• Title/Summary/Keyword: 파일 지문

Search Result 11, Processing Time 0.028 seconds

Design of Deduplication Supported Clustering Backup System using File Finger Printing (파일 지문으로 중복 파일을 제거한 클러스터링 백업 시스템 설계)

  • Jeong, Ho-Min;Ko, Young-Woong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.737-740
    • /
    • 2007
  • 기존의 백업시스템에서는 데이터의 중복을 고려하지 않고 백업 데이터 전부를 저장하기 때문에 저장용량 공간을 많이 차지하는 문제점이 있다. 본 논문에서는 이러한 문제점을 해결하기 위해 백업 데이터의 각 파일에 대해서 일정한 크기의 블록 단위로 파일지문을 부여하고 파일지문이 동일할 경우 하나의 사본만을 공유하는 방법으로 백업 데이터의 용량을 감소시키는 방법을 도입하였다. 제안하는 백업 시스템은 중복되어 발생하는 데이터에 대해 하나의 사본만 백업함으로써 백업되는 데이터의 양을 효과적으로 감소시켰다. 또한 백업되는 파일 블록에 대해서 클러스터링 기술을 사용함으로서 입출력 성능 향상을 고려하였다.

Risk of DNA contamination through fingerprint brush, during the dusting of living persons and deceased (살아있는 사람과 사망한 사람의 지문을 채취하는 과정에서 지문 브러쉬의 DNA 오염 정도 연구)

  • Min, Hee Won;Hong, Sungwook
    • Analytical Science and Technology
    • /
    • v.29 no.2
    • /
    • pp.85-93
    • /
    • 2016
  • This study investigated the possibility of DNA contamination during fingerprint collection when using a fingerprint brush. Two kinds of brushes were selected: powdered brushes and neat (not powdered) brushes. The fingerprints were collected from the tips of all the fingers and near the wrists of both living and deceased persons using the two brushes. Both brushes were analyzed for the DNA contents and profiles. The results obtained confirmed the transfer of DNA onto both brushes, although the results showed that the powdered brushes carried more DNA compared with the neat brushes. More DNA was transferred onto the brushes used on deceased persons than onto the brushes used for living persons. Only partial DNA profiles were obtained from the brushes, which is due to the presence of other sources of DNA on the surfaces of the skin of both living and deceased persons. This phenomenon confirmed the DNA contamination during fingerprint collection when fingerprint brushes were used.

A Clustering File Backup Server Using Multi-level De-duplication (다단계 중복 제거 기법을 이용한 클러스터 기반 파일 백업 서버)

  • Ko, Young-Woong;Jung, Ho-Min;Kim, Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.7
    • /
    • pp.657-668
    • /
    • 2008
  • Traditional off-the-shelf file server has several potential drawbacks to store data blocks. A first drawback is a lack of practical de-duplication consideration for storing data blocks, which leads to worse storage capacity waste. Second drawback is the requirement for high performance computer system for processing large data blocks. To address these problems, this paper proposes a clustering backup system that exploits file fingerprinting mechanism for block-level de-duplication. Our approach differs from the traditional file server systems in two ways. First, we avoid the data redundancy by multi-level file fingerprints technology which enables us to use storage capacity efficiently. Second, we applied a cluster technology to I/O subsystem, which effectively reduces data I/O time and network bandwidth usage. Experimental results show that the requirement for storage capacity and the I/O performance is noticeably improved.

Android Application Code Protection Scheme Using Fingerprint Authentication and Dynamic Loading (지문 인증과 동적 로딩을 이용한 안드로이드 애플리케이션 코드 보호 기법)

  • Lyoo, Hwahn-il;Suk, Jae-Hyuk;Park, Jin-Hyung;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1361-1372
    • /
    • 2017
  • If an external attacker takes from a victim's smartphone a copy of a secret application or an application to which fingerprinting technique is applied, secret information can be leaked or the legitimate user can be misunderstood as an illegal redistributor, which results in a serious security problem. To solve this problem, this paper proposes an Android application code protection scheme using fingerprint authentication and dynamic loading. The proposed scheme divides one application into CLR(Class LoadeR) and SED(SEperated Dex). CLR is an APK file with the ability to dynamically load the SED, and the SED is a file containing the classes required to run the application. The SED is stored inside the smartphone after being encrypted, and the SED can be decrypted only if the user is successfully authenticated using his or her fingerprint. The proposed scheme can protect the application code from the attacker who physically acquired user's smartphone.

정보보호 인증기술 연구 센터

  • Jeong, Han-Jae;Won, Dong-Ho;Kim, Seung-Joo
    • Review of KIISC
    • /
    • v.19 no.4
    • /
    • pp.59-64
    • /
    • 2009
  • 정보보호 인증기술 연구센터는 초경량 저비용의 인증 원천 기술 개발, 통합 인증 시스템 개발, 정보가전 네트워크에서의 인증기술 개발 등 정보보호를 위한 인증기술을 개발하기 위하여 연구 개발을 진행해왔다. 또한, 공통평가기준(CC, Common criteria) 및 CMVP(Cryptographic module verification program)와 같은 보안성 평가에 관한 많은 연구 및 과제수행을 진행하였다. 특히 본 연구센터는 대학기관 중 국내 최초로 정보보호제품에 대한 CC인증 자문을 수행하였으며, 센터에 소속된 연구원들이 대학원생 최초로 수습 평가자 자격증을 취득하였다. 또한 2008년에는 지문인식 시스템 보호프로파일, 개방형 스마트카드 플랫폼 보호파일 등 총 6종의 보호프로파일을 개발하였다. 마지막으로 센터는 우수한 정보보호인력 양성을 목표로 다양한 지원 및 제도를 운영하였다. 그 결과 다수의 우수 연구논문 발표, 국내외 특허 출원 및 등록, 기술이전 및 우수인력 배출 등 당초 목표 이상의 실적으로 달성하였다. 향후 정보보호 인증기술 연구센터는 지금까지 구축된 인증기술 및 보안기술과 산학협력 네트워크 등을 기반으로 우리나라가 인증기술 및 정보보호 산업의 강국으로 자리잡는데 지속적으로 기여할 것으로 기대된다.

Smartphone Backup System Using Deduplication Scheme (중복 제거 기술을 이용한 스마트폰 백업 시스템)

  • Jeong, Ho Min;Kim, Byung-Ki;Song, Chang-Geun;Ko, Young-Woong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1803-1806
    • /
    • 2010
  • 스마트폰에서 용량을 많이 차지하는 멀티미디어 컨텐츠, 응용 프로그램 데이터가 증가하면서 스마트폰을 위한 백업 프로그램에 대한 요구가 증가하고 있다. 본 논문에서는 중복 제거 기법을 적용한 스마트폰 백업 기술을 제안함으로 네트워크 대역폭을 효율적으로 사용하고 저장 공간을 줄일 수 있는 방안을 제시하고 있다. 제안하는 중복 제거 방식은 스마트폰에서 각 파일을 일정한 크기의 블록 단위로 분할하고 지문을 부여하고, 지문이 동일하지 않을 경우에만 데이터를 전송하는 방식을 사용한다. 실험결과 제안하는 방식이 네트워크 대역폭 및 저장 공간을 효율적으로 사용함을 보이고 있다.

Suggestions for Solving Errors and Integrity Guarantees in the Process of Transferring Standard Electronic Documents (표준 전자문서 이관 시 발생하는 무결성 보장 및 오류 해결에 대한 제언)

  • Yu, Young-Moon
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.20 no.3
    • /
    • pp.1-21
    • /
    • 2020
  • Although the National Archives of Korea has been receiving transfer of standard electronic documents with a retention period of more than 30 years from the central administration since 2015, errors and inefficiencies persist. Despite this, however, there remain no studies that analyze or address these issues. This study aims to bridge this gap and found that most errors in the transfer process occur at the production stage. To address such, this study proposes a four-step solution. First, before electronic document approval, the text and attached files are checked for defects to prevent errors. Second, as soon as the signature is made, digital signatures are applied on a file-by-file basis to ensure integrity. Third, integrity verification and transfer inspection are automatically performed through digital signature investigation and defect check procedure during transfer and preservation. Fourth and last, the criteria of acquiring records and integrity guarantee technologies are properly applied in production stage with proper management and supervision.

Storage System Performance Enhancement Using Duplicated Data Management Scheme (중복 데이터 관리 기법을 통한 저장 시스템 성능 개선)

  • Jung, Ho-Min;Ko, Young-Woong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.1
    • /
    • pp.8-18
    • /
    • 2010
  • Traditional storage server suffers from duplicated data blocks which cause an waste of storage space and network bandwidth. To address this problem, various de-duplication mechanisms are proposed. Especially, lots of works are limited to backup server that exploits Contents-Defined Chunking (CDC). In backup server, duplicated blocks can be easily traced by using Anchor, therefore CDC scheme is widely used for backup server. In this paper, we propose a new de-duplication mechanism for improving a storage system. We focus on efficient algorithm for supporting general purpose de-duplication server including backup server, P2P server, and FTP server. The key idea is to adapt stride scheme on traditional fixed block duplication checking mechanism. Experimental result shows that the proposed mechanism can minimize computation time for detecting duplicated region of blocks and efficiently manage storage systems.

Use of Microsatellite Markers Derived from Genomic and Expressed Sequence Tag (EST) Data to Identify Commercial Watermelon Cultivars (수박 시판 품종의 식별을 위한 Genomic과 Expressed Sequence Tag (EST)에서 유래된 Microsatellite Marker의 이용)

  • Kwon, Yong-Sham;Hong, Jee-Hwa;Kim, Du-Hyun;Kim, Do-Hoon
    • Horticultural Science & Technology
    • /
    • v.33 no.5
    • /
    • pp.737-750
    • /
    • 2015
  • This study was carried out to construct a DNA profile database for 102 watermelon cultivars through the comparison of polymorphism level and genetic relatedness using genomic microsatellite (gMS) and expressed sequence tag (EST)-microsatellite (eMS) markers. Sixteen gMS and 10 eMS primers showed hyper-variability and were able to represent the genetic variation within 102 watermelon cultivars. With gMS markers, an average of 3.63 alleles per marker were detected with a polymorphism information content (PIC) value of 0.479, whereas with eMS markers, the average number of alleles per marker was 2.50 and the PIC value was 0.425, indicating that eMS detects a lower polymorphism level compared to gMS. Cluster analysis and Jaccard's genetic distance coefficients using the unweighted pair group method with arithmetic average (UPGMA) based on the gMS, eMS, and combined data sets showed that 102 commercial watermelon cultivars could be categorized into 6 to 8 major groups corresponding to phenotypic traits. Moreover, this method was sufficient to identify 78 out of 102 cultivars. Correlation analysis with Mantel tests for those clusters using 3 data sets showed high correlation ($r{\geq}0.80$). Therefore, the microsatellite markers used in this study may serve as a useful tool for germplasm evaluation, genetic purity assessment, and fingerprinting of watermelon cultivars.

Attendance Check System based on Smartphone using QR code (QR코드를 활용한 스마트폰 기반 출석체크 시스템)

  • Park, Sunju
    • Journal of The Korean Association of Information Education
    • /
    • v.18 no.2
    • /
    • pp.325-334
    • /
    • 2014
  • There are management and price problems that have been caused by requirement of RFID reader, Fingerprint Identification System and Clicker for the construct of automatic attendance system to check the students' attendance accurately and quickly. Therefore, in the thesis, we developed smartphone based attendance check system by utilizing Wi-Fi and the smartphones that has been already built without using additional equipments and establishing construction of system additionally. It recognizes date, time, location and the seat number in classroom if a student logs the attendance chocking application in and it also allows students to get lecture feedback and check attendance by taking quizzes and questionnaires that are related to the lecture. As a result, by applying the attendance check system, instructors state that it is convenient since the app allows instructors to communicate with students though the quizzes and questionnaires. Especially, the instructors state that it is convenient because the results of the quizzes, questionnaires and attendance can be downloaded it the from of Excel files.