• Title/Summary/Keyword: 과금 방안

Search Result 71, Processing Time 0.03 seconds

A Study of the Method for Subscriber-Aware and Fair Aggregation Scheme in Ethernet (이더넷에서 가입자 구별 및 공평한 접선에 관한 연구)

  • Kwon Tae-Hyun;Park Jong-Su;Park Dae-Geun;Lee Yong-Surk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7B
    • /
    • pp.602-607
    • /
    • 2006
  • A subscriber-oriented service became necessary for the QoS management due to the development of network. BcN(Broadband convergence Network) which incorporates communication, broadcasting and internet not only improves the quality of the communication and broadcasting service but also. aims at broadband service. Therefore, QoS management for each subscriber becomes more important. Not yet, however, the discussion for the subscriber oriented QoS management is not activated. Although, there are several techniques for subscriber distinction using flow information, IP information or MAC information, but they are only processed in layer 3 network. Actually, it is impossible to manage QoS of all subscriber's in layer 3 network. In this paper, we propose a method for QoS management scheme that does not need additional processes or large hardware in layer 2 network and analyze efficiency and overheads. We propose the first subscriber-oriented service method in layer 2 network that is applicable to either existing network or BcN.

An Exploratory Study on the Current Situation of Smart Advertising and its Activation Plan (스마트광고의 활용현황과 활성화 방안에 관한 탐색적 연구)

  • Park, Sung-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.33-40
    • /
    • 2013
  • The smart media has changed the patterns of advertising information consumption and media usage behavior drastically. The smart advertisements, however, have failed to perform as sophisticated as the smart devices carried out. In this respect, this study is designed to figure out the current situation and the ecosystem of smart advertising and to prepare its activation plan through a survey(FGI), which will be able to give policy suggestions about smart media and advertising. In conclusion, this study points out that the proliferation of smart advertising needs to install "Smart Media Representative" which provides independable decisions on the regulation of smart advertising, the system of price, standardization of advertising, the development of various forms of advertisements, the scientific measurement of the effectiveness, the protection of privacy, professional manpower training, etc.

A Study on the Analysis of User Identification and Authentication Procedures when Issuing and Using Alternative Means of Resident Registration Numbers (주민등록번호 대체수단별 발급·이용 시 이용자 신원확인 및 인증절차 분석 연구)

  • J. B. Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.5
    • /
    • pp.707-713
    • /
    • 2024
  • This paper analyzes the current status of identity verification and authentication procedures when issuing and using alternative means for resident registration numbers and suggests measures to improve the problems. Users unconsciously use identity verification services by responding to identity verification requests from Internet service providers (ISPs). Ultimately, online service users are providing excessive amounts of personal information, and ISPs are charging fees for identity verification services, ultimately increasing online service costs. Therefore, this paper analyzes the current status of identity verification and authentication procedures for users when issuing and using alternative means for resident registration numbers and suggests measures to improve the problems.

Smart-phone Malicious Code Countermeasure System (스마트폰 악성코드 대응 시스템)

  • Song, Jong-Gun;Lee, HoonJae;Kim, TaeYong;Jang, WonTae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.223-226
    • /
    • 2013
  • Information security breaches caused by malicious code is arising in various forms with exponential growth. The latest information security threats on computers are increasing, especially on smartphone, which has enabled malicious code to quickly surge. As a result, the leakage of personal information, such as billing information, is under threat. Meanwhile the attack vector o smartphone malware is difficult to detect. In this paper, we propose a smartphone security system to respond to the spread of malicious code by iPhone and Android OS-based malware analysis.

  • PDF

Designed and Implementation of Layered Configuration Management for the Efficient Management of Intranet (효율적인 인트라넷 관리를 위한 계층적 구성 관리 시스템 설계 및 구현)

  • 라연경;김호철;서승호;문해은;김영탁
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1228-1237
    • /
    • 2002
  • Network management is composed of five major functional areas, fault, configuration, account, performance and security management in the ITU standards. Configuration management identifies, exercises control over, collects data from network element node system and provides data to the management systems. The proposed architecture is designed based on the Distributed Processing Environment of CORBA(Common Object Request Broker Architecture) Spec v2.3. In this paper, configuration management system has been designed and implemented with layered managed object. It provides that integrated management of various data link layer technology. We suggest MIB(Management Information Base)/MIT(Management Information Tree) to support integrated management and distributed environment.

A Method of QoS Measurement of Multimedia Data based on Digital Watermarking (멀티미디어 데이터의 QoS 보장을 위한 디지털 워터마킹 기법 적용)

  • Ryu Kyeung-Ha;Kim Min-Su;Jung Ho-Youl;Chung Hyun-Yeol
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • spring
    • /
    • pp.327-330
    • /
    • 2002
  • 디지털 워터 마킹은 일반적으로 지적 재산권의 보호를 위해서 컨텐츠 소유자가 자신의 컨텐츠에 저작권 정보를 나타내는 워터마크를 삽입하여 제 3자가 허가 없이 디지털 컨텐츠의 사용을 할 경우 불법적인 사용을 막아내는 데 사용된다. 본 논문에서는 워터마킹 기법의 새로운 적용 예로써 인터넷 또는 무선 환경을 통한 멀티미디어 데이터 전송 시 수신된 데이터의 품질을 사용자 측면에서 측정 할 수 있는 방안, 즉 디지털 워터마킹 기법의 새로운 적용 예에 대하여 고찰하였다. 제안하는 방법은 네트워크 상에서 발생하는 패킷 손실, 지연 등의 통계적 해석으로 수신 된 멀티미디어 데이터의 품질을 평가하는 척도로 사용하는 기존의 방법과는 달리 사용자 측면에서 눈으로 보이는 데이터의 일그러짐 정도나, 음질의 왜곡을 정량적인 측정치로 보여 줄 수 있음으로써, 오디오 데이터의 QoS(Quality of Service)를 보장하기 위한 수단이나 수신품질에 따른 차별화 된 과금 결정 등에 활용할 수 있을 것이다. 이를 위해 본 논문에서는 멀티미디어 데이터의 품질 측정을 위한 블라인드 워터마킹 기법을 적용하고 다양한 비트 에러율 (Bit Error Rate, BER)을 갖는 BSC(Binary Symmetric Channel)에 적용시켜 봄으로써 멀티미디어 데이터에 삽입된 워터마크 신호의 검출정도와 수신된 미디어 신호의 PSNR비가 선형적인 분포를 가지게 됨을 확인 할 수 있었다.

  • PDF

A Study on the Technology Options for Number Portability in Korea (국내 번호이동성 도입을 위한 기술방식 연구)

  • 김용식;문주희;조용환
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.2
    • /
    • pp.73-77
    • /
    • 2003
  • Number portability is a policy for the increase of user benefits and promotion of telecommunications market competition. In June Un, local number portability (LNP) will be implemented in Korea. The technical solution of LNP will migrate via initial non-intelligent option (RCF) to intelligent option (QoR) from 2007 and number portability standard for 2G mobile uses QoR. The introduction of number portability needs to change operators' network and to implement the solution of LNP suitable to their network property. Therefore the purpose of this paper is to propose a suggestion for the technical options of number portability by the comparative study of merits and demerits of several solutions and the case study of several countries.

  • PDF

A New Key Management Mechanism and Performance Improvement for Conditional Access System (제한수신시스템을 위한 키 관리 메카니즘과 성능향상 방안)

  • 조현숙;이상호
    • The KIPS Transactions:PartC
    • /
    • v.8C no.1
    • /
    • pp.75-87
    • /
    • 2001
  • The Conditional Access System is the complete system for ensuring that broadcasting services are only accessible to those who are entitled to receive them. Four major parts to this system are scrambling, descrambling, authentication and encryption. For the proper operation, which means hard-to- break and uninterrupted service, secure key management and efficient delivery mechanism are very important design factors to this system. Performance analysis is another important factor to this system that is used in massive subscriber environment. In this thesis, one of the secure and efficient key management mechanisms is proposed. For the secrecy of this mechanism, hierarchical stacking of keys and key generation matrix are proposed. For the proof of efficient delivery of those keys, simulation results and performance analysis. which is based on queuing analysis, are presented. Lastly, optimal key generation and delivery period, maximal and minimal key deliver time, and communication capacity for data collection are presented for various subscriber volume.

  • PDF

Interworking of SIP Authentication with DIAMETER and Security Analysis (SIP와 DIAMETER의 인증 연동 및 안전성 분석)

  • 박성준;정수환;이병길;김현곤
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3C
    • /
    • pp.426-435
    • /
    • 2004
  • The DIAMETER protocol provides Authentication, Authorization, and Accounting (AAA) transactions across the Internet. SIP(Session Initiation Protocol) will be used for new types of signaling, such as instant messaging and application level mobility across networks. And SIP will be a major signaling protocol for next generation wireless networks. But the Digest authentication scheme is not using a secure method of user authentication in SIP, and it is vulnerable to man-in-the-middle attacks or dictionary attacks. This study focused on designing a SIP proxy for interworking with AAA server with respect to user authentication and security analysis. We compared and analyzed the security aspects of the scenarios and propose two proposals that a response which include the user address and password-based mutual authentication and key agreement protocol. It is claimed to be more secure against common attacks than current scenarios.

Integrating Portable Internet with cdma2000 Mobile Communication Networks for Seamless Service (연속적인 서비스를 위한 휴대 인터넷과 cdma2000 이동통신망의 연동 방안)

  • Cho Jinsung;Kim Jeong Gem
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.11B
    • /
    • pp.920-929
    • /
    • 2004
  • Nowadays, wireless packet data services are provided over cdma2000 1x/1xEV-DO mobile communication network and Portable Internet are being standardized for users demanding higher data rate services. Portable Internet can provide high data rate services, but its service coverage is relatively small. If Portable Internet may be integrated with cdma2000 mobile networks, users are able to choose the best service according to service areas and get seamless services while they are moving around. At the same time, it is cost-effective for operators to construct and maintain the integrated network. For the purpose of effectively integrating Portable Internet into cdma2000 networks, we propose an integration scheme including network architecture, protocol architecture, functions in network elements, interfaces between them, and call-flow procedures. The integration scheme proposed in this paper adopts a tightly-coupled architecture for unified authentication/accounting and seamless services. In addition, the scheme can be implemented without modifying the existing cdma2000 mobile communication networks. It is also simple to develop the dual-mode mobile station. Through the simulation results based on the performance model for handoffs between cdma2000 and Portable Internet, it has teen validated that the proposed scheme diminishes packet losses compared with the loosely-coupled architecture.