• Title/Summary/Keyword: 방기천

Search Result 41, Processing Time 0.023 seconds

A Study of PKI-Based E-commerce Security System Design under Java Code Environment (Java Code를 중심으로한 PKI기반 전자상거래 보안시스템 설계)

  • Bang, Kee-Chun;Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.51-57
    • /
    • 2013
  • RSA is the most widely used public key algorithms. Payment via the SSL communications, and user authentication using RSA secure shopping mall that can protect the user's valuable information in the process of building. SSL-based electronic signature technology and encryption protocols for this technology are electronic documents are delivered to the other party through a separate encryption process, the information sender to enter information on a web browser (user) and the recipient (the Web server of the site Manager), except you will not be able to decrypt the contents. Therefore, the information is encrypted during the transfer of electronic documents even if hackers trying to Sniffing because its contents can never understand. Of internet shopping mall in the user authentication 'and' Communications' SSL secure shopping mall built with the goal of the methodology are presented.

A Study on the RFID Security Technologies in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 RFID보안 기술에 대한 연구)

  • Bang Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.6 no.4
    • /
    • pp.267-272
    • /
    • 2005
  • The ubiquitous computing environment is a new paradigm that represents the future life and is expected to bring about great changes in IT and in the lives of individuals. However, since a good deal of information can be easily obtained and shared in the ubiquitous computing environment, problems such as a security threat and infringement of privacy are getting serious. The present study is intended to explore some ways to minimize such problems by introducing RFID technology in the ubiquitous computing environment. This study also examines the causes of violation of security and privacy that might occur in the RFID system and requirement for security. In addition it seeks possible technical solutions to those causes.

  • PDF

A Study on Designing Method of Framework for NGN QoS Management (NGN 운용과정의 QoS 관리를 위한 프레임워크 설계방법)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.9 no.1
    • /
    • pp.101-107
    • /
    • 2008
  • The level of transference of NGN is beginning as the operation of Access Gateway in korea at present, but NGN will keep developing continuously to the NGN integrated network until 2010. This research is finding the meaning and assignment of NGN QoS to deduct how to manage the control system and presenting the QoS control process and trial framework. The trial framework is the modeling of the QoS measurement metrics, the measurement time schedule, the section, hierarchy, instrument, equipment and method of measurement and the series of cycle & the methodology about analysis of the result of measurement. The objective standard of quality in communication service is guaranteed not by itself but by controlling and measuring continuously. Especially it's very important time to maintain the research about NGN QoS measurement and control because the big conversion of new network technology paradigm is now spreading.

  • PDF

A Study on Creative Industry Development Vision based on Digital Contents (지식창출형 콘텐츠 기반 창조산업 육성방안)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.47-53
    • /
    • 2012
  • Economic crisis, efforts to overcome the digital content industry development at home and abroad have been racing in the country's future lies in the digital content industry. Therefore, the digital content industry through vision, model identification knowledge-based global digital content market-based deployment is required. For research purposes the digital content industry to derive an alternative to national industrial development that will lay the groundwork. The deployment order for the first digital content industry, SWOT analysis performed to derive the Korean-specific model. As a result, measures based on the advancement of digital content industry as a long-term vision and specific goals are presented as staged. The age of convergence of the u-media content markets in government, corporations, consumers, and these form the structure of a virtuous cycle distribution systems for energy by being active, synergistic effects are obtained. Above all, based on the content industry to secure internal and external growth is key. Vision of the digital content, the growth momentum of the national social development policies to be used as a role model by changing the way a series of courses is required.

Design of a Wireless ATM MAC Protocol for Multimedia Services (멀티미디어 서비스를 위한 무선 ATM MAC 프로토콜의 설계)

  • 임재환;방기천
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.3
    • /
    • pp.329-338
    • /
    • 1999
  • In this paper we propose a WATM MAC protocol called DTDD/PS (Dynamic Time Division Duplex using Poll/Select scheme). The idea of the DTDD/PS protocol is based that a radio cell is considered as queueing system. The MAC controller in base station is charged in coordinating terminals for the QoS requirement from each terminal. For that reason, terminals send it's own dynamic parameter represented its status, and controller controls the access of terminals and assigns time slots dynamically using received parameters. Therefore this system can satisfy the QoS of real-time service in wireless environments. To evaluate DTDD/PS protocol simulations are executed. In 25Mbps channel capacity, the voice and data coexist traffic situation, as the total number of terminal is increased, the delay of data terminals is increased rapidly. But the case of only increasing data terminals, the number of supported voice terminals is not varying. Therefore we can expect that DTDD/PS protocol can applied to multimedia traffic effectively.

  • PDF

A Building Method of Designing National Cyber Security Governance Model Through Diagnosis of Operational Experience (정보보안체계 운영경험 진단을 통한 국가 사이버보안 거버넌스 모델 연구 방법)

  • Bang, Kee-Chun
    • Journal of Digital Convergence
    • /
    • v.16 no.6
    • /
    • pp.205-212
    • /
    • 2018
  • This Study aims to propose a new information security governance model design method for streamlining security governance at national strategic level. The research method of this study is to diagnose our operational experience and to derive a new model design method. In the meantime, national information security activities were perceived to be focused on knowledge transfer, and motivation of activities and securing of executive power were weak. As a result, security blind spots and frequent occurrence of large security incidents have become unresolved challenges. National cyber security governance should be grouped together as a whole systematically from the upper policy to the lower level of performance under the responsibility of the national leader. Based on this approach, this study presented the comprehensive framework of Korean security governance model and embodied it into four architectural designs such as vision, goal, process, and performance, thus deriving the foundation for future national governance model design. Further research is needed to diagnose problems in life cycle flow, security policies based on environmental changes, and new frameworks in which all subjects participate.

A Design on the Wavelet Transform Digital Filter for an Image Processing (영상처리를 위한 웨이브렛 변환 디지털 필터의 설계)

  • Kim, Yun-Hong;Jeon, Gyeong-Il;Bang, Gi-Cheon;Lee, U-Sun;Park, In-Jeong;Lee, Gang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.37 no.3
    • /
    • pp.45-55
    • /
    • 2000
  • In this paper, we proposed the hardware architecture of wavelet transform digital filter for an image processing. Filter bank pyramid algorithm is used for wavelet transform and each fillet is implemented by the FIR filter. For DWT computation, because the memory controller is implemented by hardware, we can efficiently process the multisolution decomposition of the image data only input the parameter. As a result of the image Processing in this paper, 33㏈ PSNR has been obtained on 512$\times$512 B/W image due to 11-bit mantissa processing in FPGA Implementation. And because of using QMF( Quadrature Mirror Filter) properties, it reduces half number of the multiplier needed DWT(Discrete Wavelet Transform) computation so the hardware size is reduced largely. The proposed scheme can increase the efficiency of an image Processing as well as hardware size reduced. The hardware design proposed of DWT fillet bank is synthesized by VHDL coding and then the test board is manufactured, the operating Program and the application Program are implemented using MFC++ and C++ language each other.

  • PDF

Streaming Service Scheduling Scheme in Mobile Networks (모바일환경에서 실시간 데이타서비스를 위한 스케줄링 정책)

  • Min Seung-Hyun;Kim Myung-Jun;Bang Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.3 no.1
    • /
    • pp.47-57
    • /
    • 2002
  • Recently, wireless networks have been pursuing multimedia data service as voice, data, image, video and various form of data according to development of information communication technology. It guarantees cell delivery delay of real time data in efficient real time multimedia data transfer. Also, it minimizes cell loss rate of non-real time multimedia data. In the wireless ATM, there are based on Asynchronous Transfer Mode(ATM). It implies that there are various service with difficult transmission rates and qualities in the wireless communication network. As a result, it is important to find out the ways to guarantee the Quality of Service(QoS) for each kind of traffic in wireless network. In this thesis, we propose an improved TCRM scheduling algorithms for transmission real-time multimedia data service in wireless ATM Networks. We appear real time multimedia scheduling policy that apply each different method to uplink and downlik to wireless ATM network. It can guarantee QoS requirements for each real time data and non-real time data. It also deals the fairness problem for sharing the scarce wireless resources. We solve fault of TCRM as inefficient problem of non-real data by using arbitrary transmission speed and RB(Reservation Buffer) through VC(Virtual Control) and BS(Base Station).

  • PDF

Design and Implementation of Authoring Tools for Multimedia Production (멀티미디어 제작을 위한 저작도구의 설계 및 구현)

  • Yoo Su-Mi;Baik Sung-Wook;Bang Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.4 no.1
    • /
    • pp.45-55
    • /
    • 2003
  • Due to the rapid development of information & communication technology under high performance computing environments, the multimedia production techniques have been applied to a variety of multimedia fields such as general banner advertisements including texts, images and animations, and the internet-broadcasting dealing with videos and sounds. This paper presents an authoring tool with main functions to setup events objects (image, animation, sound, button, area) and to setup action functions, so that non-experts can easily produce multimedia including images, sounds, animations and so on. The authoring tool implemented in Java can be applied to the CD-ROM title production as well as the web-site construction. We can expect that when this authoring tool is used for in multimedia production, both cost and time will be reduced due to its convenience and powerful functions. We have a future plan to integrate intelligent multimedia presentation techniques with the presented tool for the autonomous multimedia authoring works.

  • PDF

A Study on the System for the Computer Remote Control by Mobile (모바일 기반의 컴퓨터 원격제어 시스템에 관한 연구)

  • Song Eun-Jee;Bang Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.6 no.1
    • /
    • pp.49-54
    • /
    • 2005
  • The development of various contents has been accelerated with the explosive increase of the number of internet users, the rapid expansion of wireless internet service and the pervasion of mobile terminal. Mobile service is able to offer the elastic service to anyone regardless of the place and the time. With this characteristics, this service could be extended even to the pace which the access was limited with the existing line service. The purpose of this study is to propose a system which is able to make a remote control of computer by means of mobile as an example of the production of contents for such mobile service. With this system it could be identified what kind of job a user of PC is making by mobile phone regardless of the time and place. The functions such as termination reboot, messenger, macro execution, and timer are included. The greatest advantage of the system proposed in this paper is to protect the youth, who are making an access recklessly to the harmful site, by use of mobile at my time and any place.

  • PDF