• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.032 seconds

An Efficient Variant of Self-Healing Group Key Distribution Scheme with Revocation Capability (자가 치료 기능과 취소 능력을 가진 효율적인 그룹키 분배 기법)

  • Kang Ju-Sung;Hong Dowon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.941-948
    • /
    • 2005
  • In the self-healing group key distribution scheme, users are capable of recovering lost group keys on their own without requesting additional transmission from the group manager, where there is no reliable network infrastructure. In this paper, we propose a new self-healing group key distribution scheme with revocation capability, which is optimal in terms of user memory storage and more efficient in terms of communication complexity than the previous results. We obtain a slightly improved result from (13) and (14) by using the new broadcasting method. In addition, we prove that our scheme has the properties of t-wise forward secrecy and t-wise backward secrecy, and extend this self-healing approach to the session key recovery scheme from a single broadcast message.

Design and Implementation of A Scan Detection Management System with real time Incidence Response (실시간 e-mail 대응 침입시도탐지 관리시스템의 설계 및 구현)

  • Park, Su-Jin;Park, Myeong-Chan;Lee, Sae-Sae;Choe, Yong-Rak
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.359-366
    • /
    • 2002
  • Nowadays, the hacking techniques are developed increasingly with wide use of internet. The recent type of scanning attack is appeared in against with multiple target systems on the large scaled domain rather than single network of an organization. The development of scan detection management system which can detect and analyze scan activities is necessary to prevent effectively those attacking at the central system. The scan detection management system is useful for effective utilization of various detection information that received from scan detection agents. Real time scan detection management system that can do the integrated analysis of high lever more that having suitable construction in environment of large scale network is developed.

Development of Remote Management and Control System for VoIP Terminal (인터넷전화 단말기 원격관리 및 제어시스템 개발)

  • Song, Han-Chun;Ban, Ku-Ik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.73-80
    • /
    • 2011
  • In this paper, we design and implementation of effective remote management system for VoIP(Voice over IP) terminal. Ordinary VoIP terminal is connected inside of NAT(Network Address Translation) assigned private IP address. NAT provides address mapping between outside public IP address and inside private IP address, for outside system telephone call is connected to inside VoIP terminal. In this paper, we also design and implementation of UDP hole punching function that the outside calls pass through the NAT, for outside management system call is connected to internal VoIP terminal, and gathered to management information of the VoIP terminal. Also, we evaluated and analysed of developed system in the test environment. As a result of test, It showed that it was well performed without any data error and data loss in the connectivity, and It showed that it was well gathered management information of the VoIP terminal.

A Learning Study of the Product Control System Using Smartphones (스마트폰을 이용한 공정관리시스템의 학습연구)

  • Koo, Min-Jeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.197-204
    • /
    • 2011
  • In this paper, There is a study of a smartphone-based App for e-learning when the process control of manufacturing. First, That is obtained the control limit lines after inputted by the measured data and able to look up the assignable causes and then can display those causes. A User of this App can access the record about assignable causes using the record menu and can use with an e-Learning tool. Because that were provided in the form of a control process theory and bulletin announcements. Helped to exchange information. In addition, the user's guide how to use this App. The result of this process control is provided by charts. The alarm message to the alertsymbol, depending on the level of color clearly was designed to UI which displays the results. After the questionnaire responses with respect to satisfaction of Utilization and satisfaction of the learning experience. The Utilization' satisfaction results Appeared that 82% of the participants were satisfied. And The learning's satisfaction results Appeared that 90% of the participants were satisfied.

Device Adapter Model based on Dynamic Management Module for u-Health gateway (u-헬스 게이트웨이를 위한 동적 관리 모듈 기반의 디바이스 어댑터 모델)

  • Kim, Jong-Tak;Song, Si-Yun;Hwang, Hee-Jeong
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.41-48
    • /
    • 2010
  • It is essential to guarantee a smooth communication and data exchange in a PHD(Personal Healthcare Device) network for applications providing U-health services. In spite of that, most of PHDs are heterogeneous, so the heterogeneity of their protocols makes it difficult to develop an integrated gateway sending sensed healthcare data to U-health service providers. To solve this problem, we suggest the design and implementation of a device adapter model based on dynamic managed module in this paper. Our model were implemented to work on the OSGi-based gateway middleware and to have interoperability in connection with the HL7 system that is the standard of the Healthcare Information systems. In addition, our model has an architecture supporting a communication based on the object serialization in order to provide extensibility in the functional aspect of applications. Through the experiment on a test-bed which is an implementation of the device adapter module for electrocardiogram and blood-pressure/blood-sugar device having one channel, we have confirmed the accuracy of sensing and sending data.

User Authentication System using OCR (광학문자인식을 이용한 사용자 인증 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.15-22
    • /
    • 2018
  • As smart devices become popular, users can use authentication services in various methods. Authentication services include authentication using an ID and a password, authentication using a sms, and authentication using an OTP(One Time Password). This paper proposed an authentication system that solves the security problem of knowledge-based authentication using optical character recognition and can easily and quickly authenticate users. The proposed authentication system extracts a character from an uploaded image by a user and authenticates the user using the extracted character information. The proposed authentication system has the advantage of not using a password or an OTP that are easily exposed or lost, and can not be authenticated without using accurate photographs. The proposed authentication system is platform independent and can be used for user authentication, file encryption and decryption.

The Effects of Price-Framing and Message-Framing Strategies on Consumer Attitudes: Focusing on Online Travel Products (가격 프레이밍과 메시지 프레이밍 전략이 소비자 태도에 미치는 영향: 온라인 여행상품을 중심으로)

  • Kim, Mi-Kyung;Chung, Nuree;Yang, Sung-Byung
    • The Journal of Information Systems
    • /
    • v.26 no.3
    • /
    • pp.119-147
    • /
    • 2017
  • Purpose In an online e-commerce environment without face-to-face contact between the seller and the buyer, the attitudes of consumers differ greatly depending on which framing strategy is applied, even in cases when the benefits of the deals represent the same value. The purpose of this study is to explore the effects of price-framing and message-framing strategies on consumer attitudes through an experimental analysis in the context of online travel product purchasing. This study suggests a research model based on prospect theory and prior literature on price-framing and message-framing strategies. Design/methodology/approach The experiment was structured as a 2 (discount price presentation: 'Won' vs. '%') ${\times}$ 2 (discount level: low vs. high) ${\times}$ 2 (time-limit message: none vs. one) mixed design. The research hypotheses were tested in a study of 200 undergraduate and graduate students assigned randomly and distributed evenly to each of the eight cells. Findings The findings indicate that consumer attitudes become more favorable when the '%' discount, higher discount rate, and time-limit message are presented. However, no significant interaction effect is found between the discount price presentation and the discount level/time-limit message. This study has a theoretical implication in that it extends the scope of research by examining the influence of framing strategies on experience goods such as online travel products. Moreover, this study can provide managers with more specific guidelines when establishing framing strategies in the context of purchasing online travel products.

A Design of MAC based SDAP(Secure Data Aggregation Protocol) for security and communication efficiency on VANET (VANET에서 보안과 통신효율을 고려한 MAC기반 SDAP(Secure Data Aggregation Protocol) 설계)

  • Lee, Byung-kwan;Ahn, Heui-hak;Jeong, Eun-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.650-652
    • /
    • 2013
  • As VANET(Vehicular Ad-hoc NETwork) improves road safety, efficiency, and comfort, and provides a value-added service such as commerce information or internet access. it is the most important technology in ITS(Intelligent Transportation System). But, In VANETs, better communication efficiency can be achieved by sacrificing security and vice versa. VANETs cannot get started without either of them. Therefore, to solve these problems simultaneously, this paper proposes MAC(Message Authentication Code) based SDAP(Secure Data Aggregation Protocol) which removes redundant data or abnormal data between vehicles and verifies the integrity of message. The MAC based SDAP not only improves the efficiency of data delivery but also enhances the security by detecting malicious attacks such as propagation jamming attack, forgery attack, and disguised attack.

  • PDF

Development of Wireless Base Station Remote Monitoring System Using IoT Based on Cloud Server (클라우드 서버 기반 IoT를 이용한 무선기지국 원격 감시시스템 개발)

  • Lee, Yang-weon;Kim, Chul-won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.6
    • /
    • pp.849-854
    • /
    • 2018
  • Radio base stations, which are widely distributed across large areas, have many difficulties in managing them. Unmanned radio base stations in remote mountains are having a hard time accessing them in case of emergencies. Major telephone service providers only remotely control incoming and outgoing information and local small business partners responsible for maintaining actual facilities do not possess such technologies, so they are each checked during field visits. In this study, in order to process the sensor raw data and smoothing, we apply the particle filters and confirmed that the performance of sensor data accuracy is increased. Integrated system using temperature, humidity, fire condition, and power operation at a wide range of radio base stations under the real-time monitoring status is operated well. It show that all of the status of base station are monitored at the remote office using the cloud server through internet networking.

InterCom : Design and Implementation of an Agent-based Internet Computing Environment (InterCom : 에이전트 기반 인터넷 컴퓨팅 환경 설계 및 구현)

  • Kim, Myung-Ho;Park, Kweon
    • The KIPS Transactions:PartA
    • /
    • v.8A no.3
    • /
    • pp.235-244
    • /
    • 2001
  • Development of network and computer technology results in many studies to use physically distributed computers as a single resource. Generally, these studies have focused on developing environments based on message passing. These environments are mainly used to solve problems for scientific computation and process in parallel suing inside parallelism of the given problems. Therefore, these environments provide high parallelism generally, while it is difficult to program and use as well as it is required to have user accounts in the distributed computers. If a given problem is divided into completely independent subproblems, more efficient environment can be provided. We can find these problems in bio-informatics, 3D animatin, graphics, and etc., so the development of new environment for these problems can be considered to be very important. Therefore, we suggest new environment called InterCom based on a proxy computing, which can solve these problems efficiently, and explain the implementation of this environment. This environment consists of agent, server, and client. Merits of this environment are easy programing, no need of user accounts in the distributed computers, and easiness by compiling distributed code automatically.

  • PDF