• Title/Summary/Keyword: ID management system

Search Result 197, Processing Time 0.026 seconds

Design and Implement of Authentication System for Secure User Management for Secure on Medical ICT Convergence Environment (의료 ICT융합 환경에서 안전한 사용자 관리를 위한 인증시스템 설계 및 구현: 중소형 의료기관을 중심으로)

  • Kim, Yanghoon;Choi, Yean Jung
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.29-36
    • /
    • 2019
  • The convergence of traditional industry and ICT is a combination of security threats and vulnerabilities in ICT and specific industry-specific problems of existing industries, and new security threats and vulnerabilities are emerging. In particular, in the medical ICT convergence industry, various problems regarding user authentication are derived from the medical information system, which is being used for abuse and security weaknesses. According, this study designed and implemented a user authentication system for secure user management in medical ICT convergence environment. Specifically, we design and implement measures to solve the abuse and security weaknesses of ID sharing and to solve the inconvenience of individual ID / PW authentication by performing user authentication using personalized devices based on medical information systems.

Design of an Authentication System Based on Personal Identity Verification Card (전자신분증 기반의 개인 신분확인을 위한 인증시스템 설계)

  • Park, Young-Ho;Kong, Byung-Un;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1029-1040
    • /
    • 2011
  • Electronic identity (e-ID) card based on smartcard is a representative identity credential for on-line and off-line personal identification. The e-ID card can store the personal identity information securely, so that the information can be accessed fast, automated identity verification and used to determine the cardholder's authorization to access protected resources. Due to such features of an e-ID card, the number of government organizations and corporate enterprises that consider using e-ID card for identity management is increasing. In this paper, we present an authentication framework for access control system using e-ID cards by discussing the threat environment and security requirement against e-ID card. Specifically, to accomplish our purpose, we consider the Personal Identity Verification system as our target model.

Establishment of Hanwoo(Korean Cattle, Bos taurus, Linn.) Traceability System Using Radio Frequency Identification(RF-ID) (전자식별칩(RF-ID)을 이용한 한우 생산이력추적시스템 도입)

  • Seo, K. S.;Kim, S.;Lee, J.G.;Sohn, Y.G.;Salces, A.J.;Choi, T.J.
    • Journal of Animal Science and Technology
    • /
    • v.50 no.1
    • /
    • pp.1-8
    • /
    • 2008
  • This study was conducted to develop a traceability system for systematic animal identifi- cation to increase efficiency of animal production, post production and processing to ensure that quality and sanitary meat products reach the consumers of the entire country. The new animal identification traceability system was designed for easy management, data collection and storage considering bar code, registration number and farm number.Specifically the system aimed 1) To provide standard radio frequency technology identification (RF-ID) for livestock management, standard of ear tag, microchip and ear tag identification equipment, 2) To guarantee meat product label thereby safeguarding the consumers 3) To give incentives to farmers for producing quality meat products and 4) To provide unified system for national livestock management.Results of the research which started in July 2003 which was used by several farmers’ cooperatives and Department Store revealed the feasibility of using the RF-ID system although much will be done to conform to global nomenclatures.

EPC Sensor Network-based Product and Process Traceability System in the Food Supply Chain

  • Chun, Jung-Woo;Oh, Ji-Sung;Rho, Jae-Jueng;Lee, Jung-Wook
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.184-189
    • /
    • 2007
  • Concerns about food safety continue to rise and under this situation, governments of some countries have reinforced their regulations more strictly for food safety. In order to prevent food safety incidents or, at least to minimize the impact, the preparedness is very important. As a consequence of this, traceability system has become an essential tool for food safety. Recently, it requires more prevention-based food safety control system. One of the most generally used systems for food safety control is Hazard Analysis and Critical Control Point (HACCP). Both traceability and HACCP systems can be integrated through Electronic Product Code (EPC) Sensor Network technologies which have four value propositions. In this paper, we will introduce the concept of product and process traceability system (P2TS) through the integration of three systems to improve food safety management. The final aim is to find out the added values of the P2TS.

  • PDF

I2DM : An Improved Identity Management Protocol for Internet Applications in Mobile Networks (모바일 네트워크에서 인터넷 응용을 위한 향상된 ID관리 프로토콜)

  • Park, In-Shin;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to rapid spread of smart phones and SNS(Social Network Service), using of Internet applications has increased and taking up bandwidth more than 3G network's capacity recently. This caused reduction of speed and service quality, and occurred strong needs that backbone network company to increasing investment costs. Also a great rise of mobile network users causing identity management problems on mobile service provider through mobile network. This paper proposes advanced IDM3G[1] - to solve user ID management and security problems on mobile internet application services over 3G network and more - authentication management protocol. $I^2DM$ protocol breakup loads which made by existing IDM3G protocol's mutual authentication via mobile operator, via sending some parts to internet application service provider, enhancing mobile and ID management of service provider and network load and process load from information handling and numbers of transmitting packets, to suggest more optimized protocol against further demanding of 3G mobile network.

ID-based group key exchange mechanism for virtual group with microservice

  • Kim, Hyun-Jin;Park, Pyung-Koo;Ryou, Jae-Cheol
    • ETRI Journal
    • /
    • v.43 no.5
    • /
    • pp.932-940
    • /
    • 2021
  • Currently, research on network functions virtualization focuses on using microservices in cloud environments. Previous studies primarily focused on communication between nodes in physical infrastructure. Until now, there is no sufficient research on group key management in virtual environments. The service is composed of microservices that change dynamically according to the virtual service. There are dependencies for microservices on changing the group membership of the service. There is also a high possibility that various security threats, such as data leakage, communication surveillance, and privacy exposure, may occur in interactive communication with microservices. In this study, we propose an ID-based group key exchange (idGKE) mechanism between microservices as one group. idGKE defines the microservices' schemes: group key gen, join group, leave group, and multiple group join. We experiment in a real environment to evaluate the performance of the proposed mechanism. The proposed mechanism ensures an essential requirement for group key management such as secrecy, sustainability, and performance, improving virtual environment security.

A Study of the Damage and the Countermeasure by Identification Card Loss (신분증 분실에 따른 피해 및 대응책에 관한 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.53-64
    • /
    • 2017
  • Korean Identification card or driver license is usually used to verify one's identity in Korea. These are also used as an adult certification. Since the form of these ID card is an analog and it needs to be checked with naked eyes, it might be used maliciously. Someone who's got someone else's ID card can do other things. Therefore, it must be reported rapidly when ID card is lost or stolen. The most serious problem might be occurred when they do not recognize and report the loss. They might suffer from pecuniary or mental damage such as opening a mobile phone service, providing loan or credit card, opening a personal checking account, etc. Thus, this study suggests and compares the ways of avoiding these problems. First, the most effective way is to send the authorization code via mobile phones in consideration of build-up period and cost. The person in charge of business processing department using ID card sends the authorization code via registered mobile phone. The owners submits it to the person and their identifications are confirmed. Next effective way is that the person in charge of business processing department using ID card sends text messages via registered mobile phone. Lastly, the most ineffective way is to introduce and implement the electronic ID card ultimately even though it is expensive and takes a long time to build up the system.

A Federation Policy Development Method for Generating Domestic ID Federation (국내 ID 연합 생성을 위한 연합 정책 개발 방안)

  • Wang, Gicheol
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.8
    • /
    • pp.28-36
    • /
    • 2016
  • ID federation provides users various benefits such as employing multiple services with only single authentication and mitigating management burden of service providers that individually preserve account information of users. To keep up with this international trend, efforts for making the domestic ID federation is ongoing to provide users in the domestic research and education community seamless network connectivity and to support tetherless extension of research environment. In this paper, we analyze the foreign ID federation policies and compare them as a underlying work for making the domestic ID federation. Besides, we suggest some contents that should be included in the domestic ID federation policy. To activate the coming domestic ID federation, we need to first have a well-made federation policy. Then, we need to aggressively promote the domestic ID federation, develop various and fascinating services, and build a convenient support system for technology and service.

Data modeling and architecture design for Product Recovery Management System (국제표준 MOL (Middle-Of-Life) 데이터 모델링 및 제품 복원 관리 시스템 설계)

  • Eom Ju-Myeong;Seo Seok-Hwan
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.05a
    • /
    • pp.1793-1799
    • /
    • 2006
  • 생산자 폐기 책임 규제 강화로 인하여, 제조업 영역이 제품 제조(BOL) 뿐만 아니라 사용, 보수(MOL)와 폐기(EOL)까지 확장 수명주기로 확대 되고 있다. 또한 EOL상에서 개별 제품에 대한 제품 복원 관리 시스템 (PRMS: Product Recovery Management System)에 관한 연구가 활발히 진행 되고 있다. 그러나 BOL, MOL과 EOL간의 정보 단절 문제, MOL상의 정보를 저장하고 사용할 수 없었던 문제는 EOL관리의 자동화를 저해한 큰 요인이다. 최근 유비쿼터스 기술의 발달로 개별 제품 추적이 가능해 졌지만, EOC 등의 식별부호(ID)만으로는 PRMS에 필요한 제품 정보를 얻을 수 없다. 본 논문에서는 제품 ID로부터 MOL상의 정보를 연결하고, 국제표준 기반 정보모델을 이용하는 PRMS를 개발한다. 이를 위해: (1) PRMS에 필요한 정보를 국제표준(ISO10303-239 등)을 기반으로 모델링하고, (2) 제품 ID를 통해 MOL상의 정보를 수집하여 제품 복원에 대한 의사결정을 수행할 수 있는 PRMS를 설계하고, (3) 시제품 구현을 통해 제안된 데이터 모델 및 시스템의 유효성을 검증한다.

  • PDF

Research on key management for supervisory control and data acquisition system (원격 감시 제어시스템에서 키 관리 방안 연구)

  • Lee, Keonjik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.4
    • /
    • pp.29-42
    • /
    • 2020
  • SCADA (Supervisory Control and Data Acquisition) systems for remote monitoring, data acquisition and control are applied to major industrial infrastructures including power, water and railroad. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. These systems are located at far distances and are connected to the main control center through various types of communication methods. Due to the nature of these systems, they are becoming the significant targets of cyber attack. We propose an efficient key management scheme which is established on ID-based cryptosystem without an expensive computation on MTU (Master Terminal Unit), Sub-MTU, and RTU (Remote Terminal Unit). The proposed method is secure and effective in key management among multiple legitimate devices.