• Title/Summary/Keyword: Verification and Certification

Search Result 171, Processing Time 0.028 seconds

A Study on the Improvement Plan of Reusable Pipe Support Certification System (재사용 파이프서포트 인증제도의 개선방안 연구)

  • Moon, Seong-Oh;Lim, Nam-Gi
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2020.11a
    • /
    • pp.4-5
    • /
    • 2020
  • Pipe support is a representative structure that supports slab formwork, and it is a representative temporary equipment that has been systematically managed since the 1990s when the domestic temporary equipment performance test system was introduced. Nevertheless, it is also a reality that many of the products in circulation are used products that are reused and do not meet the performance of the initial manufacturing stage. However, if only new products are insisted, it could lead to delays in the process due to an increase in construction costs and difficulties in timely delivery. On the contrary, it is not acceptable for the safety of the construction site to use products of low quality without verification procedures or standards. Therefore, this study attempts to grasp the management system such as safety certification for temporary equipment and the actual condition of quality control to maintain performance, and propose improvement plans.

  • PDF

Trend and verification measures of certification evaluation in control system (제어시스템 인증평가 동향 및 검증방안)

  • Ueda, Osamu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.259-262
    • /
    • 2016
  • 최근 중요 인프라 업계에서 주로 다뤄지는 제어시스템을 표적으로 한 사이버 공격으로 Stuxnet에 이어 Havex RAT, BlackEnergy2 라고 하는 멀웨어(Malware)를 이용한 사건이 많이 증가하고 있다. 제어시스템의 새로운 공격 방법에 대한 대책으로 시스템 입구와 내부조직에 대한 대책을 강화하기 위한 필요성이 요구되어 왔지만 그러한 대책은 한정되어 있다. 본 논문에서는 보안대책에 필요한 인증 취득에 있어서 기준이 되는 국제 표준인 ISASecure(R)EDSA 인증제도에 착목했다. 인증평가는 요구요건이 중복되는 불필요한 인증평가 작업을 최소화 하는 것으로 인증 취득 시 발생되는 코스트를 절감할 수 있으며 기존의 정보 보안 관리체계(lSMS)의 인증을 취득하고 있는 기업이나 조직이면 제어시스템의 인증 기준으로 추가된 차분 요건만으로 취득이 가능 할 수 있을 것으로 상정된다. 이러한 제어시스템의 보안을 구현하기 위해 IACS(Industrial Automation and Control System)에서 표준화로 제정한 IEC62443 시리즈를 참조하여 세계각국에서 사용되는 제어시스템을 대상으로 인증(EDSA) 요구사항의 차분을 도출하는 수법을 제안하고자 한다.

A Study on Developing Qualification Criteria in the Private Security Industry (민간경비 자격검정 개선방안에 관한 연구)

  • Choe, Jung-Taek
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.143-167
    • /
    • 2009
  • As of entering the 21st century, a trend in the field of a private security industry among the advanced countries have been increased a qualification system and train session to meet the needs of professionalism. Intensifying the professionalism in Korea, education and train system has been initiated to change but the oligopoly market already formulated due to impractical selection standard and management of education system. Issuing certification and offering basic training through a designated institution for the purpose of improving quality of the private security industry worker, its practical effectiveness were lower than expectation. Rather certification-holder or security agency, institution or truster's rent-seeking behavior have been increased by occupational licensing system. The founded results, which were associated to problems in selecting and educating to the private security guard, in this study were that any verification has been initiated towards dual-system in official approval and structural problems in education system, and non-existence of verification for professionalism and management capability to security agency owner and its upper managerial level. Current a dual system in an officially authorized verification system and completion of security guard credential requested change to an unified official qualification verification system to solve those problems. Ranges of an applicant to the unified official qualification verification system should be extend to the whole population in the private security industry. Moreover, minimization of the dead-weigh loss, which is caused by oligopoly phenomenon while using its market-dominant status, increasement number of designated institution, which allows self-regulating competition, and endowment of autonomy, which is in selecting education and agency, were requested to solve the problems in selecting and educating to the private security guard. In order to minimize stated problems while maintaining objectiveness, a new manage and supervise institution, which is called a 'private security industry committee', should be establish. The private security industry committee is a formation of governance network which are participated from professional group to civil organization.

  • PDF

A study on the send and receive of the message in the TEDI system (TEDI 시스템상의 메시지 송수신에 관한 고찰)

  • Jeon, Soon-Hwan
    • The Journal of Information Technology
    • /
    • v.7 no.1
    • /
    • pp.43-56
    • /
    • 2004
  • The purpose of this paper is to study the send and receive of the message in the TEDI System. The TEDI System replaces a series of trade documents with electronic date, and it realizes secure and reliable transactions of data among parties by means of open networks, such as the Internet. The TEDI system is composed of Web browsers, TC Serves, a RSP Server, and Certification Servers. TEDI has development the system and legal frame work. Exporters, importers, carriers, banks insurance and companies those who engage in the trade releated business have tested TEDI system and evaluated the legal frame work from the practical point of view. TEDI is now refining the system and preparing for the service. A fundamental feature of the TEDI System is the attribution to participants of data messages through public key certificates issued by certification authorities that allow for verification of digital signatures. Access to servers maintained by such certification authorities also takes place through the internet. In principle, certificates used by any reputable certification authority may be employed as long as they are compatible with X.509 V3.

  • PDF

Performance Verification and Reliability Test of Tunnel Shotcrete Stressmeter (터널 숏크리트 응력계의 성능검증과 신뢰성 시험 연구)

  • Kim, Yeong-Bae;Park, Yeong-Bae;Lee, Seong-Won;Lee, Kang-Il
    • Journal of the Korean Geotechnical Society
    • /
    • v.40 no.4
    • /
    • pp.113-126
    • /
    • 2024
  • Shotcrete lining is an important material for the stability of tunnels in NATM tunnels. However, stressmeters for stress measurements of shotcrete lining are installed in the field without performance verification because of a lack of research on methods, procedures, regulations, and reliability of measurement equipment. To solve this problem, all shotcrete stressmeters currently used in Korea were investigated. For each stressmeter, external inspection and structural and functional inspection were performed to identify defects and problems in devices. For this purpose, a shotcrete stressmeter performance test device capable of load loading in stages was developed and obtained KOLAS certification. Using the device, stressmeter performance tests were conducted. Structural problems of integrated- and cell-type shotcrete stressmeters were identified through concrete mold tests, and improvement plans and performance verification procedures were suggested. The results of this study are expected to contribute to the preparation of regulations for the performance verification of shotcrete stressmeters and the selection of measuring instruments in the field in the future.

A Study on the Analysis of User Identification and Authentication Procedures when Issuing and Using Alternative Means of Resident Registration Numbers (주민등록번호 대체수단별 발급·이용 시 이용자 신원확인 및 인증절차 분석 연구)

  • J. B. Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.5
    • /
    • pp.707-713
    • /
    • 2024
  • This paper analyzes the current status of identity verification and authentication procedures when issuing and using alternative means for resident registration numbers and suggests measures to improve the problems. Users unconsciously use identity verification services by responding to identity verification requests from Internet service providers (ISPs). Ultimately, online service users are providing excessive amounts of personal information, and ISPs are charging fees for identity verification services, ultimately increasing online service costs. Therefore, this paper analyzes the current status of identity verification and authentication procedures for users when issuing and using alternative means for resident registration numbers and suggests measures to improve the problems.

The Study about Performance Test of Wind turbine (풍력발전기 출력성능 평가에 대한 연구)

  • Ko, Suk-Whan;Jang, Moon-Seok
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.1348-1349
    • /
    • 2011
  • In this paper, The case of power performance test for 3MW wind-turbine system is introduced. For the verification of power curve and the certification of wind-turbine, power performance test is very important. This paper described the power testing results of a 3MW wind turbine and analysed an uncertainty about the testing. The measured power curves are very closely coincide with the calculated. Total uncertainty of measured data for Power Curve is 120~200kW in the rated power.

  • PDF

Effective Certificate Verification of Wireless PKI Based in WAP (WAP에서 무선 PKI기반의 효율적인 인증서 검증)

  • Shin Jung-Won;Choi Seong-Kwon;Ji Hong-Il;Lee Byong-Rok;Cho Yong-Hwan
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.175-180
    • /
    • 2005
  • To data service is offered successfully including electronic commercial transaction in radio Internet, security problem should be solved. Security protocole for radio internet does certification and key exchange by leitmotif and designed because suppose WPKI(WAP Public Key Infrastructure) mainly and use certificate. Wish to discuss efficient certificate verification of PKI that consider radio surrounding hereupon.

  • PDF

A Study on the Dispute Cases and Improvement Related to the FTA Cumulation: A Focus on the KOREA-ASEAN FTA (FTA 원산지누적 분쟁사례와 개선방안 연구: 한-아세안 FTA를 중심으로)

  • Ko, Jai-Kil
    • Journal of Arbitration Studies
    • /
    • v.30 no.4
    • /
    • pp.95-119
    • /
    • 2020
  • Securing a stable supply chain is becoming a significant concern among countries as the global uncertainty rises with the expansion of global protectionism and the result of what the COVID-19 pandemic has brought around the world. This study has investigated dispute cases between customs authority and trade corporations based on the KOREA-ASEAN FTA and suggested the following implications and improvements: Firstly, the extent (varieties) of the proof document on cumulation and its form should be stipulated and provided through consultation between customs from each contracting party. Secondly, it ought to be prescribed as an obligation so that producers located in the third country can cooperate in providing documents for certification of origin. The duty to provide such documentary evidence should also be specified when making EX-IM contracts. Lastly, origin verification provisions regarding cases to which cumulation is applied have to be complemented so that the verification period's extension can be applied and approved. One can expect that the abovementioned responses on cumulation will enhance the availability of KOREA-ASEAN FTA.

Speaker Verification Model Using Short-Time Fourier Transform and Recurrent Neural Network (STFT와 RNN을 활용한 화자 인증 모델)

  • Kim, Min-seo;Moon, Jong-sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1393-1401
    • /
    • 2019
  • Recently as voice authentication function is installed in the system, it is becoming more important to accurately authenticate speakers. Accordingly, a model for verifying speakers in various ways has been suggested. In this paper, we propose a new method for verifying speaker verification using a Short-time Fourier Transform(STFT). Unlike the existing Mel-Frequency Cepstrum Coefficients(MFCC) extraction method, we used window function with overlap parameter of around 66.1%. In this case, the speech characteristics of the speaker with the temporal characteristics are studied using a deep running model called RNN (Recurrent Neural Network) with LSTM cell. The accuracy of proposed model is around 92.8% and approximately 5.5% higher than that of the existing speaker certification model.