• Title/Summary/Keyword: ID Registration

Search Result 35, Processing Time 0.034 seconds

Architecture of Vessel ID Importation System for Efficient Registration of Maritime ID in Maritime Cloud Environment (해사클라우드 환경에서 해사ID의 효율적인 등록을 위한 선박ID 연동 시스템의 구조 설계)

  • An, Gae-Il;Chung, Do-Young;Chung, Byung-Ho
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2017.11a
    • /
    • pp.132-133
    • /
    • 2017
  • The International Maritime Organization (IMO) has defined e-Navigation for the purpose of providing safe and efficient maritime information and communication services. Currently, a maritime cloud is being developed as a communication infrastructure for e-Navigation services. In this paper, we design the structure of vessel ID importation system which can efficiently register the maritime ID in the maritime cloud environment.

  • PDF

Development of Integrated Spatial Information Identifier for Developing 3D Cadastral Information System (3차원 지적정보시스템 개발을 위한 통합 공간정보식별자 개발)

  • Song, Myung Su;Song, Sang Cheol;Jang, Yong Gu;Lee, Sung Ho
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.20 no.4
    • /
    • pp.11-17
    • /
    • 2012
  • The study aims to secure an integrated UFID system-based ID system as it defines the three-dimensional land registration record through selection and standardization of objects. By comparing the integrated ID system secured by the study and the objected ID system proposed by Seoul City, the study came up with practicality of the integrated ID system for the three-dimensional land registration record information system. An integrated UFID-based intellectual spacial information which is consisted of 41 figures in total was developed by the study. The study confirmed the practicality of the integrated ID system by comparing it with the objected ID of the three dimensional land registration record information system established by Seoul City.

A Study on Integrated ID Authentication Protocol for Web User (웹 사용자를 위한 통합 ID 인증 프로토콜에 관한 연구)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.197-205
    • /
    • 2015
  • Existing Web authentication method utilizes the resident registration number by credit rating agencies separating i-PIN authentication method which has been improved authentication using resident registration number via the real name confirmation database. By improving the existing authentication method, and it provides the available integrated ID authentication on Web. In order to enhance safety, the proposed authentication method by encrypting the user of the verification value, and stores the unique identifier in the database of the certificate authority. Then, the password required to log in to the Web is for receiving a disposable random from the certificate authority, the user does not need to remember a separate password and receives the random number by using the smart phone. It does not save the user's personal information in the database, and it is easy to management of personal information. Only the integration ID needs to be remembered with random number on every time. It doesn't need to use various IDs and passwords if you use this proposed authentication methods.

ID-Based Optimistic Fair Exchange Scheme Based on RSA

  • Youn, Taek-Young;Chang, Ku-Young
    • ETRI Journal
    • /
    • v.36 no.4
    • /
    • pp.673-681
    • /
    • 2014
  • Fairness of exchange is a significant property for secure online transactions, and a fair exchange scheme is a useful tool for ensuring the fairness of exchanges conducted over networks. In this paper, we propose an ID-based optimistic fair exchange scheme based on the RSA function, one which is designed by combining a well-known RSA-based signature scheme and the (naive) RSA function. Note that the main contribution of this paper is to give the first provably secure ID-based fair exchange scheme based on the RSA function, whose security can be proved under fully formalized security models. Our scheme has the following additional strongpoints. The scheme is setup-free; hence, there is no registration step between a user and an arbitrator. Moreover, the proposed scheme is designed in an ID-based setting; thus, it is possible to eliminate the need for certificates and avoid some related problems.

Uncertified Facility (BSL 2 plus): Its Journey through Life for Preparations and Setting up, Compliance with Biosafety Regulations, Implementation, and Registration of the Facility with the Ministry of Health, Singapore

  • Tun, Tin;Sim, Xander
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.53 no.1
    • /
    • pp.68-80
    • /
    • 2021
  • An uncertified facility is a facility not certified, as defined in the Biological Agents and Toxins Act (BATA) in Singapore, but has met the requirements of the Ministry of Health to possess First and Fifth Schedule biological agents and toxins. This type of facility is also known as a Biosafety Level 2 Plus (BSL 2+) facility. Registration as an uncertified facility or a BSL 2+ facility requires a certain process and procedure to be sought with the Biosafety Branch of the ministry. This review, shares first-hand knowledge on the journey to achieving registration of the authors' facility. The procedure involved considerable preparation, setting up facility requirements, biosafety precautions, procedures and practices, and training and competence of laboratory users. The ministry conducted a thorough onsite facility audit to ensure that the facility requirements and biosafety procedures and practices were in place. It then issued an approval letter of possession for the first-time use of biological agents and registered the laboratory as an uncertified facility. The expectation is that the comprehensive information shared may be of great benefit to other facilities with similar interests.

A Study of Online User Identification Based on One-Time Password with Guaranteeing Unlinkability (OTP에 기반한 비연결성을 보장하는 온라인 본인확인에 대한 연구)

  • Kim, Jung-Dong;Cho, Kwan-Tae;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.129-139
    • /
    • 2011
  • Recently by the privacy & data security law, when a user registers the online membership, we need to take action to check a progress of identification without resident registration number. On the most of websites, I-PIN is used by identification instead of the resident registration number. However, I-PIN causes dangerous situations if someone steals the ID and a password, the personal data can be easy to exposure. In this paper, we propose the OTP, which can solve all these problems by guaranteeing the identification of unlinkability. This type of method would help the process of membership registration without fixed data like ID and a password in online so it would be very useful to security of private data.

A Study on PIN-based Authentication and ID Registration by Transfer in AAA System (AAA시스템에서의 이동에 따른 PIN 기반의 인증 및 ID 등록에 관한 연구)

  • Kang Seo-Il;Lee Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.359-368
    • /
    • 2006
  • AAA(Authentication, Authorization, Accounting) is the service that offers authentication, authorization, and accounting method, and every terminal that accesses the network requires this AAA service. The authentication process of a mobile terminal is as follows: a mobile phone accesses an authentication server in a home network via the authentication service in an external network, which receives the authentication result. And, for the home authentication server to offer secure service, a unique key is distributed for the secure communication between the external agent and the user, the external agent and the home authentication server, and the user and the home authentication server. This paper discusses and proposes the key distribution for secure communication among external authentication servers when a mobile terminal travels to an external network. As the proposed method does not require the home authentication server to reissue another authentication when a user travels to other external networks, it reduces the overload in the home authentication server. It can also distribute a PIN-driven key.

A Study on Safe Identification Card Using Fingerprint Recognition and Encrypted QR (지문인식기술과 암호화된 QR코드를 이용한 안전한 신분증 연구)

  • Song, Chung-Geon;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.317-323
    • /
    • 2014
  • The registration cards that are currently used to identify the people of Korea may cause secondary damage once stolen because they contain very specifically expressed fingerprint information. In order to solve this problem, in ID is required that can utilize the state-owned fingerprint DB, while while maintaining confidentiality of the identification information and satisfying the cost as well. At this point accordingly, a secure form of ID, which uses the encrypted QR code and fingerprint information, is proposed.

A Digital ID Wallet User-oriented Mechanism in a Mobile Environment (모바일 환경에서 사용자 중심의 전자ID지갑 운용 메커니즘)

  • Song, Dong-Ho;Lim, Sun-Hee;Lim, Jong-In;Yi, Ok-Yeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.57-64
    • /
    • 2007
  • As a ubiquitous environment approaches and the use of the wireless Internet using the mobile terminals is on the increase. Therefore, the users have to undergo the inconvenience of repeatedly input the same information for the user registration and the ID certification. The information the users have to put in to register in on-line services range from the basic personal information to the more other private information such as financial information. Accordingly the user can be in control of users personal information and safely manage the information by conveniently selecting from the Digital ID Wallet the Ticket that holds various information including the basic, financial or payment certification-related information. Consequently, we propose a digital identity management mechanism to control one's personal information in a mobile environment.