• Title/Summary/Keyword: Innovation Certification

Search Result 88, Processing Time 0.023 seconds

A Design of Certificate Password Recovery Using Decentralized Identifier (DID를 사용한 인증서 암호 복구)

  • Kim, Hyeong-uk;Kim, Sang-jin;Kim, Tae-jin;Yu, Hyeong-geun
    • Journal of Venture Innovation
    • /
    • v.2 no.2
    • /
    • pp.21-29
    • /
    • 2019
  • In the public certificate technology commonly used in Korea, users have a cumbersome problem of always resetting when they forget their password. In this paper, as a solution to this problem, we propose a secure authentication certificate password recovery protocol using blockchain, PKI, and DID for distributed storage. DID is a schema for protecting block ID in blockchain system. The private key used in the PKI is configured as a user's biometric, for example, a fingerprint, so that it can completely replace the memory of the complex private key. To this end, based on the FIDO authentication technology that most users currently use on their smartphones, the process of authenticating a user to access data inside the block minimizes the risk of an attacker taking over the data.

The Future of BlockChain Technology Leading Innovation in the Industrial Ecosystem (산업 생태계의 혁신을 선도할 블록체인 기술의 미래전망)

  • Kim, Jung-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.324-332
    • /
    • 2018
  • Blockchain technology has the potential to revolutionize trust models and business processes in a variety of industries. However, it is considered to be the initial stage of the system that pursues autonomy rather than efficiency, and it is necessary to monitor and inspect the distributed ledger technology from the price and introduction time as compared with the existing relational DB transaction technology. However, domestic and foreign private sectors have already been activated by applying block-chain technology in the national domain, and the block chain is devoid of doubt that it is an exaggerated technology, characterized by the invariance of the record, transparency, and autonomous execution of business rules. It has begun to be utilized in history, identity, certification and auditing in the financial industry as well as various industries. In this paper, we analyze the problems such as security weakness, insufficient regulatory environment, technical consensus and lack of common standard. In addition, the business sense and possibility of the block chain technology is expected to be the innovation of the industrial ecosystem by entering into the reality system from the concept through monitoring the actual introduction performance in the field of copyright, logistics, health care and environment.

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE (LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증)

  • Yoo, Jae-hoe;Kim, Hyung-uk;Jung, Yong-hoon
    • Journal of Venture Innovation
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2019
  • In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.

A Study on the Change in Start-up Competence of College Students Participating in Technology Start-up Education Camp (기술창업교육캠프 참가 대학생의 창업역량 변화에 관한 연구)

  • Jeon, Ju Hyun;Lim, Kyoung Su
    • Journal of Engineering Education Research
    • /
    • v.20 no.4
    • /
    • pp.67-72
    • /
    • 2017
  • It was only 2010 when start-up education spread to undergraduate education in South Korea. Start-up education was conducted so late that there are insufficient studies of evaluation and feedback on the effectiveness of start-up education. Education is a complex concept of teaching people in a desirable direction and developing their inherent abilities. Based on this, start-up education can be defined as cultivating students' entrepreneurial spirit internally and making them exhibit start-up competence externally by teaching them the knowledge, skills and attitudes necessary for business start-up and developing abilities such as creativity, challenge spirit and problem-solving skills. This study conducted pre and post survey to check if the education camp for the technology start-up, which is a practice-oriented start-up education, has an effect on the change of the participating students' perceptions about the business start-up. This study would analyze various factors of college students' business start-up through a factorial analysis so that the quantitative accumulation of start-up education can lead to a qualitative change and propose measures for the management of the quality of the education.

A study on the send and receive of the message in the bolero and TEDI system (Bolero와 TEDI 시스템상의 메시지 송수신에 관한 고찰)

  • Jeon, Soon-Hwan
    • The Journal of Information Technology
    • /
    • v.7 no.2
    • /
    • pp.105-121
    • /
    • 2004
  • The purpose of this paper is to study the send and receive of the message in the both Bolero and TEDI System. Bolero System is the business processes and methods, together with the digital information system, which are provided by Bolero International for communicating Messages and Documents and facilitating business transactions, as well as the Bolero Rulebook and Operating Rules governing their use. On the other hand, The TEDI System replaces a series of trade documents with electronic date, and it realizes secure and reliable transactions of data among parties by means of open networks, such as the Internet. The TEDI system is composed of Web browsers, TC Servers, a RSP Server, and Certification Servers.

  • PDF

A Study on the Measurement of Performance and Evaluation Model to Achieve the Program Education Objectives (프로그램 교육목표 평가 모형과 성취도 측정에 관한 연구)

  • Park, Ik-Su;Park, Kyung-Woo
    • Journal of Engineering Education Research
    • /
    • v.16 no.6
    • /
    • pp.52-57
    • /
    • 2013
  • In this paper, the evaluation system in order to achieve the program education objectives of Accreditaion Board for engineering education of Korea, analyze the educational objectives evaluation tool case studies of programs that are run by each university, the program educational objectives to match the actual situation of university I have developed a distinction between questions the evaluation and assessment system. Configuration, execution, measurement, analysis, is a five-step mooring, the evaluation tool, is a graduate research you are currently using the most in Korea, the employer survey, education target assessment model of the program, employment trends of graduates, I decided to graduate focus group interviews. Distinction between questions, the evaluation also developed a questionnaire to derive the important keywords of education for each objectives. Improvement evaluation tool, the evaluation criteria is required, the University is preparing evaluate (NGR) in South Korea engineering education certification next regularly, requires research on semantic analysis of the results of measurement of the educational goals of the program in the future some.

A Comparative Study on Office Building Criteria between G-SEED and LEED

  • Mok, Seon-Soo;Cho, Dong-Woo;Park, Ah-Reum
    • KIEAE Journal
    • /
    • v.14 no.1
    • /
    • pp.59-66
    • /
    • 2014
  • G-SEED aims for establishing green environmental building with energy saving and has started for evaluating with multi-residential complex in 2002 by the Ministry of Land, Infrastructure & Transport (MOLIT) and the Ministry of Environment to develop the current 10 building types and new & existing building types to be applied. Since G-SEED has been developed for more than 10 years, the strategy of globalization is needed with constant review itself and comparison between other assessments to understand current situation from the global perspectives. This study draws similarities and differences of G-SEED and LEED criteria by the comparison from re-constructed LEED criteria based on G-SEED. "Energy & Pollution" is the most concerned category in both assessments as the result of analysis on category rates. Next concerns are "Material & Resources", "Indoor Environment" and "Water Management". The unique categories in both criteria are "Ecological Environment" in G-SEED and "Innovation & Design Process" in LEED. The conclusion of this research is that two assessments are organized at different locations and with different strategies for developing green building but there are common concerns such as energy saving, material use, indoor environment. As a result, it is expected to use fundamental data for developing G-SEED for global standard.

Vulnerability Evaluation Methodology for firewall Certification (침입차단시스템 제품 인증을 위한 취약성 평가 방법)

  • 김점구
    • The Journal of Information Technology
    • /
    • v.3 no.3
    • /
    • pp.27-37
    • /
    • 2000
  • Although an insurance criterion for reliance is unified, the difference in evaluation mechanism in every country is already ambiguity. In other words, the aspect of objectivity would be a little because it is true that the vulnerability evaluation include evaluator, scenario and tools (TSVES) applying in test, depth and scope of evaluation. But evaluation results can be difference in accordance with each evaluation elements. By using TSVES to evaluating network security vulnerability, first, we expected the evaluation results is impartiality, objectivity, repeatability, reproducibility, appropriateness and soundness of results. Second, it could be transferred manual ways into automation ways, and then expected easiness and safety of extension and modification in a quality of products as well as a dramatical reduction of waste of time and energy.

  • PDF

Six Sigma and the Cost of(Poor) Quality

  • Aca;U, Jichao-X
    • International Journal of Quality Innovation
    • /
    • v.3 no.2
    • /
    • pp.159-173
    • /
    • 2002
  • Any organization's Six Sigma program may be at high risk without heeding the lessons learned from the past and that tries to operate without a robust business foundation. A foundation that preferably should consist of stepping-stones such as a 5-S house-keeping program, an effective Integrated Management System (IMS), which includes a strong focus on planning for quality to fully capture the Voice of the Customer (VOC), and an organization-wide training scheme, as well as a reliable Cost of Poor Quality (COPQ) system. That's the best advise I can give to any organization that wishes to embark on a Six Sigma improvement program and hope to be successful. The paper will elaborate on the above issues and provide suggested solutions based on the review of published historical information and the experiences encountered over the last four decades by the author, as a quality practitioner and consultant, in industries that produced safety-critical product. This author maintains that few fundamentally new or useful things have been created in the field of Quality during the last couple of decades. Nevertheless, this paper deliberates on a number of relatively “newer” issues including the concept of “three types of customers”, the CTC, “Critical To Customer” term, the eight Quality Management Principles of the new ISO 9000 family, the growth of industry-specific standards, the adoption of Integrated Management Systems, the rebirth of AS2561 COQ standard, the spread of Six Sigma as well as related ASQ certification and the need for a robust business foundation to ensure Six Sigma survival.

Development of Capstone Design Curriculum in Architectural Engineering that Applies Flipped Learning and Design Thinking (플립러닝과 디자인씽킹을 적용한 건축공학종합설계 교육과정 개발)

  • Kim, Jae-Yeob
    • Journal of the Regional Association of Architectural Institute of Korea
    • /
    • v.21 no.1
    • /
    • pp.89-95
    • /
    • 2019
  • In the era of the Fourth Industrial Revolution, a new curriculum that breaks away from the existing education programs is needed to cultivate men of talent for this new industrial era. In this regard, this study aimed to develop innovative curriculums that can be applied to the capstone design of architectural engineering at universities in Korea. To this end, it analyzed the operational status of the capstone design curriculum of domestic universities that operate engineering certification education programs. In addition, it examined educational innovation cases of advanced universities at home and abroad, and analyzed other studies related to educational renovation. Based on the analysis results, it developed the capstone design curriculum of architectural engineering that can be applied to domestic universities. The curriculum was developed into two contents: operating method and syllabus. The method which has been commonly applied to domestic universities was adopted as the operating method. The syllabus was developed by applying flipped learning and design thinking theory, which has widely been dealt with in advanced universities and recent studies. In addition, the curriculum was developed in the form of a prototype to meet the conditions of each university for its efficient utilization.