• Title/Summary/Keyword: 호의 등록

Search Result 347, Processing Time 0.025 seconds

New Cultivar 'White Edge' of Leaf Variegated Hosta minor (좀비비추의 잎변이 품종 'White Edge' 육성)

  • Kim, Hyun Jin;Lee, Jong Suk;Park, Kwang Woo;Kim, Sik Sung
    • Korean Journal of Plant Resources
    • /
    • v.26 no.4
    • /
    • pp.516-518
    • /
    • 2013
  • A new leaf variegated cultvar 'White Edge' was developed by ethyle methane sulfonate(EMS) treatment on seed of Hosta minor. Among induced leaf variegated plant, some with white color on the edge of the leaves was selected. They were cultivated via vegetative propagation. 'White Edge' was finally selected through the test of characteristics from 2003 to 2005. Assessment of botanical characteristics was conducted for three years. The major characteristic of these cultivar is that they maintain uniformly all year round. 'White Edge'(Grant No.1880) was registered to the Korea Seed and Variety Service(KSVS) for commercialization in 2007. These cultivar are useful as materials for pot or as ground cover plants.

전자금융 침해사고 예방 및 대응 강화 방안

  • Lee, Jung-Ho
    • Review of KIISC
    • /
    • v.18 no.5
    • /
    • pp.1-20
    • /
    • 2008
  • 편리한 금융거래 수단으로써 인터넷뱅킹을 포함한 전자금융 서비스가 생활화 되었으며 그 중요성 또한 갈수록 증가하고 있다. 이에 대한 부작용으로서 사용자의 실수나 금융기관, 쇼핑몰, 포털 등의 해킹을 통한 전자금융 접근매체의 유출, 비정상적인 지불결제나 인터넷뱅킹 이체 사고 등 침해사고 또한 함께 증가하고 있다. 금융권은 금융감독원을 중심으로 전자금융 종합보안 대책 수립(2005년) 및 전자금융거래법 시행(2007년) 등을 통해 고객 PC의 해킹방지를 위한 다양한 보안프로그램 제공 의무화, 보안등급에 따른 이체한도 차등화, 금융권 통합 OTP 인증체계 구축 등 전자금융 침해사고 예방을 위한 적극적인 노력을 기울여오고 있으나, 최근 들어 피싱/파밍 등 신종 사이버사기 기법이나 해외의 전문 해커에 의해 개발된 고도의 지능화된 해킹툴이 사용되어 보안프로그램을 무력화시킨 후 고객정보를 유출해가거나 일반 포털사이트, 웹하드, 웹메일 등의 해킹을 통해 인터넷 사이트에 등록된 고객의 인터넷뱅킹 접근 매체를 유출하여 인터넷뱅킹 침해 사고를 일으키는 등의 신종 침해사고를 완벽히 차단하지는 못하고 있어, 더욱 강력한 전자금융 침해사고 예방 통제 방안의 수립과 함께 침해사고 발생 시 원인 파악 및 범인 검거를 위한 역추적 시스템의 구축 등 기존 보안체계를 대폭 강화할 필요성이 발생하고 있다. 본 연구에서는 시중 은행의 인터넷뱅킹 침해사고 발생 현황 조사를 중심으로 최근 발생한 전자금융 침해사고의 추이분석, 침해사고 주요 원인과 기존 대응 체계의 현황, 한계점 등을 파악하였다. 그리고 전자금융 침해사고의 효과적인 예방 및 대응 강화 방안으로서 사용자 관점에서 공인인증서를 중심으로 한 전자금융 접근매체의 관리 강화 방안을 제안하였으며, 전자금융 서비스를 제공하는 금융 기관 관점에서 효과적인 전자금융거래 로깅 및 역추적 시스템의 구축 및 전체 금융기관과 감독기관 간의 유기적인 공조를 기반으로 한 침해사고 공동 대응체계의 구축 및 운영을 위한 시스템의 구성 방법, 운영 프로세스, 관련 법률의 검토 및 대응 방법 등을 제안하였다.

U-Healthcare user's privacy protection protocol with Implantable medical Device of State Information (상태정보에 따른 체내삽입형 장치를 부착한 유-헬스케어 환자의 프라이버시 보호 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4C
    • /
    • pp.297-306
    • /
    • 2012
  • IT technology of U-healthcare system is being grafted onto medical services and the use of U-healthcare system are extending steadily. However, in case of patients using Implantable Medical Device (IMD) in U-healthcare system, patients' privacy protection and safe access to system recently has emerged as a major issue. This paper proposes a patients' privacy protection protocol to prevent any illegal accesses from third parties as state value and action value are synchronized after patients' information virtualization. The proposed protocol can limit the access range of patients' information according to authentication information of hospitals, doctors, nurses, and pharmacies registered in the U-healthcare server. Additionally, this protocol can increase management efficiency for patients' privacy by synchronizing state values and action values only for approved information and, by instituting this process, third parties cannot easily access patients' information.

A Software Framework to provide multiple VPMN MSISDNs with a Single IMSI (단일 IMSI로 다중 VPMN MSISDN을 제공하기 위한 소프트웨어 프레임워크)

  • Lee, Dong-Cheul;Rhee, Byung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.75-81
    • /
    • 2011
  • The UMTS is the most widely used specifications to deploy a mobile system and it supports an automatic roaming function. Users in the UMTS can use their phone numbers even in foreign countries without having to change their mobile phones. Also some users want to use other phone numbers which are allocated in foreign countries. To meet such requirements, many methods have been proposed. However, those require much cost to adopt or are not easy to use. In this paper, we propose a software framework that provides multiple MSISDNs with a single IMSI. The roaming SCP is adopted to modify the procedure of the location update and the mobile-terminated call. In the performance evaluation, we compared the proposed scheme with the standard scheme and the schemes in the related works. The results showed that the proposed scheme has 7.6% lower signaling cost than the mobile-station-based scheme and 9.7% lower cost than the telecommunication-network-based scheme.

발명하는 사람들-제50호

  • Han, Mi-Yeong
    • The Inventors News
    • /
    • no.50
    • /
    • pp.1-16
    • /
    • 2006
  • '제1회 여대생 발명캠프' 성황리에 마쳐/'발명으로 풍성한 가을을 맞이하시길'/IT기업, 국내 특허 30% 이상 넘었다/레이저 프린터 특허출원, 프린터 분야 중 최다/피부 보호하는 자외선 차단제, 특허출원 꾸준히 증가/액정표시장치 관련 특허 지속적 증가/진공청소기, 첨단 기술로 혁신 꾀해/소멸특허정보, 온.오프라인 제공/발명 지도자 양성 연수, 온라인에서 이루어진다/검색율증가로 활발한 지재권 활동 기대/'2006상표-디자인 전시회'/표준기술특허로 신제품 개발 쉬워져/김광림 전 차관, 세명대 총장에 취임/영양 살린 '기능성 국수' 눈길 끌어/특허청, 포스코와 혁신 파트너십 체결/한국특허정보원, 성과 관리제 도입으로 경영 성과 극대화/특허청, 상반기 미국 국제특허출원 심사 1백18건 유치/중소기업 48%, 고액 기술이전비 '지불 가능'/특허청, 고객눈높이 맞춘 민원서비스 제공/모범명세서 첨부제도로 특허 받기 쉬워져/'여성 발명인의 축제' 개최/'제5회 전국 대학발명 경진대회'/'미스터 차우' 둘러싼 상표권 분쟁 치열/외환은행, 외국인 근로자 해외송금서비스 특허 획득/재난 방지 시스템 구축 핵심기술, 특허출원 증가/비밀디자인 청구기간 확대/이젠, 여름용품 정리할 때/역사 속의 발명품/하루 10분 발명교실/특허Q&A/한경희 (주)한경희 생활과학 대표이사/특허청, 수해복구에 두 팔 걷고 나서/무선환경에서의 저작권보호 관련 외국인출원 급증/아이디어 착상 및 발명 기법/다림질 편하게 하는 요령 10가지/발명을 통한 사업화, 시대의 흐름과 인간의 마음을 담아야/스텐서의 전자레인지/3차원 구조물 만들수 있는 나노종이 개발/애플, 크리에이티브에 1억불 지급/흰 우유에 꽂으면 딸기맛 나는 '퍼니스토로우'/한올제약, 씹는 비만 치료제 특허 취득/음성군, 기술로 복숭아 털 알레르기 잡았다/향기로 소비자 마음을 사로잡는다/'독일 국제 아이디어.발명.신제품 전시회'/한국여성발명협회 회원사 발명품 가이드/코네쥬얼리, 우선심사 통해 특허등록/

  • PDF

Nondestructive Analysis on Miniature Pagoda of Sarira Reliquary (Treasure No. 259-2) from Sujong-sa Temple (수종사(水鍾寺) 석조(石造) 부도내(浮屠內) 금동제구층탑(金銅製九層塔)(보물(寶物) 제(第)259-2호(號))의 비파괴(非破壞) 분석조사(分析調査))

  • Kwon, Hyuknam;Yu, Heisun;Kang, Hyungtae
    • Conservation Science in Museum
    • /
    • v.4
    • /
    • pp.57-61
    • /
    • 2003
  • From the stupa of Sujongsa-Temple, located in Yangpyeong, Gyeonggi-do province, was excavated a celadon jar with lid, a gilt-bronze nine-storied miniature pagoda and a silver-plate hexagonal miniature shrine, etc. Among them, the gilt-bronze miniature pagoda has been known as a gilt-bronze product since most of its surface has copper tint and the base part has bronze corrosion. Its formal title registered on the Cultural Properties Administration also begins with "a gilt-bronze". However, it was supposed to be a gold product in many aspects: the color and status of the surface, degree of the bronze corrosion creation and the metal thread joining the wind bell. So the necessity to prove its material by a scientific analysis was raised. We examined it with nondestructive method. The results were traces of open-working on many parts of the surface, but no traces of gilding. Moreover, as we perform an XRF analysis, the main component were gold and silver(16%) and some impurities such as copper and iron were found. Therefore, it could be inferred that this miniature pagoda is a gold product.

A Study on Hacking Attack of Wire and Wireless Voice over Internet Protocol Terminals (유무선 인터넷전화 단말에 대한 해킹 공격 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.299-302
    • /
    • 2011
  • Recently, Voice over Internet protocol(VoIP) in IP-based wired and wireless voice, as well as by providing multimedia information transfer. Wired and wireless VoIP is easy on illegal eavesdropping of phone calls and VoIP call control signals on the network. In addition, service misuse attacks, denial of service attacks can be targeted as compared to traditional landline phones, there are several security vulnerabilities. In this paper, VoIP equipment in order to obtain information on the IP Phone is scanning. And check the password of IP Phone, and log in successful from the administrator's page. Then after reaching the page VoIP IP Phone Administrator Settings screen, phone number, port number, certification number, is changed. In addition, IP Phones that are registered in the administrator page of the call records check and personal information is the study of hacking.

  • PDF

An Optimal ILP Algorithm of Memory Access Variable Storage for DSP in Embedded System (임베디드 시스템에서 DSP를 위한 메모리 접근 변수 저장의 최적화 ILP 알고리즘)

  • Chang, Jeong-Uk;Lin, Chi-Ho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.2
    • /
    • pp.59-66
    • /
    • 2013
  • In this paper, we proposed an optimal ILP algorithm on memory address code generation for DSP in embedded system. This paper using 0-1 ILP formulations DSP address generation units should minimize the memory variable data layout. We identify the possibility of the memory assignment of variable based on the constraints condition, and register the address code which a variable instructs in the program pointer. If the process sequence of the program is declared to the program pointer, then we apply the auto-in/decrement mode about the address code of the relevant variable. And we minimize the loads on the address registers to optimize the data layout of the variable. In this paper, in order to prove the effectiveness of the proposed algorithm, FICO Xpress-MP Modeling Tools were applied to the benchmark. The result that we apply a benchmark, an optimal memory layout of the proposed algorithm then the general declarative order memory on the address/modify register to reduce the number of loads, and reduced access to the address code. Therefor, we proved to reduce the execution time of programs.

GPS Based Sensor Network Research for Prediction of Incident (GPS 기반 돌발 상황 예측을 위한 센서네트워크 연구)

  • Jung, Hui-Sok;Won, Dae-Ho;Yang, Yeon-Mo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.454-456
    • /
    • 2010
  • The demands for (a) individual vehicle has been gradually increasing recently due to increase of personal income and spare time. In 2009, the quantities of registered vehicles exceeds over 17,325,210 millions pieces, and the risks of traffic accidents and traffic jam are increasing days by days. It has some limitations to solve the problem of traffic jam by transportation facilities and causes lots of time and costs. For a possible solution, ITS(Intelligent Transport System) has been introduced, but it is an insufficient way for abrupt incidents or risks on roads. The riskiest matter on driving a vehicle is unforeseen situation. In this paper, the most efficient and economical system that communicates with a driver about unexpected accident by sensor network and GPS information, is introduced rather than a traditional method associated with lots of time and costs.

  • PDF

Network topology automatic configuration and remote fault diagnosis system (네트워크 토폴로지 자동 구성 및 원격 장애진단 시스템)

  • Shim, Kyou-Chul;Hwang, Gyung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.548-556
    • /
    • 2018
  • NMS (Network Management System) is a system that is used for a small or large networks management. As the size of network becomes larger and the configuration information become complicated, it becomes more difficult to grasp the network status and it takes much time to diagnose the failure of the network equipment. In this paper, to alleviate the problems of NMS we implement web-based network topology automatically using JavaScript, Python, HTML5 based TWaver. The detailed implementation of the system include the automatic collection of the connection information based on the equipment information registered in the NMS system, the implementation of the web-based network topology and the remote fault diagnosis. In the network topology, we can expect to improve the quality of the NMS system through structured data management by adding the configuration management, fault management and performance management functions in a comprehensive manner.