Exploring the Techniques of Information Security Certification

02/15/2023
by   Abel C. H. Chen, et al.
0

If the information system is intruded or attacked by hackers, leaked personal data or serious economic loss may occur; the threats may be serious security problems. For security services, information security certification is built based on Public Key Infrastructure (PKI) to be an important tool for the services of bank transactions, natural person certificate, blockchain, and Hyper Text Transfer Protocol Secure (HTTPS). Therefore, this study uses Taiwan Patent Search System (TPSS) to find and analyze the contents of patents for obtaining the innovation reports of information security certification in Taiwan according to patents. This study considers the single-factor and two-factors to analyze the relationships of annuals, technology leaders, market leaders, and major applications for exploring the patent portfolios of technology leaders and market leaders in information security certification.

READ FULL TEXT
research
08/31/2023

Blockchain Based Open Network in Technology Intermediation

Blockchain technology is developing using in reliable applications which...
research
02/27/2018

Fundamental Values of Cryptocurrencies and Blockchain Technology

We propose a theoretical model to measures the fundamental values of cry...
research
01/13/2019

Understanding the Social Factors Affecting the Cryptocurrency Market

Blockchain and its application on cryptocurrency transactions have gathe...
research
05/22/2021

Securing Optical Networks using Quantum-secured Blockchain: An Overview

Deployment of optical network infrastructure and network services is gro...
research
11/11/2022

Blockchain Technology to Secure Bluetooth

Bluetooth is a communication technology used to wirelessly exchange data...
research
11/29/2017

UC Secure Issuer-Free Adaptive Oblivious Transfer with Hidden Access Policy

Privacy is a major concern in designing any cryptographic primitive when...
research
09/25/2021

Analysing GSM Insecurity

In the 1990s, GSM emerged as a cutting-edge technology that promised imp...

Please sign up or login with your details

Forgot password? Click here to reset