• Title/Summary/Keyword: 실시간 보안관리

Search Result 325, Processing Time 0.023 seconds

A Design of a Personnel Control System Using RF Tag in Port Facilities (RF 태그를 활용한 항만 내 인원관리 시스템)

  • Cha, Jin-Man;Park, Yeoun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.520-523
    • /
    • 2010
  • In the field of network sense for the Ubiquitous environment, the technology of RFID is a significant part. Due to the real time processing of information and the property of network, RFID has been used in service field such as distribution, administrative control of physical distribution, remote measuring device, and security, instead of currently used bar-code. The management system of port facilities using the current RFID technology has the effects of reducing working hours and improvement in data processing, but it is not proper for human resource allocation since it is dominantly worked for physical resources. In this paper, we designed and implemented personnel control system using RFID of 2.4GHz in port facilities which presents a monitoring system for safety operation and increase of efficiency using RFID in order to overcome the limitations and problems of current port operation management techniques.

  • PDF

A Study on the U-City Information Characterization for the Effective Information Management (효율적 정보관리를 위한 U-City 정보 특성분석에 관한 연구)

  • Ahn, Jong-Wook;Shin, Dong-Bin;Kim, Jung-Hoon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.18 no.1
    • /
    • pp.119-127
    • /
    • 2010
  • In this study, U-City to effectively manage information as a basis for studies of U-City Info characteristics were analyzed. U-City services are currently being discussed which is about 228. Short-term possibility of applying these services, the service's practicality and availability of services based on public services analyzed, 39 were selected. Next, the selected U-City to target services to analyze the flow of information and analysis based on the characteristics of U-City information was derived. U-City information derived from this study, the characteristics of real-time information, and service-specific mandatory and optional information, melting complex information, dynamic information, large amounts of data, user-customized information, and information security vulnerabilities, revealing personal information and privacy is. The results of this study, governments and municipalities to promote the construction of the U-City can be used effectively. To do so, considering the characteristics of U-City information, information management standards should be established.

The Study on Threats of Information Security and Their Solutions in the Fourth Industrial Revolution (4차 산업혁명 시대에 정보보안의 위협요인과 대응방안에 대한 연구)

  • Cho, Sung-Phil
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.11-35
    • /
    • 2017
  • The third industrial revolution, characterized by factory automation and informatization, are moving toward the fourth industrial revolution which is the era of superintelligence and supernetworking through rapid technology innovation. The most important resources in the fourth industrial revolution are information or data since the most of industrial and economic activities will be affected by information in the fourth industrial revolution. Therefore we can expect that more information will be utilized, shared and transfered through the networks or systems in real time than before so the significance of information management and security will also increase. As the importance of information resource management and security which is the core of the fourth industrial revolution increases, the threats on information security are also growing so security incidents such as data breeches and accidents take place more often. Various and thorough solutions are highly needed to protect information resources from security risks because information accidents or breaches seriously damage brand image and cause huge financial damage to organization. The purpose of this study is to research general trends on data breaches and accident that can be serious threat of information security. Also, we will provide resonable solutions to protect data from nine attack patterns or other risk factors after figuring out each characteristic of nin attack patterns in data breaches and accidents.

  • PDF

Smartphone User Authentication Algorithm based on Mutual Cooperation in Mobile Environment (모바일 환경에서 상호 협력 기반 스마트폰 사용자 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1393-1400
    • /
    • 2017
  • As the number of smartphone users increases, vulnerability to privacy protection is increasing. This is because personal information is stored on various servers connected to the Internet and the user is authenticated using the same ID and password. Authentication methods such as OTP, FIDO, and PIN codes have been introduced to solve traditional authentication methods, but their use is limited for authentication that requires sharing with other users. In this paper, we propose the authentication method that is needed for the management of shared information such as hospitals and corporations. The proposed algorithm is an algorithm that can authenticate users in the same place in real time using smart phone IMEI, QR code, BLE, push message. We propose an authentication algorithm that can perform user authentication through mutual cooperation using a smart phone and can cancel realtime authentication. And we designed and implemented a mutual authentication system using proposed algorithm.

Implement remote video monitoring system to sports coaching for athletes Based of IP-Camera (IP카메라기반의 운동선수 코칭용 원격 영상모니터링 시스템)

  • Park, Cheon-Il;Kim, Kyeong-Tae;Kim, Sang-Gi;Kang, Joon-Sang;Seo, SeungBeom;Lee, Jung-Hoon;Lee, Seung-Youn;Lim, Yun-Sik;Yu, Young-Sik;Kim, Joon-Won;Lee, Jong-Hoon;Lee, Jong-Sung;Lee, Seon-Hee;Cha, Jae-Sang
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.2
    • /
    • pp.6-11
    • /
    • 2013
  • Recently sports science is various attempts to improve the athletes' performances. Above all they collect a results for the data and analyze the movement of the players after the game. Based on this, they are utilized to complement the vulnerability and how to improve. However, this way is not able to understand the movement a player and the flow of the game in real time. Because they are analyzed to match results based on the data. Therefore it is possible to managed for performance enhancement used to IT technology during the game in real-time.

Real-Time Visualization of Web Usage Patterns and Anomalous Sessions (실시간 웹 사용 현황과 이상 행위에 대한 시각화)

  • 이병희;조상현;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.97-110
    • /
    • 2004
  • As modem web services become enormously complex, web attacks has become frequent and serious. Existing security solutions such as firewalls or signature-based intrusion detection systems are generally inadequate in securing web services, and analysis of raw web log data is simply impractical for most organizations. Visual display of "interpreted" web logs, with emphasis on anomalous web requests, is essential for an organization to efficiently track web usage patterns and detect possible web attacks. In this paper, we discuss various issues related to effective real-time visualization of web usage patterns and anomalies. We implemented a software tool named SAD (session anomaly detection) Viewer to satisfy such need and conducted an empirical study in which anomalous web traffics such as Misuse attacks, DoS attacks, Code-Red worms and Whisker scans were injected. Our study confirms that SAD Viewer is useful in assisting web security engineers to monitor web usage patterns in general and anomalous web sessions in particular.articular.

Mobile Material Management Through Real Time Connection with ERP System (모바일을 활용한 실시간 ERP시스템 연동 모형의 구축: 자재관리 고도화 사례 중심으로)

  • Lee, Chae-Eun;Lee, Dong-Man;Yoo, Ji-Young
    • Information Systems Review
    • /
    • v.6 no.2
    • /
    • pp.285-305
    • /
    • 2004
  • This study is based on providing core infrastructure to make or extend an ERP strategy to make the proper model to cope effectively with various customer requirements and market changes through ERP improvement. The purpose of this study is to support making a competitive advantage by raising productivity and reducing costs as a result of making and applying the "mobile real time connection to ERP"model which is accessible anywhere and anytime using PDA and wireless LAN on the basis of mobile business concept. The model is implemented as the "mobile Material Management System" on the area of material management of ERP in the enterprise which already implemented ERP system. This model is also applied into other divisions of the enterprise. This case study shows that the proper application of ERP reduces costs by reducing business process lead time, increase productivity and customer satisfaction through mobility and instant connectivity and easiness of the system. It is recommended to apply this model into the ERP system which is used in most enterprise, to make a competitive advantage. To sum up, the model in this study can be applied into the enterprise which wants to reduce costs, increase productivity and customer satisfaction through ERP improvement.

Object Tracking Framework of Video Surveillance System based on Non-overlapping Multi-camera (비겹침 다중 IP 카메라 기반 영상감시시스템의 객체추적 프레임워크)

  • Han, Min-Ho;Park, Su-Wan;Han, Jong-Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.141-152
    • /
    • 2011
  • Growing efforts and interests of security techniques in a diverse surveillance environment, the intelligent surveillance system, which is capable of automatically detecting and tracking target objects in multi-cameras environment, is actively developing in a security community. In this paper, we propose an effective visual surveillance system that is avaliable to track objects continuously in multiple non-overlapped cameras. The proposed object tracking scheme consists of object tracking module and tracking management module, which are based on hand-off scheme and protocol. The object tracking module, runs on IP camera, provides object tracking information generation, object tracking information distribution and similarity comparison function. On the other hand, the tracking management module, runs on video control server, provides realtime object tracking reception, object tracking information retrieval and IP camera control functions. The proposed object tracking scheme allows comprehensive framework that can be used in a diverse range of application, because it doesn't rely on the particular surveillance system or object tracking techniques.

Study of Reading Rate & Small UHF RFID Tags in The Key Management System in a Metallic Cabinet (작은 UHF RFID를 이용한 열쇠관리용 철재캐비닛 시스템과 인식률에 관한 연구)

  • Chung, You-Chung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.263-268
    • /
    • 2010
  • This paper shows the key management system in a small metallic cabinet using a small UHF RFID tags. Each key chain with a key has a custom-designed small RFID tag antenna. There are 6 metallic racks in the small cabinet, and each rack can hold 60 key chains. Therefore, the small cabinet can hold 360 key chains with tags. The 360 key chains with RFID tags in a cabinet are recognized by RFID key chain management system. Even though it is hard to recognize 360 tags in the a cabinet, this RFID key management system with small custom designed RFID tags can recognize all the tags in the small cabinet. To read the all the tags, the locations of antennas and tag shapes are optimized. The reading rates based on the bios-version of the reader and the locations of the reader antennas are compared.

An UHISRL design to protect patient's privacy and to block its illegal access based on RFID (환자의 프라이버시 보호와 불법 접근 차단을 위한 RFID 기반 UHISRL 설계)

  • Lee, Byung Kwan;Jeong, Eun Hee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.3
    • /
    • pp.57-66
    • /
    • 2014
  • This paper proposes the UHISRL(Ubiquitous Healthcare Information System based on Real Time Location) which manages patient, doctor, medicine by using RFID. The proposed UHISRL monitors the patient's health state, and enables us to confirm the result with Smart Phone and Tablet PC. Also, it can block Replay and Spoofing attack by using the ERHL(Extended Randomized Hash Lock) authentication scheme designed in this paper. A patient privacy is enhanced by limiting UHISRL DB access according to attributes with CP-ABE (Cipher Text - Attributed based Encryption) technique. Specially, UHISRL can prevent an unexpected accident by monitoring a chronic patient's emergency situation in real time.