• Title/Summary/Keyword: 도면보안

Search Result 12, Processing Time 0.027 seconds

Cloud CAD in the Security Technology Category (클라우드 CAD에서의 도면 보안 기술 분류)

  • Bae, Tae-won;Hong, Mi;Lee, Jong-kun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.827-830
    • /
    • 2011
  • 클라우드 CAD는 기존 사용자들의 작업 효율성 증대 및 기업의 자원 절약뿐만이 아니라 설계와 현장간의 협업 등 많은 부분에서 큰 효과를 가져다 줄 것으로 기대하고 있다. 하지만 많은 기업들이 도면, 문서 등이 관련된 보안에 관련된 문제로 인해 클라우드 CAD를 사용함에 있어서 망설이고 있다. 이에 본 논문에서는 현재 시중에 출시되어 있는 대표적인 클라우드 CAD인 AutoCAD WS와 몇몇 기업에서 적용중인 가상화 클라우드 CAD를 기준으로 하여 기업에 적용시 문제가 될 수 있는 보안 문제를 알아보고 그 해결 방안을 제시한다.

The study of Drawing Creation System using Data Marshalling which is directly connected with GIS (Data Marshalling을 적용한 GIS시스템과 직접적으로 연동되어 처리되는 도면 생성시스템의 개발에 관한 연구)

  • Lee, Won-Kee;Kang, In-Soo
    • Proceedings of the KIEE Conference
    • /
    • 2005.07e
    • /
    • pp.3-5
    • /
    • 2005
  • 대규모 기업용 GIS 데이터베이스를 구축하고 운용하기 위한 시스템의 도입이 수년간 꾸준히 진행되어 왔으며 전력분야에서도 전력망 GIS 구축이 활발히 수행되어 현재 현장으로 확장 단계에 있다. 현장 업무를 위하여 전체 도면정보에서 임의의 영역을 추출하여 현장에 활용함으로써 기존의 종이 도면을 대체하고 있는 추세로 정보 통신 기술의 발전으로 현장에서 무선으로 도면 정보를 전송함으로써 필드 GIS라는 사업 분야로 발전하고 있다. 본 연구에서는 시스템간의 직접적인 연동 및 전체 GIS 데이터베이스에서 현장용 설계/공사등의 업무에 필요한 특정 영역내의 설비, 속성, 각 설비간의 관계(Relationship) 및 계통 정보를 추출하여 표준화, 암호화함으로서 현장에서 설계/준공처리 업무를 수행한 후 결과를 본래의 GIS영역 내부로 통합하여 데이터의 무결성을 유지할 수 있는 시스템에 대한 연구로써 기존 매체간의 인터페이스를 통한 시스템간의 불완전한 매핑 문제와 데이터 보안문제를 해결하여 필드 정보시스템(FIS) 분야에 확장, 활용한 수 있는 기술에 대한 연구이다.

  • PDF

Development of Digital Watermarking Technology to Protect Cadastral Map Information

  • Kim, Jung-Yeop;Lee, Hyun-Joon;Hong, Sung-Eon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.18 no.3
    • /
    • pp.57-65
    • /
    • 2010
  • This research aimed to prevent illegal distribution and reproduction of digital cadastral map information using digital watermarking. To this end, a digital watermarking was developed in consideration of the properties of cadastral maps and based on watermarking methods, after which its performance was evaluated. A watermark key and a one-way function was used to compensate for the algorithm and, therefore, watermarking security, based on the existing research results. In these ways, the present method meets the requirements for fidelity, robustness, false positive rate and the maintenance of consistent topology. The advanced techniques suggested in this paper were devised so as to be suitable for vector data such as GIS and navigation data as well as cadastral maps. Moreover, if the existing methodology is further improved, it could be expected to be used even more widely.

A Study on Object Recognition Technique based on Artificial Intelligence (인공지능 기반 객체인식 기법에 관한 연구)

  • Yang Hwan Seok
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.3-9
    • /
    • 2022
  • Recently, in order to build a cyber physical system(CPS) that is a technology related to the 4th industry, the construction of the virtual control system for physical model and control circuit simulation is increasingly required in various industries. It takes a lot of time and money to convert documents that are not electronically documented through direct input. For this, it is very important to digitize a large number of drawings that have already been printed through object recognition using artificial intelligence. In this paper, in order to accurately recognize objects in drawings and to utilize them in various applications, a recognition technique using artificial intelligence by analyzing the characteristics of objects in drawing was proposed. In order to improve the performance of object recognition, each object was recognized and then an intermediate file storing the information was created. And the recognition rate of the next recognition target was improved by deleting the recognition result from the drawing. In addition, the recognition result was stored as a standardized format document so that it could be utilized in various fields of the control system. The excellent performance of the technique proposed in this paper was confirmed through the experiments.

A Study of Storage Device Control Method for File Outflow Protecting (파일유출 방지를 위한 저장장치 제어기법에 대한 연구)

  • Choi, Joo-Ho;Rhew, Sung-Yul
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.1-11
    • /
    • 2006
  • The files of intellectual property on computer systems have increasingly been exposed to such threats that they can be flowed out by internal users or outer attacks through the network. The File Outflow Protection System detects file outflow when users not only copy files on client computers into storage devices, but also print them. This Protection system has been designed to Win32 API hooking by I/O Manager in kernel level if files are flowed out by copying. As a result, the monitoring system has exactly detected file outflows, which is proved through testing.

  • PDF

The Research for Cyber Security Experts (사이버보안 전문가 양성을 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1137-1142
    • /
    • 2017
  • Cyber hacking attacks and cyber terrorism are damaging to the lives of the people, and in the end, national security is threatened. Cyber-hacking attacks leaked nuclear power cooling system design drawings, cyber accidents such as hacking of Cheongwadae's homepage and hacking of KBS stations occurred. The Act on Information and Communication Infrastructure Protection, Promotion of Information and Communication Network Utilization and Information Protection, and the Personal Information Protection Act remove the responsibility for cyber attacks, but it is difficult to prevent attacks by hackers armed with new technologies. This paper studies the development of cyber security experts for cyber security. Build a Knowledge Data Base for cyber security professionals. Web hacking, System hacking, and Network hacking technologies and evaluation. Through researches on the operation and acquisition of cyber security expert certification, we hope to help nurture cyber security experts for national cyber security.

Design and Implementation of Warehouse Management System Simulator (창고관리시스템 시뮬레이터의 설계 및 구현)

  • Kim, Chi-Taek;Lee, Min-Soon;Lee, Byoung-Soo
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.73-80
    • /
    • 2008
  • In this paper, we developed a WMS (Warehouse Management System) Simulator. There is no Simulator that supports optimized design for Warehouse, consider goods which storage in warehouse and using RFID and USN based on cable wireless network. Also, there is no tool for monitoring which decides delivery time with information about temperature, humidity and illumination, after goods are stocked into warehouse. In this paper, WMS Simulator Implements function of drawing a blueprint. The Simulator that can analyze moving information of Palette with RFID tags and the change about temperature, humidity and illumination is developed in this paper. Inventory accuracy, space equipment practical use, and decreasing of picking time, faulty storage and product loss by product processing ability elevation are expected by designing the way of operating of warehouse for most suitable use of system in physical distribution through these treatise.

  • PDF

The Research for cyber security experts (사이버보안 전문가 양성을 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.301-304
    • /
    • 2016
  • Cyber world constitute the infrastructure of the country and its people and control. Cyber attacks and leakage of personal information are being threatened damage to the national economy and national security. December 2014 had been cyber hacking attacks on Korea Hydro & Nuclear Power Nuclear cooling system design drawings of a spill, and Cheong Wa Dae website hacked, KBS stations occurred in cyber hacking accidents. As a result, ICT-based Protection Act, Promotion of Information and Communications Network Utilization and Information Act on Protection, etc., privacy laws are being enforced, personal information in the form of requirements from leading high-tech eoryeowoona is to prevent the attacks of armed hackers Internet information society It proposes positive measures to keep your personal information officer and laws.

  • PDF

Automated extraction of MIPS firmware image base using page-granularity (페이지 입상도 기반의 MIPS 펌웨어 베이스 주소 자동추출 기법)

  • Seok-Joo Mun;Daehee Jang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.01a
    • /
    • pp.5-6
    • /
    • 2023
  • 본 논문에서는 MIPS 아키텍쳐 기반 펌웨어에 대한 페이지 단위의 이미지 베이스 주소 탐색 방안을 제안한다. 이 방법은 MIPS 기반 임베디드 기기의 펌웨어를 대상으로, 대상 내의 분석 대상의 이미지 베이스 주소 계산 알고리즘을 효율적으로 개선하여 이미지 베이스 주소탐색 시간을 최소화하는 것을 목표로 한다. 이 방법은 펌웨어 내 문자열의 주소를 기준으로 세그먼트 시작 주소를 유추, 페이지 단위인 4KB 단위로의 이미지 베이스 주소 후보군을 계산하여 이미지 베이스 주소 후보군을 선별하는 것을 그 원리로 한다. 본 논문에 적용된 방법은 기존의 경험적 방법을 통한 펌웨어 베이스 탐색 방안에 비해 정확도면에서 우수함을 보인다.

  • PDF

Vector Data Hashing Using Line Curve Curvature (라인 곡선 곡률 기반의 벡터 데이터 해싱)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.2C
    • /
    • pp.65-77
    • /
    • 2011
  • With the rapid expansion of application fields of vector data model such as CAD design drawing and GIS digital map, the security technique for vector data model has been issued. This paper presents the vector data hashing for the authentication and copy protection of vector data model. The proposed hashing groups polylines in main layers of a vector data model and generates the group coefficients by the line curve curvatures of the first and second type of all poly lines. Then we calculate the feature coefficients by projecting the group coefficients onto the random pattern and generate finally the binary hash from the binarization of the feature coefficients. From experimental results using a number of CAD drawings and GIS digital maps, we verified that the proposed hashing has the robustness against various attacks and the uniqueness and security by the random key.