• Title/Summary/Keyword: Documents Authentication

Search Result 37, Processing Time 0.024 seconds

A Study of the PMI-based XML Access Control Model in Consideration of the Features of the Public Organization (공공기관의 특성을 고려한 PMI기반의 XML 접근제어 모델에 관한 연구)

  • Cho, Chang-Hee;Lee, Nam-Yong
    • Journal of Information Technology Services
    • /
    • v.5 no.3
    • /
    • pp.173-186
    • /
    • 2006
  • The local public organizations, to secure the Confidentiality, Integrity, Authentication and Non-Repudiation of cyber administrative environment is giving it a try to consolidate the official documents among them by standardizing all the documents into XML formats together with the establishment of the GPKI(Government Public Key Infrastructure). The Authentication System based on the PKI(Public Key Infrastructure) used by the GPKI, however, provides only the simple User Authentication and thus it results in the difficulty in managing the position, task, role information of various users required under the applied task environment of public organizations. It also has a limitation of not supporting the detailed access control with respect to the XML-based public documents.In order to solve these issues, this study has analyzed the security problems of Authentication and access control system used by the public organizations and has drawn the means of troubleshoot based on the analysis results through the scenario and most importantly it suggests the access control model applied with PMI and SAML and XACML to solve the located problem.

Design and Implementation of an Authentication Method for Secure Distribution and Use of E-documents in Online Environment (온라인 환경에서의 전자문서 안전배포 및 이용을 위한 인증방법 설계 및 구현)

  • Kim, Yong
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.1
    • /
    • pp.75-98
    • /
    • 2008
  • With explosive growth in the area of the Internet and IT services, various types of e-documents are generated and circulated. An e-Document is a sort of electronic records which a organization performs works and goals. In this study, we propose a security algorithm for secure use and distribution of e-documents. Especially, the proposed method can be applied to generate digital signature which can guarantee authenticity, integrity, confidentiality of an e-document and authenticate authorized users. Also, we can get higher security level as using a smart card that provides highly storing capacity and security. We carried out an experiment to verify efficiency and security of the proposed method.

Documents to Produce for the Recognition and Enforcement of Arbitral Awards (중재판정의 승인.집행을 위하여 제출할 서류)

  • Lee, Ho-Won
    • Journal of Arbitration Studies
    • /
    • v.23 no.2
    • /
    • pp.141-164
    • /
    • 2013
  • The current Korean Arbitration Act (KAA) ${\S}37(2)$ requires that a formal copy of an arbitral award or a duly certified copy thereof and the original arbitration agreement or a duly certified copy thereof be produced for the recognition and enforcement of a arbitral award. But as the KAA provides that the recognition and enforcement of a foreign arbitral award to which the New York Convention applies shall be granted in accordance with the Convention, the duly authenticated original award should be produced instead of a formal copy in that case. The provision on the documents to produce for the recognition and enforcement of an arbitral award is set to establish a reasonable and transparent standard and to facilitate the recognition and enforcement of awards by prohibiting parochial refusal of the recognition and enforcement on the grounds of formalities. Therefore it is necessary to simplify those documents according to the internationally acknowledged standard. It would be desirable to amend KAA ${\S}37(2)$ to require only "the original arbitral award or a copy thereof" without authentication or certification and a translation into Korean without any condition, adopting the 2006 amendment to the UNCITRAL Model Law on International Commercial Arbitration.

  • PDF

A Study on the Blockchain-based System Authentication Method (블록체인 기반 시스템 인증 방법에 대한 연구)

  • Kim, Sunghwan;Kim, Younggon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.211-218
    • /
    • 2020
  • Recently, with the advent of blockchain technology, attempts to apply this technology to existing systems are increasing. By using the blockchain technology consensus ledger and smart contract, it is necessary to distribute certificates to various fields that require documents, attestation, authentication, verification, etc. We are studying methods using hash operation, blockchain, etc., but it is difficult to spread the technology as it has not yet reached the stage of commercialization. In this paper, user device registration authentication algorithm, blockchain-based question and answer authentication algorithm, certificate issuance, verification process and encryption algorithm, and server-side authentication for easy application in blockchain based business platform environment We proposed a blockchain-based system authentication method using four algorithms.

The Development of Web Browsed Electronic Document Interchanges System (초고속정보통신망상에서 웹 기반의 전자문서교환(EDI) 시스템 구현)

  • Kim, Nak-Hyun;Roh, Myung-Ho
    • IE interfaces
    • /
    • v.13 no.2
    • /
    • pp.258-265
    • /
    • 2000
  • EDI(Electronic Data Interchange) allows the exchange of business information and computer-processable data in a standard, structured format electronically between organizational entities. EDI handles the restructuring of a business document into the standard format so that it can be transmitted from one computer to another. This paper identifies features and technologies of web browsed electronic document exchange system as follows 1) the fundamental technologies that consists of the EDI technologies, the Internet/Web technologies, the security/authentication techniques, and the XML implementation technologies. 2) the functions that consists of the document standards, transfer technology of the document, encryption and authentication 3) the implemented Web-EDI systems that consists of document generation module, encryption and authentication module, transfer module, acknowledgement module, administration module. In this paper, the Web-based EDI system implemented from the researched technologies will be installed on the EDI servers owned by corporate customers and enable the exchange of documents between each installed companies.

  • PDF

A Study on Provisions and Precedents about Original Electronic Documents in UCP and eUCP (전자서류의 원본성에 대한 UCP 및 eUCP의 규정.판례에 관한 연구)

  • Jang, Heung-Hoon;Park, Bok-Jae
    • International Commerce and Information Review
    • /
    • v.7 no.1
    • /
    • pp.213-233
    • /
    • 2005
  • A letter of credit is the best settlement among various means of payments until now. A letter of credit plays very important roles in rational and smooth international trade. Letter of credit is usually used in international trade. But many people have to prepare a lot of transport documents in order to transact with L/C. Therefore, the transactions will be happened to delay in international trade very often. Owing to the EDI, international trade will be materialized with electronic business of E-commerce. If we transact with the electronic documents, it will be reduced the time very much in international trade. Generally speaking, all relating parties transact with L/C complying with UCP, but there are no ruling articles about electronic documents in UCP. If all parties want to transact with electronic documents in global business, UCP has to contain the electronic provisions. So, ICC published eUCP on 2002. The purpose of the study was to analyze original electronic papers and provisions through foreign precedents in UCP and eUCP. If we want to exchange the electronic document, the UCP provisions about electronic documents would be revised as follows: UCP provision 20(b) would be revised, “Unless otherwise stipulated in the credit, banks have to accept as an original documents, a documents produced or appearing to have been produced: (i)by reprographic, automated or computerized systems (ii)as carbon copies,; provided that it is marked as original and, where necessary, appears to be signed. A document may be signed by handwriting, by facsimile signature, by perforated signature by symbol, or by any other mechanical or electronic method of authentication."

  • PDF

A Study of PKI-Based E-commerce Security System Design under Java Code Environment (Java Code를 중심으로한 PKI기반 전자상거래 보안시스템 설계)

  • Bang, Kee-Chun;Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.51-57
    • /
    • 2013
  • RSA is the most widely used public key algorithms. Payment via the SSL communications, and user authentication using RSA secure shopping mall that can protect the user's valuable information in the process of building. SSL-based electronic signature technology and encryption protocols for this technology are electronic documents are delivered to the other party through a separate encryption process, the information sender to enter information on a web browser (user) and the recipient (the Web server of the site Manager), except you will not be able to decrypt the contents. Therefore, the information is encrypted during the transfer of electronic documents even if hackers trying to Sniffing because its contents can never understand. Of internet shopping mall in the user authentication 'and' Communications' SSL secure shopping mall built with the goal of the methodology are presented.

A Study on Providing Secure Storage and User Authentication Using MTM on Mobile Platform (모바일 플랫폼에서 MTM을 이용한 보안영역 제공 및 인증에 관한 연구)

  • Lee, Sun-Ho;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.293-302
    • /
    • 2011
  • The various information services can be delivered by smartphone through advanced high-speed mobile communication. A smartphone is a mobile device that offers more powerful computing capacity than feature phone. Therefore this device can provide such as web surfing, editing documents, playing video, and playing games. A lot of personal information stored on smartphone. Because it has High usability. Personal information Leaks if the smart phone is lost or stolen may become a big problem. In this paper we have analyzed existing method for providing secure storage and user authentication on mobile platform and derived security requirement. Therefore we propose the following scheme that satisfy security requirement. Proposed scheme providing secure storage with preventing authentication bypass, and availability from damaged data to access secure area.

ESES: XML based Secure E-Commerce Services (ESES: XML 기반의 안전한 전자상거래 서비스)

  • 나중찬;손승원;조현숙
    • Proceedings of the CALSEC Conference
    • /
    • 2001.02a
    • /
    • pp.305-311
    • /
    • 2001
  • Recently, XML(extensible Markup Language) Document is widely accepted as the standard for electronic documents in the electronic commerce. Therefore, a security mechanism for XML documents must be provided In the first place. ESES(ETRI Secure I-commerce Services) provides a system designed specifically for securing XML documents and existing non-XML documents that are exchanged in the Electronic Commerce and is essential to various electronic commerce platform as a fundamental system. In this paper, we provide an overview of these aspects of the ESES and design and implemented the secure I-Commerce Platform to support security services such as authentication, integrity and confidentiality for Electronic Document Interchange.

  • PDF

The High-Reliable Image Authentication Technique using Histogram Compensation (히스토그램 보정을 이용한 고신뢰성 영상 인증 기법)

  • Kim, Hyo-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.7
    • /
    • pp.1088-1094
    • /
    • 2010
  • Image authentication algorithms have to discriminate forged contents in the various critical fields of military, medical services, digital documents. They must ensure perceptual invisibility and fragility against malicious attacks. It is desirable that watermarking algorithms support sufficient insertion capacity and blind feature. And, high reliable algorithms that can eliminate false-positive and false-negative errors are needed in the watermark extraction process. In this paper, we control coefficients of high frequency band in a DCT domain and compensate brightness histogram for high reliability. As a result, we found that the proposed algorithm guarantee various requirements such as perceptual invisibility with high PSNR values, fragility, high reliability and blind feature. In addition, experiment results show that the proposed algorithm can be used steganographic applications by sufficient capacity of watermark.