• Title/Summary/Keyword: 도어 시스템

Search Result 219, Processing Time 0.031 seconds

Design of the secure data management system using homomorphic encryption (준동형 암호를 이용한 안전한 데이터 관리 시스템 설계)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Choi, Kang-Im;Ryou, Hwang-Bin;Shin, Hyo-Young
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.91-97
    • /
    • 2015
  • General companies consider saving the information after enciphering as law. However, if the actual information is saved as enciphered, the decoding process must be conducted when the information is searched or edited in the ser ver. Therefore, process delay time occurs and is less efficient. This kind of work gives burden to the server, so the companies or managers handling the server do not save the information after enciphering. In this paper, the Networ k constructs and realizes an efficient security data management system that ensures safety and haste in operating u sing the homomorphic encryption technology, which collects information and decides quickly, and enables editing the encryption without a decoding process. To ensure the security of the embodied system, the existing encryption algo rithm can be used. Search method to use the keyword search. Additionally, by using a trapdoor, the keyword is not expose and it is changed whenever it is searched, and the formation of the keyword does not get exposed.

A Method of Detecting Real-Time Elevation of Privilege Security Module Using User Credentials (자격증명을 이용한 실시간 권한 상승 탐지 보안 모듈)

  • Sim, Chul Jun;Kim, Won Il;Kim, Hyun Jung;Lee, Chang Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.5
    • /
    • pp.247-254
    • /
    • 2017
  • In a Linux system, a user with malicious intent can acquire administrator privileges through attack types that execute shells, and can leak important user information and install backdoor program. In order to solve this problem, the existing method is to analyze the causes of the elevation of privilege, fix the problems, and then patch the system. Recently, a method of detecting an illegal elevated tasks in which information inconsistency occurs through user credentials in real time has been studied. However, since this credential method uses uid and gid, illegal elevated tasks having the root credentials may not be detected. In this paper, we propose a security module that stores shell commands and paths executed with regular privileges in a table and compares them with every file accesses (open, close, read, write) that are executed to solve the case which cannot detect illegal elevated tasks have same credential.

IoT Authentication System Using Blockchain and TOTP

  • Kim, Ho-Gyun;Jung, Soon-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.113-122
    • /
    • 2020
  • In this paper, we propose the terminal authentication system using blockchain and TOTP(Time-based One-time Password Algorithm) to sustain a continuous authentication between user device and service device. And we experiment this system by using door-lock as a terminal of IoT(Internet of Things). In the future, we can apply this result to several devices of IoT for convenience and security. Although IoT devices frequently used everyday require convenience and security at the same time, it is difficult for IoT devices having features of the low-capacity and light-weight to apply the existing authentication technology requiring a high amount of computation. Blockchain technology having security and integrity have been used as a storage platform, but its authentication cannot be performed when the terminal cannot access any network. We show the method to solve this problem using Blockchain and TOPT.

Public Key Encryption with Keyword Search for Restricted Testability (검증 능력이 제한된 검색 가능한 공개키 암호시스템)

  • Eom, Ji-Eun;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.3-10
    • /
    • 2011
  • To provide efficient keyword search on encrypted data, a public key encryption with keyword search (PEKS) was proposed by Boneh et al. A sender encrypts an e-mail and keywords with receiver's public key, respectively and uploads them on a server. Then a receiver generates a trapdoor of w with his secret key to search an e-mail related with some keyword w. However, Byun et al. showed that PEKS and some related schemes are not secure against keyword guessing attacks. In this paper, we propose a public key encryption with keyword search for restricted testability (PEKS-RT) scheme and show that our scheme is secure against keyword guessing attacks.

GoAsap: A Proposal for a Golang New Version Detection and Analysis System from a Static Analysis Perspective (GoAsap: 정적분석 관점에서 바라보는 Golang 신버전 탐지·분석시스템 제안)

  • Hyeongmin Kang;Yoojae Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.707-724
    • /
    • 2024
  • Recently, Golang has been gaining attention in programming language rankings each year due to its cross-compilation capabilities and high code productivity. However, malware developers have also been increasingly using it to distribute malware such as ransomware and backdoors. Interestingly, Golang, being an open-source language, frequently changes the important values and configuration order of a crucial structure called Pclntab, which includes essential values for recovering deleted symbols whenever a new version is released. While frequent structural changes may not be an issue from a developer's perspective aiming for better code readability and productivity, it poses challenges in cybersecurity, as new versions with modified structures can be exploited in malware development. Therefore, this paper proposes GoAsap, a detection and analysis system for Golang executables targeting the new versions, and validates the performance of the proposed system by comparing and evaluating it against six existing binary analysis tools.

Analysis of Thermal Characteristics for Components of Electrical Door System in Electric Multiple Unit (전동차 전기식 도어시스템의 구성부품에 대한 발열 특성분석)

  • Lee, Bon Hyung;Kim, Doo-Hyun;Kim, Sung-Chul
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.1
    • /
    • pp.18-24
    • /
    • 2020
  • This research conducted an the failure analysis was performed based on the failure and operation data for Seven years using the Reliability, Availability, Maintainability, and Safety(RAMS) constructed at the operation stage after the opening of the D urban railway. therefore, the risk priority was selected for failure frequency component within the door system that showed high failure. Finally, the goal was to suggest ways to improve the door system. For this purpose, the analysis of thermal characteristics of failed components such as Door Control Unit(DCU) in the door system based on the Seven-year failure analysis data of RAMS was performed. These results were applied to the main component exchange cycle of the door unit, the mean time between failure(MTBF) and mean kilometer between failure(MKBF) values of RAMS increased by 26% in 2017-2018 when the improvement measures were taken, and the MTBF value of DCU was 300,000 hours, which was a 57% improvement in reliability. The results of this thesis identify potential enhancements in reliability and improvements in maintenance of the door system that, if implemented, would contribute to train safety and reduce instances of failure in the future.

Analysis of Train Operation Obstacle Using Number of Failures and Delay Time of Electric Door System (전기식 도어시스템의 고장건수 및 지연시간을 활용한 열차운행장애 분석)

  • Lee, Bon Hyung;Kim, Doo-Hyun;Kim, Sung-Chul
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.1
    • /
    • pp.12-17
    • /
    • 2020
  • This paper analyzes functions of component parts of D-Urban Railway's door system along with operation obstacle risks on frequency(the number of occurrences/year) and severity(delay time/the number of occurrences). Based on this, the paper presents improvements and current system's problems after obstacle risks of EMU and door system are appled. The obstacle of door system causes corrosion of main parts such as DCU due to heat problem of operation environment, problems of maintenance methods and deterioration. DCUs on PCBs with more than 50% pattern corrosion cause problems. Even though the number of door system's obstacle occurrences for the last 5 years is 42, along with 104 minutes of operation obstacle, EMU operation obstacle risk is low(Level 1), which indicates there is limit in matrix of railway risks presented by the standard of railway safety management system. Therefore, it is necessary to have railway risk matrix suitable for the field. Finally, the paper deducts the obstacle risks through frequency and severity. Since 2017 when the risks of EMU and door system's obstacle, that of EMU has been 24(47% reduced) and that of door system has been average 9.5 per year(23% reduced).

A Study on the Pressure Change during the Pressurization to the Elevator Lobby (부속실 급기가압 시 압력특성 변화에 관한 연구)

  • Kim, Beom-Kyue;Park, Yong-Hwan;Kim, Hong-Sik
    • Fire Science and Engineering
    • /
    • v.26 no.5
    • /
    • pp.99-104
    • /
    • 2012
  • This study investigated the pressure change in the fire room and elevator lobby during the air pressurization to the Elevator lobby with the various egress scenarios and the existence of vent holes in the fire room. The experiments revealed that pressure change was significantly affected by the open/closure scenarios of the front door and stairway door resulting in over pressure, under pressure and performance drop of the door closure. It also revealed that the required smoke defensive air velocity can be obtained only with the existence of vent holes in the fire room by the removal of back pressure in the fire room.

Quantitative Risk Reduction Model according to SIL allocated by Risk Graph for Railway Platform Door System (Risk Graph에 의해 할당된 SIL에 따른 철도 승강장 도어 시스템의 정량적 Risk 저감 모델)

  • Song, Ki Tae;Lee, Sung Ill
    • Journal of the Korean Society of Safety
    • /
    • v.31 no.5
    • /
    • pp.141-148
    • /
    • 2016
  • There exists required safety integrity level (SIL) to assure safety in accordance with international standards for every electrical / electronics / control equipment or systems with safety related functions. The SIL is allocated from lowest level (level 0) to highest level (level 4). In order to guarantee certain safety level that is internationally acceptable, application of methodology for SIL allocation and demonstration based on related international standards is required. Especially, in case of the SIL allocation method without determining of quantitative tolerable risk, the additional review is needed to check whether it is suitable or not is required. In this study, the quantitative risk reduction model based on the safety integrity allocation results of railway platform screen door system using Risk Graph method has been examined in order to review the suitability of quantitative risk reduction according to allocated safety integrity level.

Functional Analysis of Subsystem for Electric Plug Door (전기식 플러그 도어 하부시스템 기능 분석)

  • Joung, Eui-Jin;Hong, Jai-Sung;Won, Jong-Un;Lee, Jang-Mu;Lee, Han-Min;Kim, Gil-Dong
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.2198-2199
    • /
    • 2011
  • The sliding door and plug door are the main types of door system in the EMU(Electric Multiple Unit). The sliding door is widely used in Korea but has weak point in the noise problem. In the low operation speed, the noise coming from outer side of the EMU is not an important factor. As the speed is higher than before, noise is increased and make an issue. The main cause of noise is the imperfect air tightness in the EMU. The plug door system has advantages for the noise reduction characteristic in the high speed area. Actually the noise level is an important factor for the passenger comfort. In this paper, we will describe the characteristic of electric plug door and functions of sub component.

  • PDF