• Title/Summary/Keyword: ID Management

Search Result 359, Processing Time 0.034 seconds

Analysis of Regulation and Standardization Trends for Drone Remote ID (드론 원격 식별 규정 및 표준화 동향 분석)

  • Kim, H.W.;Kang, K.S.;Kim, D.H.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.6
    • /
    • pp.46-54
    • /
    • 2021
  • Drone remote identification (ID) capability is essential to ensure public safety, help law enforcement, and secure the safety and efficiency of the national airspace. Remote ID technology can be used to differentiate compliant drones from illegal drones that pose a potential security risk by providing airspace awareness to the civil aviation agency and law enforcement entities. In addition, the increased safety and efficiency obtained by mandating remote ID will make it possible to operate drones over populated areas and beyond visual lines of sight. In addition, remote ID will allow drones to be safely integrated into unmanned traffic management systems and the national airspace. Remote ID devices can be categorized by type, i.e., broadcast remote ID or network remote ID. The broadcast remote ID, which has high technical maturity and will be applied in the near future, is primarily considered to ensure the security of drones. The network remote ID, which is being developed and tested and will be applied in the distant future, can be used additionally to ensure the safety and the efficiency of the national airspace. In this paper, we analyze the trends on regulation and standardization activities for drone remote ID primarily in the United State and Europe.

A Federation Policy Development Method for Generating Domestic ID Federation (국내 ID 연합 생성을 위한 연합 정책 개발 방안)

  • Wang, Gicheol
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.8
    • /
    • pp.28-36
    • /
    • 2016
  • ID federation provides users various benefits such as employing multiple services with only single authentication and mitigating management burden of service providers that individually preserve account information of users. To keep up with this international trend, efforts for making the domestic ID federation is ongoing to provide users in the domestic research and education community seamless network connectivity and to support tetherless extension of research environment. In this paper, we analyze the foreign ID federation policies and compare them as a underlying work for making the domestic ID federation. Besides, we suggest some contents that should be included in the domestic ID federation policy. To activate the coming domestic ID federation, we need to first have a well-made federation policy. Then, we need to aggressively promote the domestic ID federation, develop various and fascinating services, and build a convenient support system for technology and service.

A Study of the Damage and the Countermeasure by Identification Card Loss (신분증 분실에 따른 피해 및 대응책에 관한 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.53-64
    • /
    • 2017
  • Korean Identification card or driver license is usually used to verify one's identity in Korea. These are also used as an adult certification. Since the form of these ID card is an analog and it needs to be checked with naked eyes, it might be used maliciously. Someone who's got someone else's ID card can do other things. Therefore, it must be reported rapidly when ID card is lost or stolen. The most serious problem might be occurred when they do not recognize and report the loss. They might suffer from pecuniary or mental damage such as opening a mobile phone service, providing loan or credit card, opening a personal checking account, etc. Thus, this study suggests and compares the ways of avoiding these problems. First, the most effective way is to send the authorization code via mobile phones in consideration of build-up period and cost. The person in charge of business processing department using ID card sends the authorization code via registered mobile phone. The owners submits it to the person and their identifications are confirmed. Next effective way is that the person in charge of business processing department using ID card sends text messages via registered mobile phone. Lastly, the most ineffective way is to introduce and implement the electronic ID card ultimately even though it is expensive and takes a long time to build up the system.

A study on the Application of Distributed ID Technology based on Blockchain for Welfare Blind Spot Management (복지사각지대 관리를 위한 블록체인 분산 ID기술 적용 연구)

  • Min, Youn A
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.145-150
    • /
    • 2020
  • The importance of managing blind spots in the welfare crisis is increasing. Accordingly, in order to manage the blind spot of the welfare crisis, it is necessary to manage the social safety net with the contents of supporting income and self-reliance of low-income families, and actively discovering and supporting poor and crisis households. In this paper, we reviewed various problems related to blind spots for the management of welfare blind spots, and proposed the applicability of blockchain-based distributed ID and the possibility of distributed ID technology in stages by considering the range of blind spots.

Key Management and Recovery Scheme over SCADA System Using ID-based Cryptosystem (ID 기반 암호 기법을 이용한 SCADA 시스템에서 비밀 키 관리 및 복구 방안)

  • Oh, Doo-Hwan;Choi, Doo-Sik;Na, Eun-Sung;Kim, Sang-Chul;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.427-438
    • /
    • 2012
  • The SCADA(Supervisory Control and Data Acquisition) systems are used to control some critical national infrastructures such as electricity, gas, and water distribution systems. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. We propose a new key management method which is established on ID-based cryptosystem using pairing on MTU(Master Terminal Unit), Sub-MTU, and RTU(Remote Terminal Unit). Furthermore, we present a redistribution protocol of private key of each device and a system recovery protocol as a countermeasure of exposure of KMS(Key Management System) master key which is occurred by some unexpected accidents or malicious attacks.

The secured mobile wallet system using by integrated ID (통합 아이디를 이용한 안전한 모바일 월렛 시스템)

  • Nam, Choon-Sung;Jeon, Min-Kyung;Shin, Dong-Ryeol
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.9-20
    • /
    • 2015
  • Nowadays, Smart Wallet technology trend that is able to save users' consuming costs and also retain users' redundant behaviors such as Single-tapping, One-way communication, Integrated ID, has been issued in recent Mobile Industrial Fields. As one of Smart Wallet functions, Integrated ID is proposed for users' convenience, handiness, and immediate responses. It is designed for the effective management of users' IDs which are easy to be forgot because of its unusual structures. To be detail, instead of user, Integrated ID system can certificate users identification from various online sites (where user resisted) authorization requests via one-clicking, not putting identification data in each sites. So, this technology would be helpful much to a certain user who has lots ID and its Password in multiple Online shopping companies by establishing integrated ID. However, although Integrated ID has lots advantages to be used, most Mobile Service Companies has hesitated to apply Integrated ID service in their shopping systems because this technology requires them sharing their users' data. They have worried that this service would be not helpful to gain their profits. Furthermore, Users who join in multiple shopping companies and use Integrated ID services also are difficult to decide which company they have to save their points in before payment because this system could not show any financial benefit analysis data to their users. As following facts, via this paper majorly we propose the advanced Integrated ID system which concern shopping point management. Basically, this system has a strong security payment service and secure network services like other mobile Shopping systems. Additionally, this system is able to service (or to support) shopping -point -saving guide for customers' financial benefits and conveniences.

Forward Anonymity-Preserving Secure Remote Authentication Scheme

  • Lee, Hanwook;Nam, Junghyun;Kim, Moonseong;Won, Dongho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1289-1310
    • /
    • 2016
  • Dynamic ID-based authentication solves the ID-theft problem by changing the ID in each session instead of using a fixed ID while performing authenticated key exchanges between communicating parties. User anonymity is expected to be maintained and the exchanged key kept secret even if one of the long-term keys is compromised in the future. However, in the conventional dynamic ID-based authentication scheme, if the server's long-term key is compromised, user anonymity can be broken or the identities of the users can be traced. In addition, these schemes are vulnerable to replay attacks, in which any adversary who captures the authentication message can retransmit it, and eventually cause the legitimate user to be denied service. This paper proposes a novel dynamic ID-based authentication scheme that preserves forward anonymity as well as forward secrecy and obviates replay attacks.

Trust Management and Privacy Protection for Mobile Digital ill Wallets (모바일 전자 ID 지갑에 적합한 신뢰 관리 및 개인 정보보호 방안)

  • Jang, Gong-Soo;Yun, Ju-Seung;Lee, Hang-Suk;Jung, Han-Wul;Park, Young-Su;Choi, Dea-Sun;Jin, Seung-Hun
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.297-308
    • /
    • 2009
  • In 2008, ETRI developed a new mobile digital ID wallet, in which anyone can store personal information and PKI credential. When the wallet is used, privacy protection is one of the most important problems and personal information should be protected under various usage scenarios such as exchanging sensitive information in on/off-line environments, joining as a new member in the web site, etc. In this paper, we propose a triangular trust management scheme that can effectively manage trustness and also protect sensitive personal information. This scheme relies on three techniques: PKI, reputation and condition (situation context). We implemented prototype of our scheme, and tested it under various scenarios, which showed that the proposed scheme can effectively be used for diverse cases.

Implementation of Truck and Dock Management System for Manufacturers and Couriers using RF-ID

  • Lee, June-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.119-125
    • /
    • 2021
  • Companies' efforts to find ways to reduce logistics costs for products and raw materials currently being brought in to produce products in all manufacturing processes are one of the biggest challenges, and the recent global recession has made logistics management even more important. This development technology limits the development of IN/OUT Bound truck logistics and dock management optimization system in the factory, especially by using UHF 900Mhz RFID radio frequency technology.

Identity-Based Online/Offline Signcryption Without Random Oracles (ID기반 온라인/오프라인 사인크립션(Signcryption) 기법)

  • Park, Seung-Hwan;Kim, Ki-Tak;Koo, Woo-Kwon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.23-36
    • /
    • 2010
  • Signcryption is a cryptographic primitive which offers authentication and confidentiality simultaneously with a cost lower than signing and encrypting the message independently. We propose a new cryptographic notion called Identity-based online/offline signcryption. The notion of online/offline scheme can be divided into two phases, the first phase is performed offline prior to the arrival of a message to be signed or encrypted and the second phase is performed online phase after knowing the message and the public key of recipient. The Online phase does not require any heavy computations such as pairings or exponents. It is particularly suitable for power-constrained devices such as smart cards. In this paper, we propose ID-based signcryption scheme and ID-based online/offline signcryption scheme where the confidentiality and authenticity are simultaneously required to enable a secure and trustable communication environment. To our best knowledge, this is the first ID-based online/offline signcryption scheme that can be proven secure in the standard model.