• Title/Summary/Keyword: 번호이동성

Search Result 118, Processing Time 0.029 seconds

Call Scenarios for UPT Service in the IMT-2000MSC Based on Advanced Intelligent Network (차세대 지능망 기반의 IMT-2000 교환기에서이 UPT 서비스 호 시나리오)

  • Gwon, Sun-Ryang;Kim, Dae-Yeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.193-202
    • /
    • 1999
  • A promising telecommunication system so called IMT-2000 is forecasted to cover almost 50 percent of telecommunication services, which will be provided in the beginning of the year 2000. The system offers high quality service such as data, image, and video as well as voice. UPT, which offers the personal mobility, is recognized as an important service because we can bind a variety of wire or wireless networks as single number. This paper discusses the design of IMT-2000 MSC based on AIN and UPT service in the MSC. First, we propose the system structure of the IMP-2000 MSC, as a platform of UPT service implementation. Based on this, we define main functions and its blocks of the IMP-2000 MSC. Third, we present the structure of SSF and Its operational mechanism to support the IN services such as UPT. Finally, we present the detail UPT service implementation for the IMP-2000 MSC through the design of UPT call flows between software blocks, which are the minimum units, within the IMPt-2000 MSC.

  • PDF

A Design of Protocol Based on Smartcard for Financial Information to Protect in E-payment System (온라인 소액결제 시스템에서 금융정보 보호를 위한 스마트카드 기반의 프로토콜 설계)

  • Lee, Kwang-Hyoung;Park, Jeong-Hyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.11
    • /
    • pp.5872-5878
    • /
    • 2013
  • This study provides two channel structure and two factor authentication. First, a purchasing request by Internet and then user certification and a settlement approval process by mobile communication. Second, it support that proposal protocol utilize a partial factor value of stored in users smartcard, smart phone and password of certificate. Third, storage stability is improved because certificate store in smartcard. Finally, proposal protocol satisfy confidentiality, integrity, authentication, and non- repudiation on required E-commerce guideline. In comparative analysis, Efficiency of the proposal protocol with the existing system was not significantly different. But, In terms of safety for a variety of threats to prove more secure than the existing system was confirmed.

A Study of Authentication Scheme using Biometric-Based Effectiveness Analysis in Mobile Devices (모바일 장치에서 신체정보기반의 효용성 분석을 이용한 인증기법에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.795-801
    • /
    • 2013
  • As the life which existed only offline has changed into a life part of which is led online, it is an important problem to identify whether an online user is legitimate one or not. Biometric authentication technology was developed to identify the user more correctly either online or in offline daily life. Biometric authentication is a technology where a person is identified by his or her unique characteristics, and is highlighted as a next-generation authentication technology replacing password. There are various kinds of traits unique to each individual, and biometric authentication technologies drawing on such traits use various devices and algorithms. Firstly, this paper classified such various biometric authentication technologies, and analyzed the effects of them when they are applied on smartphone, smartwatch and M2M of the different devices platforms. Secondly, it suggested the effectiveness-based AIB(Authentication for Integrated Biometrics) authentication technique, a comprehensive authentication technique, which can be used in different devices platforms. We have successfully included the establishment scheme of the effectiveness authentication using biometrics.

Establishment of New Single Origin Plane Rectangular Coordinate System in Korea (한국의 새로운 단일원점 평면직각좌표계 설정)

  • Kim, Tae Woo;Yun, Hong Sik;Lee, Dong Ha;Kim, Gun Soo;Koh, Young Chang
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.31 no.3
    • /
    • pp.183-192
    • /
    • 2013
  • As a worldwide trend, the spatial information that is established by country, institution and purpose is integrated into the data with a single spatial reference to improve the data connectivity and usability. In this study, a new national single origin plane rectangular coordinate system was studied to efficiently respond to the changes in the spatial reference according to the introduction of a new national geodetic standard and to the demand of seamless data service in the spatial information sector. For this purpose, the Korean Peninsula was set as the projection region and the projection distortion in the projection region was analyzed. The projection parameters were defined to homogenize and minimize the projection distortion, and their standardization and registration on the international organizations were conducted. The study on the required optimal projection equation resulted in the Hooijberg projection equation and projection parameters (${\Phi}$, ${\lambda}$, K, N, E) resulted in $38^{\circ}N$ and $128^{\circ}E$ projection origin, and a scale factor of 0.99924. The proper false northing and easting were 700,000m N and 400,000m E, respectively, considering the introduction of country station index system.

A study on dehydration of rare earth chloride hydrate (염화 희토류 수화물의 탈수화에 관한 연구)

  • Lee, Tae-Kyo;Cho, Yong-Zun;Eun, Hee-Chul;Son, Sung-Mo;Kim, In-Tae;Hwang, Taek-Sung
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.10 no.2
    • /
    • pp.125-132
    • /
    • 2012
  • The dehydration schemes of rare earth (La, Ce, Nd, Pr, Sm. Eu, Gd, Y) chloride hydrates was investigated by using a dehydration apparatus. To prevent the formation of the rare earth oxychlorides, the operation temperature was changed step by step ($80{\rightarrow}150{\rightarrow}230^{\circ}C$) based on the TGA (thermo-gravimetric analysis) results of the rare earth chloride hydrates. A vacuum pump and preheated Ar gas were used to effectively remove the evaporated moisture and maintain an inert condition in the dehydration apparatus. The dehydration temperature of the rare earth chloride hydrate was increased when the atomic number of the rare earth nuclide was increased. The content of the moisture in the rare earth chloride hydrate was decreased below 10% in the dehydration apparatus.

Classification of Passing Vessels Around the Ieodo Ocean Research Station Using Automatic Identification System (AIS): November 21-30, 2013 (선박자동식별장치(AIS)를 이용한 이어도 종합해양과학기지 주변 통항 선박의 분류: 2013년 11월 21일~30일)

  • Hong, Dan-Bee;Yang, Chan-Su
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.17 no.4
    • /
    • pp.297-305
    • /
    • 2014
  • In this study, we installed the Automatic Identification System (AIS) receiver on the Ieodo Ocean Research Station (IORS) from November 21 to 30, 2013 in order to monitor marine traffic and fishery activity in the jurisdictional sea area. The collected AIS raw data consist of static data report (MMSI, IMO NO., Call Sign, Ship Name, etc.) and position information report (position, speed, course, etc.), and the developed program was applied to classify ships according to ship flag and type information. The nationalities are released from the first three-digit numbers (MID) of MMSI, but in general most of small ships do not send an exact ship flag through Class B type AIS, a simplified and low-power equipment. From AIS data with flag information, ships under the flag of China had the highest frequency and the second was Korean flag, while in ship type cargo and fishing vessels were dominant in sequence. As for the ships without flag information, we compared the tracks with others in order to estimate ship flags. It can be said that fleets of ships with Chinese frequently appear sail together for fisheries over the waters, because the unknown ships followed a similar moving pattern with Chinese fishing vessels.

Passwordless Protection for Private Key Using USIM Information (USIM 정보를 활용한 패스워드리스 방식의 개인키 보호 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.32-38
    • /
    • 2017
  • Despite the opinion that certificate is useless, half of the population in Korea (approx. 35 million) get an certificate, and use it for internet banking, internet shopping, stock trading, and so on. Most users store their certificates on a usb memory or smartphone, and certificates or passwords stored on such storage media can be easily attacked and used to disguise as legitimate users. Due to these security problem of certificate, a various authentication technologies has been proposed such as smartphone owner authentication using SMS, and a personal authentication using biometric authentication. However, a safe technique is not presented yet without user password, and certificate. In this paper, I proposed a method to secure certificate/private key without a user password using a combination of USIM card and smartphone's information. Even if a hacker gets the user password, the certificate, and the private key, he can not use the certificate. User do not need to remember complex password which is a combination of alphabetic / numeric / special characters, and use his certificate safely.

Proposal of security method using financial transactions and OTP (금융거래와 LFSR를 활용한 보안 방식 제안)

  • Kim, Ki-hwan;Parkn, Seong-hwan;Yu, Seo-yeong;Lee, Hoon-jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.41-44
    • /
    • 2019
  • Most of the financial transactions in modern society are traded online, and offline transactions can be made with cards and smart phones in addition to cash transactions. The advantage of monetary transactions on-line is that the purchasing process is simple, volume increases due to cash, and mobility degradation factors such as weight disappear. However, the online environment has no limitation on the physical distance, and there is a problem that if personal information is exposed to another person, it can be directly connected with financial loss. Of course, in most financial sectors, there is no problem because security policies are prepared for financial accidents. In this paper, we show that it is possible to prevent stealing of encrypted information and to operate with a simple structure by arbitrarily changing the fixed card number, expiration date, and CVC every time using OTP.

  • PDF

An Analysis of Civil Complaints about Traffic Policing Using the LDA Model (토픽모델링을 활용한 교통경찰 민원 분석)

  • Lee, Sangyub
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.4
    • /
    • pp.57-70
    • /
    • 2021
  • This study aims to investigate the security demand about the traffic policing by analyzing civil complaints. Latent Dirichlet Allocation(LDA) was applied to extract key topics for 2,062 civil complaints data related to traffic policing from e-People. And additional analysis was made of reports of violations, which accounted for a high proportion. In this process, the consistency and convergence of keywords and representative documents were considered together. As a result of the analysis, complaints related to traffic police could be classified into 41 topics, including traffic safety facilities, passing through intersections(signals), provisional impoundment of vehicle plate, and personal mobility. It is necessary to strengthen crackdowns on violations at intersections and violations of motorcycles and take preemptive measures for the installation and operation of unmanned traffic control equipments, crosswalks, and traffic lights. In addition, it is necessary to publicize the recently amended laws a implemented policies, e-fine, procedure after crackdown.

Software integrity verification method in POS system (POS시스템 내 소프트웨어 무결성 검증 방안)

  • Cho, Sung-A;Kim, Sung Hoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.987-997
    • /
    • 2012
  • A Point-of-Sales (POS) terminal manages the selling process by a salesperson accessible interface in real time. Using a POS system makes a business and customer management much more efficient. For these reasons, many store install POS terminal and used it. But it has many problem that stealing personal information by hacking and insider corruption. Because POS system stored payment information like that sales information, card valid period, and password. In this paper, I proposed software integrity verification technique in POS system based on White list. This method can prevent accidents that personal information leak by hacking and POS system forge and falsification. This proposed method provides software integrity, so it can prevent inside and outside threats in advance.