• Title/Summary/Keyword: CAD Security

Search Result 26, Processing Time 0.025 seconds

Cloud CAD in the Security Technology Category (클라우드 CAD에서의 도면 보안 기술 분류)

  • Bae, Tae-won;Hong, Mi;Lee, Jong-kun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.827-830
    • /
    • 2011
  • 클라우드 CAD는 기존 사용자들의 작업 효율성 증대 및 기업의 자원 절약뿐만이 아니라 설계와 현장간의 협업 등 많은 부분에서 큰 효과를 가져다 줄 것으로 기대하고 있다. 하지만 많은 기업들이 도면, 문서 등이 관련된 보안에 관련된 문제로 인해 클라우드 CAD를 사용함에 있어서 망설이고 있다. 이에 본 논문에서는 현재 시중에 출시되어 있는 대표적인 클라우드 CAD인 AutoCAD WS와 몇몇 기업에서 적용중인 가상화 클라우드 CAD를 기준으로 하여 기업에 적용시 문제가 될 수 있는 보안 문제를 알아보고 그 해결 방안을 제시한다.

Neutral Reference Model for Engineering Change Propagation in Global Top-down Modeling Approach

  • Hwang, Jin-Sang;Mun, Du-Hwan;Han, Soon-Hung
    • International Journal of CAD/CAM
    • /
    • v.7 no.1
    • /
    • pp.81-89
    • /
    • 2007
  • As the modular production is an important issue in globalized manufacturing industries, sub modules or parts of the final product are provided by many suppliers. Some part suppliers design their own products for themselves. In some cases, part supplier may provide the same type product to multiple 1-tier companies. Because all suppliers and 1-tier companies can not use the same CAD system in general case, the engineering change in the CAD model of one company could not propagate to related CAD models of other companies directly. Although they use the same CAD system, it is hard to share their CAD model with each other because of company security policy. In this paper, the neutral reference model, which consists of the neutral skeleton model and the external reference model, is proposed to apply a global top-down modeling approach to collaborating companies.

A Comparison Algorithm of Rectangularly Partitioned Regions (직사각형으로 분할된 영역 비교 알고리즘)

  • Jung, Hae-Jae
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.53-60
    • /
    • 2006
  • In the applications such as CAD or image processing, a variety of geometric objects are manipulated. A polygon in which all the edges are parallel to x- or y-axis is decomposed into simple rectangles for efficient handling. But, depending on the partitioning algorithms, the same region can be decomposed into a completely different set of rectangles in the number, size and shape of rectangles. So, it is necessary an algorithm that compares two sets of rectangles extracted from two scenes such as CAD or image to see if they represent the same region. This paper proposes an efficient algorithm that compares two sets of rectangles. The proposed algorithm is not only simpler than the algorithm based on sweeping method, but also reduces the number $O(n^2)$ of overlapped rectangles from the algorithm based on a balanced binary tree to O(nlogn).

  • PDF

Neutral Reference Model for the Sharing and Propagation of Engineering Change Information in a Collaborative Engineering Development (협업 개발 내 설계 변경 정보의 공유 및 전파를 위한 중립 참조 모델)

  • Hwang, Jin-Sang;Mun, Du-Hwan;Han, Soon-Hung
    • Korean Journal of Computational Design and Engineering
    • /
    • v.13 no.4
    • /
    • pp.243-254
    • /
    • 2008
  • As modular production becoming increasingly widespread in globalized manufacturing industries, sub modules or parts of the final product are being provided by many suppliers. Some part suppliers design their own products for themselves. In some cases, part suppliers provide the same type of product to multiple OEM companies. Because all part suppliers and OEM companies typically cannot use the same CAD system, engineering change in the CAD model of one company cannot be directly propagated to related CAD models of other companies. Even if two companies use the same CAD system, it may be difficult to share their CAD model owing to corporate security policy. In this paper, a neutral reference model that consists of a neutral skeleton model and an external reference data model is proposed as a new medium for the sharing and propagation of engineering change information among collaborating companies.

Digital Watermarking for Copyright Protection of 3-D CAD Design Drawing Based on Vector Data Using Digital Watermarking

  • Kwon, Ki-Ryong;Lee, Suk-Hwan;Park, Seung-Seob;Jeong, Tai-Il
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.12
    • /
    • pp.1596-1606
    • /
    • 2006
  • There has been more increased the development of 3D technique since many 3D contents of 3D graphic model, 3D mobile/computer game, and 3D CAD have been serviced in Web or industry fields. Therefore, the watermarking system is more required to protect the copyright for 3D contents. Currently there has been researched about the watermarking for 3D graphic model of mesh or NURBS. However, watermarking technique based on CAD design drawing leaves something to be desired yet. This paper proposed the watermarking technique for 3D CAD design drawing using Line and Arc components. After drawing out Line and Arc components from designed drawing, we embed the watermark into both the length of Line component and the radius of Arc component. Experimental results verified that the proposed algorithm satisfies the transparency about watermarked drawing and also has the robustness against several attacks by using public CAD tool.

  • PDF

Vector Data Hashing Using Line Curve Curvature (라인 곡선 곡률 기반의 벡터 데이터 해싱)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.2C
    • /
    • pp.65-77
    • /
    • 2011
  • With the rapid expansion of application fields of vector data model such as CAD design drawing and GIS digital map, the security technique for vector data model has been issued. This paper presents the vector data hashing for the authentication and copy protection of vector data model. The proposed hashing groups polylines in main layers of a vector data model and generates the group coefficients by the line curve curvatures of the first and second type of all poly lines. Then we calculate the feature coefficients by projecting the group coefficients onto the random pattern and generate finally the binary hash from the binarization of the feature coefficients. From experimental results using a number of CAD drawings and GIS digital maps, we verified that the proposed hashing has the robustness against various attacks and the uniqueness and security by the random key.

A Watermarking Scheme Based on k-means++ for Design Drawings (k-means++ 기반의 설계도면 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.5
    • /
    • pp.57-70
    • /
    • 2009
  • A CAD design drawing based on vector data that is very important art work in industrial fields has been considered to content that the copyright protection is urgently needed. This paper presents a watermarking scheme based on k-means++ for CAD design drawing. One CAD design drawing consists of several layers and each layer consists of various geometric objects such as LINE, POLYLINE, CIRCLE, ARC, 3DFACE and POLYGON. POLYLINE with LINE, 3DFACE and ARC that are fundamental objects make up the majority in CAD design drawing. Therefore, the proposed scheme selects the target object with high distribution among POLYLINE, 3DFACE and ARC objects in CAD design drawing and then selects layers that include the most target object. Then we cluster the target objects in the selected layers by using k-means++ and embed the watermark into the geometric distribution of each group. The geometric distribution is the normalized length distribution in POLYLINE object, the normalized area distribution in 3DFACE object and the angle distribution in ARC object. Experimental results verified that the proposed scheme has the robustness against file format converting, layer attack as well as various geometric editing provided in CAD editing tools.

Design and Implementation of Information Security System to Prevent Leakage of Drawing Information (설계정보 유출방지를 위한 정보보안시스템 설계 및 구현)

  • Chang, H.B.;Lee, H.S.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.11 no.5
    • /
    • pp.327-334
    • /
    • 2006
  • Recently, security incidents are growing rapidly in which internal employees let the drawing leak out to competitors or other countries. This type of security incidents has a characteristic that it occurs less frequently than other types of security incidents such as network or server security incident, but the damage is a lot more serious. The existing information security technologies to prevent internal information from being leaked out are only applicable to general documents(office documents, web pages and image files in which data are encrypted one by one). However, architectural drawings made up of collection of files with various formats(extensions) have problems with the process speed of en(de) cryption and accuracy, so the developments of security technologies by new methods are required. In this study, we design and develop a security technology based on work area with which users can protect the leakage of critical information in the kernel level while maintaining their work environment when they have to use sharing information that cannot be managed by the unit of file. As a result, we developed the "Virtual Secure Disk" which allows only authorized users and applications to have an access to drawings, and have verified its security by applying it to the actual company.

Translation of 3D CAD Data to X3D Dataset Maintaining the Product Structure (3차원 CAD 데이터의 제품구조를 포함하는 X3D 기반 데이터로의 변환 기법)

  • Cho, Gui-Mok;Hwang, Jin-Sang;Kim, Young-Kuk
    • The KIPS Transactions:PartA
    • /
    • v.18A no.3
    • /
    • pp.81-92
    • /
    • 2011
  • There has been a number of attempts to apply 3D CAD data created in the design stage of product life cycle to various applications of the other stages in related industries. But, 3D CAD data requires a large amount of computing resources for data processing, and it is not suitable for post applications such as distributed collaboration, marketing tool, or Interactive Electronic Technical Manual because of the design information security problem and the license cost. Therefore, various lightweight visualization formats and application systems have been suggested to overcome these problems. However, most of these lightweight formats are dependent on the companies or organizations which suggested them and cannot be shared with each other. In addition, product structure information is not represented along with the product geometric information. In this paper, we define a dataset called prod-X3D(Enhanced X3D Dataset for Web-based Visualization of 3D CAD Product Model) based on the international standard graphic format, X3D, which can represent the structure information as well as the geometry information of a product, and propose a translation method from 3D CAD data to an prod-X3D.

AES-CCM Hardware Architecture using a shared SBox for home security

  • Tumurbaatar, Selenge
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.181-184
    • /
    • 2008
  • This work was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Assessment) and Yonsei University Institute of TMS Information Technology, a Brain Korea 21 program, Korea. CAD Tools were supported by IDEC.

  • PDF