical characters, physicochemical as well as chemical parameters were developed for proper identification of roots of S. costus and its differenciation from A. lappa as well as authentication of the commercial market samples. The detailed morphoanatomical studies revealed that roots of S. costus can be distinguished from A. lappa on the basis of some important microscopial characters eg. the schizogenous resin ducts observed in roots of S. costus, were absent in A. lappa.. Besides, the HPTLC fingerprint profile showed a distinct band at Rf. 0.72 in S. costus, which was totally absent in A. lappa and a band at $R_f$ 0.64 in A. lappa which was absent in S. costus Chlorogenic acid, used as a chemical marker for HPTLC analysis, was estimated to be 0.077% in S. costus as compared to 0.107% in A. lappa. Thus these detailed pharmacognostical parameters can be successfully used to distinguish between roots of S. costus and A. lappa.

Molecular Authentication of Scrophularia herbs by PCR-RFLP Based on rpl-5 Region of Mitochondrial DNA (현삼속 식물의 종판별을 위한 Mitochondrial DNA의 염기서열 및 PCR-RFLP 분석)

  • Lee, Jeong-Hoon;Jo, Ick-Hyun;Lee, Jei-Wan;Park, Chun-Geun;Bang, Kyong-Hwan;Kim, Hong-Sig;Park, Chung-Berm
    • Korean Journal of Medicinal Crop Science
    • /
    • v.18 no.3
    • /
    • pp.173-179
    • /
    • 2010
  • This study describes an efficient approach to the development of DNA markers for use in distinguishing the Scrophularia species that have been used as useful medicinal crops. In order to distinguish Scrophularia species, DNA sequences of rpl-5 region in mitochondrial DNA of Scrophularia species were analysed for detecting sequence variations, and the PCR-RFLP method was applied for developing practicable DNA marker patterns. Several DNA variations were detected by the sequence comparison of rpl-5 region among Scrophularia species. Genetic relationship analysis of Scrophularia species was carried out based on these DNA variations. DNA variations of rpl-5 region were revealed that it was significantly efficient in genetic relationship analysis of Scrophularia species. In addition, Scrophularia species tested in this study were completely discriminated by four polymorphic genotypes by PCR-RFLP combined with Tsp509 I (^AATT) restriction enzyme. Our results suggested that DNA sequence variations of rpl-5 region were sufficiently useful for genetic relationship analysis of Scrophularia species. Polymorphic genotypes by PCR-RFLP using the Tsp509 I enzyme will be useful for discrimination of Scrophularia species as a practicable DNA markers.

Security-intensified SSL VPN and WLCAPT Virtual Server Design (SSL VPN의 보안 강화와 WLCAPT 가상 서버 설계)

  • Jeong Eun-Hee;Choi Eun-Sil;Lee Byung-Kwan
    • Journal of Internet Computing and Services
    • /
    • v.5 no.6
    • /
    • pp.45-58
    • /
    • 2004
  • This paper consists of two parts, One is the ECC( GF(2/sup m/)) algorithm to improve the security strength and the processing time of SSL VPN and the other is the WLCAPT algorithm instead of LSNAT for the security strength of virtual server. In general when corporates use SSL protocol in order to build VPN, they use RSA algorithm with the problem of security and processing time about authentication and confidentiality, In this paper, a shared public key is generated with ECSPK which uses ECC( GF(2/sup m/)) algorithm to improve the security and processing time instead of RSA In addition, WLCAPT algorithm proposed in this paper is applied to virtual server which resides in the server side and then after NAT translation, the actual server of headquarter is securely communicated with it.

  • PDF

A study on the method of the personnel recording of DHRMIS (국방인사정보체계의 인사기록방법에 관한 연구)

  • Cho, Young-Pyong;Yang, Hae-Sool
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.2
    • /
    • pp.88-99
    • /
    • 2008
  • In this article, DHRMIS being developed with ERP at resent realizes the personnel affairs recording procedures that all the Ministry of National Defense, the army, the navy and the air force can use on personnel affairs in order to solve the problem of the personnel recording procedures of the MND and each of the troops such as using manual affairs together with computation affairs, absence of electronic recording managements in some of the institutions MND, insufficiency of real time recording, and excess of centralized managements to present and record the personnel data. The personnel recording procedures consist of standardized personnel recording procedures and definition of the personnel recording procedures. This personnel recording procedures propose 3 improvements such as an atomic electronic recording management, a real time recording affair, effective centralization and distribution of verification authority so as to guarantee authentication, integrity, reliance, and accessibility of personnel data. When proposed personnel recording procedures are realized through developing DHRMS, these can bring on unification of 10 recording management systems, reduction of recording management time from 45 days to 3 days, distribution of verification authority MND, each of the troops, each of the institutes, an individual, and reduction of some of the manual documents.

  • PDF