• Title/Summary/Keyword: 탈취

Search Result 437, Processing Time 0.027 seconds

Recovery of Nickel Metal from the Spent FeCl$_3$ Etching Solution by Solvent Extraction and Chemical Reduction (FeCl$_3$ 에칭廢液으로부터 溶媒抽出과 化學沈澱에 의한 니켈金屬 回收)

  • Lee, Man-Seung;Kim, Myoung-Sik
    • Resources Recycling
    • /
    • v.14 no.3
    • /
    • pp.48-54
    • /
    • 2005
  • Solvent extraction and chemical reduction experiments have been performed to separate iron and nickel from a spent FeCl$_3$ etching solution and to recover nickel metal. It was possible to separate iron and nickel by extracting the spent solution with Alamine336. At the O/A ratio of 7:1, iron extraction percentage of 99% was obtained. In the stripping of the loaded organic with 0.01 M HCl solution, iron stripping percentage of 99% was obtained when the A/O ratio was 7:1. When the pH of the raffinate was controlled to be 10.5, nickel metal powder with 99% purity was obtained by using hydrazine as a reducing agent at 100$^{\circ}C$. A process was suggested to recover nickel metal from the spent FeCl$_3$ solution and to regenerate etching solution.

Detection of Forgery of Mobile App and Study on Countermeasure (모바일 단말기 앱의 위·변조 탐지 및 대응방안 연구)

  • Jung, Hyun Soo;Chae, Gyoo-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2015
  • As the number of smartphone users is increasing with the development of mobile devices, the range of monetary transaction from the individual use is increasing. Therefore, hacking methods are diversified and the information forgery of mobile devices has been a current issue. The forgery via apps in mobile devices is a hacking method that creates an app similar to well-known apps to deceive the users. The forgery attack corresponds to the violation of integrity, one of three elements of security. Due to the forgery, the value and credibility of an app decreases with the risk increased. With the forgery in app, private information and data can be stolen and the financial losses can occur. This paper examined the forgery, and suggested a way to detect it, and sought the countermeasure to the forgery.

  • PDF

A Study on Treatment Way of a Malicious Code to injected in Windows System File (Windows 시스템 파일에 기생하는 악성코드의 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.255-262
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs. or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe. csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment way that experimented on at these papers and a plan to solve will become a researcher or the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

발명하는 사람들-제55호

  • Han, Mi-Yeong
    • The Inventors News
    • /
    • no.55
    • /
    • pp.1-16
    • /
    • 2007
  • 선진국가 선도하는 창의적 여성경제리더 양성하자/발명지도사.시제품제작지원 시행/발행인 칼럼/특허심사처리 세계에서 가장 빠르다/글로벌 기업, 한국 특허청에 심사의뢰 쇄도/국유특허권 온라인 전자계약 시행/특허기술, "기술경매" 로 산다/여성발명인 거유 활동 영역 넓어/감귤와인 특허획득 이어 독일 등 해외 수출 기대/미더덕 냉동 않고도 장기 보관/특허민원서식 대폭 감축/특허청, 개도국 지원사업 대폭 확대/기상청, 날씨예보기술로 특허 받아/우리나라 국제특허출원 수준 세계 6위/건강관련 브랜드 상표출원 증가/친환경수로관 '도룡용 살린다'/고등학교에 첫 발명창작과 개설/욕조, 웰빙 휴식공간으로 자리매김/가습기, 공기정화.탈취.방향 등 다기능화/패치제 특허출원 해마다 증가/일 특허청, 분할출원기간 30일 연장/중 법원, 비아그라 특허군 인정/국내 제약사 유유 "미머크사 특허 침해" 주장/삼성전자, 지난해 미 특허 2천4백53건으로 2위/기업심볼마크는 단순, 상표는 길어져/LG전자 "대우일렉이 드럼세탁기 특허권 침해했다"/유.무선 통합 '원폰 서비스' 기술 개발/암환자 울린 과대광고제품 1백억원대 판매 적발/맥도날드 '해피밀' 광고 퇴출/세원셀론텍, 콜라겐 원천기술 특허/역사 속의 발명품/하루 10분 발명교실/특허Q&A/'S&D Trecap' 황지경 대표/경기도, 여성분야 소상공인창업자금 신설/특허청, 세계지식재산기구(WIPO) 진출확대/아이디어 착상 및 발명 기법/여성발명 활성화만이 국가경쟁력 키우는 첩경/히로자키의 광엽수 진액/해외 네티즌 인기 화제의 발명품들/여성기업 생산제품 MAS시 적격성 평가 면제/특허청, 시작품제작지원 5천만원까지 확대/지난해 짝파라치에게 3억2천3백만원 포상금 지급/입체방송 분야 특허출원 봇물/트랜스지방 퇴출 시민단체 '토트랜스 클럽' 출현/한국여성발명협회 회원사 발명품 가이드/

  • PDF

Experimental Study on Hydrogen Sulfide Abatement in Sewage Odor Using Microbial Deodorants on the Market (시판용 미생물탈취제를 이용한 하수 악취 내 황화수소 저감에 관한 실험적 연구)

  • Park, Sang Jin;Kwon, Soo Youl
    • Journal of Environmental Health Sciences
    • /
    • v.46 no.2
    • /
    • pp.170-183
    • /
    • 2020
  • Objectives: This study was conducted to estimate a technology to reduce hydrogen sulfide (H2S) in sewage odor using microbial deodorant. Methods: After injecting five commercially available microbial deodorants into fresh sewage, the concentration of hydrogen sulfide over time was measured using the headspace method. H2S concentration in odor samples was measured using gas chromatograph/FPD. Calculated odor concentration and calculated odor intensity by H2S concentration remaining after treatment with microbial deodorant were evaluated theoretically. Results: The rate of H2S abatement by microbial deodorant differed depending on the experimental conditions and the type of deodorant, but it was found to range from 63 to 82%. Especially, two deodorants showed high H2S reduction rates of over 80% on average. However, based on the best deodorant, the theoretically calculated odor concentration by H2S after microbial deodorant treatment was 4,400 OUk, and the theoretical odor intensity was also rated at 4 degrees or higher. Conclusions: In conclusion, microbial deodorant is considered to have a relatively high effect on reducing H2S in sewage odor. However, even after treatment with microbial deodorant, calculated odor concentration and calculated odor intensity were relatively high. This is thought to be caused by other odorous substances besides H2S.

Privacy Situation and Countermeasures of Financial Apps based on the Android operating system (모바일 앱 개인정보 침해현황 및 대응방안 (금융, 안드로이드 운영체제 중심으로))

  • Kim, Bo;Lim, Jong-In;Jo, Yong-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.267-272
    • /
    • 2014
  • Customers who register at mobile banking service through startphone has 40Mil in first quarter of 2014, which was increased 8.5%(3.6Mil) compare to figure from end of year 2013. Average 1 trillion 627.6billion won is dealing through smartphone banking in daily and three for increased psychological bullying caused by malignant code which change normality to malignant. The results of the analysis current state of affairs of personal information collection management authority required in finance smartphone app service and also recommend solution for protecting finance consumers plans to minimized collecting personal information in smartphone finance app service.

A Preparation and Characteristics of Functional rchitecture Materials Made frm Non-metallic Minerals (비금속광물 분체의 기능성 건축소재화 특성)

  • 김병곤;최상근;박종력;전호석
    • Journal of the Korean Ceramic Society
    • /
    • v.40 no.8
    • /
    • pp.811-817
    • /
    • 2003
  • Recently, application fields of non-metallic minerals by utilizing their structure properties are broadening. Especially, layered minerals have not only excellent shielding or covering ability but also absorbing and storing characteristics of chemical elements between a layers. We considered about the above mentioned characteristics and added functional substances onto their surfaces for the preparation of new environmentally friendly functional materials. In this study, natural graphite and sericite were mainly used to produce for the new environmentally friendly functional building materials. Graphite surfaces were modified with a surfactant (Alkyl Benzyle Demethyle Ammonium Chloride) for anti-bacillus and penicillium. Surface modification mechanism are that primary adsorption by differential zeta potential between graphite and ABDM and secondary adsorption by interaction between surfactant chains take place. Surfactant layers were fully formed and it was expected up to 99.7% up the efficiency of anti-bacillus and penicillium. Also the prepared functional samples have a effect to improve a various efficiency such as electromagnetic wave shield(up to 95%), deodorization(up to 80%), heat storage(5%) etc.

A Study of Packet Analysis in Smart Phone Internet Access (Smart Phone 인터넷 접속시 패킷 분석 연구)

  • Song, Jin-Young;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.229-232
    • /
    • 2010
  • Smart Phone is the increasing use. Smart Phone can be run on that New or videos you want to connect to the Internet for downloading and viewing applications. But the wireless Internet have been found that Due to the vulnerability of the Internet, Smart Phone security vulnerabilities. This paper analyzes the vulnerability. Smart Phone droid that occur when connecting to the Internet. For information on Smart Phone to use to analyze network packet analysis and packet capture tools. Analysis is based on information from the Internet when you use Smart Phone Hack will demonstrate the process. Messenger, ID, to confirm the password, the actual internet ID, password access to the personal information that can be seized. In this study, hacking and security of the Smart Phone will contribute to the research process that Internet information and communication powers to strengthen the security of Korea.

  • PDF

A Study of Intrusion Security Research and Smishing Hacking Attack on a Smartphone (스마트폰에서 Smishing 해킹 공격과 침해사고 보안 연구)

  • Park, In-Woo;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2588-2594
    • /
    • 2013
  • Damage is increasing by (Smishing) hacking attack Smishing you use a smart phone after entering 2013. Takeover of personal information and direct financial damage in collaboration with graphics sewing machine hacking attack has occurred. Monetary damage that leads to Internet payment service (ISP) and secure payment system in conjunction with graphics sewing machine hacking attack on a smartphone has occurred. In this paper, I will study analysis in the laboratory examples of actual infringement vinegar sewing machine hacking attack. It is a major power security measures to prevent damage to the secure payment system that a case analysis and practical principle technical nest sewing machine hacking attack, using Smishing. In this paper, I will be to research to be able to through a smart phone, to the online payment safer and more convenient.

Industrial Security Crime's Realities and Counter-Measure (산업보안범죄의 실태 및 대응방안)

  • Seo, Bong Sung;Lim, You Seok
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.141-149
    • /
    • 2015
  • Modern society is to have an significant impact on the competitiveness of the country in which the economic value is very high occupancy and ensure a state-of-the-art science and technology. The country's core technology or industry security crimes going seized state-of-the-art technology firms can threat of damage to the country's economic security. In particular, the defense industry serious crime that is directly related to national security. The company's core technology and trade secrets leaked once the industrial countries must prevent security breaches and offenses of strict punishment measures because it is impossible to recover. Also, some advanced countries directly has been operating industrial security crime for the country's economy and national security. In recent years, Nation core technology infringement cases are rapidly increasing in the country. In addition, industrial security crime threat to national security. Therefore, the industry security crimes damage to the national security that infringe on the business secrets of core technologies and businesses. It is necessary to identify that industry security crime associated with the visibility of the broad scope of intellectual property protection.