• Title/Summary/Keyword: 통신장치

Search Result 4,418, Processing Time 0.036 seconds

A Study on the Methods of Building Tools and Equipment for Digital Forensics Laboratory (디지털증거분석실의 도구·장비 구축 방안에 관한 연구)

  • Su-Min Shin;Hyeon-Min Park;Gi-Bum Kim
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.21-35
    • /
    • 2022
  • The use of digital information according to the development of information and communication technology and the 4th industrial revolution is continuously increasing and diversifying, and in proportion to this, crimes using digital information are also increasing. However, there are few cases of establishing an environment for processing and analysis of digital evidence in Korea. The budget allocated for each organization is different and the digital forensics laboratory built without solving the chronic problem of securing space has a problem in that there is no standard that can be referenced from the initial configuration stage. Based on this awareness of the problem, this thesis conducted an exploratory study focusing on tools and equipment necessary for building a digital forensics laboratory. As a research method, focus group interviews were conducted with 15 experts with extensive practical experience in the digital forensic laboratory or digital forensics field and experts' opinions were collected on the following 9 areas: network configuration, analyst computer, personal tools·equipment, imaging devices, dedicated software, open source software, common tools/equipment, accessories, and other considerations. As a result, a list of tools and equipment for digital forensic laboratories was derived.

Recent Trends in Cryptanalysis Techniques for White-box Block Ciphers (화이트 박스 블록 암호에 대한 최신 암호분석 기술 동향 연구)

  • Chaerin Oh;Woosang Im;Hyunil Kim;Changho Seo
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.9-18
    • /
    • 2023
  • Black box cryptography is a cryptographic scheme based on a hardware encryption device, operating under the assumption that the device and the user can be trusted. However, with the increasing use of cryptographic algorithms on unreliable open platforms, the threats to black box cryptography systems have become even more significant. As a consequence, white box cryptography have been proposed to securely operate cryptographic algorithms on open platforms by hiding encryption keys during the encryption process, making it difficult for attackers to extract the keys. However, unlike traditional cryptography, white box-based encryption lacks established specifications, making challenging verify its structural security. To promote the safer utilization of white box cryptography, CHES organizes The WhibOx Contest periodically, which conducts safety analyses of various white box cryptographic techniques. Among these, the Differential Computation Analysis (DCA) attack proposed by Bos in 2016 is widely utilized in safety analyses and represents a powerful attack technique against robust white box block ciphers. Therefore, this paper analyzes the research trends in white box block ciphers and provides a summary of DCA attacks and relevant countermeasures. adhering to the format of a research paper.

The Hague Convention on Jurisdiction and Enforcement, of Judgments

  • Park, Yu-Sun
    • Journal of Arbitration Studies
    • /
    • v.16 no.1
    • /
    • pp.343-373
    • /
    • 2006
  • 지적재산권의 속지주의 원칙에 따라 전통적으로 지적재산권의 침해에 있어서 결과의 발생이 없는 행위지를 침해지로 인정하지 않았다. 어문과 예술작품을 보호하기 위해 1886년 체결된 베른협약(Berne Convention for the Protection of Literary and Artistic Works) 제5조 제1항은 저작자가 베른협약에 따라 보호되는 저작물에 관하여 본국 이외의 동맹국에서 각 법률이 현재 또는 장래에 자국민에게 부여하는 권리 및 이 협약이 특별히 부여하는 권리를 향유한다고 규정하여 내국민대우원칙을 천명하고 있다. 또한 베른협약 제5조 제2항은 저작권의 보호와 향유는 저작물의 본국에서 보호가 존재하는 여부와 관계가 없이, 보호의 범위와 저작자의 권리를 보호하기 위하여 주어지는 구제의 방법은 오로지 보호가 주장되는 국가의 법률의 지배를 받는다라고 규정하여 저작권 침해가 발행한 국가의 법률의 적용을 명시하고 있다. 인터넷과 무선통신 기술의 발달은 저작물을 디지탈 형식으로 실시간에 전세계에 배포하는 것을 가능하게 하였다. 특히 저작물의 인터넷상에서의 배포는 다국적 저작권 침해행위를 야기하여, 저작권자가 다수의 국가에서 저작권 침해소송을 제기하여 판결을 집행하는 것이 필요하게 되었다. 헤이그국제사법회의(Hague Conference on Private International Law)에서 1992년부터 논의되어 온 민사 및 상사사건의 국제재판관할과 외국판결에 관한 협약(Convention on Jurisdiction and Foreign Judgment in Civil and Commercial Matters)에서 채택된1999년의 예비초안(preliminary draft) 및 2001년 외교회의에서 수정된 잠정초안(Interim text) (이하 헤이그 협약 )은 저작권자가 저작권침해행위가 발생한 각 국가에서 저작권 침해행위를 금지하는 소송을 제기할 필요없이, 동 협약의 한 가맹국가의 법원의 저작권침해금지판결을 다른 가맹국가에서도 집행할 수 있는 가능성을 제시해 주는데 의미가 있다. 헤이그 협약 제10조는 불법행위(torts)에 관한 일반적인 재판관할에 관한 규정을 두고 있으며, 저작권침해에 관한 분쟁은 동 조항의 적용을 받는다. 제10조에 의해 당사자는 가해행위지 국가의 법원 또는 결과발생지 국가의 법원에서 소송을 제기할 수 있다. 결과발생지의 경우 제10조 1항 (b)는 피고가 자신의 행위가 본국의 법규에 비추어 동일한 성격의 손해를 초래할 수 있다라고 합리적으로 예견할 수 없었던 경우에 본 조항의 적용을 배제하고 있다. 인터넷을 통한 저작권침해의 경우, 피고가 자신의 국가의 법규하에서 합법적으로 저작물을 웹사이트에 게시하였으나, 그 행위가 다운로딩이 행해진 국가에서 불법인 경우, 피고는 저작권침해를 예견할 수 없었으므로 이에 문제가 제기된다. iCrave TV사건에서, 피고인 캐나다회사가 미국 및 캐나다에서 방송되는 텔레비젼 방송 프로그램을 자신의 웹사이트에 게시하여 이용자들로 하여금 컴퓨터를 통하여 방송을 재시청 할 수 있도록 하였는데 이는 캐나다에서 합법인 반면에 미국에서는 저작권 침해에 해당한다. 피고는 방송 프로그램을 인터넷상에서 재방송하는 것은 캐나다법상 합법이므로 저작권침해를 예견할 수 없었다고 주장하면서, 해당 사이트에 오직 캐나다 거주자만의 접속을 허용하고 미국 거주자의 접속을 제한하는 일련의 Click-Wrap 계약과 스크린 장치를 제공하였다고 주장하였다. 본 사건 피고의 주장을 받아들인다고 가정할 때, 제10조 1항(b)에 의해 원고는 결과발생지인 미국법원의 재판관할을 강제할 수 없을 것이다. 지적재산권을 둘러싼 분쟁에 관한 재판관할과 국제법상의 판결의 승인 및 집행의 통일성을 기하기 위하여 2001년 1월 세계지적재산권기구(World Intellectual Property Organization)가 제안한 WIPO 협약초안(Draft Convention on Jurisdiction and Recognition of Judgments in Intellectual Property Matters)은 헤이그 협약이 재판관할과 판결의 승인 및 집행에 대한 일반적인 접근을 하고 있는 점에 반하여 지적재산권자의 보호라는 측면을 고려하여 지적재산권침해소송에 국제재판관할권을 규정하고 있다. WIPO 협약초안 제6조는 저작권자가 저작권 침해를 막기 위한 합리적인 조치를 취한 국가에서 저작권 침해소송을 피할 수 있다고 규정하고 있다. 따라서 본 조항에 의할 경우, iCrave TV사건의 피고는 미국에서의 저작권 침해소송을 회피할 수 있을 것이다. 이상과 같이 헤이그 협약이 외국판결의 승인 및 집행을 가능하게 하고 있음에도 불구하고, 외국법원의 판결이 다수의 가맹국가에서 집행되지 못하는 가장 큰 장애는 대다수의 국가들이 외국법원의 판결이 공서양속(Public Policy)에 반하는 경우 판결을 승인하지 않는 예외규정을 두고 있기 때문이다. 미국의 경우, Uniform Recognition Act와 Restatement(Third) of Foreign Relations에 따른 공서양속의 예외규정(Public Policy exception)은 외국법원의 판결의 승인을 부인하는 근거가 된다. Yahoo! 사건에서 Yahoo! Inc.의 옥션 사이트를 통해 독일 나치 소장물의 판매가 이루어졌는데, 프랑스 형법상 이는 범죄행위에 해당하므로, 프랑스 법원은Yahoo! Inc.에게 프랑스 이용자가 당해 옥션 사이트에 접속할 수 없도록 모든 가능한 조치를 취할 것을 명하였다. 이에 미국 법원은 프랑스 법원의 판결은 Yahoo! Inc.의 미국헌법 제1 수정(First Amendment)의 언론의 자유(freedom of speech)에 반하므로 판결의 집행을 거부하였는데 이는 공서양속의 예외규정을 보여주는 예이다. 헤이그 협약 제28조와 WIPO 협약초안 제25조 또한 공서양속의 예외규정을 두고 있다. 본 논문은 인터넷과 통신기술의 발달로 야기되는 다국적 저작권 침해사건에서 한 국가의 법원의 저작권 침해금지판결이 다수의 국가에서 승인 및 집행될 수 있는 능성을 헤이그 협약과 WIPO 협약초안 및 미국판결을 중심으로 살펴보았다. 국제적으로 통일된 저작권법이 존재하지 않고 외국 판결의 승인을 부인하는 예외조항과 외국판결의 집행에 관한 각국의 이해관계와 준거법의 해석이 다른 현시점에서 지적재산권의 속지주의를 뛰어넘어 외국법원의 판결을 국제적으로 집행하는 것은 다소 어려움이 있어 보이나 국제적인 집행가능성의 열쇠를 제시하는 헤이그 협약과 장래의 국제조약에 그 기대를 걸어볼 수 있겠다.

  • PDF

Radio location algorithm in microcellular wide-band CDMA environment (마이크로 셀룰라 Wide-band CDMA 환경에서의 위치 추정 알고리즘)

  • Chang, Jin-Weon;Han, Il;Sung, Dan-Keun;Shin, Bung-Chul;Hong, Een-Kee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.8
    • /
    • pp.2052-2063
    • /
    • 1998
  • Various full-scale radio location systems have been developed since ground-based radio navigation systems appeared during World War II, and more recently global positioning systems (GPS) have been widely used as a representative location system. In addition, radio location systems based on cellular systems are intensively being studied as cellular services become more and more popular. However, these studies have been focused mainly on macrocellular systems of which based stations are mutually synchronized. There has been no study about systems of which based stations are asynchronous. In this paper, we proposed two radio location algorithms in microcellular CDMA systems of which base stations are asychronous. The one is to estimate the position of a personal station at the center of rectangular shaped area which approximates the realistic common area. The other, as a method based on road map, is to first find candidate positions, the centers of roads pseudo-range-distant from the base station which the personal station belongs to and then is to estimate the position by monitoring the pilot signal strengths of neighboring base stations. We compare these two algorithms with three wide-spread algorithms through computer simulations and investigate interference effect on measuring pseudo ranges. The proposed algorithms require no recursive calculations and yield smaller position error than the existing algorithms because of less affection of non-line-of-signt propagation in microcellular environments.

  • PDF

A Study on Establishment of the Optimum Mountain Meteorological Observation Network System for Forest Fire Prevention (산불 방지를 위한 산악기상관측시스템 구축방안)

  • Lee, Si-Young;Chung, Il-Ung;Kim, Sang-Kook
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.8 no.1
    • /
    • pp.36-44
    • /
    • 2006
  • In this study, we constructed a forest fire danger map in the Yeongdong area of Gangwon-do and Northeastern area of Gyeongsangbuk-do using a forest fire rating model and geographical information system (GIS). We investigated the appropriate positions of the automatic weather station (AWS) and a comprehensive network solution (a system including measurement, communication and data processing) for the establishment of an optimum mountain meteorological observation network system (MMONS). Also, we suggested a possible plan for combining the MMONS with unmanned monitoring camera systems and wireless relay towers operated by local governments and the Korea Forest Service for prevention of forest fire.

Awareness and Practice of Sugar Reduction in School Foodservice and the Practice of Nutrition Education in Daegu (대구시 영양(교)사의 학교급식 당류 저감화 인식도와 실천도 및 영양교육 실태)

  • Jang, Suhyang;Kim, Kilye;Lee, Yeon-Kyung
    • Korean Journal of Community Nutrition
    • /
    • v.26 no.3
    • /
    • pp.167-176
    • /
    • 2021
  • Objectives: This study was conducted to identify the awareness and practice of reducing sugar in school meals and the status of nutrition education regarding sugar reduction. Methods: An online survey was conducted on 101 nutrition teachers (dietitians) working at elementary, middle, and high schools in Daegu. Results: School nutrition teachers in Daegu recognized the need for efforts to reduce the sugar intake in the Korean diet, and it was found that elementary nutrition teachers were more aware of the implementation of the sugar reduction policy at the national level than middle and high school nutrition teachers (P = 0.002). Among the policies to reduce sugar intake at the national level, there was a high need for the promotion of self-control and limiting the sales of food with high sugar content in schools and their vicinity. The degree of practice for reducing sugar in school meals was found to be higher in the preparation, purchase, and cooking stage compared to the serving stage (P < 0.05). There was a high need for changing the preferences of the subjects for a sweet taste as a means of reducing the sugar in school meals. Thirty-six percent of nutrition teachers conducted sugar reduction education, and sending out school newsletters was the highest type of nutrition education at 80.6%. Conclusions: To effectively promote reduced sugar intake in school meals, it is necessary to change the preference of the subjects for sweetness and to conduct continuous education that can improve the awareness of people for reducing their sugar intake. For this, it is necessary to set aside time for nutrition education and to prepare an institutional framework for providing this education.

Smart Electric Mobility Operating System Integrated with Off-Grid Solar Power Plants in Tanzania: Vision and Trial Run (탄자니아의 태양광 발전소와 통합된 전기 모빌리티 운영 시스템 : 비전과 시범운행)

  • Rhee, Hyop-Seung;Im, Hyuck-Soon;Manongi, Frank Andrew;Shin, Young-In;Song, Ho-Won;Jung, Woo-Kyun;Ahn, Sung-Hoon
    • Journal of Appropriate Technology
    • /
    • v.7 no.2
    • /
    • pp.127-135
    • /
    • 2021
  • To respond to the threat of global warming, countries around the world are promoting the spread of renewable energy and reduction of carbon emissions. In accordance with the United Nation's Sustainable Development Goal to combat climate change and its impacts, global automakers are pushing for a full transition to electric vehicles within the next 10 years. Electric vehicles can be a useful means for reducing carbon emissions, but in order to reduce carbon generated in the stage of producing electricity for charging, a power generation system using eco-friendly renewable energy is required. In this study, we propose a smart electric mobility operating system integrated with off-grid solar power plants established in Tanzania, Africa. By applying smart monitoring and communication functions based on Arduino-based computing devices, information such as remaining battery capacity, battery status, location, speed, altitude, and road conditions of an electric vehicle or electric motorcycle is monitored. In addition, we present a scenario that communicates with the surrounding independent solar power plant infrastructure to predict the drivable distance and optimize the charging schedule and route to the destination. The feasibility of the proposed system was verified through test runs of electric motorcycles. In considering local environmental characteristics in Tanzania for the operation of the electric mobility system, factors such as eco-friendliness, economic feasibility, ease of operation, and compatibility should be weighed. The smart electric mobility operating system proposed in this study can be an important basis for implementing the SDGs' climate change response.

Analysis of Spatial and Vertical Variability of Environmental Parameters in a Greenhouse and Comparison of Carbon Dioxide Concentration in Two Different Types of Greenhouses (온실 환경요인의 공간적 및 수직적 특성 분석과 온실 종류에 따른 이산화탄소 농도 비교)

  • Jeong, Young Ae;Jang, Dong Cheol;Kwon, Jin Kyung;Kim, Dae Hyun;Choi, Eun Young
    • Journal of Bio-Environment Control
    • /
    • v.31 no.3
    • /
    • pp.221-229
    • /
    • 2022
  • This study was aimed to investigate spatial and vertical characteristics of greenhouse environments according to the location of the environmental sensors, and to investigate the correlations between temperature, light intensity, and carbon dioxide (CO2) concentration according to the type of greenhouse. Temperature, relative humidity (RH), CO2, and light sensors were installed in the four-different vertical positions of the whole canopy as well as ground and roof space at the five spatial locations of the Venlo greenhouse. Also, correlations between temperature, light intensity, and CO2 concentration in Venlo and semi-closed greenhouses were analyzed using the Curve Expert Professional program. The deviations among the spatial locations were larger in the CO2 concentration than other environmental factors in the Venlo greenhouse. The average CO2 concentration ranged from 465 to 761 µmol·mol-1 with the highest value (646 µmol·mol-1) at the Middle End (4ME) close to the main pipe (50Ø) of the liquefied CO2 gas supply and lowest (436 µmol·mol-1) at the Left Middle (5LM). The deviation among the vertical positions was greater in temperature and relative humidity than other environments. The time zone with the largest deviation in average temperature was 2 p.m. with the highest temperature (26.51℃) at the Upper Air (UA) and the lowest temperature (25.62℃) at the Lower Canopy (LC). The time zone with the largest deviation in average RH was 1 p.m. with the highest RH (76.90%) at the LC and the lowest RH (71.74%) at the UA. The highest average CO2 concentration at each hour was Roof Air (RF) and Ground (GD). The coefficient of correlations between temperature, light intensity, and CO2 concentration were 0.07 for semi-closed greenhouse and 0.66 for Venlo greenhouse. All the results indicate that while the CO2 concentration in the greenhouse needs to be analyzed in the spatial locations, temperature and humidity needs to be analyzed in the vertical positions of canopy. The target CO2 fertilization concentration for the semi-closed greenhouse with low ventilation rate should be different from that of general greenhouses.

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

A Case Study of Environmental Design from a Viewpoint of Hybrid and Features of User Experience (하이브리드와 이용자체험 특성으로 본 환경설계의 사례연구)

  • Jang, Il-Young;Kim, Jin-Seon
    • Archives of design research
    • /
    • v.19 no.1 s.63
    • /
    • pp.201-214
    • /
    • 2006
  • Modern society is an age of vagueness and confusion. In addition, vagueness, complexity and variety are seen throughout art including modern philosophy, literature, and environmental design. A phenomenon like this shows that modern society has integrated different components as an organic relationship frequently crossing the boundary of fields. This feature can be regarded as hybrid related with accepting contradictory components and binding them into one under relationship between part and whole. As new design concept, presented are attitude to accept the two instead of attitude to select one of the alternatives, abundance instead of dearness, and ambiguity instead of simplicity. This principle has a crucial influence on creative design providing opposing contradiction and several alternative plans as non-deterministic form not completed one and, above all, useful information in mutual dependence and mutual relationship. When it comes to hybrid, therefore, a strategy is needed to consider layer of several fields getting out of standardizing space into a single space. As an event of this situation and concept, space experience means behaving freely based on experience of users' body. It can be known that this experience brings about users' more dynamic experience in comparison with the experience of seeing environmental design from a viewpoint of visual ism on the existing simplicity. Such a practical experience is subjective, synesthetic, and non-observational one. Therefore, hybrid has brought active users to the stage, which is distinguished from synesthesia felt through body's experience, not through observational attitude and visual space which achieve former balance and harmony with non-determination. That's because hybrid creatures are turning to a product resulted from creative imagination instead of from reappearance which makes text visualized. Such experience performed by user's active participation collapses the boundary between special elite-centered art and daily life and it is the present progressive form showing creation process of future events and new esthetic experience.

  • PDF