• Title/Summary/Keyword: 사전등록

Search Result 208, Processing Time 0.03 seconds

Lamport OTP Extension using Overlapped Infinite Hash Chains (중첩된 무한 해시체인을 이용한 Lamport OTP 확장)

  • Shin, Dong Jin;Park, Chang Seop
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.11-17
    • /
    • 2018
  • Lamport's one-time password (OTP) was originally proposed to address the weaknesses of a simple password system: fixed password, pre-shared password. However, a main weakness of Lamport's OTP is that a root hash value of a new hash chain should be re-registered after consuming all the hash values since OTP generation is based on the finite hash chain. Several studies have been conducted to solve these drawbacks, but new drawbacks such as increased burden of proof for verifiers and verifiers have been exposed. In this paper, we propose and compare a novel OTP that overlaps several short hash chains instead of one long hash chain, which is the core of existing Lamport OTP, to solve the drawbacks while maintaining the advantages of Lamport.

  • PDF

Real-time multiple face recognition system based on one-shot panoramic scanning (원샷 파노라믹 스캐닝 기반 실시간 다수 얼굴 인식 시스템)

  • Kim, Daehwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.553-555
    • /
    • 2022
  • This paper is about a real-time automatic face recognition system based on one-shot panoramic scanning. It detects multiple faces in real time through a single panoramic scanning process and recognizes pre-registered faces. Instead of recognizing multiple faces within a single panoramic image, multiple faces are recognized using multiple images obtained in the scanning process. This reduces the panorama image creation time and stitching error, and at the same time can improve the face recognition performance by using the accumulated information of multiple images. It is expected that it can be used in various applications such as a multi-person smart attendance system with only a simple image acquisition device.

  • PDF

스마트 항로표지 수집정보의 연동 시험 시나리오 설계

  • 오세웅;김윤지;강동우;박세길;장준혁
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.311-313
    • /
    • 2023
  • 자율운항선박, 스마트 해상물류 등 미래 해상환경의 패러다임 변화에 대응하여 항로표지 현장시설을 고도화하고 신해상교통인프라 지능화 및 정보서비스 개발을 위해 스마트 항로표지 및 연계기술 개발 사업을 수행하고 있다. 본 사업의 1단계 연구 성과로 스마트 항로표지 통합플랫폼과 항로표지 서비스 성능시험환경이 구축되는데, 본 연구에서는 스마트 항로표지 통합 플랫폼에 설치된 각종 센서에서 수집된 정보를 육상의 성능시험환경으로 연동 시험에 관한 시나리오를 설계하였다. 스마트 항로표지 통합 플랫폼 및 장착되는 센서에 사전에 설계된 해양자원명을 부여하고 항로표지 정보관리시스템의 등록하는 절차를 제시하였고, 실시간으로 수집되는 항로표지 정보를 연동하여 빅데이터 분석 플랫폼으로 저장하고, 저장한 정보를 항로표지 서비스로의 적용과 활용에 관한 시나리오 설계 결과를 검토하였다.

  • PDF

Color-related Query Processing for Intelligent E-Commerce Search (지능형 검색엔진을 위한 색상 질의 처리 방안)

  • Hong, Jung A;Koo, Kyo Jung;Cha, Ji Won;Seo, Ah Jeong;Yeo, Un Yeong;Kim, Jong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.1
    • /
    • pp.109-125
    • /
    • 2019
  • As interest on intelligent search engines increases, various studies have been conducted to extract and utilize the features related to products intelligencely. In particular, when users search for goods in e-commerce search engines, the 'color' of a product is an important feature that describes the product. Therefore, it is necessary to deal with the synonyms of color terms in order to produce accurate results to user's color-related queries. Previous studies have suggested dictionary-based approach to process synonyms for color features. However, the dictionary-based approach has a limitation that it cannot handle unregistered color-related terms in user queries. In order to overcome the limitation of the conventional methods, this research proposes a model which extracts RGB values from an internet search engine in real time, and outputs similar color names based on designated color information. At first, a color term dictionary was constructed which includes color names and R, G, B values of each color from Korean color standard digital palette program and the Wikipedia color list for the basic color search. The dictionary has been made more robust by adding 138 color names converted from English color names to foreign words in Korean, and with corresponding RGB values. Therefore, the fininal color dictionary includes a total of 671 color names and corresponding RGB values. The method proposed in this research starts by searching for a specific color which a user searched for. Then, the presence of the searched color in the built-in color dictionary is checked. If there exists the color in the dictionary, the RGB values of the color in the dictioanry are used as reference values of the retrieved color. If the searched color does not exist in the dictionary, the top-5 Google image search results of the searched color are crawled and average RGB values are extracted in certain middle area of each image. To extract the RGB values in images, a variety of different ways was attempted since there are limits to simply obtain the average of the RGB values of the center area of images. As a result, clustering RGB values in image's certain area and making average value of the cluster with the highest density as the reference values showed the best performance. Based on the reference RGB values of the searched color, the RGB values of all the colors in the color dictionary constructed aforetime are compared. Then a color list is created with colors within the range of ${\pm}50$ for each R value, G value, and B value. Finally, using the Euclidean distance between the above results and the reference RGB values of the searched color, the color with the highest similarity from up to five colors becomes the final outcome. In order to evaluate the usefulness of the proposed method, we performed an experiment. In the experiment, 300 color names and corresponding color RGB values by the questionnaires were obtained. They are used to compare the RGB values obtained from four different methods including the proposed method. The average euclidean distance of CIE-Lab using our method was about 13.85, which showed a relatively low distance compared to 3088 for the case using synonym dictionary only and 30.38 for the case using the dictionary with Korean synonym website WordNet. The case which didn't use clustering method of the proposed method showed 13.88 of average euclidean distance, which implies the DBSCAN clustering of the proposed method can reduce the Euclidean distance. This research suggests a new color synonym processing method based on RGB values that combines the dictionary method with the real time synonym processing method for new color names. This method enables to get rid of the limit of the dictionary-based approach which is a conventional synonym processing method. This research can contribute to improve the intelligence of e-commerce search systems especially on the color searching feature.

Artificial Intelligence Algorithms, Model-Based Social Data Collection and Content Exploration (소셜데이터 분석 및 인공지능 알고리즘 기반 범죄 수사 기법 연구)

  • An, Dong-Uk;Leem, Choon Seong
    • The Journal of Bigdata
    • /
    • v.4 no.2
    • /
    • pp.23-34
    • /
    • 2019
  • Recently, the crime that utilizes the digital platform is continuously increasing. About 140,000 cases occurred in 2015 and about 150,000 cases occurred in 2016. Therefore, it is considered that there is a limit handling those online crimes by old-fashioned investigation techniques. Investigators' manual online search and cognitive investigation methods those are broadly used today are not enough to proactively cope with rapid changing civil crimes. In addition, the characteristics of the content that is posted to unspecified users of social media makes investigations more difficult. This study suggests the site-based collection and the Open API among the content web collection methods considering the characteristics of the online media where the infringement crimes occur. Since illegal content is published and deleted quickly, and new words and alterations are generated quickly and variously, it is difficult to recognize them quickly by dictionary-based morphological analysis registered manually. In order to solve this problem, we propose a tokenizing method in the existing dictionary-based morphological analysis through WPM (Word Piece Model), which is a data preprocessing method for quick recognizing and responding to illegal contents posting online infringement crimes. In the analysis of data, the optimal precision is verified through the Vote-based ensemble method by utilizing a classification learning model based on supervised learning for the investigation of illegal contents. This study utilizes a sorting algorithm model centering on illegal multilevel business cases to proactively recognize crimes invading the public economy, and presents an empirical study to effectively deal with social data collection and content investigation.

  • PDF

Log Collection Method for Efficient Management of Systems using Heterogeneous Network Devices (이기종 네트워크 장치를 사용하는 시스템의 효율적인 관리를 위한 로그 수집 방법)

  • Jea-Ho Yang;Younggon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.119-125
    • /
    • 2023
  • IT infrastructure operation has advanced, and the methods for managing systems have become widely adopted. Recently, research has focused on improving system management using Syslog. However, utilizing log data collected through these methods presents challenges, as logs are extracted in various formats that require expert analysis. This paper proposes a system that utilizes edge computing to distribute the collection of Syslog data and preprocesses duplicate data before storing it in a central database. Additionally, the system constructs a data dictionary to classify and count data in real-time, with restrictions on transmitting registered data to the central database. This approach ensures the maintenance of predefined patterns in the data dictionary, controls duplicate data and temporal duplicates, and enables the storage of refined data in the central database, thereby securing fundamental data for big data analysis. The proposed algorithms and procedures are demonstrated through simulations and examples. Real syslog data, including extracted examples, is used to accurately extract necessary information from log data and verify the successful execution of the classification and storage processes. This system can serve as an efficient solution for collecting and managing log data in edge environments, offering potential benefits in terms of technology diffusion.

Internationale Mobiliarsicherungsrechte an Luftfahrzeugausr$\ddot{u}$stung in EU (EU에 있어서 항공장비에 대한 국제동산담보권에 관한 소고)

  • So, Jae-Seon;Kim, Dae-Kyung
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.27 no.2
    • /
    • pp.29-65
    • /
    • 2012
  • Der neue strukturelle Ansatz der Kommbination eines Rahmen$\ddot{u}$bereinkommens und eines ausr$\ddot{u}$stungsspezifischen Sonderprotokolls bedingt einen neuen organisatorischen Anstz f$\ddot{u}$r die Zusammenarbeit zwischen internationalen Organisationen bei der Schaffung von internationalem Einheitsprivatrecht. So haben hier zwei internationale Organisationen gemeinsam die Verantwortung f$\ddot{u}$r einmultilaterales $\ddot{U}$bereinkommen $\ddot{u}$bernommen: auf der einen Seite UNIDROIT als die internationale Organisation, die generell f$\ddot{u}$r die Vereinheitlichung des Privatrechts kompetent ist; auf der anderen Seite ICAO als die f$\ddot{u}$r die private Luftfahrt zust$\ddot{a}$ndige internationale Organisation. Dieses neue, f$\ddot{u}$r die Luftfahrzeugausr$\ddot{u}$stung praktizierte organisatorische Modell eines joint venture zweier internationaler Organisation bei der Einheitsrechtsetzung, namlich die Betreuung eines allgemeinen privatrechtsvereinheitlichenden Rahmens$\ddot{u}$bereinkommens durch UNIDROIT und die Wahrnehmung der sektorspezifischen Belange in einem ausr$\ddot{u}$stungsspesifischen Sonderprotokoll durch die jeweils zust$\ddot{a}$ndige internationale Spezialorganisation, hat bereits f$\ddot{u}$r die Sektoren der Eisenbahn- und Weltraumausrustung Schule gemacht. Das in Kapstadt beschlossene v$\ddot{o}$lkervertragliche Regelungswerk hat erstmals ein einheitsrechtliches - grunds$\ddot{a}$atzlich weltweite Geltung anstrebendes - Sicherungsrecht geschafen. Dies kann f$\ddot{u}$r die Sachenrechtsintergration einen $\ddot{a}$hnlichen Durchbruch bedeuten, wis das Wiener UN-kaufrechts$\ddot{u}$bereinkommen von 1980 f$\ddot{u}$r das Schuldvertragsrecht. Voraussetzung daf$\ddot{u}$r ist allerdings die juristische Qualit$\ddot{a}$t und Praxisgerechtigkeit des Regelungswerkes und - insbesondere - das Funktionieren des Registersystems. Von wesentlicher Bedeutung f$\ddot{u}$r den Erfolg des $\ddot{U}$bereinkkommens wird auchsein, ob es Rechtssicherheit zu gew$\ddot{a}$hrleisten vermag.

  • PDF

A Study on Integrated Anti-counterfeiting Strategy to stop the forgery for Korean cosmetics in China (중국에서 한국 화장품의 위조근절을 위한 통합적 위조방지 전략 연구)

  • Koh, Joong Hyun
    • International Commerce and Information Review
    • /
    • v.18 no.4
    • /
    • pp.81-112
    • /
    • 2016
  • About 60 percent of cosmetic products sold in the dominant Taobao internet shopping mall proved recently to be counterfeit products made in China. This paper is to investigate the anti-counterfeiting strategies to clean up fake goods for Korean cosmetics which have been exported to China. Using the scienter rule the paper classified the forgery action for Korean cosmetics into four broad groups - counterfeit, piracy, illegally distributed product, and brand prior register. This paper suggested interior company's anti-counterfeiting strategies for each group, focusing on the construction for an integrated anti-counterfeiting system including consumer's rationality through the government cooperation between Korea and China.

  • PDF

Improvement of Microwave Water Surface Current Meter and its Commercialization (전자파표면유속계의 성능개선 및 실용화)

  • Kim, Young-Sung;Lee, Hyun-Seok
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2011.05a
    • /
    • pp.85-85
    • /
    • 2011
  • 홍수기에 안전하고 정확한 유량측정을 통하여 물관리에 필요한 기초수문자료를 확보하고자 한국수자원공사에서 1993년도부터 홍수유량측정기술 확보를 위한 연구를 시작하였다. 그간의 연구성과를 바탕으로 1999년도에 하천의 유속을 비접촉식으로 측정할 수 있는 홍수용 전자파표면유속계를 개발하여 특허등록하였고 그와 동시에 이의 상품화를 추진하여 2010년도까지 75대를 보급하여 실무에서 이용하고 있다. 이동식인 홍수용 전자파표면유속계를 바탕으로 2001년도에는 고정식 실시간 홍수유량측정측정시스템을 개발하여 특허등록하였고, 이 시제품을 현재 용담 수자원시험유역의 동향지점에서 시험운영하고 있다. 또한, 현장 유량측정실무자들의 홍수용 전자파표면유속계 개선요구에 따라 편각용 전자파표면유속계 시제품을 개발하였으며, 이는 임의의 한 지점에 설치한 한 대의 장비로 좌우 여러 측선의 유속을 동시에 측정할 수 있는 다점 측정기능을 갖도록 성능을 개선하였다. 이에 따라 홍수시 유량측정에 소요되는 시간이 줄어들어 신속하게 유량측정을 완료할 수 있는 계기를 마련하였다. 이와 더불어 유속측정 범위를 확장하여 홍수시의 고유속 뿐만 아니라 0.5 m/s 이하의 저유속까지 측정할 수 있는 범용 전자파표면유속계의 시제품을 추가로 개발하였다. 이 장비는 최저유속 0.03 m/s의 측정을 실내시험을 통하여 입증하였다. 범용 전자파표면유속계는 상품화 시제품의 개발을 목표로 기존 시제품의 현장시험을 통하여 현장적용상의 문제점에 대한 해결에 주력하였다. 첫째, 평갈수용 전자파표면유속계의 사용편의를 개선하기 위하여 소형화 및 경량화를 추진하였고, 이를 위하여 사용주파수를 기존의 10 GHz에서 24 GHz로 변경함으로써 $35{\times}35\;cm$ 크기의 기존안테나를 $22{\times}22\;cm$ 크기로 소형화하였으며 송수신부의 무게는 기존 18 kg에서 3.3 kg으로 혁신적으로 줄이는데 성공하였다. 이를 위하여 안테나는 기존의 반사형안테나에서 도파관슬롯배열안테나로 변경하였다. 둘째, 측정값의 안정화를 위하여 안테나의 특성을 개선하여 부엽(side-lobe) 레벨 30 dB 이하 그리고 전후방비(front-back ratio) 50 dB 이하로 개선하여 안테나가 지향하는 방향 이외의 위치에서 반사되는 불필요한 신호를 줄였다. 또한 적응형 이득제어(adaptive gain control)기법의 채택으로 미소 신호에 대한 안정적 측정 및 과다 신호에 대한 능동적 감쇄를 할 수 있도록 시스템을 구성하여 전 유속범위에 대한 안정적 측정을 가능토록 설계 및 제작하였다. 셋째, 자가점검 기능을 탑재하여 유속측정 전에 기기의 상태에 대한 self test기능을 통하여 측정자가 기기의 상태를 사전에 파악 가능토록함으로써, 기기 오작동에 대한 능동 대처할 수 있도록 하였다. 이외에도 저전력 회로설계를 통하여 배터리 사용시간을 확장하였고, 기존의 전자파표면유속계가 가지고 있던 방습 및 방수에도 내성을 갖는 제품으로 설계하였으며 스마트기기를 이용한 무선측정 및 세련된 디자인 등 사용자의 요구사항을 충분히 반영하였다.

  • PDF

Simple Credit Card Payment Protocols Based on SSL and Passwords (SSL과 패스워드 기반의 신용카드 간편결제 프로토콜)

  • Kim, Seon Beom;Kim, Min Gyu;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.563-572
    • /
    • 2016
  • Recently, a plenty of credit card payment protocols have been proposed in Korea. Several features of proposed protocols include: using passwords for user authentication in stead of official certificate for authenticity, and no need to download additional security module via ActiveX into user's devices. In this paper, we suggest two new credit card payment protocols that use both SSL(Security Socket Layer) as a standardized secure transaction protocol and password authentication to perform online shopping and payment. The first one is for the case where online shopping mall is different from PG(Payment Gateway) and can be compared to PayPal-based payment methods, and the second one is for the case where online shopping mall is the same as PG and thus can be compared to Amazon-like methods. Two proposed protocols do not require users to perform any pre-registration process which is separate from an underlying shopping process, instead users can perform both shopping and payment into a single process in a convenient way. Also, users are asked to input a distinct payment password, which increases the level of security in the payment protocols. We believe that two proposed protocols can help readers to better understand the recent payment protocols that are suggested by various vendors, and to analyze the security of their payment protocols.