• Title/Summary/Keyword: Certificate System

Search Result 574, Processing Time 0.028 seconds

Certificate Issuing using Proxy Signature and Threshold Signature in Self-initialized Ad Hoc Network (자기 초기화하는 Ad Hoc 네트워크에서의 대리 서명과 임계 서명 기법을 이용한 인증서 발급 기법)

  • Kang, Jeon-Il;Choi, Young-Geun;Kim, Koon-Soon;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.55-67
    • /
    • 2007
  • In ad hoc network, especially in the environment which the system authority only exists at the beginning of the network, it is very important problem how to issue the certificates in self-initialized public key scheme that a node generates its certificate with public and private key pair and is signed that by the system authority. In order to solve this problem, early works present some suggestions; remove the system authority itself and use certificate chain, or make nodes as system authorities for other nodes' certificates. In this paper, we suggest another solution, which can solve many problem still in those suggestions, using proxy signature and threshold signature, and prove its performance using simulation and analyse its security strength in many aspects.

A Secure and Effective Optimal Path Searching Method on Certificate Chains in Mobile Ad hoc NETworks (모바일 애드흑 네트워크의 안전하고 효과적인 치적의 인증경로 탐색 기법)

  • Choi, Sung-Jae;Kim, Yong-Woo;Lee, Hong-Ki;Song, Joo-Seok;Nyang, Dae-Mon
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.310-317
    • /
    • 2005
  • In opposition to conventional networks, mobile ad hoc networks usually do not offer trust about nodes or online access through certificate authorities or centralized servers. But, nodes in those systems need process that can search path as well as trust each other to exchange data in safety For these reasons, traditional security measures that require online trusted authorities or certificate storages are not well-suited for securing ad hoc networks. In this paper, I propose a secure and effective method to search the optimized path using profitable flooding techniques on certificate chains in MANETS(Mobile Ad hoc NETworks). This system includes not only using routing protocols that are generally broadcasting packets but also finding nodes securely and verifing the process through tiust relationships between nodes that are searched.

A Study on the Certification System of the Unmanned Aircraft (무인항공기 인증제도에 관한 연구)

  • Choi, Joo-Won
    • Journal of Aerospace System Engineering
    • /
    • v.6 no.1
    • /
    • pp.19-25
    • /
    • 2012
  • Nowadays, the demand of civil application of an UAV has been being increased all over the world. And many projects are going on to develop a new regulatory system for an UAV to access a national airspace. Especially, to fly UAV over the non-restricted airspace as a standard airworthiness standard, many authority funded research institutes and associations are studying regulatory environment. For the UAV to access civil airspace, the certification system of the aviation regulation have to allow this. FAA of US, CASA of Australia and European authorities are now issuing an experimental airworthiness certificate to a civil UAV. This is the first step of issuing a standard airworthiness certificate. And many people believe that civil UAV can fly over a NAS if some technical issues are resolved. In this study, I would like to present an international trends of a civil UAV regulation system, reliability trend of unmanned aerial system and would like to bring up a our regulatory environment and suggest an UAV regulatory policy.

Implementation of Adult Authentication System Using Smartphone and Near-Field Communication (스마트폰과 근거리 무선 통신을 이용한 성인 인증 시스템의 개발)

  • Lee, Chongho;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.19 no.4
    • /
    • pp.617-624
    • /
    • 2015
  • In this paper, an adult authentication system based on authentication certificate was designed and implemented using smartphone and near-field communication. It has three advantages. First, it achieves easy, convenient, and fast authentication by using smartphone and near-field communication. Second, it achieves extremely high security and reliability by exploiting authentication certificate. Third, it achieves extremely low risk of personal information leakage by generating and sending only virtual identification code. Finally, it has a proper legal basis by Digital Signature Act. It consists of adult authentication module, near-field communication control module, policy server module, and database server module. A prototype of the proposed system was designed and implemented, and it was verified to have correct operation.

A Study on the Satisfaction of Web-Based Health Education Programs (웹기반 건강교육 프로그램에 대한 만족도 연구)

  • Yun, Soon-Nyoung;Kim, Jeong-Eun;Lee, In-Sook;Lee, Bok-Im;Park, Eun-Jun;Park, Soo-Yeon
    • Research in Community and Public Health Nursing
    • /
    • v.20 no.2
    • /
    • pp.134-142
    • /
    • 2009
  • Purpose: This study was to present the process of web-based educational program (WEP) development and to identify factors affecting satisfaction with WEP for the certificate of healthcare managers working at the National Health Insurance Corporation (NHIC). Methods: Subjects were healthcare managers and voluntary participants of WEP. A total of 1,449 respondents were surveyed through an online questionnaire about their satisfaction with the educational contents and system. Results: The mean contents satisfaction was 3.75 (SO 0.54), and system satisfaction 4.68 (SD 0.54). According to statistical analysis, the type of certification, experience and professional career of health care management affected contents satisfaction. And factors affecting system satisfaction were the type of certification and gender. Conclusion: WEP was utilized as a pre-requisite course for the certificate program of healthcare managers. However, the development of advanced WEP is suggested to meet the educational needs of healthcare managers who have certificate or license and their job related to healthcare management.

  • PDF

Korea National Food Safety Certificate for ensuring global competitiveness of food export industry (수출식품산업의 국제경쟁력 확보를 위한 식품안전국가인증제)

  • Baek, Sang-Woo;Kim, So-Hee;Cho, Jae-Jin;Ahn, Yeong-Soon;Cho, Ah-Ra
    • Food Science and Industry
    • /
    • v.54 no.2
    • /
    • pp.82-92
    • /
    • 2021
  • To resolve difficulties of export process and strengthen competitiveness, Korea National Food Safety Certificate (K-NFSC), a comprehensive food safety support system, has been promoted to introduction. K-NFSC is at a developmental stage where the government certifies the safety of exported K-foods by developing Korean certification system based on HACCP and food safety management added for international use, and provides consulting on regulations of customs clearance and safety test analysis of food intended for export. To apply for the Global Food Safety Initiative (GFSI) technical equivalence in 2022, developmental direction of Korean certification system is set referring to FSSC22000. If selected as participants of an export supporting project, regulatory information such as customs clearance procedures and food labeling will be provided. In addition, the results of safety test analysis will be certified to help export products pass customs entry. K-NFSC is expected to support K-food exports and be growth engine for K-food industry.

Software Quality Assurance Activities of Automatic Train Control System to meet Requirements of the IEC 62279 Standard (IEC 62279 요구사항 충족을 위한 열차제어시스템의 소프트웨어 품질보증 활동에 관한 연구)

  • Shim, Kyu-Don;Lee, Jong-Woo;Park, Chae-Young;Kim, Jae-Nam;Seo, Young-Jun
    • Proceedings of the KSR Conference
    • /
    • 2010.06a
    • /
    • pp.1118-1125
    • /
    • 2010
  • This paper presents the methods to acquire the Safety Certificate from Independent Safety Assessment based on the IEC standard62279 which is commonly applied to railway system for Automatic Train Control(ATC) system in accordance with Urban Maglev project. This also shows approach methods and relative activities for project life-cycle to accomplish and ensure the system requirements of ATC system, RAMS and S/W quality activities. Furthermore, the key tasks conducted with ISA are noted in detail. These kind of activities for software quality of ATC system to obtain Safety Certificate could be a CASE model to improve the quality of domestic railway system and products, and also contribute to the growth of railway business and toward the achievement of overseas' railway signaling markets.

  • PDF

A Design of One-time Password Verification System with Enhanced Security Using Certificate (인증서를 이용한 보안성이 강화된 일회용 패스워드 검증 시스템의 설계)

  • Kim, Hyun-Chul;Lee, Chang-Soo;Lee, Kyung-Seok;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.435-441
    • /
    • 2009
  • The one-time password system solves the problem concerning password reuse caused by the repeated utilization of an identical password. The password reuse problem occurs due to the cyclic repetition at the time of password creation, and authentication failure can occur due to time deviation or non-synchronization of the number of authentication. In this study, the password is created asynchronously and exchanged with the user, who then signs using a digital signature in exchange for the password and a valid verification is requested along with the certificate to ensure non-repudiation. Besides this, a verification system for one-time password is proposed and designed to improve security by utilizing the validity verification that is divided into certificate verification and password verification. Comparative analysis shows that the mechanism proposed in this study is better than the existing methods in terms of replay attack, non-repudiation and synchronization failure.

Real-Time Evaluation System Using User Profile for Acquisition of A Computer Certificate of Qualification (컴퓨터 자격증 취득을 위한 사용자 프로파일을 이용한 실시간 평가 시스템)

  • Kim Yeong-Lye;Rhee Rang-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.153-158
    • /
    • 2006
  • The effect of solving questions and learning via internet is getting more and more important these days. In this paper we propose an active learning method that makes a database for the information about certificates and practical examinations and accesses it easily. First of all, this method makes it possible to evaluate students individually, improves the motive of learning and gives students a sense of achievement by providing a user-specific question filtering technique using user profile information by weight. And, it elevates the acquisition rate of certificates by advising and managing for certificate-acquisition and it also draw more interest and understanding for future directions. The case using the method of this paper, the examination record of a certificate of qualification is elevated about 10 marks.

  • PDF

The Integrated Identification Number Checking and Key Management Protocol with Certificates (인증서를 이용한 개인식별번호 확인 및 키분배 통합 프로토콜)

  • Kim Sung Duk;Jung Jae Dong;Won Dong Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.317-322
    • /
    • 2005
  • The existing certificate based authentication or identification just verifies whether the owner of private key corresponding to public key of certificate is the DN user set in the user field in the certificate or not, then we cannot find out who is the actual private key owner in a real world. To make up for this weak points, the method to insert the identification number like the resident registration number into the certificate extension field is applied as a technical standard to current domestic PKI system. In this paper, we propose the ECC based integrated identification, identification number checking and key management protocol providing user validation during the login.