• Title/Summary/Keyword: 사생활보호

Search Result 181, Processing Time 0.023 seconds

Hash-Chain based Micropayment without Disclosing Privacy Information (사생활 정보가 노출되지 않는 해쉬체인 기반 소액지불시스템)

  • Jeong Yoon-Su;Baek Seung-Ho;Hwang Yoon-Cheol;Lee Sang-Ho
    • The KIPS Transactions:PartD
    • /
    • v.12D no.3 s.99
    • /
    • pp.499-506
    • /
    • 2005
  • A hash chain is a structure organized by hash function with high speed in computation. Systems using the hash chain are using extensively in various cryptography applications such as one-time passwords, server-supported signatures and micropayments. However, the most hash chain based on the system using pre-paid method provides anonymity but has the problem to increase payment cost. In this paper, we propose a new hash chain based on the micropayment system to keep user anonymity safe through blind signature in the withdrawal process of the root value without disclosing privacy information, and to improve efficiency by using secret key instead of public key in the system without the role of certificate.

A Study on Key Recovery System model for Privacy (프라이버시 보호를 위한 키 복구 시스템 모델에 대한 연구)

  • Kook, Sang-Jin;Lim, Yang-Kyu;Won, Dong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.907-910
    • /
    • 2001
  • 사생활 침해라는 문제와 법 집행 능력의 보장이라는 문제점 사이에서 논쟁 중인 키 복구 기술은 다양한 관점에서 연구되고 있다. 본 논문에서는 여러 가지 방식의 키 복구 시스템에 대하여 고찰함과 동시에 키 캡슐화 방식을 사용하는 키 복구 시스템 모델은 제안한다. 또한 이 모델은 사생활 침해 문제에 좀더 효과적으로 대처하도록 이루어진 키 복구 시스템 모델이다.

  • PDF

위치정보의 보호 및 이용 등에 관한 법률

  • Korean Associaton of Information & Telecommunication
    • 정보화사회
    • /
    • s.175
    • /
    • pp.60-61
    • /
    • 2005
  • 정부는 지난 2005년 1월 27일 위치정보의 유출, 오.남용으로부터 사생활의 비밀 등을 보호하고 위치정보의 안전한 이용환경을 조성하여 위치정보 이용 활성화 도모를 위해 법률을 제정한 바 있다. 정통부는 이 법률의 위임사항 및 시행에 필요한 사항을 규정하기 위해 하위법령 제정(안)을 마련했다.

  • PDF

Implementation of Video Security Telephony System on Davinci Processor (다빈치프로세서 기반 영상 보안 통화 시스템 구현)

  • Kim, Joon-Cheol;Ghimire, Deepak;Lee, Joon-Whoan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06c
    • /
    • pp.433-436
    • /
    • 2011
  • 영상 통화 시스템을 설치한 장소에서 대두되는 문제점은 문서 유출 등의 보안문제와 사생활 침해가 발생하는 것이다. 본 논문에서는 실시간 영상 통화를 하면서 문서유출 및 보안사항에 위배되거나 사생활이 침해되는 영상이 발견된 즉시 영상 통화를 중단시켜 보안유지 및 사생활 보호를 위한 다빈치 기반 실시간 영상 통화 시스템을 개발하고자한다. 구현 된 시스템은 실시간 처리가 가능하고 영상통화 시 문서 유출 등 보안문제가 발생하는 영상을 검출하는 알고리즘을 개발하여 다빈치보드에 포팅하고 여러 가지 보안사항에 대한 실험에 적용하였다.

Improvement of AACS Security Framework with Access Control to Personal Contents (개인 콘텐츠 접근제어 기능을 갖는 개선된 AACS 보안 Framework)

  • Kim, Dae-Youb
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.167-174
    • /
    • 2008
  • As both a digital camera and a digital camcorder are popularized in recent years, UCC created by general users is also popularized. Unfortunately, according to that, the lack of privacy is also increasing more and more. The UCC is saved on the recordable media(Media) like DVD and deposited personally as well as distributed through Internet portal service. If you use Internet portal service to put up your contents, you can partially prevent the violation of privacy using security technologies such as authentication and illegal copy protection offered by internet portal service providers. Media also has technologies to control illegal copy. However, it is difficult to protect your privacy if your Media having personal contents is stolen or lost. Therefore, it is necessary to develope an additional security mechanism to guarantee privacy protection when you use Media. In this paper, we describe AACS framework for Media Security and propose improved AACS framework to control the access to personal contents saved on Media.

블라인드 장착에 따른 실내 공기 순환 연구

  • Nam, Do-U;Hwang, Jae-Min
    • Proceeding of EDISON Challenge
    • /
    • 2016.03a
    • /
    • pp.625-627
    • /
    • 2016
  • 본 논문은 EDISON CFD의 전처리기, eMEGA를 이용하여 격자를 생성하고, 2차원 정렬 격자 기반 비압축성 해석자를 이용하여 유동해석을 진행한 뒤 후처리기, eDAVA를 통해 유동선을 그려 블라인드 장착에 따른 실내 공기 순환에 대한 연구 내용을 담고 있다. 본 연구는 시중에 판매중인 사생활 보호용 블라인드를 포함, 여러 블라인드의 장착 여부에 따라 실내 내부 공기 순환의 양상을 확인하고 실제로 블라인드 장착 시 실내환기에 어떤 영향을 주는지 유동 선을 통해 확인해 보았다. 블라인드 미장착시, 실내 전체적으로 공기가 고루 순환되는 모습을 보였으며, 블라인드 장착 시 대체로 블라인드 형태에 따라 유동이 이동하는 것을 볼 수 있었다. 본 연구는 사생활 보호와 환기 효율성의 관점에서의 소비자 선택권에 영향을 미치는 효과를 가져 올 것으로 보인다.

  • PDF

Drones flying and violations of privacy laws, such as riskon (드론비행과 사생활침해 등 법률위반 위험성 연구)

  • Jeong, Soonchae;Mfitumukiza, Joseph;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.1
    • /
    • pp.22-27
    • /
    • 2017
  • In this paper, A heightened interest in the latest drone, yet steady increase in the field to exploit them. The next market is expected to be vastly improved, and use drone also increasingly will be strengthened. But also not a few side effects of him. In order to use safer and more commonly a drone safety and privacy protection, and there are many issues that need to be considered. Violating privacy laws, such as relations caused by the drone flight and review this study ways to resolve the breach. The flight due to a draw at peace with human life and behavior and enjoy it, but this problem created by new outbreak.

Legal Issues Regarding the Civil Injunction Against the Drone Flight (토지 상공에서의 드론의 비행자유에 대한 제한과 법률적 쟁점)

  • Shin, Hong-Kyun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.35 no.2
    • /
    • pp.75-111
    • /
    • 2020
  • The civilian drone world has evolved in recent years from one dominated by hobbyists to growing involvement by companies seeking to profit from unmanned flight in everything from infrastructure inspections to drone deliveries that are already subject to regulations. Drone flight under the property right relation with the land owner would be deemed legal on the condition that expeditious and innocent passage of drone flight over the land be assured. The United Nations Convention on the Law of the Sea (UNCLOS) enshrines the concept of innocent passage through a coastal state's territorial sea. Passage is innocent so long as it is not prejudicial to the peace, good order or security of the coastal state. A vessel in innocent passage may traverse the coastal state's territorial sea continuously and expeditiously, not stopping or anchoring except in force majeure situations. However, the disturbances caused by drone flight may be removed, which is defined as infringement against the constitutional interest of personal rights. For example, aggressive infringement against privacy and personal freedom may be committed by drone more easily than ever before, and than other means. The cost-benefit analysis, however, has been recognjzed as effective criteria regarding the removal of disturbances or injunction decision. Applying that analysis, the civil action against such infringement may not find suitable basis for making a good case. Because the removal of such infringement through civil actions may result in only the deletion of journal article. The injunction of drone flight before taking the information would not be obtainable through civil action, Therefore, more detailed and meticulous regulation and criteria in public law domain may be preferable than civil action, at present time. It may be suitable for legal stability and drone industry to set up the detailed public regulations restricting the free flight of drone capable of acquiring visual information amounting to the infrigement against the right of personal information security.

Personal Information Protection in Digital Era -Reviewing Personal information protection Act- (디지털시대의 개인정보보호 - 새로운 개인정보보호법을 중심으로)

  • Yoo, Jong-Lak
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.81-90
    • /
    • 2011
  • Companies using internet as a kind of marketing means are increasing rapidly according to the expansion trend of e-commerce through internet and consumers also use internet as the common means of purchasing necessary articles. E-commerce using internet has advantages without limitation to temporal and spatial accessibility and general consumers and unspecified individuals also use internet to purchase their goods as well as general transactions such as advertisement, contract, payment and claim settlement. 'In the age of information, invasion of personal information resulted from the development of information and communication technology is one of the greatest problems all the countries in the world face. Therefore, Personal information protection Act is one of basic laws to protect personal information and rights and it is also an essential law in the age of information. In that sense, new Personal information protection Act is the advanced act containing various items to minimize the national damages from the leaking of private information and protect right to informational self-determination in the information society. It is expected that this legislation contributes to reduce the leaking of private information, enhance the level of privacy protection and develop privacy related industries. However, active participation of all members of our society and improvement of their recognition should be preceded for the rational and legal use of private information and the settlement of its protection culture. While the purpose of Personal information protection Act can protect privacy from collection, leaking, misuse and abuse of private information and enhance national interests and protect personal dignity and value, it also must perform the roles of balancing privacy protection with liberal information flow.