• Title/Summary/Keyword: 사용자 보호

Search Result 2,737, Processing Time 0.028 seconds

An Anonymity Control Electronic Cash System with Divisible using KCDSA (KCDSA를 이용한 분할성 기능을 가진 익명성 제어 전자화폐 시스템)

  • Jang, Seok-Cheol;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.757-764
    • /
    • 2001
  • The increase of electronic commerce leads to the increasing attention to the way customers pay and a large number of researches on payment system. Recently many researches on a system which provides anonymity in order to protect user\`s privacy have been carried out. And some potential problems from that system are being reviewed by anonymity control system. This thesis will include the following. First, I want to analyze the old scheme related to divisible and examine general ideas of anonymity control. Second, I propose a new blind signature in addition to KCDSA, the standard digital signature in Korea. The last one I want to propose is a new electronic cash system with the divisible for more efficient use of electronic cash which can control anonymity with the help of trustee.

  • PDF

The Implementation of Policy Management Tool Based on Network Security Policy Information Model (네트워크 보안 정책 정보 모델에 기반한 정책 관리 도구의 구현)

  • Kim, Geon-Lyang;Jang, Jong-Soo;Sohn, Sung-Won
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.775-782
    • /
    • 2002
  • This paper introduces Policy Management Tool which was implemented based on Policy Information Model in network suity system. Network security system consists of policy terror managing and sending policies to keep a specific domain from attackers and policy clients detecting and responding intrusion by using policies that policy server sends. Policies exchanged between policy server and policy client are saved in database in the form of directory through LDAP by using Policy Management Tool based on network security policy information model. NSPIM is an extended policy information model of IETF's PCIM and PCIMe, which enables network administrator to describe network security policies. Policy Management Tool based on NSPIM provides not only policy management function but also editing function using reusable object, automatic generation function of object name and blocking policy, and other convenient functions to user.

Design and Implementation of File protection system based on Windows 2000 system (Windows 2000기반의 파일 보호 시스템 설계 및 구현)

  • Lee, Nam-Hun;Yu, Sin-Geun;Sim, Yeong-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.741-756
    • /
    • 2001
  • With the development of computer systems, there has been a sharp increase in the threats on these systems including attacks by malicious programs such as virus, vandal, etc. Currently virus vaccines are widely used to thwart these threats, but they have many weaknesses. They cannot guard against unknown threats and sometimes, they also cannot detect the existence of malicious programs before these malicious programs make any destructive results. For lack of an efficient security model, the existing security programs have the problem that they raise many false-positive alarms in spite of normal action. So it becomes very important to develop the improved security program that can make up for the weakness of the existing computer security program and can detect many threats of malicious programs as early as possible. In this paper we describe the design of an improved security model and the implementation of a security program that can filter and handle the threats on computer systems at the kernel level in real time.

  • PDF

Designing a Highly Sensitive Eddy Current Sensor for Evaluating Damage on Thermal Barrier Coating (열차폐코팅의 비파괴적 손상 평가를 위한 고감도 와전류 센서 설계)

  • Kim, Jong Min;Lee, Seul-Gi;Kim, Hak Joon;Song, Sung Jin;Seok, Chang Seong;Lee, Yeong-Ze
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.36 no.3
    • /
    • pp.202-210
    • /
    • 2016
  • A thermal barrier coating (TBC) has been widely applied to machine components working under high temperature as a thermal insulator owing to its critical financial and safety benefits to the industry. However, the nondestructive evaluation of TBC damage is not easy since sensing of the microscopic change that occurs on the TBC is required during an evaluation. We designed an eddy current probe for evaluating damage on a TBC based on the finite element method (FEM) and validated its performance through an experiment. An FEM analysis predicted the sensitivity of the probe, showing that impedance change increases as the TBC thermally degrades. In addition, the effect of the magnetic shield concentrating magnetic flux density was also observed. Finally, experimental validation showed good agreement with the simulation result.

A Study on RFID System for Accessing Multiple Objects Using Encrypted ID (암호화된 ID를 이용한 다중 객체 접근 방식의 RFID 시스템 연구)

  • Jung, Jong-Jin;Kim, Ji-Yeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.2
    • /
    • pp.80-87
    • /
    • 2008
  • RFID systems are being studied and developed in the area of the industry and marketplace. Recently RFID systems are core element of the ubiquitous technologies in individual life and industry. However, RFID systems often cause some serious problems such as violation of privacy and information security because their contactless devices communicate each other by radio frequency In this paper, we propose multiple objects RFID tag scheme including tag structure and authentication protocol. The proposed RFID tag structure maintains several object IDs of different applications in a tag memory. The tag structure allows those applications to access object IDs simultaneously. The authentication protocol for multiple objects tag is designed ta overcome the problems of security and privacy. The protocol has robustness against various attacks in low cost RFID systems. We evaluate the efficiency of proposed scheme and compare security of our scheme with several traditional schemes.

  • PDF

Design and Implementation of DRM Proxy for DRM Cloud Service (DRM 클라우드 서비스를 위한 DRM Proxy 설계 및 구현)

  • Lee, Hyejoo;Heo, Changsoo;Seo, Changho;Shin, Sang Uk
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.553-560
    • /
    • 2013
  • The development of cloud computing technology and smart devices have increasingly been expanding the influence in various fields. Although DRM(Digital Rights Management) is a very important technology for secure content services, interoperability among DRM technologies must be addressed in order to provide the service without the constraints of time and place on various smart devices. In this paper, we study DRM Cloud which provides DRM functions as a service in cloud computing environment, and address interoperability problem by providing different DRM technologies as a cloud service. That is, when a user wants to play contents with the different DRM technologies on a smart device, the usage of the content is controlled by providing the corresponding DRM module and function as SaaS from DRM cloud. To do this, we define the functions and structure of DRM Proxy which performs smooth service call and provision between DRM cloud user and DRM cloud, and finally we describe the experimental implementation result.

Research on Development and Evaluation Tests of Movable Catenary System Using Rigid Bar for DC Feeding System (강체전차선을 이용한 직류전기철도용 이동식 전차선 시스템 개발 및 성능검증에 관한 연구)

  • Park, Seong-Hee;Jang, Dong-Uk;Kang, Seung-Wook
    • Journal of the Korean Society for Railway
    • /
    • v.20 no.3
    • /
    • pp.356-364
    • /
    • 2017
  • The process of inspecting electric railway vehicles is complicated and these vehicles accompany a risk of safety accidents. This developed system will be a great help in simplifying the shunting process and be very useful in terms of ensuring safety and providing user convenience. In this paper, the results of performance evaluation tests are studied on a movable catenary system for railway vehicles that secured mechanical durability, convenience, and operator safety by applying a specific rigid bar catenary of an existing mobile train line. We presented an analysis of the basic characteristics for site installation including sorting. In conclusion, this developed system was obtained in good results through durability test, durable mechanical load test and safety test in require specifications.

Design of a Privacy-based Confirmed Case Contact Notification System in the With-Corona Era (With-Corona 시대에 프라이버시 보호 기반의 확진자 접촉 여부 알림 시스템 설계)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.138-143
    • /
    • 2021
  • As of this moment, we are tracing people who are closed contact with Covid-19 patients and trying to block the spread of Covid-19 through diagnostic tests. However, the incubation period of the confirmed case is two weeks, and it takes a lot of human resources, time, and money to trace the routes of the confirmed case. In particular, as the number of confirmed cases have been increasing, the cost for finding closed contacts and blocking them in advance exponentially have almost reached the limitation of the budget. In finding closed contacts, all citizens must record an electronic access list every time they visit an amenities such as a store or a restaurant. This is likely the invasion of the privacy of personal location information. In this study, we designed a system that keeps one's location in real time, it will download the movement information of the confirmed case which is collected by KDCA, and it will notify the user when there is an overlap. Moreover, then guide for diagnostic test in advance will be used. The proposed method can solve the difficulty of recording in an electronic access list when visiting a store, and it can block infringement of privacy without providing personal information from KDCA.

The effect of Korean Employment Protection Legislation on Eliminating Discrimination on Non-Regular workers (비정규직 보호법의 차별 시정 효과)

  • Ko, Hyejin
    • 한국사회정책
    • /
    • v.25 no.4
    • /
    • pp.125-161
    • /
    • 2018
  • This article aims to investigate the impact of Korean employment protection legislation that has implemented since 2007 on eliminating discrimination on non-regular worker's wage and social security. It is used the panel Tobit model reflecting the variation of implementation time according to the size of establishments. Although the employment protection laws for non-regular workers have implemented, the wage gap and discrimination in social security for non-regular workers have continued. Of course, the discrepancies on wage and social security were founded not only between regular and non-regular workers but also within non-regular workers. For reducing the discriminations, this study proposes to restrict the reason for justifying discrimination, and the introduction of a new approach to accessing the discrimination and complimentary credit system. Besides, this study suggests to actively review the strengthening of regulations on the use of non-regular workers.

NFC based Smart Waiting Number Ticket Issuing System (NFC를 이용한 스마트 대기표발권시스템 설계)

  • Kang, Su-kyoung;Kim, Chang-jae;Lee, Nam-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.940-943
    • /
    • 2014
  • Currently in many places, such as a business or government office, customers are spending many time after issuing waiting number ticket. To improve this, this paper proposes new design of waiting number ticket issuing system which provides real-time notification service with smartphone. This system add the NFC tag to the issuing machine in order to input the information of waiting and increase the convenience of users and provides an integrated management of corporate and government information using a waiting number ticket. Therefore, it is possible to efficiently use the waiting time than when using the existing ticketing system by taking advantage of this system, and appears to be to reduce costs and environmental protection, by not using the paper ticket. Also this system can be used to improve business processes through the application Waiting Number Ticket ticket cancellation feature.

  • PDF