• Title/Summary/Keyword: 안전 삭제

Search Result 103, Processing Time 0.026 seconds

The Authentication and Key Management Method based on PUF for Secure USB (PUF 기반의 보안 USB 인증 및 키 관리 기법)

  • Lee, Jonghoon;Park, Jungsoo;Jung, Seung Wook;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.12
    • /
    • pp.944-953
    • /
    • 2013
  • Recently, a storage media is becoming smaller and storage capacity is also becoming larger than before. However, important data was leaked through a small storage media. To solve these serious problem, many security companies manufacture secure USBs with secure function, such as data encryption, user authentication, not copying data, and management system for secure USB, etc. But various attacks, such as extracting flash memory from USBs, password hacking or memory dump, and bypassing fingerprint authentication, have appeared. Therefore, security techniques related to secure USBs have to concern many threats for them. The basic components for a secure USB are secure authentication and data encryption techniques. Though existing secure USBs applied password based user authentication, it is necessary to develop more secure authentication because many threats have appeared. And encryption chipsets are used for data encryption however we also concern key managements. Therefore, this paper suggests mutual device authentication based on PUF (Physical Unclonable Function) between USBs and the authentication server and key management without storing the secret key. Moreover, secure USB is systematically managed with metadata and authentication information stored in authentication server.

Complement of the Interlocking Logic of ATS for Heterogenous Railway Signaling Systems (이종 철도신호시스템을 위한 기존 자동열차정지 연동로직의 보완)

  • Jeong, Rag-Gyo;Kim, Baek-Hyun;Kang, Seok-Won;Byun, Yeun-Sub;Park, Geon-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.702-708
    • /
    • 2016
  • The railway signaling system has evolved to maximize its safety and maintainability based on the experiences in the construction and operation of railway systems. The newly developed systems was established to cope with the changes in an operating environment. In the process of a transition to the new system, both the existing ATS (Automatic Train Stop) and new ATP/ATO (Automatic Train Protection/Automatic Train Operation) systems are operating simultaneously in parallel. In this situation, modifications of the conditions of the interlocking diagram and logic are necessarily required on the existing ATS systems due to the frequent improvements in signaling equipment. This paper reports the enhancement of safety and operational efficiency of the system through an improvement of the security and the interlocking conditions of the existing ATS systems. The independent display of signals for each track was ensured to avoid giving the effect of On/Off signals for the selected track on the opposite side, and the security was improved by adjusting the position and interlocking conditions. In addition, the increased traffic density of railway systems was achieved by removing the unnecessary conditions and detailed signal display, which resulted in enhanced operational efficiency.

Apache NiFi-based ETL Process for Building Data Lakes (데이터 레이크 구축을 위한 Apache NiFi기반 ETL 프로세스)

  • Lee, Kyoung Min;Lee, Kyung-Hee;Cho, Wan-Sup
    • The Journal of Bigdata
    • /
    • v.6 no.1
    • /
    • pp.145-151
    • /
    • 2021
  • In recent years, digital data has been generated in all areas of human activity, and there are many attempts to safely store and process the data to develop useful services. A data lake refers to a data repository that is independent of the source of the data and the analytical framework that leverages the data. In this paper, we designed a tool to safely store various big data generated by smart cities in a data lake and ETL it so that it can be used in services, and a web-based tool necessary to use it effectively. Implement. A series of processes (ETLs) that quality-check and refine source data, store it safely in a data lake, and manage it according to data life cycle policies are often significant for costly infrastructure and development and maintenance. It is a labor-intensive technology. The mounting technology makes it possible to set and execute ETL work monitoring and data life cycle management visually and efficiently without specialized knowledge in the IT field. Separately, a data quality checklist guide is needed to store and use reliable data in the data lake. In addition, it is necessary to set and reserve data migration and deletion cycles using the data life cycle management tool to reduce data management costs.

Relative efficacy of three Ni-Ti file systems used by undergraduates (학생들이 사용한 세 종류 Ni-Ti file systems의 근관성형 효율 비교)

  • Kim, Hyeon-Cheol;Park, Jeong-Kil;Hur, Bock
    • Restorative Dentistry and Endodontics
    • /
    • v.30 no.1
    • /
    • pp.38-48
    • /
    • 2005
  • The purpose of this study was to compare and evaluate the shaping ability of the three different Ni-Ti file systems used by undergraduate students. Fifty undergraduate students prepared 150 simulated curved root canals in resin blocks with three Ni-Ti file systems - $ProFile^{(R)}$ (PF), Manual $ProTaper^{(R)}$ (MPT), Rotary $ProTaper^{(R)}$ (RPT). Every student prepared 3 simulated root canals with each system respectively. After root canal preparation, the Ni-Ti files were evaluated for distortion or breakage Assessments were made according to the presence of various types of canal aberrations. The pre- and post-instrumented canal images were attained and superimposed. The instrumented root canal width were measured and calculated for the net transportation (deviation) and the centering ratio. Under the condition of this study, both $ProTaper^{(R)}$ systems allowed significantly more removal of root canal wall than the $ProFile^{(R)}$ system. In the important other aspects such as the centering ratio, there was no significant differences between the systems. Novice dental students were able to prepare curved root canals with any kinds of Ni-Ti file systems with little aberration and great conservation of tooth structure. Students want to learn effective methods and at the same time simple rotary procedures. The rotary $ProTaper^{(R)}$ systems were one of the most compatible to these students from the point of view of cutting ability The $ProFile^{(R)}$ system was also compatible in safe and gentle shaping.

Business Continuity and Data Backup in Cloud Computing Service and Architecture Study for Data Availability Zone (비즈니스 연속성을 위한 클라우드 컴퓨팅 서비스에서의 데이터 백업과 데이터 가용영역 아키텍쳐 연구)

  • Park, Young-ho;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2305-2309
    • /
    • 2016
  • Cloud Computing Service should support efficiency and stability. United States of America, for example, provides FedRAMP (Federal Risk and Authorization Management Program) accreditation to certify cloud computing service and hence growth of computing service industry is giving benefits of cost reduction and efficiency to companies. However, the use of computing service brings more risk than ever. Because cloud computing holds all the data of multiple companies, problems such as hacking bring out control loss of service and as a result total data of companies can be lost. Unfortunately, cloud computing certification programs do not have any good solutions for this data loss and companies may lose all the important data without any proper data backup. This paper studies such problems in terms of backup problem and provides Data Availability Zone solution for recovery and safe saving of data so that computing service can offer better efficiency and stability.

A Study on Improving the System for Qualification of Personal Guardian: Mainly on Practical Examinations (신변보호사 자격검정제도의 개선방안: 실기시험을 중심으로)

  • Ha, jeong hoon
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.277-293
    • /
    • 2020
  • The purpose of this study is to select the talented and competent personal caregiver personnel through a professional and rational inspection system, and to provide safer personal care services to the public so that the people who are eligible for service can lead a safe life. The purpose of this study is to cultivate qualified and competent personal guardian personnel and provide professional and stable services to the people so that the people who can use the service can lead a safer life. In order to grow into a system that meets the objectives of the personal guardian qualification screening system, it must be revised and supplemented from various evaluation methods. The improvement measures related to the practical test of the system for qualifying personal guardians are as follows. First, the fitness evaluation items should be added. Second, it is necessary to reestablish the test technology. (Remove technology that causes the second threat) (Adds skills that can be used as civilian status) Third, the fallout and application action must be added. Fourth, evaluation in various starting positions is necessary. Fifth, evaluation should be made by diversifying the distance and direction with the opponent.

데이터베이스 테이터의 고장진단 및 복구를 위한 전문가 시스팀

  • Lee, Gil-Haeng;U, Wang-Don;Jo, Ju-Hyeon
    • ETRI Journal
    • /
    • v.14 no.4
    • /
    • pp.148-164
    • /
    • 1992
  • 본 논문에서는 TDX-10 데이터베이스 데이터의 고장을 주기적으로 진단하고 복구할 수 있는 고장진단 전문가 시스팀을 제안하고 구현하였다. 실시간 환경 및 분산구조를 갖는 데이터베이스 관리 시스팀에서 데이터베이스의 효과적인 접근을 위해서 필요한 데이터베이스의 데이터 즉, 디렉토리와 딕셔너리는 매우 중요하며 고장이 발생할 경우 데이터베이스 관리시스팀에 미치는 영향은 치명적이다. 따라서, 실시간 환경을 갖는 데이터베이스 관리 시스팀에서 데이터베이스 데이터에 대한 고장 진단 및 복구는 필수적이라고 할 수 있다. 본 논문에서 제안한 고장진단 전문가 시스팀은 데이터베이스 데이터를 운용중 변하는 부분과 변하지 않는 부분으로 분류하고 미리 주어진 고장진단 규칙에 따라 진단하는 방법이다. 데이터베이스 데이터의 고장진단 데이터, 고장진단 규칙, 고장진단 데이터 생성기, 고장진단 데이터 검증기, 그리고 고장진단기로 구성되어 있다. 고장진단 데이터는 고장진단기가 데이터베이스 데이터를 주기적으로 진단하기 위하여 사용하는 마스터 데이터로서 두개가 존재한다. 고장진단 데이터 생성기는 데이터베이스 데이터의 고장진단을 위한 데이터 구조를 생성하고 데이터베이스로부터 데이터베이스를 데이터를 중복하여 읽어들이는 역할을 한다. 이와 같은 과정은 시스팀이 초기에 동작을 시작하거나 운용중 운용자에 의해서 릴레이션의 추가 및 삭제, 그리고 튜플의 추가등과 같은 사건이 발생할 경우에 이루어진다. 데이터베이스 검증기는 고장진단 데이터 생성기가 중복하여 생성한 데이터에 대해서 데이터베이스 데이터의 제작시의 초기 오류를 검증해냄으로써 데이터베이스 관리 시스팀의 안전한 운용을 가능하게 하며 고장진단기가 데이터베이스 데이터를 주기적으로 진단할 데이터를 탄생시킨다. 마지막으로 고장진단기는 주기적으로 데이터베이스 데이터의 고장을 진단하여 고장이 발생한 데이터를 미리 분류한 규칙에 따라 원래의 데이터로 복구하거나 운용자에게 보고함으로써 고장에 대비하도록 한다. 그리고 데이터베이스 상의 운용자에 의한 변경을 감지하여 고장진단 데이터의 재생성을 지시한다. 본 논문에서 제시하고 구현한 데이터베이스 데이터의 고장진단 및 복구를 위한 전문가 시스팀은 실시간 환경과 고장허용 환경, 분산 구조 그리고 빈번한 접근을 갖는 데이터베이스 관리 시스팀에서 아주 중요한 역할을 할 수 있다.

  • PDF

Real-time Traffic Sign Recognition using Rotation-invariant Fast Binary Patterns (회전에 강인한 고속 이진패턴을 이용한 실시간 교통 신호 표지판 인식)

  • Hwang, Min-Chul;Ko, Byoung Chul;Nam, Jae-Yeal
    • Journal of Broadcast Engineering
    • /
    • v.21 no.4
    • /
    • pp.562-568
    • /
    • 2016
  • In this paper, we focus on recognition of speed-limit signs among a few types of traffic signs because speed-limit sign is closely related to safe driving of drivers. Although histogram of oriented gradient (HOG) and local binary patterns (LBP) are representative features for object recognition, these features have a weakness with respect to rotation, in that it does not consider the rotation of the target object when generating patterns. Therefore, this paper propose the fast rotation-invariant binary patterns (FRIBP) algorithm to generate a binary pattern that is robust against rotation. The proposed FRIBP algorithm deletes an unused layer of the histogram, and eliminates the shift and comparison operations in order to quickly extract the desired feature. The proposed FRIBP algorithm is successfully applied to German Traffic Sign Recognition Benchmark (GTSRB) datasets, and the results show that the recognition capabilities of the proposed method are similar to those of other methods. Moreover, its recognition speed is considerably enhanced than related works as approximately 0.47second for 12,630 test data.

Security Verification Framework for e-GOV Mobile App (전자정부 모바일 앱 보안성 검증체계)

  • Bang, Ji-Ho;Ha, Rhan;Kang, Pil-Yong;Kim, Hong-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.119-131
    • /
    • 2012
  • Recently smart phones have been proliferating widely and quickly. Since the number of mobile apps that are being developed and deployed to domestic/international app stores is rising, more apps are being installed and deleted by users without any difficulty. The deployed apps are each attested through distinct verification framework of specific app stores. However, such verification frameworks are insufficient in checking security concerns. Unfortunately, the security verification framework is necessary since the incidents of leaking privacy and confidential information are being increased in lately. The aim of this paper is to provide the security verification framework that assures security and reliability of the e-government mobile apps. In order to verify proposed verification framework, a few apps were selected and inspected through proposed framework and these inspection results are included in this paper.

System Design for the Safe store and Issue Service Assurance of the E-Document (전자문서의 안전한 보관 및 발급 서비스 확보를 위한 시스템 설계)

  • Sung, Kyung-Sang;Kim, Jung-Jae;Oh, Hae-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.173-180
    • /
    • 2008
  • Certified e-Document Authority keep it with protection legal as a system a guarantee and identifies originality of an e-Record, It presume to be authenticity e-Records and contents of an e-Record prove what was not changed. But, e-Records has high medium degree of dependence and loss danger of information has very high problems. In addition, Because correction(attachment and deletion) and a revision of information are easy, a problem for integrity and the originality of an e-Record is caused. Existing system show the following inefficient. For the originality guarantee, an existing e-Documents encryption method accomplishes a encrypted process of a whole document with a symmetric key, if the information revised midway, the whole documents content must accomplish re-scanning and re-encryption process again. To get over such inefficient, this paper maximize efficiency which occurred at the time of partial information revision request by encryption and managing using the link information based on the linkage characteristics of the each page on the registered requested e-Documents, It was able to increase security configuration by minimizing problems on an information exposure through increasing complicated of the key management.

  • PDF