• Title/Summary/Keyword: Key Management System

Search Result 2,026, Processing Time 0.026 seconds

Study of Reading Rate & Small UHF RFID Tags in The Key Management System in a Metallic Cabinet (작은 UHF RFID를 이용한 열쇠관리용 철재캐비닛 시스템과 인식률에 관한 연구)

  • Chung, You-Chung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.263-268
    • /
    • 2010
  • This paper shows the key management system in a small metallic cabinet using a small UHF RFID tags. Each key chain with a key has a custom-designed small RFID tag antenna. There are 6 metallic racks in the small cabinet, and each rack can hold 60 key chains. Therefore, the small cabinet can hold 360 key chains with tags. The 360 key chains with RFID tags in a cabinet are recognized by RFID key chain management system. Even though it is hard to recognize 360 tags in the a cabinet, this RFID key management system with small custom designed RFID tags can recognize all the tags in the small cabinet. To read the all the tags, the locations of antennas and tag shapes are optimized. The reading rates based on the bios-version of the reader and the locations of the reader antennas are compared.

Key Management and Recovery Scheme over SCADA System Using ID-based Cryptosystem (ID 기반 암호 기법을 이용한 SCADA 시스템에서 비밀 키 관리 및 복구 방안)

  • Oh, Doo-Hwan;Choi, Doo-Sik;Na, Eun-Sung;Kim, Sang-Chul;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.427-438
    • /
    • 2012
  • The SCADA(Supervisory Control and Data Acquisition) systems are used to control some critical national infrastructures such as electricity, gas, and water distribution systems. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. We propose a new key management method which is established on ID-based cryptosystem using pairing on MTU(Master Terminal Unit), Sub-MTU, and RTU(Remote Terminal Unit). Furthermore, we present a redistribution protocol of private key of each device and a system recovery protocol as a countermeasure of exposure of KMS(Key Management System) master key which is occurred by some unexpected accidents or malicious attacks.

THE MULTILEVEL SECURITY PROBLEM OVER CLASS SEMIGROUPS OF IMAGINARY QUADRATIC NON-MAXIMAL ORDERS

  • KIM, YONGTAE
    • Honam Mathematical Journal
    • /
    • v.28 no.2
    • /
    • pp.185-196
    • /
    • 2006
  • A scheme based on the cryptography for enforcing multilevel security in a system where hierarchy is represented by a partially ordered set was first introduced by Akl et al. But the key generation algorithm of Akl et al. is infeasible when there is a large number of users. In 1985, MacKinnon et al. proposed a paper containing a condition which prevents cooperative attacks and optimizes the assignment in order to overcome this shortage. In 2005, Kim et al. proposed key management systems for multilevel security using one-way hash function, RSA algorithm, Poset dimension and Clifford semigroup in the context of modern cryptography. In particular, the key management system using Clifford semigroup of imaginary quadratic non-maximal orders is based on the fact that the computation of a key ideal $K_0$ from an ideal $EK_0$ seems to be difficult unless E is equivalent to O. We, in this paper, show that computing preimages under the bonding homomorphism is not difficult, and that the multilevel cryptosystem based on the Clifford semigroup is insecure and improper to the key management system.

  • PDF

Implementation of an RFID Key Management System for DASH7

  • Vegendla, Aparna;Seo, Hwajeong;Lee, Donggeon;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.1
    • /
    • pp.19-25
    • /
    • 2014
  • The wireless sensor networking standard DASH7 operates in low-power communication with a better transmission quality in active RFID networks. The DASH7 security standard supports public key cryptography. At present, the DASH7 standard uses the message authentication code in the network layer for authentication and integrity. However, its security standard is still in an incubation stage with respect to the implementation of a crypto exchange over a DASH7 network. Effective key management is an important factor for privacy and security. If organizations are not careful about where and how keys are stored, they leave the encrypted data vulnerable to theft. In this regard, we present a key management system designed for efficient key management through public key infrastructure authentication as well as a non-repudiation feature for the DASH7 standard. We analyze the performance of the proposed system on a basis of various performance criteria such as latency and throughput.

A Study on Management Performance by ISO/TS 16949 Quality Management System Certification (ISO/TS16949 품질경영시스템 인증에 따른 경영성과에 관한 연구)

  • Park, Jong-Young;Hong, Jung-Eui;Kim, Kwang-Soo
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2009.11a
    • /
    • pp.269-288
    • /
    • 2009
  • After enterprise get a certification in acquisition, the core requirements of ISO/TS 16949 standard is pull out the Performance Indicators by process access approach during the settlement and operation of system, and the pulled key performance indicators classified into the customer intention process, support process and management process and analyzed the effect to the management result. This study conducted with following step. Firstly, preceding research, the literature and investigation analysis about process approach method which is the special characteristics of ISO/TS 16949 standard. Secondly, each process of ISO/TS 16949 standard is classified and deduced the key performance indicators followed process access method. Finally, get a enterprise survey data related to improvement of Performance Indicator and analyzed by SPSS statistical software.

  • PDF

A Study on Management Performance by ISO/TS 16949 Quality Management System Certification (ISO/TS16949 품질경영시스템 인증에 따른 경영성과에 관한 연구)

  • Park, Jong-Young;Hong, Jung-Eui;Kim, Kwang-Soo
    • Journal of the Korea Safety Management & Science
    • /
    • v.11 no.3
    • /
    • pp.227-237
    • /
    • 2009
  • After enterprise get a certification in acquisition, the core requirements of ISO/TS 16949 standard is pull out the Performance Indicators by process access approach during the settlement and operation of system, and the pulled key performance indicators classified into the customer intention process, support process and management process and analyzed the effect to the management result. This study conducted with following step. Firstly, preceding research, the literature and investigation analysis about process approach method which is the special characteristics of ISO/TS 16949 standard. Secondly, each process of ISO/TS 16949 standard is classified and deduced the key performance indicators followed process access method. Finally, get a enterprise survey data related to improvement of Performance Indicator and analyzed by SPSS statistical software.

Research on Importance-Performance Analysis of Smart Construction Safety Management System (스마트 건설안전관리시스템의 중요도-성과도 분석 연구)

  • Jong-Yil Park;Chang-Hee Yun
    • Journal of the Korea Safety Management & Science
    • /
    • v.26 no.2
    • /
    • pp.43-53
    • /
    • 2024
  • This study analyzes the importance-performance analysis (IPA) of the 10 dimensions of the smart construction safety management system, and analyzes which dimensions are important and which dimensions are performing to determine key improvement tasks, incremental improvement tasks, Maintenance and reinforcement tasks and continuous maintenance tasks were derived. Among the 10 dimensions of the smart construction safety management system, the dimensions that are recognized as important by all field managers and field workers and have high performance are the automatic risk displacement measurement system, smart environmental sensor system, and heavy equipment seizure prevention system. However, areas that were perceived as having high importance but low performance were worker location tracking systems, smart safety helmet chin muscles, and smart safety ring fastening. Among the smart construction safety management systems perceived by field managers, areas for key improvement with high importance and low performance included worker location tracking system and smart safety ring fastening. Among the smart construction safety management systems perceived by field workers, the area for key improvement with high importance and low performance was the automatic risk displacement measurement system.

Quality Management Performance Evaluation Using A Computer Support System (컴퓨터 지원시스템을 활용한 품질경영 성과측정)

  • Shin, Wan-Seon;Kang, Eun-Kyung
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.24 no.4
    • /
    • pp.529-537
    • /
    • 1998
  • Appropriate performance evaluation is a key successful factor for continuous improvement and systematic management support in the implementation of quality management. This research deals with the development of a computer support system for performance evaluation of quality management and its application to a real world problem. It, first, investigates existing performance evaluation methods and classifies them into three styles. A number of key factors for designing computer support systems are then elicited by analyzing the characteristics of the existing methods in terms of the requirements needed for a successful evaluation tool. The computer support system is designed by incorporating the key factors in the system design process and it is implemented as a network version. Finally, a case study is performed in order to verify the proposed support system. The pros and cons of the system are also discussed.

  • PDF

Exploring Factors and Elements of Coordination between Key Account Management Units and Non-key Account Management Units: Case Study in an IT-related Machinery and System Vendor

  • Tonai, Shoko
    • Asia Marketing Journal
    • /
    • v.18 no.1
    • /
    • pp.1-22
    • /
    • 2016
  • Studies in key account management (KAM) have identified the importance of cross-functional coordination in firms to effectively implement KAM. However, these studies have ignored how companies integrate KAM and other customer management (non-KAM). This paper explores coordination design between KAM units and non-KAM units by analyzing a case study through three dimensions: front-end coordination, back-end-coordination, and organizational translation at the beginning of research. The case study shows that non-KAM conditions can require a modification of the coordination design. This research performs an in-depth analysis of changes in the implementation of sales reforms for an IT-related machinery and system vendor in Japan. Data sources include interviews with KAM units and non-KAM sales units and an analysis of secondary data. This paper suggests that studying the coordination between KAM units and non-KAM units will further our understanding of internal coordination in KAM research.

An Fingerprint Authentication Model of ERM System using Private Key Escrow Management Server (개인키 위탁관리 서버를 이용한 전자의무기록 지문인증 모델)

  • Lee, Yong-Joon;Jeon, Taeyeol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.1-8
    • /
    • 2019
  • Medical information is an important personal information for patients, and it must be protected. In particular, when medical personnel approach electronic medical records, authentication for enhanced security is essential. However, the existing public certificate-based certification model did not reflect the security characteristics of the electronic medical record(EMR) due to problems such as personal key management and authority delegation. In this study, we propose a fingerprint recognition-based authentication model with enhanced security to solve problems in the approach of the existing electronic medical record system. The proposed authentication model is an EMR system based on fingerprint recognition using PEMS (Private-key Escrow Management Server), which is applied with the private key commission protocol and the private key withdrawal protocol, enabling the problem of personal key management and authority delegation to be resolved at source. The performance experiment of the proposed certification model confirmed that the performance time was improved compared to the existing public certificate-based authentication, and the user's convenience was increased by recognizing fingerprints by replacing the electronic signature password.