• Title/Summary/Keyword: International Authorization

Search Result 60, Processing Time 0.024 seconds

Building Control Box Attached Monitor based Color Grid Recognition Methods for User Access Authentication

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Khudaybergenov, Timur;Kim, Min Soo;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.1-7
    • /
    • 2020
  • The secure access the lighting, Heating, ventilation, and air conditioning (HVAC), fire safety, and security control boxes of building facilities is the primary objective of future smart buildings. This paper proposes an authorized user access to the electrical, lighting, fire safety, and security control boxes in the smart building, by using color grid coded optical camera communication (OCC) with face recognition Technologies. The existing CCTV subsystem can be used as the face recognition security subsystem for the proposed approach. At the same time a smart device attached camera can used as an OCC receiver of color grid code for user access authentication data sent by the control boxes to proceed authorization. This proposed approach allows increasing an authorization control reliability and highly secured authentication on accessing building facility infrastructure. The result of color grid code sequence received by the unauthorized person and his face identification allows getting good results in security and gaining effectiveness of accessing building facility infrastructure. The proposed concept uses the encoded user access authentication information through control box monitor and the smart device application which detect and decode the color grid coded informations combinations and then send user through the smart building network to building management system for authentication verification in combination with the facial features that gives a high protection level. The proposed concept is implemented on testbed model and experiment results verified for the secured user authentication in real-time.

A Study on the Integrated Management Systems Establishment and Operation of the KS, QMS and EMS (KS, QMS, EMS 통합경영시스템 구축 및 운영에 관한 연구)

  • Kim, Kwang-Soo;Lee, Sang-Hun;Chung, Sun-Seok
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2010.11a
    • /
    • pp.175-189
    • /
    • 2010
  • With the foundation of the WTO in 1995, the era of boundless and unlimited competition between many of the countries around the world has begun. In order to elevate the competitiveness in the international market, we have incorporated the QMS and the EMS system, establish by the International Standardization Organization, and the process has been operated under the authorization. However, many Korea companies' separate enforcement of the QMS and the EMS system is causing the dissipation of the labor force and the invested capital. As we can see through studying the contents on this paper, the number of documents has been reduced down to 54% (From 139 of them to 64 of them), and the conflict and the chaos that could have happened between the documents has been prevented. Its' outcome is attributed to the foundation and the embarkation on the Integrated Management Systems of the KS, QMS, and EMS. Not only that, it has also reduced the waste elements up to greater than 40%.

  • PDF

A Study on the Application and Service Factors Confidence of e-Trade (전자무역 활용 및 서비스요인에 관한 연구)

  • Lim, Cheon-Hyeok;Park, Nam-Kyu
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.43
    • /
    • pp.397-422
    • /
    • 2009
  • Electronic trade reduces additional costs generated from the issuing and management of paper documents, and overcomes the physical limitations of commercial transactions as well as the geographical and time limitations resulting from trading with foreign countries. These characteristics of electronic trade guarantees better and more effective global marketing for companies. In addition, by expanding relative superiority of large corporations to medium-small sized companies, many medium-small companies have shown great interest in electronic trade to promote its exporting businesses, and implementing changes to facilitate electronic trade into their business system. Therefore, it is expected that the electronic trade will be more widely distributed and utilized by businesses of all sizes in the future. The adaptation and implementation of the electronic trade system can only have prosperous effects when there is a high efficiency in the utilization and service process of the concerned company. Under this premise, this research first examined electronic trade, characteristics of the company and information utilization as the key elements to determine the effectiveness of the utility aspect. Then it examines confirmation of product demand, registration of revenues, and authorization as the key elements to determine the level of service process.

  • PDF

A Study on the Certification System in Electromic Commerce (전자상거래(電子商去來)의 인증체계(認證體系)에 관한 고찰(考察))

  • Ha, Kang Hun
    • Journal of Arbitration Studies
    • /
    • v.9 no.1
    • /
    • pp.367-390
    • /
    • 1999
  • The basic requirements for conducting electronic commerce include confidentiality, integrity, authentication and authorization. Cryptographic algorithms, make possible use of powerful authentication and encryption methods. Cryptographic techniques offer essential types of services for electronic commerce : authentication, non-repudiation. The oldest form of key-based cryptography is called secret-key or symmetric encryption. Public-key systems offer some advantages. The public key pair can be rapidly distributed. We don't have to send a copy of your public key to all the respondents. Fast cryptographic algorithms for generating message digests are known as one-way hash function. In order to use public-key cryptography, we need to generate a public key and a private key. We could use e-mail to send public key to all the correspondents. A better, trusted way of distributing public keys is to use a certification authority. A certification authority will accept our public key, along with some proof of identity, and serve as a repository of digital certificates. The digital certificate acts like an electronic driver's license. The Korea government is trying to set up the Public Key Infrastructure for certificate authorities. Both governments and the international business community must involve archiving keys with trusted third parties within a key management infrastructure. The archived keys would be managed, secured by governments under due process of law and strict accountability. It is important that all the nations continue efforts to develop an escrowed key in frastructure based on voluntary use and international standards and agreements.

  • PDF

Analysis of Standard Security Technology for Security of the Network (네트워크의 보안성 강화를 위한 표준 정보보호 기술 분석)

  • Kim, Bong-Han
    • Journal of Digital Convergence
    • /
    • v.13 no.12
    • /
    • pp.193-202
    • /
    • 2015
  • The development of the security solutions that can provide a variety of security services is needed urgently. For development of the security solutions, analysis of international standard security technology is the key. In this paper, international organizations' standardization(ISO/IEC JTC1 SC27, ITU-T SG-17, IETF Security Area, etc.) and the current trend of the standard security technology are mainly analyzed. The core of the latest security technology(Application Bridging, DNS-based Authentication, HTTP Authentication, IP Security, Javascript Security, Authentication Technology Next Generation, Managed Incident, Web Authorization Protocol, Security Automation, Transport Layer Security, etc.) is analyzed focusing on 18 working groups of the IETF.

A Study on the Integrated Management Systems Establishment and Operation of the KS, QMS and EMS (KS, QMS, EMS 통합경영시스템 구축 및 운영에 관한 연구)

  • Kim, Kwang-Soo;Lee, Sang-Hun;Chung, Sun-Seok
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.4
    • /
    • pp.229-238
    • /
    • 2010
  • With the foundation of the WTO in 1995, the era of boundless and unlimited competition between many of the countries around the world has begun. In order to elevate the competitiveness in the international market, we have incorporated the QMS and the EMS system, establish by the International Standardization Organization, and the process has been operated under the authorization. However, many Korea companies' separate enforcement of the QMS and the EMS system is causing the dissipation of the labor force and the invested capital. As we can see through studying the contents on this paper, the number of documents has been reduced down to 54% (From 139 of them to 64 of them), and the conflict and the chaos that could have happened between the documents has been prevented. Its' outcome is attributed to the foundation and the embarkation on the Integrated Management Systems of the KS, QMS, and EMS. Not only that, it has also reduced the waste elements up to greater than 40%.

A Study on the Improvement of Bayesian networks in e-Trade (전자무역의 베이지안 네트워크 개선방안에 관한 연구)

  • Jeong, Boon-Do
    • International Commerce and Information Review
    • /
    • v.9 no.3
    • /
    • pp.305-320
    • /
    • 2007
  • With expanded use of B2B(between enterprises), B2G(between enterprises and government) and EDI(Electronic Data Interchange), and increased amount of available network information and information protection threat, as it was judged that security can not be perfectly assured only with security technology such as electronic signature/authorization and access control, Bayesian networks have been developed for protection of information. Therefore, this study speculates Bayesian networks system, centering on ERP(Enterprise Resource Planning). The Bayesian networks system is one of the methods to resolve uncertainty in electronic data interchange and is applied to overcome uncertainty of abnormal invasion detection in ERP. Bayesian networks are applied to construct profiling for system call and network data, and simulate against abnormal invasion detection. The host-based abnormal invasion detection system in electronic trade analyses system call, applies Bayesian probability values, and constructs normal behavior profile to detect abnormal behaviors. This study assumes before and after of delivery behavior of the electronic document through Bayesian probability value and expresses before and after of the delivery behavior or events based on Bayesian networks. Therefore, profiling process using Bayesian networks can be applied for abnormal invasion detection based on host and network. In respect to transmission and reception of electronic documents, we need further studies on standards that classify abnormal invasion of various patterns in ERP and evaluate them by Bayesian probability values, and on classification of B2B invasion pattern genealogy to effectively detect deformed abnormal invasion patterns.

  • PDF

Software Defined Networking and Network Function Virtualization for improved data privacy using the emergent blockchain in banking systems

  • ALRUWAILI, Anfal;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.111-118
    • /
    • 2021
  • Banking systems are sensitive to data privacy since users' data, if not well protected, may be used to perform fake transactions. Blockchains, public and private, are frequently used in such systems thanks to their efficiency and high security. Public blockchains fail to fully protect users' data, despite their power in the accuracy of the transactions. The private blockchain is better used to protect the privacy of the sensitive data. They are not open and they apply authorization to login into the blockchain. However, they have a lower security compared to public blockchain. We propose in this paper a hybrid public-private architecture that profits from network virtualization. The main novelty of this proposal is the use of network virtualization that helps to reduce the complexity and efficiency of the computations. Simulations have been conducted to evaluate the performance of the proposed solution. Findings prove the efficiency of the scheme in reducing complexity and enhancing data privacy by guarantee high security. The contribution conducted by this proposal is that the results are verified by the centralized controller that ensures a correct validation of the resulted blockchains. In addition, computation complexity is to be reduced by profiting from the cooperation performed by the virtual agents.

Certificate Revocation in Connected Vehicles

  • Sami S. Albouq
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.13-20
    • /
    • 2023
  • In connected vehicles, drivers are exposed to attacks when they communicate with unauthenticated peers. This occurs when a vehicle relies on outdated information resulting in interactions with vehicles that have expired or revoked certificates claiming to be legitimate nodes. Vehicles must frequently receive or query an updated revoked certificate list to avoid communicating with suspicious vehicles to protect themselves. In this paper, we propose a scheme that works on a highway divided into clusters and managed by roadside units (RSUs) to ensure authenticity and preserve hidden identities of vehicles. The proposed scheme includes four main components each of which plays a major role. In the top hierarchy, we have the authority that is responsible for issuing long-term certificates and managing and controlling all descending intermediate authorities, which cover specific regions (e.g., RSUs) and provide vehicles with short-term pseudonyms certificates to hide their identity and avoid traceability. Every certificate-related operation is recorded in a blockchain storage to ensure integrity and transparency. To regulate communication among nodes, security managers were introduced to enable authorization and access right during communications. Together, these components provide vehicles with an immediately revoked certificate list through RSUs, which are provided with publish/subscribe brokers that enable a controlled messaging infrastructure. We validate our work in a simulated smart highway environment comprising interconnected RSUs to demonstrate our technique's effectiveness.

On the International Standardization of AAA Technology (AAA 정보보호 기술 표준화 동향)

  • Kim, H.G.;Lee, B.G.;Choi, D.H.;Yoo, S.K.;Kim, M.H.;Lee, H.D.;Yoo, H.J.
    • Electronics and Telecommunications Trends
    • /
    • v.20 no.1 s.91
    • /
    • pp.123-129
    • /
    • 2005
  • AAA(Authentication, Authorization, and Accounting) 정보보호 기술은 유/무선 인터넷, 휴대인터넷, Mobile IP, VoIP 등 다양한 서비스 접속을 위한 인증/권한 검증/과금 기능을 제공하기 위한 기술이다. 현재 IETF 표준화 기구에서는 AAA에 관련된 표준을 제정하고 있다. IETF AAA 작업그룹에서 Diameter기반 프로토콜에 대한 표준화를 진행하고 있으며, 지속적인 표준화 작업을 통하여 RFC 표준 6개와 인터넷 드래프트 6개가 진행중이다. 본 고에서는 이러한 Diameter 기반 AAA 정보보호 기술에 대해 현재까지의 표준화 진행 상태 및 표준화 방향을 IETF AAA 작업그룹 중심으로 살펴본다.