• Title/Summary/Keyword: 메시지 시스템

Search Result 2,106, Processing Time 0.038 seconds

A Study on the Performance Improvement in SEcure Neighbor Discovery (SEND) Protocol (보안 이웃 탐색 프로토콜 성능 향상 기법에 관한 연구)

  • Park, Jin-Ho;Im, Eul-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.85-96
    • /
    • 2008
  • Neighbor Discovery(ND) protocol is used to exchange an information of the neighboring nodes on the same link in the IPv6 protocol environment. For protecting the ND protocol, firstly utilizing Authentication Header(AH) of the IPsec protocol was proposed. But the method has some problems-uses of key exchange protocol is not available and it is hard to distribute manual keys. And then secondly the SEcure Neighbor Discovery(SEND) protocol which protects all of the ND message with digital signature was proposed. However, the digital signature technology on the basis of public key cryptography system is commonly known as requiring high cost, therefore it is expected that there is performance degradation in terms of the availability. In the paper, to improve performance of the SEND protocol, we proposed a modified CGA(Cryptographically Generated Address) which is made by additionally adding MAC(Media Access Control) address to the input of the hash function. Also, we proposed cache mechanism. We compared performance of the methods by experimentation.

An E-Mail Protocol Providing Forward Secrecy without Using Certificated Public Keys (공개키 인증서를 사용하지 않는 전방향 안전성을 보장하는 E-mail 프로토콜)

  • Kwon, Jeong-Ok;Koo, Young-Ju;Jeong, Ik-Rae;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.3-11
    • /
    • 2009
  • Forward secrecy in an e-mail system means that the compromising of the long-term secret keys of the mail users and mail servers does not affect the confidentiality of the previous e-mail messages. Previous forward-secure e-mail protocols used the certified public keys of the users and thus needed PKI(Public Key Infrastructure). In this paper, we propose a password-based authenticated e-mail protocol providing forward secrecy. The proposed protocol does not require certified public keys and is sufficiently efficient to be executed on resource-restricted mobile devices.

The Trends and Prospects of Mobile Forensics Using Linear Regression

  • Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.10
    • /
    • pp.115-121
    • /
    • 2022
  • In this paper, we analyze trends in the use of mobile forensic technology, focusing on cases where mobile forensics are used, and we predict the development of future mobile forensics technology using linear regression used in future prediction models. For the current status and outlook analysis, we extracted a total of 8 variables by analyzing 1,397 domestic and foreign mobile forensics-related cases and newspaper articles. We analyzed the prospects for each variable using the year of occurrence as an independent variable, seven variables such as text (text message usage information), communication information (cell phone communication information), Internet usage information, messenger usage information, stored files, GPS, and others as dependent variables. As a result of the analysis, among various aspects of the use of mobile devices, the use of Internet usage information, messenger usage information, and data stored in mobile devices is expected to increase. Therefore, it is expected that continuous research on technologies that can effectively extract and analyze characteristic information of mobile devices such as file systems, the Internet, and messengers will be needed As mobile devices increase performance and utilization in the future and security technology.

The interaction effect of descriptive norm message and regulatory focus in online context of franchise system (프랜차이즈 시스템의 온라인 맥락에서 서술적 규범 메시지와 조절초점의 상호작용 효과)

  • Kim, Sae-Rom;Lee, Dong-il
    • The Korean Journal of Franchise Management
    • /
    • v.9 no.2
    • /
    • pp.31-38
    • /
    • 2018
  • Purpose - In recent years, many companies include franchises have acquire customers by making an online stores and they are carrying out permission marketing activities with e-mail and SMS. Permission marketing requires voluntary customer approval for receiving commercial messages such as cross-selling and upselling. Therefore, it is necessary for the business to induce the customer's acceptance. The purpose of this study is to examine which type of different messages can affect higher in consumer persuasion. Thus, we investigated the impact of descriptive norm message on intention of reception in an online store context, and its interaction with chronic regulatory focus. Research design, data, and methodology - This study hypothesized that the descriptive norm message would affect positive influences to consumers' intension of reception. Specially, this study inquired into whether the interaction effect between descriptive norm and regulatory focus. To verify the hypothesis, we conducted 2 × 2 between-subject factorial design with message type (general message and descriptive norm message) and regulatory focus(promotion focus and prevention focus) as independent variables. Participants of the experiment were assigned to one of 2 kind experimental situations randomly according to characteristics of message type. A total of 131 participants (descriptive norm message: 65, general message: 66) responded for this study. The data were analyzed using frequency analysis, exploratory factor analysis, and two-way ANOVA. Result - The results of the study are as follows. First, we found main effects of the descriptive norm message. The intention of reception were significantly higher in the descriptive norm message rather than general message as in previous researches. Second, interaction effect between the descriptive norm message and regulatory focus was significant. The prevention focus (vs. promotion focus) were hight in a positive behavior intention when the descriptive norm message was given. Conclusions - This study verifies the main effect and interaction effect of descriptive norm message and regulatory focus on the consumers' intention of reception in permission marketing, and persuasive message in the online store context. The results of this study will provide various advantages to companies that want to establish long lasting relationship with customers by carrying out permission marketing in the future.

A Position Recognition Method of Mobile Relay with Acceleration Sensor for Efficient Communication Network Connection (효율적인 통신망 연결을 위한 가속도 센서를 탑재한 이동식 중계기의 위치 인식 방안)

  • Hong, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.527-528
    • /
    • 2022
  • It is not easy to identify the location of mobile terminals based on drones in the mountainous area, the densely populated urban area, or the space where mobile terminals can easily move by using equipments or modules that can recognize the location of sensors or mobile terminals with LBS (Location-Based Service). However, although the performance of GPS has developed due to the development of technology, it is still widely used in position recognition systems using GPS modules in the sea and onshore, and there is much room for more utilization. Currently, most of the existing sensor networks need to send at least three location information messages to mobile terminals with location information that a plurality of mobile base stations depend on GPS. However, location recognition of mobile repeaters that maintain a certain movement speed using acceleration sensors is necessary for efficient communication network connection.

  • PDF

Suggestions of Bus Station Service in Gangnam - Using HCI methods - (서울시 강남역 광역버스 정류장 서비스 개선 제안 - HCI방법론을 중심으로 -)

  • Kim, Sora;Kang, Ji Yeon;Han, Hae Jung;Kim, Sora
    • Design Convergence Study
    • /
    • v.13 no.5
    • /
    • pp.131-145
    • /
    • 2014
  • Considering the number of population commuting from Gyeonggi to Seoul, the development of the bus system is relatively slow. There are many problems to be solved but it has been overlooked, leaving the users in discomfort. The goal of this research is to improve the current system to satisfy the unmet needs, using HCI methods, which is composed of five steps, including Define, Find, Analyze & Synthesize, Ideation, Develop. In Define, we recruited the interviewees using the extreme user method to find their needs. In Find, we proceeded 'be the customer', shadowing for background research and in-depth interview. In Analyze & Synthesis, we analyzed the customer needs and clustered to similar needs to draw useful ideas. After that we suggested sophisticated ideas based on design principles from previous stage and visualized in user scenarios and mock-ups. Overall, the research suggests with text message service, informative light service and mobile application to improve the existing bus station.

A Study on an Efficient VDES Gain Control Method Conforming to the International Standard (국제 표준 규격에 부합하는 효율적인 VDES 이득제어 방안 연구)

  • Yong-Duk Kim;Min-Young Hwang;Won-Yong Kim;Jeong-Hyun Kim;Jin-Ho Yoo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.06a
    • /
    • pp.339-343
    • /
    • 2022
  • In this study, a method for simplifying the structure of the VDES RF receiver, and the gain control method of the receiver to comply with the international standard in this structure was described. The input level of the wanted signal and unwanted signal to the receiver was defined, and when the two signals were input, the saturation state at the ADC was checked at the receiver output. As a result of the simulation by the circuit simulator, it was satisfied that the output power of the receiver was in the SFDR region of ADC with respect to the adjacent channel interference ratio, intermodulation, and blocking level. Through this study, it was found that the structure of th proposed RF receiver conforms to the international standard.

  • PDF

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.

A Link Protection Scheme with a Backup Link Spanning Tree for Provider Backbone Bridged Networks and Implementation (프로바이더 백본 브리지 망을 위한 백업링크 스패닝트리 기반 링크장애 복구기능과 구현)

  • Nam, Wie-Jung;Lee, Hyun-Joo;Yoon, Chong-Ho;Hong, Won-Taek;Moon, Jeong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.58-68
    • /
    • 2010
  • In this paper, we propose an efficient link protection switching scheme for provider backbone bridge systems with a spanning tree for backup links exclusively, and evaluate its performance. The proposed scheme offers guaranteed QoS flows even when a link fault occurrs in the primary link by flooding the flows over the profiled spanning tree. The flooding mechanism over the spanning tree can also provide low latency and remove the loopback flows. We also derive the efficiency of bandwidth usage for the normal flows and the number of lost frames during the link restoration. For evaluating its feasibility, we implement a prototype of PBB-TE systems based on the Linux bridge codes, which can support both link protection switching capability with CCM and MAC-in-MAC encapsulation. A related protocol analyzer is also developed. One can see that the proposed scheme and the prototype can be useful for developing carrier class Ethernet systems based on PBB-TE.

Distributed Coordination of Project Schedule Changes: An Agent-Based Compensatory Negotiation Approach (건설공사 공정변경의 분산조정 : 에이전트기반의 보상협의 방식)

  • Kim Kee-Soo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.4 no.2 s.14
    • /
    • pp.74-81
    • /
    • 2003
  • In the construction industry, projects are becoming increasingly large and complex, involving multiple subcontractors. Traditional centralized coordination techniques used by the general contractors become less effective as subcontractors perform most wok and provide their own resources. When subcontractors cannot provide enough resources, they hinder their own performance as well as that of other subconractors and ultimately the entire project Thus, construction projects need a new distributed coordination approach wherein all of the concerned subcontractors can reschedule a project dynamically. To enable the distributed coordination framework of project schedule changes, the author developed an agent-based compensatory negotiation methodology, which allows intelligent software agents to simulate negotiations on behalf of their human subcontractors. In addition to this theoretical work, 1 designed and implemented a prototype to demonstrate the effectiveness of the framework. Thus, this research formalizes the necessary steps that would help construction project participants to increase the efficiency of their resource use, which in turn will enhance successful completions of whole projects.