• Title/Summary/Keyword: ID management system

Search Result 197, Processing Time 0.025 seconds

The secured mobile wallet system using by integrated ID (통합 아이디를 이용한 안전한 모바일 월렛 시스템)

  • Nam, Choon-Sung;Jeon, Min-Kyung;Shin, Dong-Ryeol
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.9-20
    • /
    • 2015
  • Nowadays, Smart Wallet technology trend that is able to save users' consuming costs and also retain users' redundant behaviors such as Single-tapping, One-way communication, Integrated ID, has been issued in recent Mobile Industrial Fields. As one of Smart Wallet functions, Integrated ID is proposed for users' convenience, handiness, and immediate responses. It is designed for the effective management of users' IDs which are easy to be forgot because of its unusual structures. To be detail, instead of user, Integrated ID system can certificate users identification from various online sites (where user resisted) authorization requests via one-clicking, not putting identification data in each sites. So, this technology would be helpful much to a certain user who has lots ID and its Password in multiple Online shopping companies by establishing integrated ID. However, although Integrated ID has lots advantages to be used, most Mobile Service Companies has hesitated to apply Integrated ID service in their shopping systems because this technology requires them sharing their users' data. They have worried that this service would be not helpful to gain their profits. Furthermore, Users who join in multiple shopping companies and use Integrated ID services also are difficult to decide which company they have to save their points in before payment because this system could not show any financial benefit analysis data to their users. As following facts, via this paper majorly we propose the advanced Integrated ID system which concern shopping point management. Basically, this system has a strong security payment service and secure network services like other mobile Shopping systems. Additionally, this system is able to service (or to support) shopping -point -saving guide for customers' financial benefits and conveniences.

Key Management and Recovery Scheme over SCADA System Using ID-based Cryptosystem (ID 기반 암호 기법을 이용한 SCADA 시스템에서 비밀 키 관리 및 복구 방안)

  • Oh, Doo-Hwan;Choi, Doo-Sik;Na, Eun-Sung;Kim, Sang-Chul;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.427-438
    • /
    • 2012
  • The SCADA(Supervisory Control and Data Acquisition) systems are used to control some critical national infrastructures such as electricity, gas, and water distribution systems. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. We propose a new key management method which is established on ID-based cryptosystem using pairing on MTU(Master Terminal Unit), Sub-MTU, and RTU(Remote Terminal Unit). Furthermore, we present a redistribution protocol of private key of each device and a system recovery protocol as a countermeasure of exposure of KMS(Key Management System) master key which is occurred by some unexpected accidents or malicious attacks.

The Mobile Digital ID Wallet based on LTE/SAE for 4G Networks (4G 네트워크를 위한 LTE/SAE 기반의 모바일 전자ID지갑)

  • Jung, Yun-Seon;Lim, Sun-Hee;Yi, Ok-Yeon;Lee, Sang-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10C
    • /
    • pp.764-777
    • /
    • 2008
  • In 4G environments, which is the next generation technology for mobile network, it is forecasted that the wireless Internet using a mobile devices such as a mobile phone, PDA will increase because of expansion of Internet and integration of heterogeneous networks. Therefore, we need a Digital ID management technology that can prevent illegal uses and manage private information efficiently in wired and wireless environments. In this paper, we analyze various Digital ID management technologies, and then define requirements of user-centric Digital ID management technology. In addition, we newly propose the authentication mechanism for mobile applications in LTE/SAE network. Finally, we propose the mobile Digital ID Wallet mechanism suitable for 4G environments.

Implementation of Unique ID Considering the Evolutional BOMs in Ship Outfitting Design (선박 의장 BOM의 진화를 반영하기 위한 고유 식별자 구현)

  • Kim, Seung-Hyun;Lee, Jang-Hyun;Suh, Heung-Won;Jeon, Jung-Ik;Kim, Kwang-Sik
    • Korean Journal of Computational Design and Engineering
    • /
    • v.15 no.6
    • /
    • pp.449-459
    • /
    • 2010
  • Recently, not only marine PLM (Product Lifecycle Management) system but also an effective outfitting BOM (Bill of Material) management has been attracted by many shipyards. In particular, efficient outfitting design is being one of major issues in shipyards since most of currently designed marine vessels have more complex outfitting system than ever. Furthermore, each outfitting system has huge number of parts that should be arranged based upon the procurement and installation plan. Outfitting BOMs evolve into different forms according to the product development phases during basic design; detail design; and production design. Therefore, it is very difficult to maintain a consistent BOM data during the design phases. In order to express the evolution of product structures and the information of outfitting along the ship design, we suggested UID (Unique ID) code system. The UID (Unique ID) is used in order to create the relationship within evolutional BOMs of each design stage. It utilizes as the procedure of weight calculation for procurement BOM during each design stage. Thereafter, in order to demonstrate suggested outfitting BOM management technique, we suggested a prototype. In the prototype system, suggested features of outfitting BOM are implemented.

NON-INTERACTIVE IDENTITY-BASED DNF SIGNATURE SCHEME AND ITS EXTENSIONS

  • Lee, Kwang-Su;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • Bulletin of the Korean Mathematical Society
    • /
    • v.46 no.4
    • /
    • pp.743-769
    • /
    • 2009
  • An ID-based DNF signature scheme is an ID-based signature scheme with an access structure which is expressed as a disjunctive normal form (DNF) with literals of signer identities. ID-based DNF signature schemes are useful to achieve not only signer-privacy but also a multi-user access control. In this paper, we formally define a notion of a (non-interactive) ID-based DNF signature and propose the first noninteractive ID-based DNF signature schemes that are secure under the computational Diffie-Hellman and subgroup decision assumptions. Our first scheme uses random oracles, and our second one is designed without random oracles. To construct the second one, we use a novel technique that converts a non-interactive witness indistinguishable proof system of encryption of one bit into a corresponding proof system of encryption of a bit-string. This technique may be of independent interest. The second scheme straightforwardly yields the first ID-based ring signature that achieves anonymity against full key exposure without random oracles. We finally present two extensions of the proposed ID-based DNF signature schemes to support multiple KGCs and different messages.

A Study on Scalable Federated ID Interoperability Method in Mobile Network Environments (모바일 환경으로 확장 가능한 federated ID 연동 방안에 관한 연구)

  • Kim, Bae-Hyun;Ryoo, In-Tae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.27-35
    • /
    • 2005
  • While the current world wide network offers an incredibly rich base of information, it causes network management problem because users should have many independent IDs and passwords for accessing different sewers located in many places. In order to solve this problem users have employed single circle of trust(COT) ID management system, but it is still not sufficient for clearing the problem because the coming ubiquitous network computing environment will be integrated and complex networks combined with wired and wireless network devices. The purpose of this paper is to describe the employment and evaluation of federated ID interoperability method for solving the problem. The use of the proposed model can be a solution for solving network management problem in the age of mobile computing environment as well as wired network computing environment.

ID management technology on RFID system (RFID에서 ID 관리 기술)

  • Lee, Chang-Yeol
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2005.11a
    • /
    • pp.409-412
    • /
    • 2005
  • RFID 시스템은 태그, 리더, 그리고 RFID를 관리하는 S/W 시스템으로 구성되고 있다. RFID태그에 기록하는 정보는 RFID 태그를 분류하는 클라스에 따라 다르지만, 모든 RFID태그는 국제적 표준에 따른 ID 체계를 갖추고, 운영을 하여야 한다. 여기서는 국제적 RFID용 ID표준을 살펴보고, ISO15459에 따른 ID 관리 시스템이 갖추어야 할 구조적 특징에 대하여 연구하기로 한다.

  • PDF

Implementation of Truck and Dock Management System for Manufacturers and Couriers using RF-ID

  • Lee, June-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.119-125
    • /
    • 2021
  • Companies' efforts to find ways to reduce logistics costs for products and raw materials currently being brought in to produce products in all manufacturing processes are one of the biggest challenges, and the recent global recession has made logistics management even more important. This development technology limits the development of IN/OUT Bound truck logistics and dock management optimization system in the factory, especially by using UHF 900Mhz RFID radio frequency technology.

A Design of OpenID System Using ID Management Method User-Centric (사용자 중심 ID 관리 기법을 이용한 OpenID 시스템의 설계)

  • Jeong, Eui-Kyeong;Yun, Cheol-Yong;Kim, Hyun-Chul;Jun, Moon-Seog
    • Annual Conference of KIPS
    • /
    • 2009.04a
    • /
    • pp.1373-1376
    • /
    • 2009
  • 인터넷의 확산과 웹 2.0 서비스의 등장은 기존 서비스 제공자 중심의 ID 관리를 사용자 중심의 ID 관리 형태로 변화시키는 계기가 되었다. 그러나 기존 사용자 중심 ID 관리 기법은 사용자 인증 및 정보 관리에 대한 문제가 존재한다. 본 논문에서는 서비스 제공자가 필요로 하는 정보만을 사용자가 선별적으로 선택하여 제공함으로서 기존 ID 관리 기법의 문제를 해결할 수 있는 사용자 중심의 ID 관리 기법을 이용한 OpenID 시스템을 제안한다. 또한, 실험 및 비교분석을 통하여 보안성 및 효율성 측면에서 우수함을 확인 할 수 있었다.

The blocking channel to reduce the performance decrease using the low correlation with cyclic delay scheme in LED-ID system (LED-ID 시스템에서 채널 차단에 따른 성능 열화를 줄이기 위한 저 상관 순환 지연 기법)

  • Lee, Kyu-Jin;Kim, Gui-Jung
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.319-325
    • /
    • 2015
  • We proposed the blocking channel to reduce the performance decrease using the low correlation with cyclic delay scheme in LED-ID system. LED-ID is based on the visible light to transmit the data. However, It is occurred the block channel by structure or environment of indoor for light of straightness. LED-ID system is degraded the performance by the block channel as loss of data, and burst error. To solve the block channel, the proposed system is overcome the burst error by low correlation among data, which is able to obtain the maximize time diversity gain to improve the performance of BER by cyclic delay scheme. The BER performance is evaluated by computer simulation according to channel parameter. The simulation results shows that proposed system gives much better performance than conventional system and constant cyclic delay scheme system.