• Title/Summary/Keyword: Personal certification

Search Result 149, Processing Time 0.03 seconds

A Study on the Improvement of Personal Identity Proofing Service Using an Alternative Method for Resident Registration Number Based on Electronic Signature (전자서명 기반의 주민등록번호 대체수단을 사용한 본인확인서비스 개선 방안에 대한 연구)

  • Kim, Jong Bae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.453-462
    • /
    • 2021
  • As the status of public certificates expired due to the recent revision of the Electronic Signature Act, electronic signature-based public certificates were also lost in the means of replacing resident registration numbers(RRN). As a result, public certification institutions have recently been designated by the Korea Communications Commission as identity verification service providers through a review of the designation of personal identity proofing agency based on alternative means of RRN. However, unlike existing RRN replacements such as i-PIN, mobile phones, and credit cards, the personal identity proofing process for applicants for certificates is different from existing alternatives. The proposed method shows that it is possible to protect users' personal information and provide universal, reasonable, and safe identification services by applying improvements to electronic signature-based personal identity proofing services.

The Study of Improvement of Personal Information Leakage Prevention in Mobile Environment (모바일 환경에서 개인정보 유출 방지를 위한 개선 연구)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.53-62
    • /
    • 2015
  • Recently, number of tablet or Smartphone users increased significantly in domestic and around the world. But violation of personal information such as leakage, misuse and abuse are constantly occurring by using mobile devices which is very useful in our society. Therefore, in this paper it will talk about the problems in the network environment of the mobile environment such as tablet and Smartphone, Mobile Malware, hacking of the public key certificate, which could be potential threat to mobile environment. This thesis will research for people to use their mobile devices more reliable and safer in mobile environment from invasion and leakage of personal information. In order to use Smartphone safely, users have to use Wi-Fi and Bluetooth carefully in the public area. This paper will research how to use App safely and characteristic of risk of worm and Malware spreading. Because of security vulnerabilities of the public key certificate, it will suggest new type of security certification. In order to prevent from the information leakage and infect from Malware in mobile environment without knowing, this thesis will analyze the improved way to manage and use the mobile device.

Structure and Technology of Personal Protection Helmets (인체보호용 헬멧의 구조 및 기술)

  • Hwang, Jae Hyung;Jeong, Won Young
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.41 no.4
    • /
    • pp.771-781
    • /
    • 2017
  • The helmet is an imperative personal protective equipment. This protective device must be able to guard the human head against potential risks. Helmets are classified according into the purpose of use; therefore, the required performance and specifications depend on the type of products. Military helmets are intended to protect the wearer's head from bullets and shrapnel. Generally, lightweight super fibers and fiber reinforced composite materials are used as helmet shell materials, and NIJ STD of U.S. Department of Justice is most widely used as international standard related to bulletproof helmets. Safety helmets are widely used for industrial application and sports leisure. In general, the performance of shock absorption must be ensured, and various lining systems are applied in material, design, and combination methods. Evaluation standards have also been classified and strictly controlled for each purpose; therefore, it is difficult to certify with the existing standards such as the recently developed convergence helmets. However, it is possible to launch the product through a separate national integrated certification procedure.

The Research for cyber security experts (사이버보안 전문가 양성을 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.301-304
    • /
    • 2016
  • Cyber world constitute the infrastructure of the country and its people and control. Cyber attacks and leakage of personal information are being threatened damage to the national economy and national security. December 2014 had been cyber hacking attacks on Korea Hydro & Nuclear Power Nuclear cooling system design drawings of a spill, and Cheong Wa Dae website hacked, KBS stations occurred in cyber hacking accidents. As a result, ICT-based Protection Act, Promotion of Information and Communications Network Utilization and Information Act on Protection, etc., privacy laws are being enforced, personal information in the form of requirements from leading high-tech eoryeowoona is to prevent the attacks of armed hackers Internet information society It proposes positive measures to keep your personal information officer and laws.

  • PDF

Analysis of Global Trends in the Cross-border Transfer of Personal Data and Its Implications for Korea (개인정보 국외이전 관련 규범 국제 동향 분석 및 한국에의 시사점)

  • Bomin-Ko
    • Korea Trade Review
    • /
    • v.46 no.6
    • /
    • pp.239-255
    • /
    • 2021
  • To review the theoretical background of regulatory approaches to cross-border transfer of personal data, this paper divides major digital trade participating countries into four types according to the OECD - non-regulatory, post-intervention, pre-supervision, and national control. It then analyzes the US, Japan, the EU, and China respectively that belong to each type. South Korea, which is currently about to pass the amendment by the National Assembly, has identified that it is in the middle of post-intervention and pre-supervision, and needs to evolve into pre-supervision norms like the EU while it has to participate more actively in the process of establishing international digital trade rules. Korea first needs to sign digital trade agreements and promote mutual certification projects more actively from the standpoint of a medium-sized open country with growing digital companies and digitally-open consumers. Second, the government should fully consider the interests of not only companies but also various trade stakeholders including domestic consumers, when drafting and implementing trade policies. To this end, 'a single window approach' is needed not only at the Ministry of Trade, Industry, and Energy, but also at the level of the entire government which require an integrated form of digital trade policy governance.

Drone Delivery Service Commercialization Plan Study (드론 택배서비스 실용화 방안 연구)

  • Kang, Ho-Jeung
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.35 no.2
    • /
    • pp.281-312
    • /
    • 2020
  • Despite the recent economic difficulties, the on-line market is overtaking the off-line market. Since US Amazon CEO Jeff Bezos mentioned that a delivery service using drones is possible, it has been creating new perspectives and values that have never been seen before. Drones are being used in various fields. Among them, the delivery service using drones will be the future growth engine of Korea in cooperation with the 4th industrial revolution. However, as drones are put into practical use, problems such as human life and property damage and personal information protection due to public collisions or falls are expected. The practical use of future drones is inevitable, not optional. As a method for commercialization of drones, first, securing safety through drone use and securing a national certification system, which is the minimum standard system for drone safety, and second, securing various infrastructures by activating drone use, and third, aviation regulations and personal information protection, etc. It needs to be supplemented in terms of laws and regulations.

Improved u-Healthcare Service Authentication Protocol based on RFID Technology (개선된 RFID 기술을 이용한 u-헬스케어 서비스 인증 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.10
    • /
    • pp.107-115
    • /
    • 2013
  • Recently, the RFID technology is combined with a u-healthcare services is an emerging trend in the field of medical services. u-healthcare service, as covering the field of personal health information beyond the level of simple health screening and treatment of life are closely related. Considering security, invasion of privacy, as well as life may be threatened even if your personal health information to be exposed or exploited illegally u-Healthcare services certification is essential. In 2012, Jeong proposed J-L patient authentication protocol that Initialization process, and patients using RFID technology separates the certification process. Jeong, such as the claim that the proposed protocol for reuse attacks, spoofing attacks, prevent information disclosure and traceability fire safety, but raises issues of security and operations efficiency. Therefore, in this paper, Jeong, such as the security of the proposed protocol and to prove the computational efficiency issues, and to enhance the safety and efficiency of RFID technology based on practical u-Healthcare services authentication protocol is proposed.

A Study on the Priority of Complementary Measures about Deficiencies on the PIMS Certification (PIMS 인증결함의 보완조치 우선순위에 관한 연구)

  • Kang, Da-Yeon;Jeon, Jin-Hwan;Hwang, Jong-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.4
    • /
    • pp.10-17
    • /
    • 2018
  • Most of the privacy officers of organizations are hard to think of the corrective action about deficiencies of the PIMS(Personal Information Management Systems) certification. Because, it is difficult to define the priority of the complementary measures due to the unique characteristics and procedures of personal information protection for each organization. The purpose of this study is to evaluate the priority of the complementary measures using the Analytic Hierarchy Process(AHP). According to the results, it is important to comply with the legal requirements in the first tier. The second tier, PIMS experts answered that dedicated organization, password management, and agreement of the subject are important. Above all, agreement of the subject was found the highest priority for complementary measures about PIMS's deficiencies.

A Study on PIMS Controls for PII Outsourcing Management under the Cloud Service Environment (클라우드 서비스 환경의 개인정보 위탁을 위한 개인정보보호 관리체계 통제 연구)

  • Park, Dae-Ha;Han, Keun-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1267-1276
    • /
    • 2013
  • Cloud consumers who use cloud computing services are obliged to review and monitor the legal compliance of cloud providers who are consigned the processes of the PII (personally identifiable information) from them. This paper presented possible scenarios for cloud PII outsourcing and suggested PIMS (personal information management system) controls for outsourcing management between cloud consumers and cloud providers by analyzing both international standards and domestic certification schemes related to cloud computing and/or privacy management based on the legal obligations for PII outsourcing from Korean "Personal Information Protection Act (PIPA)". The controls suggested can be applicable for developing the guidance of complying with privacy laws in organizations or the checklist of PII outsourcing management in PIMS certification.

Study on the Connection with Public Authentication and Bio Authentication (공인인증서와 바이오인증 연계를 위한 연구)

  • Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.39-44
    • /
    • 2015
  • Organization is increasing the authorizing process to use public certificate and bio information. Certificate, has evolved to be able to parallel distributes the bio authentication and portable bio-authentication device. Authentication using an individual's PC and smart devices continue to generalize, while convenience for authentication is increased by comparison Study on cooperation with the security at the network level's a weak situation. If ask authentication method through the cooperation of the public certificate and bio information work with current network access control, there is a possibility to develop a more powerful security policy. by cooperation weaknesses against vulnerable personal authentication techniques on security token in a reliable and secure personal authentication techniques, such as bio-recognition, Bio Information for identification and to prevent exposing a methodology suggest to validate whether or not to carry out in this paper. In addition, organize the scenario that can work with the 802.1x network authentication method, and presented a proposal aimed at realization.