• Title/Summary/Keyword: 엑티브 엑스 플러그 인

Search Result 2, Processing Time 0.014 seconds

Real-Time Video Communication System Adaptive HTTP-Based Using HTML5 (HTML5를 활용한 HTTP기반의 적응적 실시간 화상대화 시스템)

  • Ban, Tae-Hak;Kim, Yong-Pill;Yang, Seung-Eui;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.620-622
    • /
    • 2013
  • Real-time Video communication technology using a Web browser today is on the rise. Video communication system The existing A method of providing an Video communication via a program for a specific server on the service provider, respectively. By using the server of the company that provides an Video communication solutions, were limited by using its own network that you can use to build a separate server for performing Video communication another, using specific software and user groups it was a mechanism for using the Video communication environment. In addition, must be installed separately and ActiveX, plug-in and, use of the service has become possible. Therefore, in this paper, utilizing the real-time Video communication Web-based technology without installing the plug-in, real-time through a Web browser or Active-X of another using a script HTML5 and the Web on the Internet Using HTTP in an environment in the Internet is possible, I've implemented a system capable of Video communication.

  • PDF

A study about the influence to the client system when using PKI-based authentication system (공개키 기반 인증체계의 사용이 클라이언트 시스템에 미치는 영향에 관한 연구)

  • Jeon, Jeong-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.159-167
    • /
    • 2012
  • The authentication system of the PKI(public key infrastructure) provides the authenticity and security, accessibility, economic feasibility, and convenience to the service provider and users. Therefore the public and private companies in Korea widely use it as the authentication method of the web service. However, the safety client system is threatened by many vulnerable factors which possibly caused when using PKI-based authentication system. Thus, in this article vulnerable factors caused by using the PKI-based authentication system will be analyzed, which is expected to be the useful data afterwards for the construction of the new authentication system as well as performance improvement.