• 제목/요약/키워드: ID Management

Search Result 359, Processing Time 0.024 seconds

Study of Method for Applying Identity Management on Cable-IPTV (Cable-IPTV에서의 IdM 적용방안 연구)

  • Park, Jun-Su;Lee, Young-Pyo;Kim, Hee-Dong;Jang, Jae-Young
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.235-238
    • /
    • 2009
  • 케이블 방송사업자들은 디지털화를 추진하면서, 한편으로는 케이블 망을 이용하여 초고속인터넷, 인터넷전화 등의 통신사업에도 진출하였다. 한편, 통신사업자들은 IPTV 서비스를 제공함으로써 방송분야에 진출하면서 양 사업자들의 경쟁이 도입되었다. 향후 디지털케이블방송이 IPTV와 경쟁하기 위해서는 Cable-IPTV로의 진화와 양방향 콘텐츠 서비스의 도입이 필요하고, 이를 실현할 대표적인 서비스로 T-commerce가 주목받고 있다. 또한 T-commerce 서비스 도입을 위해서는 가입자의 정보를 안전하고 효율적으로 관리할 수 있는 IdM(Identity Management) 기술이 필요하고, 본 논문에서는 디지털케이블방송에서 IdM 기술을 적용하는 방안에 대해 기술한다.

  • PDF

A Study of the Detecting Method about the Identification Card's Counterfeit, Modification and Illegal Use by Minors (미성년자의 신분증 위·변조 및 도용을 검출하기 위한 방법 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.87-101
    • /
    • 2018
  • Minors' law evasion is getting serious. Some of them make a fake ID card or use a stolen ID card illegally. They are illegally used for buying alcohol, cigarette, bond or going to club, pub, motel and so on. On the latest News, there was a case that teens rented a car with a driver licence without checking and had severe car accident. Like this case, car rental service was fined and suspended from business because they did not figure out ID card's counterfeit or modification. Thus, this study investigates the detecting method about the ID card(including a driver license) counterfeit, modification or illegal use. The server has a database of 17~19's minors one fingerprint and services whether the visitor is adult true or not. The method will be usable and economical for business. Then, it was compared and analyzed with methods already in use in business.

ID-based group key exchange mechanism for virtual group with microservice

  • Kim, Hyun-Jin;Park, Pyung-Koo;Ryou, Jae-Cheol
    • ETRI Journal
    • /
    • v.43 no.5
    • /
    • pp.932-940
    • /
    • 2021
  • Currently, research on network functions virtualization focuses on using microservices in cloud environments. Previous studies primarily focused on communication between nodes in physical infrastructure. Until now, there is no sufficient research on group key management in virtual environments. The service is composed of microservices that change dynamically according to the virtual service. There are dependencies for microservices on changing the group membership of the service. There is also a high possibility that various security threats, such as data leakage, communication surveillance, and privacy exposure, may occur in interactive communication with microservices. In this study, we propose an ID-based group key exchange (idGKE) mechanism between microservices as one group. idGKE defines the microservices' schemes: group key gen, join group, leave group, and multiple group join. We experiment in a real environment to evaluate the performance of the proposed mechanism. The proposed mechanism ensures an essential requirement for group key management such as secrecy, sustainability, and performance, improving virtual environment security.

A Study on Integrated ID Authentication Protocol for Web User (웹 사용자를 위한 통합 ID 인증 프로토콜에 관한 연구)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.197-205
    • /
    • 2015
  • Existing Web authentication method utilizes the resident registration number by credit rating agencies separating i-PIN authentication method which has been improved authentication using resident registration number via the real name confirmation database. By improving the existing authentication method, and it provides the available integrated ID authentication on Web. In order to enhance safety, the proposed authentication method by encrypting the user of the verification value, and stores the unique identifier in the database of the certificate authority. Then, the password required to log in to the Web is for receiving a disposable random from the certificate authority, the user does not need to remember a separate password and receives the random number by using the smart phone. It does not save the user's personal information in the database, and it is easy to management of personal information. Only the integration ID needs to be remembered with random number on every time. It doesn't need to use various IDs and passwords if you use this proposed authentication methods.

ID-Based Proxy Re-encryption Scheme with Chosen-Ciphertext Security (CCA 안전성을 제공하는 ID기반 프락시 재암호화 기법)

  • Koo, Woo-Kwon;Hwang, Jung-Yeon;Kim, Hyoung-Joong;Lee, Dong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.64-77
    • /
    • 2009
  • A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a ciphertext for Alice into the ciphertext for Bob. Recently, ID-based proxy re-encryption schemes are receiving considerable attention for a variety of applications such as distributed storage, DRM, and email-forwarding system. And a non-interactive identity-based proxy re-encryption scheme was proposed for achieving CCA-security by Green and Ateniese. In the paper, we show that the identity-based proxy re-encryption scheme is unfortunately vulnerable to a collusion attack. The collusion of a proxy and a malicious user enables two parties to derive other honest users' private keys and thereby decrypt ciphertexts intended for only the honest user. To solve this problem, we propose two ID-based proxy re-encryption scheme schemes, which are proved secure under CPA and CCA in the random oracle model. For achieving CCA-security, we present self-authentication tag based on short signature. Important features of proposed scheme is that ciphertext structure is preserved after the ciphertext is re-encrypted. Therefore it does not lead to ciphertext expansion. And there is no limitation on the number of re-encryption.

The Design and Implementation of Single Sign-On Service for Education-related Information Service Platform (교육정보 통합 플랫폼 구현을 위한 통합 사용자 인증 서비스의 설계 및 구현)

  • Park, Jung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.100-109
    • /
    • 2011
  • The study concluded that in order to achieve a single sign-on through the federation ID management method must be used among many other methods so to establish a combined approval service that gives access to education related information provided by the 16 city and provincial offices of education and the KERIS(Korea Education & Research Information Service). The federation ID management method allows the usage of authentication policy and enables transfer of ID information to other institutions through standardized processing. Therefore by establishing single sign-on through the federation ID management method allows individual city and provincial office of education to maintain the already existing approval services while combining user identification database.

Implementation of Unique ID Considering the Evolutional BOMs in Ship Outfitting Design (선박 의장 BOM의 진화를 반영하기 위한 고유 식별자 구현)

  • Kim, Seung-Hyun;Lee, Jang-Hyun;Suh, Heung-Won;Jeon, Jung-Ik;Kim, Kwang-Sik
    • Korean Journal of Computational Design and Engineering
    • /
    • v.15 no.6
    • /
    • pp.449-459
    • /
    • 2010
  • Recently, not only marine PLM (Product Lifecycle Management) system but also an effective outfitting BOM (Bill of Material) management has been attracted by many shipyards. In particular, efficient outfitting design is being one of major issues in shipyards since most of currently designed marine vessels have more complex outfitting system than ever. Furthermore, each outfitting system has huge number of parts that should be arranged based upon the procurement and installation plan. Outfitting BOMs evolve into different forms according to the product development phases during basic design; detail design; and production design. Therefore, it is very difficult to maintain a consistent BOM data during the design phases. In order to express the evolution of product structures and the information of outfitting along the ship design, we suggested UID (Unique ID) code system. The UID (Unique ID) is used in order to create the relationship within evolutional BOMs of each design stage. It utilizes as the procedure of weight calculation for procurement BOM during each design stage. Thereafter, in order to demonstrate suggested outfitting BOM management technique, we suggested a prototype. In the prototype system, suggested features of outfitting BOM are implemented.

Implementation of Accessibility and Usability Enhancement Scheme for a WebRTC VC Application (WebRTC VC응용의 접근성 및 편의성 향상기술 구현)

  • Lee, KyoungMin;Jo, Jinyong;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1478-1486
    • /
    • 2016
  • This paper introduces technical methods to improve the accessibility and usability of a WebRTC video conference (VC) application. Simplified login is essential, by applying such as single sign-on (SSO) to improve the accessibility of VC applications. High usability and manageability are also necessary to attract more users, enhance user experiences, and save service management cost. The proposed VC application leverages SAML-based federated identity management (FIM) to enable higher service accessibility. Users can access the application with their organizational ID and SSO authentication. The FIM eases user ID management and indirectly strengthens privacy information protection. Proposed web application has high usability and manageability because users and/or administrators can easily create, join, monitor, or tear down VC sessions through RESTful web service (REST API). We verify the feasibility of the VC application after illustrating the SAML-based identity federation and the designed REST API.

Analysis of Internet Identity Management 2.0 and Perspective of 3.0 (인터넷 신원 관리 2.0에 대한 분석과 3.0에 대한 전망)

  • Park, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1501-1509
    • /
    • 2011
  • Current identity management 1.0 model, which is service provider-centric and isolated, has several problems such as low usability, high cost structure, difficulty in privacy protection, and lack of trust infrastructure. Though various SSO-based identity management 2.0 models including Passport/Live ID, Liberty Alliance/SAML, CardSpace, and OpenID have been recently developed in order to overcome those problems, they are not widely accepted in real Internet environment so as to replace the existing identity management 1.0 model. This paper firstly analyzes the widely-known identity 2.0 models in a comparative way, and then presents a perspective on the development direction of identity management 3.0 model for future Internet.