• Title/Summary/Keyword: 기밀성능

Search Result 212, Processing Time 0.029 seconds

고진공펌프종합특성평가시스템 설계, 진단기술 개발

  • Im, Jong-Yeon;Jeong, Wan-Seop;Kim, Wan-Jung;Nam, Seung-Hwan;Im, Seong-Gyu;In, Sang-Yeol;Hong, Seung-Su;Go, Deuk-Yong
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2012.08a
    • /
    • pp.100-100
    • /
    • 2012
  • 지식경제부의 청정제조기반 산업원천개발사업의 일환으로 진행 중인 "초고진공펌프 개발" 과제 중 제3세부 과제인 "고진공펌프 종합특성평가시스템 설계, 진단기술 개발" 과제에서 진행되고 있는 연구수행결과를 소개한다. 국내 초고진공펌프 개발 수준의 선진화를 위한 기본적인 초석 확립은 현존하는 모든 진공 발생 장치의 국제적 신뢰성이 있는 완벽한 성능평가의 구현에 있다고 할 수 있다. 고진공펌프개발 총괄 과제의 대명제는 "국제적 신뢰성을 가지는 상용화 제품의 완성"이며, 이를 위한 3세부과제의 추진 방향은 기 완료된 1단계 기술개발에 근거한 1세부과제 및 2세부과제와의 유기적인 infra를 통한 성공적인 지원체계 구축 및 상용화 제품 개발 단계의 모든 신뢰성 확보 전략을 수립, 수행하는 것을 골자로 하고 있다. 또한 2단계 사업 추진 동안 제품 개발 주체인 산업체에 모든 개발된 기술을 적용할 수 있는 기반 제공 및 상용화를 위한 성공적인 기술이전도 포함된다. 상용화 개발 완료 후인 Post Project 기간 동안에 발생할 수 있는 모든 지원체계의 구축도 장기간에 걸친 연구 개발의 연장선상에서 추진되어야 될 것으로 예상된다. 세부 추진내용으로 나노팹 공정현장의 고진공펌프 신뢰성평가의 기본 개념설계를 포함한 현장 데이터의 확보 및 분석 현황, 공정현장의 실제 환경에 투입하기 전 단계의 모든 신뢰성 확보 방안, 터보분자펌프의 경우 파괴실험을 포함한 over speed, shock venting, foreign debris dropping test 등 상용화 단계에 필요한 기본 시험평가 조건을 고찰하고자 한다. 상용화 단계의 내구성 및 신뢰성 확보를 위한 전제 조건은 대외적으로 공표할 수 있는 시험 평가 데이터와 개발 주체에서 기밀 수준으로 유지해야만 하는 민감한 자료의 상시 생산 infra의 구축으로 볼 수 있다. 이러한 고진공펌프개발이라는 과제의 대명제를 완성하기 위하여 추진 연구개발 방향 등 진행형인 2년간의 최종 상용화에 필요한 국제 신뢰성, 공정대응성 확보 등 핵심사업 추진내용 및 infra 구축의 상세개발 로드맵을 완성하고자 한다.

  • PDF

Design of Securer Electronic payment system based on ECC algorithm (타원 곡선 암호를 이용한 안전한 메일 기반 전자지불시스템 설계)

  • 김성일;최문석;신병철
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.817-820
    • /
    • 2003
  • With a great improvement of computers and Network communication skills, we can exchange information quickly. There have been many researches on the subject how to guarantee the information security by security mechanism and cryptography schemes. Nowadays, many people in this area show their interest in money transfer systems between accounts, which can provide a secure mechanism in which people can send money to the legitimate party or person safe. However, we have teamed many ways to distort messages and repudiate the malicious activity in mail systems based on SSL mechanism. It is very likely that important information which must be kept in secret is laid exposed to un_authorized user. Accordingly, to provide stronger security service, researches on electronic payment system which tan guarantee the security characteristics such as confidentiality, integrity, user authentication, Non-repudiation, are strongly needed. In this paper, we analize the characteristics of the previous researches in this field, and also propose a securer electronic payment system based on ECC algorithm.

  • PDF

Design of a User authentication Protocol Using Face Information (얼굴정보를 이용한 사용자 인증 프로토콜 설계)

  • 지은미
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.157-166
    • /
    • 2004
  • Consequently substantial research has been done on the development of the bio-metric recognition method as well as technical research in the field of authentication. As a method of bio-metric recognition, personal and unique information such as fingerprints, voice, face, Iris, hand-geometry and vein-pattern are used. The face image system in bio-metric recognition and information authentication reduces the denial response from the users because it is a non-contact system the face image system operates through a PC camera attached to a computer base this makes the system economically viable as well as user friendly. Conversely, the face image system is very sensitive to illumination, hair style and appearance and consequently creates recognition errors easily, therefore we must build a stable authentication system which is not too sensitive to changes in appearance and light. In this study, I proposed user authentication protocol to serve a confidentiality and integrity and to obtain a least Equal Error Rate to minimize the wrong authentication rate when it authenticates the user.

  • PDF

An Implementation of Authentication and Encryption of Multimedia Conference using H.235 Protocol (H.235 프로토콜에 의한 영상회의의 인증과 암호화 구현)

  • Sim, Gyu-Bok;Lee, Keon-Bae;Seong, Dong-Su
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.343-350
    • /
    • 2002
  • This paper describes the implementation of H.235 protocol for authentication and media stream encryption of multimedia conference systems. H.235 protocol is recommended by ITU-T for H.323 multimedia conference security protocol to prevent from being eavesdropped and modified by an illegal attacker. The implementation in this paper has used password-based with symmetric encryption authentication. Media streams are encrypted using the Diffie-Hellman key exchange algorithm and symmetric encryption algorithms such as RC2, DES and Triple-DES. Also, 128-bit Advanced Encryption Standard and 128-bit Korean standard SEED algorithms are implemented for the future extension. The implemented authentication and media stream encryption has shown that it is possible to identify terminal users without exposing personal information on networks and to preserve security of multimedia conference. Also, encryption delay time and used memory are not increased even though supporting media stream encryption/decryption, thus the performance of multimedia conference system has not deteriorated.

A Secure Model for Reading and Writing in Hadoop Distributed File System and its Evaluation (하둡 분산파일시스템에서 안전한 쓰기, 읽기 모델과 평가)

  • Pang, Sechung;Ra, Ilkyeun;Kim, Yangwoo
    • Journal of Internet Computing and Services
    • /
    • v.13 no.5
    • /
    • pp.55-64
    • /
    • 2012
  • Nowadays, as Cloud computing becomes popular, a need for a DFS(distributed file system) is increased. But, in the current Cloud computing environments, there is no DFS framework that is sufficient to protect sensitive private information from attackers. Therefore, we designed and proposed a secure scheme for distributed file systems. The scheme provides confidentiality and availability for a distributed file system using a secret sharing method. In this paper, we measured the speed of encryption and decryption for our proposed method, and compared them with that of SEED algorithm which is the most popular algorithm in this field. This comparison showed the computational efficiency of our method. Moreover, the proposed secure read/write model is independent of Hadoop DFS structure so that our modified algorithm can be easily adapted for use in the HDFS. Finally, the proposed model is evaluated theoretically using performance measurement method for distributed secret sharing model.

OTACUS: Parameter-Tampering Prevention Techniques using Clean URL (OTACUS: 간편URL기법을 이용한 파라미터변조 공격 방지기법)

  • Kim, Guiseok;Kim, Seungjoo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.55-64
    • /
    • 2014
  • In a Web application, you can pass without restrictions special network security devices such as IPS and F/W, URL parameter, which is an important element of communication between the client and the server, is forwarded to the Web server. Parameters are modulated by an attacker requests a URL, disclose confidential information or through e-commerce, can take financial gain. Vulnerability parameter manipulation thereof cannot be able to determine whether to operate in only determined logical application, blocked with Web Application Firewall. In this paper, I will present a technique OTACUS(One-Time Access Control URL System) to complement the shortcomings of the measures existing approaches. OTACUS can be effectively blocked the modulation of the POST or GET method parameters passed to the server by preventing the exposure of the URL to the attacker by using clean URL technique simplifies complex URL that contains the parameter. Performance test results of the actual implementation OTACUS proves that it is possible to show a stable operation of less than 3% increase in the load.

A Study on the Chattering under Cryogenic Flow Test of a Oxidizer Shutoff Valve (산화제 개폐밸브의 극저온 유동시험에서 채터링의 고찰)

  • Lee, JoongYoup;Han, SangYeop;Lee, SooYong
    • Aerospace Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.108-117
    • /
    • 2013
  • The oxidizer shutoff valve of a gas generator controls the mass flow rate of the propellant of a rocket engine using pilot pressure and spring the force of the valve. The developing oxidizer shutoff valve can be shut off if the pilot pressure is removed from the actuator. Therefore, force balancing is necessary to analyze the characteristics of the forces with respect to the opening and closing of the valve in order to evaluate its performance. In light of this, the valve has been designed to adjust the control pressure required to open the poppet and to determine the working fluid pressure at which the valve starts to close. Under cryogenic flow test as a tests level of C.R.T(Control Random Test), the chattering phenomena occurred due to much leakage of a metal seat section. The pressure for chattering of the oxidizer valve is predicted at about 11 bar using force balancing analysis.

A LSB-based Efficient Selective Encryption of Fingerprint Images for Embedded Processors (임베디드 프로세서에 적합한 LSB 기반 지문영상의 효율적인 부분 암호화 방법)

  • Moon, Dae-Sung;Chung, Yong-Wha;Pan, Sung-Bum;Moon, Ki-Young;Kim, Ju-Man
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.10
    • /
    • pp.1304-1313
    • /
    • 2006
  • Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. In this paper, we propose a secure and efficient protocol to transmit fingerprint images from a fingerprint sensor to a client by exploiting characteristics of fingerprint images. Because the fingerprint sensor is computationally limited, however, such encryption algorithm may not be applied to the full fingerprint images in real-time. To reduce the computational workload on the resource-constrained sensor, we apply the encryption algorithm to a specific bitplane of each pixel of the fingerprint image. We use the LSB as specific bitplane instead of MSB used to encrypt general multimedia contents because simple attacks can reveal the fingerprint ridge information even from the MSB-based encryption. Based on the experimental results, our proposed algorithm can reduce the execution time of the full encryption by a factor of six and guarantee both the integrity and the confidentiality without any leakage of the ridge information.

  • PDF

고진공펌프종합특성평가시스템 설계, 진단기술 개발 개요

  • Im, Jong-Yeon;In, Sang-Yeol;Kim, Wan-Jung;Jeong, Wan-Seop;Im, Seong-Gyu;Go, Deuk-Yong
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2012.02a
    • /
    • pp.111-111
    • /
    • 2012
  • 지식경제부의 청정제조기반 산업원천개발사업의 일환으로 진행 중인 "초고진공펌프 개발" 과제 중 제 3 세부 과제인 "고진공펌프종합특성평가시스템 설계, 진단기술 개발" 과제에서 추진되고 있는 연구결과를 소개한다. 국내 초고진공펌프 개발 수준의 선진화를 위한 기본적인 초석 확립은 현존하는 모든 진공 발생 장치의 국제적 신뢰성이 있는 완벽한 성능평가의 구현에 있다고 할 수 있다. 고진공펌프개발 총괄 과제의 대명제는 "국제적 신뢰성을 가지는 상용화 제품의 완성"이며, 이를 위한 3세부과제의 추진 방향은 기 완료된 1단계 기술개발에 근거한 1세부과제 및 2세부과제와의 유기적인 infra를 통한 성공적인 지원체계 구축 및 상용화 제품 개발 단계의 모든 신뢰성 확보 전략을 수립, 수행하는 것을 골자로 하고 있다. 또한 2단계 사업 추진 동안 제품 개발 주체인 산업체에 모든 개발된 기술을 적용할 수 있는 기반 제공 및 상용화를 위한 성공적인 기술이전도 포함된다. 상용화 개발 완료 후인 Post Project 기간 동안에 발생할 수 있는 모든 지원 체계의 구축도 장기간에 걸친 연구 개발의 연장선상에서 추진되어야 될 것으로 예상된다. 상용화 단계의 내구성 및 신뢰성 확보를 위한 전제 조건은 대외적으로 공표할 수 있는 시험평가 데이터와 개발 주체에서 기밀 수준으로 유지해야만 하는 민감한 자료의 상시 생산 infra의 구축으로 볼 수 있다. 이러한 고진공펌프개발이라는 과제의 대명제를 완성하기 위하여 추진 연구개발 방향 등 향후 2년간의 최종 상용화에 필요한 국제 신뢰성, 공정대응성 확보 등 핵심사업 추진내용 및 infra 구축의 상세설계 로드맵 초안을 고찰하고자 한다. 본 연구는 지경부 산업원천기술개발사업 중 "초고진공펌프 개발" 사업의 제 3 세부과제인 "고진공펌프종합특성평가시스템 설계, 진단기술 개발" 과제(과제번호: 10031836)에서 수행된 연구결과의 일부임.

  • PDF

A Study on Status Survey for the Improvement of Shelter Facilities for Residents (주민대피시설의 성능개선을 위한 실태조사에 관한 연구)

  • Park, Namkwun;Kang, Shinwook
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.1
    • /
    • pp.91-97
    • /
    • 2014
  • purpose of this study was to conduct status survey on existing shelter facilities for residents and use it as basic material to plan and design improved shelter facilities in the future. As the result, first, although existing shelter facilities are judged to have been designed in consideration only of the protection from high explosive shells, actual protection capability is significantly low against high explosive shells when exit direction and protection capabilities of main entrances were investigated. Second, all the 7 facilities did not have air purifier with filters installed for the air that flows into the inside from outside and since the height of air exhausts and intake pipes in the outside are also close to the earth, there are possibilities that heavy contaminated air can flow into the inside. Third, although some facilities have anti-explosion doors installed, it is impossible to use them as chemical, biological and radiological (CBR) shelter because of improper installation of openings and anti-explosion valves as well as poor plumbing that cannot ensure air-tightness and poor finish of piping penetration.