• Title/Summary/Keyword: 스마트안전관리

Search Result 564, Processing Time 0.029 seconds

ADAM: An Approach of Digital Asset Management system (사후 디지털 자산 관리 시스템에 관한 연구)

  • Moon, Jeong-Kyung;Kim, Hwang-Rae;Kim, Jin-Mook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1977-1982
    • /
    • 2012
  • Social network service user or smart phone user is very convenient, because there are supported to various social network services such as Facebook, Twitter, Flickr, Naver blog, Daum blog, and so on. This Is very good because they store multimedia datas that user wants to cyber space if they want it conveniently. But, if social network user increases, space of cloud storage increases sharply, and when social network service used user dies then they have big problems such as they did not know in existing. Typically, problems of notice, dissemination, storage, and inheritance for digital asset can happen representatively. Now, If successor send relation information of he and his dead user that is family to social network service provider then service provider checks it. And successor may can use, save and only backup are possible after confirm of family relation truth. Therefore, We wish to propose ADAM that successor may can inherit digital assets easily, conveniently, and safely in this paper. If someone use ADAM, successor submits information about dead and own family relation in the third certification party. And ADAM can be inherited freely and conveniently about digital assets as general assets passing through right inheritance process.

A Design and Development of Secure-Coding Check System Based on E-Government Standard Framework for Convergence E-Government Service (융복합 전자정부 서비스를 위한 전자정부 표준프레임워크 기반 시큐어코딩 점검 시스템 설계 및 개발)

  • Kim, Hyungjoo;Kang, Jungho;Kim, Kyounghun;Lee, Jaeseung;Jun, Moonseog
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.201-208
    • /
    • 2015
  • Recently computer, smart phone, medical devices, etc has become used in a variety of environments as the application fields of IT products have become diversification. Attack case of abuse of software security vulnerabilities is on the increase as the application fields of software have become diversification. Accordingly, secure coding program is of a varied but history management, updating, API module to be vulnerable to attack. Thus, this paper proposed a materialization of CMS linked system to enable check the vulnerability of the source code to content unit for secure software development, configuration management system that interwork on the transmission module. Implemented an efficient coding system secure way that departmentalized by the function of the program and by analyzing and applying secure coding standards.

A Study on Integrated ID Authentication Protocol for Web User (웹 사용자를 위한 통합 ID 인증 프로토콜에 관한 연구)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.197-205
    • /
    • 2015
  • Existing Web authentication method utilizes the resident registration number by credit rating agencies separating i-PIN authentication method which has been improved authentication using resident registration number via the real name confirmation database. By improving the existing authentication method, and it provides the available integrated ID authentication on Web. In order to enhance safety, the proposed authentication method by encrypting the user of the verification value, and stores the unique identifier in the database of the certificate authority. Then, the password required to log in to the Web is for receiving a disposable random from the certificate authority, the user does not need to remember a separate password and receives the random number by using the smart phone. It does not save the user's personal information in the database, and it is easy to management of personal information. Only the integration ID needs to be remembered with random number on every time. It doesn't need to use various IDs and passwords if you use this proposed authentication methods.

Encapsulation of SEED Algorithm in HCCL for Selective Encryption of Android Sensor Data (안드로이드 센서 정보의 선택적 암호화를 지원하는 HCCL 기반 SEED 암호의 캡슐화 기능 연구)

  • Kim, Hyung Jong;Ahn, Jae Yoon
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.2
    • /
    • pp.73-81
    • /
    • 2020
  • HCCL stands for Heterogenous Container Class Library. HCCL is a library that allows heterogeneous types of data to be stored in a container as a single record and to be constructed as a list of the records to be stored in database. With HCCL, encryption/decryption can be done based on the unified data type. Recently, IoT sensor which is embedded in smartphone enables developers to provide various convenient services to users. However, it is also true that infringement of personal information may occur in the process of transmitting sensor information to API and users need to be prepared for this situation in some sense. In this study, we developed a data model that enhances existing security using SEED cryptographic algorithms while managing information of sensors based on HCCL. Due to the fact that the Android environment does not provide permission management function for sensors, this study decided whether or not to encrypt sensor information based on the user's choice so that the user can determine the creation and storage of safe data. For verification of this work, we have presented the performance evaluation by comparing with the situation of storing the sensor data in plaintext.

Device Identification System for Corporate Internal Network Visibility in IoT Era (IoT 시대 기업 내부 네트워크의 가시성 확보를 위한 단말 식별 시스템 설계)

  • Lee, Dae-Hyo;Kim, Yong-Kwon;Lee, Dong-Bum;Kim, Hyeob
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.51-59
    • /
    • 2019
  • In this paper, we propose a device identification system for network visibility that can maintain the secure internal network environment in the IoT era. Recently, the area of enterprise network is getting huge and more complicated. Not only desktops and smartphones but also business pads, barcode scanners, APs, Video Surveillance, digital doors, security devices, and lots of Internet of Things (IoT) devices are rapidly pouring into the business network, and there are highly risk of security threats. Therefore, in this paper, we propose the device identification system that includes the process and module-specific functions to identify the exploding device in the IoT era. The proposed system provides in-depth visibility of the devices and their own vulnerabilities to the IT manager in company. These information help to mitigate the risk of the potential cyber security threats in the internal network and offer the unified security management against the business risks.

A Study on the Collaboration Learning Effect of BIM/IPD Through Constructivism Learning Method (구성주의 학습 방법을 통한 BIM/IPD협업 학습효과에 대한 연구)

  • Jin, Juan;Choi, Jungsik;Kim, Inhan
    • Korean Journal of Construction Engineering and Management
    • /
    • v.22 no.5
    • /
    • pp.3-16
    • /
    • 2021
  • The purpose of this study is to verify the practical effectiveness of the constructivism education theory in building information modeling (BIM)/integrated project delivery (IPD) collaboration education by determining education methods that are most relevant to collaboration in the interaction process. We propose a BIM training model that enhances students' satisfaction in class and collaboration. We aim to identify interrelationships between BIM collaboration education and constructivism theories, examining constructivism methods in BIM/IPD classes to discern which are the most suitable for improving and enhancing collaboration and the proposed education model.

Proposal of Network Security Solution based on Software Definition Perimeter for Secure Cloud Environment (안전한 클라우드 환경을 위한 소프트웨어 정의 경계 기반의 네트워크 보안 솔루션 제안)

  • Cha, Wuk-Jae;Shin, Jae-In;Lee, Dong-Bum;Kim, Hyeob;Lee, Dae-Hyo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.61-68
    • /
    • 2018
  • As the smartphone and mobile environment develop, the time and space constraints for individual work performance are disappearing. Companies can reduce costs and expand their business quickly through cloud computing. As the use of various cloud expands, the boundaries of users, data, and applications are disappearing. Traditional security approaches based on boundaries (Perimeter) are losing their utility in the cloud environment. This paper describes the limitations of existing network access control (NAC) in a cloud environment and suggests network security technology that complements it. The study explains the SDP and combines SDP(Software Defined Perimeter) to overcome the limitations of NAC, while at the same time explaining its role as a new framework for supporting the cloud environment. The new framework proposed in this paper suggests a software-based network security solution that supports physical and software parts, providing identity-based access control, encrypted segment management, and dynamic policy management, not IP-based.

A Study of the Decision Making System in adopting Off-Site Construction Method in the Initial Stage Considering the Building Project Characteristics -Focused on Structure Work of Apartment Housing- (건축 프로젝트 특성을 고려한 초기 단계에서의 Off-Site Construction 공법 도입 여부 의사 결정 시스템 개발 - 공동주택 골조공사 중심으로 -)

  • Lee, Sungho;Cha, Heesung;Son, Bosik
    • Korean Journal of Construction Engineering and Management
    • /
    • v.23 no.1
    • /
    • pp.89-97
    • /
    • 2022
  • Recently, various problems such as reduced productivity, insufficient inflow of skilled manpower, reduced quality, and concerns about increasing safety accidents have appeared in the domestic construction industry. Stakeholder of construction project are considering the Off-Site Construction (OSC) method rather than the conventional on-site construction as an alternative. Despite the importance of decision making in the early stage of the adoption of OSC, there is a lack of methodologies for rational decision making. In this study, a decision making system has been developed to derive the final construction cost score by deriving the project characteristics, selecting the construction difficulty index, and developing a cost model for each construction method alternatives to calculate the standard construction cost. Using this system, the OSC method can be effectively evaluated in terms of its feasibility in the early stage of construction

Transportable House with Hybrid Power Generation System (하이브리드 발전 시스템을 적용한 이동식 하우스)

  • Mi-Jeong Park;Jong-Yul Joo;Eung-Kon Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.1
    • /
    • pp.205-212
    • /
    • 2023
  • In the modern society, the extreme weather caused by climate change has brought about exceptional damage in succession over the world due to the use of fossil fuels, and infectious diseases such as COVID-19 worsen the quality of human life. It is urgently necessary to reduce green-house gas and use new renewable energy. The global environmental pollution should be decreased by reducing the use of fossil fuels and using new renewable energy. This paper suggests a system which can function for the environment of four seasons, safety and communication, through the photovoltaic power-based intelligent CCTV, internet and WiFi, and cooling and heating systems, and can optimally manage power, through the real-time monitoring of the production and the consumption of the photovoltaic power. It suggests a hybrid generation system supporting diesel generation without discontinuation in the case of emergency such as system power outage caused by cold waves, typhoons and natural disasters in which the photovoltaic power generating system cannot be used.

Development of u-Health Care System for Dementia Patients (치매환자를 위한 u-Health Care 시스템 개발)

  • Shin, Dong-Min;Shin, Dong-Il;Shin, Dong-Kyoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.12
    • /
    • pp.1106-1113
    • /
    • 2013
  • For patients who have senile mental disorder such as dementia, quantity of excercise and amount of sunlight are important clue for dose and the treatment. Therefore, monitoring health information of daily life is necessary for patients' safety and healthy life. Portable & wearable sensor device and server configuration monitoring data are needed to provide these services for patients. Watch-type device(smart watch) which patients wear and server system are developed in this paper. Smart watch developed includes GPS, accelerometer and illumination sensor, and can obtain real time health information by measuring the position of patients, quantity of exercise and amount of sunlight. Server system includes the sensor data analysis algorithm and web server that doctor and protector can monitor through sensor data acquired from smart watch. The proposed data analysis algorithm acquires quantity of exercise information and detects step count in patients' motion acquired from acceleration sensor and to verify this, the three cases with fast pace, slow pace, and walking pace show 96% of the experimental result. If developed u-Healthcare System for dementia patients is applied, more high-quality medical service can be provided to patients.