• Title/Summary/Keyword: 변조 방지

Search Result 239, Processing Time 0.021 seconds

Privacy protection and non-repudiation security mechanisms for logistics (프라이버시 보호 및 부인방지를 위한 물류 운송 보안 기법)

  • Choi, Min-Seok;Lee, Dong-Hoon;Kang, Min-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.695-698
    • /
    • 2012
  • 개인정보보호법이 제정 및 시행됨에 따라서 고유식별정보를 처리하는 경우 그 고유식별정보가 분실, 도난, 유출, 변조 또는 훼손 되지 않아야 한다[1]. 하지만 현재 운송업계의 택배 서비스를 이용 시 고유식별정보가 고스란히 노출 되어있으며, 위 변조 또한 가능하다. 이러한 주소, 성명, 전화번호 등 개인을 식별할 수 있는 개인정보를 악용하여, 명의 도용이나 피싱 등의 심각한 문제가 발생될 수 있다. 현재 택배 시스템은 발신, 수신, 배송에 대한 사고 및 논쟁 발생 시 그에 따른 증거자료가 부족하기 때문에 책임이 불명확하다. 이를 사전에 방지하기 위해서는 관련된 증거를 생성, 수집, 유지, 활용, 검사하는 절차와 그 역할을 담당할 신뢰된 제3의 기관이 필요하다. 본 논문에서는 현재의 택배 시스템을 점검해 보고 개인정보보호 차원에서의 해결방안을 모색하는 것과 발신, 수신, 배송의 부인방지 서비스 적용을 목표로 한다.

Research commuter terminal system using finger vein (지정맥을 이용한 출퇴근 단말기 시스템 연구)

  • Jeong, Dong-Jin;Cho, Jae-Hyun;Kim, Gwan-Hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.672-673
    • /
    • 2016
  • 최근 위변조에 의한 본인 인증 관련 사고가 급증하였으며 지문인식 밑 기타 다양한 인증시스템이 연구되고 있다. 최근에는 사람의 지정맥을 활용한 인증 시스템의 개발에 차세대 인증 시스템으로 연구가 활발히 진행되고 있다. 지정맥 인증 기술은 손가락 두 번째 마디 내 정맥을 말한다. 지정맥의 특성은 겉으로 보이지 않고 사람마다 패턴이 다르기 때문에 위 변조가 불가능하다. 뿐만아니라 지정맥 인증은 인증 절차가 간단하고, 보안성이 매우 높은 것으로 알려져 있다. 본 연구는 기존 지문을 이용한 출/퇴근 정보는 각종 관련 사고를 유발 시킬 수 있음을 방지하고자 지정맥을 이용한 본인 인증에 대한 보안성을 높이고, 각종 부당 취득 사고(추가근무)를 미연에 방지할 수 있으며, 지정맥을 이용해 출입/퇴근 시간을 기록하며 기록된 데이터로 지각/추가 근무 시간을 정확하게 측정 할 수 있다. 본 논문의 연구 결과물을 통해서 지정맥을 이용한 출/퇴근 정보를 데이터베이스/엑셀/텍스트에 저장하고, 기록된 정보를 이용해 지각/추가근무 시간을 정확하게 산출하여 각종사고를 미연에 방지할 수 있음을 확인하였다.

  • PDF

e-Cryptex: Anti-Tampering Technology using Physically Unclonable Functions (e-Cryptex: 물리적으로 복제 불가능한 기능을 활용한 역공학 방지 기법)

  • Jione Choi;Seonyong Park;Junghee Lee;Hyung Gyu Lee;Gyuho Lee;Woo Hyun Jang;Junho Choi
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.29 no.3
    • /
    • pp.23-40
    • /
    • 2024
  • Hardware attacks involve physical reverse engineering efforts to steal sensitive information, such as encryption keys and circuit designs. Encryption and obfuscation are representative countermeasures, but they are nullified if adversaries manage to find the key. To address this issue, we propose e-Cryptex, which utilizes a Physically Unclonable Function (PUF) as an anti-tampering shield. PUF acts as a random number generator and relies on unique physical variants that cannot be replicated or restored to enhance anti-tampering mechanisms. e-Cryptex uses PUF as a shield to protect the system's structure and generate the key. Tampering with the shield will result in the destruction of the key. This paper demonstrates that e-Cryptex meets PUF security requirements and is effective in detecting of tampering attempts that pierce or completely destroy the shield. Each board consistently generates the same key under normal conditions, while also showing key uniqueness across different boards.

A Study on the Characteristic Analysis of Passive Intermodulation among Highpower Radiostations (고출력 무선국간의 수동 상호변조시 특성분석에 대한 연구)

  • Kim Yung-Duk;Jo Hak-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.176-179
    • /
    • 2006
  • As spurious emission strength is normally measured at the antenna feeder, It is required that the measurement method on passive Intermodulation occurred on the latter part of antenna feeder be made. through the tests and the analyses of passive Intermodulation between radiostations of adjacent frequency bands, the possibility of occurrence of passive Intermodulation was testified in this study. The purpose of this study is to propose the measurement method of spurious emission strength in order to prevent the bad effect by passive Intermodulation.

A Study on Test Report Information Service Architecture for Preventing Forgery and Alteration in Defense Industry (군수품 시험성적서 위·변조 방지 시스템 아키텍처에 대한 연구)

  • Lee, Donghun;Jeon, Sooyune;Bae, Manjae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.43-51
    • /
    • 2016
  • Preventing the forgery and alteration of test reports is important, in order to maintain the reliability of military supplies. Based on a survey of reports on testing institutions and a case study of established electronic document systems in the public sector, we propose a system architecture, which helps prevent the forgery and alteration of test reports with legal force. The proposed architecture takes advantage of both the time stamp that records the time a document is received and a server synchronized with the testing institution. Using the proposed system architecture, the user is able to request a test and receive reports from the testing institution without delay. Also, a defense agency is able to conveniently prove the authenticity of the test reports and utilize the statistical data collected by the architecture. Therefore, we expect that the proposed system architecture will help defense agencies to prevent the forgery and alteration of test reports and ensure their reliability and quality.

A Development of Spam Mail Interception System using User Participation Verification System (UPVS를 이용한 스팸메일 차단시스템의 개발)

  • Ahn, Byeong-Tae;Kim, Min-Sun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.11b
    • /
    • pp.969-971
    • /
    • 2010
  • 전자우편(e-mail)은 매우 편리한 통신수단임에도 불구하고 무분별한 광고성 스팸메일(spam mail)의 침입과 타인의 메일을 가로채거나 변조가능성 등의 부작용 및 역기능으로 신뢰성에 문제가 되고 있다. 특히 기존의 스팸 방지 기술인 발송/수신 단계 스팸 방지 기술은 아직까지 스팸을 완벽하게 차단하지 못하고 있다. 따라서 본 논문에서는 기존의 스팸 방지 기술을 이용하여 1단계 차단을 거친 후 사용자 참여를 이용한 검증 시스템을 개발함으로써 스팸 차단 효율을 향상시키고자 한다.

  • PDF

Image Watermarking for Identification Forgery Prevention (신분증 위변조 방지를 위한 이미지 워터마킹)

  • Nah, Ji-Hah;Kim, Jong-Weon;Kim, Jae-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.552-559
    • /
    • 2011
  • In this paper, a new image watermarking algorithm is proposed which can hide specific information of an ID card's owner in photo image for preventing ID's photo forgery. Proposed algorithm uses the image segmentation and the correlation peak position modulation of spread spectrum. The watermark embedded in photo ensures not only robustness against printing and scanning but also sufficient information capacity hiding unique number such as social security numbers in small-sized photo. Another advantage of proposed method is extracting accurate information with error tolerance within some rotation range by using $2^h{\times}2^w$ unit sample space not instead $1{\times}1$ pixels for insertion and extraction of information. 40 bits information can be embedded and extracted at $256{\times}256$ sized ID photo with BER value of 0 % when the test condition is 300dpi scanner and photo printer with 22 photos. In conclusion, proposed algorithm shows the robustness for noise and rotational errors occured during printing and scanning.

A Study on the Next Generation Identification System of Mobile-Based using Anonymous Authentication Scheme (익명 인증기법을 이용한 모바일 기반 차세대 본인확인수단에 관한 연구)

  • Park, Jeong Hyo;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.511-516
    • /
    • 2013
  • The cases of identification forgery and counterfeiting are increasing under the current identification system, which was established based on social conditions and administrative environments over 20 years ago. This leads to an increase of various criminal acts including illegal loan using fake ID and a number of damages caused out of good intentions that result in interference with the operations of public organizations. In addition, according to the advancement of information society, privacy protection has emerged as an important issue. However, ID card exposes individuals' personal information, such as names, resident registration numbers, photos, addresses and fingerprints, and thus the incidents associated with illegal use of personal information are increasing continuously. Accordingly, this study aimed at examining the issues of ID card forgery/counterfeiting and privacy protection and at proposing a next-generation identification system to supplement such weaknesses. The top priority has been set as prevention of forgery/counterfeiting and privacy protection in order to ensure the most important function of national identification system, which is user identification.

Flicker Prevention Using Byte-Inversion in OOK Modulated Visible Light Data Transmission (OOK변조된 가시광 데이터전송에서 바이트반전을 이용한 플리커 방지)

  • Lee, Junho
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.579-585
    • /
    • 2020
  • In this study, we used byte-inversion transmission method to prevent the flicker of lighting source in a visible light data communication link. In the transmitter, the non-return-to-zero (NRZ) signal with 9.6 kbps was on-off keying (OOK) modulated with a 100 kHz square wave carrier and byte-inversion signal was added after each byte to make the average optical power of the light-emitting diode (LED) constant. In the receiver, we used a band-pass filter to eliminate the interference of the 120 Hz noise which was induced from the adjacent light lamps, and an OOK demodulator to recover the original NRZ signal This scheme is useful in constructing wireless data networks using the illumination of visible light lamps.

An Effective Protection Mechanism for SSL Man-in-the-Middle Proxy Attacks (SSL MITM 프록시 공격에 대한 효과적 방어방법)

  • Lim, Cha-Sung;Lee, Woo-Key;Jo, Tae-Chang
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.6
    • /
    • pp.693-697
    • /
    • 2010
  • In current e-commerce system, it happens that client's confidential information such as credit card numbers, pin numbers, or digital certificate may pass through a web proxy server or an altered proxy server without client's awareness. Even though the confidential information is encrypted and sent through SSL(Secure Sockets Layer) or TLS(Transport Layer Security) protocol, it can be exposed to the risk of sniffing by the digital certificate forgery at the proxy server, which is called the SSL MITM(Man-In-The-Middle) Proxy attack. In this paper, current credit card web-payment systems, which is weak at proxy information alternation attack, are analyzed. A resolution with certificate proxy server is also proposed to prevent the MITM attack.