• Title/Summary/Keyword: DB Server

Search Result 280, Processing Time 0.125 seconds

A Study on Quantitative Security Assessment after Privacy Vulnerability Analysis of PC (PC의 개인정보보호 취약점 분석과 정량화된 보안진단 연구)

  • Seo, Mi-Sook;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.456-460
    • /
    • 2012
  • Privacy Protection Act of 30 March 2012 was performed. In general, personal information management to enhance security in the DB server has a security system but, PC for the protection of the privacy and security vulnerability analysis is needed to research on self-diagnosis. In this paper, from a PC to search information relating to privacy and enhance security by encrypting and for delete file delete recovery impossible. In pc found vulnerability analysis is Check user accounts, Checking shared folders ,Services firewall check, Screen savers, Automatic patch update Is checked. After the analysis and quantification of the vulnerability checks through the expression, enhanced security by creating a checklist for the show, PC security management, server management by semi-hwahayeo activates. In this paper the PC privacy and PC security enhancements a economic damage and of the and Will contribute to reduce complaints.

  • PDF

Design and Implementation of SK-VM based Avatar E-mail Service System (SK-VM 기반의 Avatar E-mail 서비스 시스템 설계 및 구현)

  • Lee Kyung-Jin;Song Wang-Cheol;Lee Jung-Yun
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.4
    • /
    • pp.212-218
    • /
    • 2005
  • These days, mobile technology is developing very fast. It has increased the usage of the Internet by mobile phones. Nowadays the avatar and game contents services are most popular in mobile phones using the Internet. In this paper, we propose a Client/Server system to combine the animation avatar and e-mail services on SK-VM which are different from simple avatar services. The server which consists of DB (database) module and mail management module is designed in order to manage the information about avatar and the user. The client is designed so as to show the email contents and avatar animation on the mobile phone. This model is intended to reduce the performance overhead on the client as much as possible. We expect that this module would be useful in the mobile phones with limited resources, although the technology is being developed very rapidly.

  • PDF

A System Development for Remotely Controlling Windows and Doors in Mobile Environment (모바일 환경에서의 원격 창호 관제시스템 개발)

  • Cho, Yong-Hyun;Ryu, Sung-Won;Ahn, Kyung-Gyu
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.4
    • /
    • pp.334-341
    • /
    • 2015
  • This paper develops a new system for remotely monitoring and controlling the windows and doors in mobile environment. We design and implement the opening and shutting unit, the gateway, and the control server system, respectively. The opening and shutting unit consists of the driver using DC motor and the motion controller which monitors the state and transfers the control information. The gateway supports TCP/IP and CDMA protocol, which is the interface of wire and wireless communication for transferring the current state and control information. The control server consists of the program to store and process the control information, the middleware to support the processing of various state message, and DB for monitoring the state and remotely controlling the system. Especially, an application software and the Web-based user interface have also been developed to support the mobile environment. The operation performances, environment influences, driving persistences, and operation failure ratio, which are based on PC and smart-phone, have been tested in 2 authorized agencies. The test results show that the developed system has a superior performance.

Development of EBPP for Korea e-Post System (우체국 전자상거래 시스템을 위한 EBPP개발)

  • 박태준
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1999.12a
    • /
    • pp.411-419
    • /
    • 1999
  • EBPP는 소비자, 사업자간에 고지서 발송, 접수 및 지불을 네트워크를 통하여 전자적으로 처리하는데 필요한 환경을 의미하며, 인터넷을 기반으로 하여 전자우편 혹은 웹 페이지를 통하여 고지서를 처리한다 EBPP 시스템은 크게 소비자, 사업자 그리고 은행간의 거래로 이루어 지지만 컴퓨터 및 인터넷의 보급의 한계 등의 문제로 현재로서 모든 고지서를 전자적으로 처리하는 것은 무리가 따른다. 그럼에도 불구하고 EBPP 시스템은 1) 경쟁력 확보를 위해 기업/금융 기관들이 인터넷을 통한 고품질 서비스 개발에 주력하는 추세이고, 2) 고객과의 보다 긴밀한 관계 유지를 위한 수단 제공하며, 3) 인터넷 등 온라인 통신 인구가 급격한 증가(2701년에 전체 인구의 약 50%가 활용할 것으로 전망)하고 있으며,4) 소비자를게 보다 편리한 지불방법 제시해주며, 5) 또 다른 마케팅 매체로 활용 가능하므로 앞으로의 전망이 매우 밝다. EBPP시스템은 크게 금융기관, 기업, 소비자 부분으로 구성되며, 소비자와 접촉 방법으로는 대표적으로 Web과 전자우편을 생각할 수 있으며, EBPP 시스템을 구축하기 위해서는 기본적으로 상접 혹은 기업에서 청구에 필요한 정보를 등록시키는 통합 청구서버(Bill consolidation server), 소비자에게 청구 가능한 정보를 갖고있는 청구 제시서버 (Bill presentment server), 소비자의 지불요청에 따라 은행으로부터 지불을 요구하는 지불서버(Payment gateway) 등이 필요하며, 이들 각각의 서버들의 구성 요소들은 제공하는 서비스에 따라 달라질 수 있다. 통합 청구서버에서 청구 제시서버로 전송되는 청구 건은 통상적으로 실시간 처리되는 것이 아니라 통합 청구서버에 존재하는 Spool DB에 저장되어 그 양이 일정한도를 넘어서면 자동 전송되도록 하여, 망의 할용도를 높이는 역할을 수행한다. 청구 제시서버의 DB에 등록된 청구 건은 인터넷을 통해 소비자에게 청구되며, 소비자에게 전송 되는 청구서는 사용자DB를 참조하여 사용자가 미리 정의한 원하는 형태로 변환되어 전달되며, 필요시 암호화 과정을 거치는 것이 가능해야 한다. 전송된 청구서는 전자우편의 경우, 암호해독이 가능한 전용 브라우저를 통해 열람 되며, 이는 다시 전용 브라우저를 통해 지불인증이 승인되어 청구 제시서버에게 전송된다. EBPP 시스템의 제어 흐름은 크게 기업이 청구 정보를 소비자에게 제시하는 흐름과 소비자의 지불 승인으로 인해 기업이 은행에 지불을 요구하는 흐름으로 구분할 수 있다. 본 논문에서는 통합 청구서버 및 정구 제시서버의 역할 및 구성 요소들에 대해 서술하고, EBPP 시스템과 연동하여야 하는 메일 서버와의 상호 작용에 대해 서술할 것이다. 본 시스템을 아직 구현이 되지 않은 관계로 시스템의 성능 등의 수치적 결과를 제시할 수 없는 상태다.

  • PDF

A Study on Countermeasures of Convergence for Big Data and Security Threats to Attack DRDoS in U-Healthcare Device (U-Healthcare 기기에서 DRDoS공격 보안위협과 Big Data를 융합한 대응방안 연구)

  • Hur, Yun-A;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.243-248
    • /
    • 2015
  • U-Healthcare is a convergence service with medical care and IT which enables to examine, manage and maintain the patient's health any time and any place. For communication conducted in U-Healthcare service, the transmission methods are used that patient's medical checkup analysis results or emergency data are transmitted to hospital server using wireless communication method. At this moment when the attacker who executes the malicious access makes DRDoS(Distributed Reflection DoS) attack to U-Healthcare devices or BS(Base Station), various damages occur that contextual information of urgent patients are not transmitted to hospital server. In order to deal with this problem, this study suggests DRDoS attack scenario and countermeasures against DRDoS and converges with Big Data which could process large amount of packets. When the attacker attacks U-Healthcare devices or BS(Base Station), DB is interconnected and the attack is prevented if it is coincident. This study analyzes the attack method that could occur in U-Healthcare devices or BS which are remote medical service and suggests countermeasures against the security threat using Big Data.

Development of a Volatile organic Compounds(VoCs) Liquefier on Integrated Management System based on ICT (ICT 기반의 휘발성 유기 화합물(VoC) 액화기 통합관리시스템 개발)

  • Kim, Gwan-Hyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1301-1306
    • /
    • 2015
  • This paper is to automate the intelligent and equipment to recycle the volatile organic compounds in various a gas stations and a laundry, in real life. In addition, based the ZigBee module and TCP/IP communications on ICT technologies, it's propose an integrated management system to monitor and manage an liquid at a remote location.Furthermore, it's propose a service model that can be freely managed from a remote location based on the app on android. In this paper, we present a communication protocol of the bridge modules and a liquefier of intelligent control system based ZigBee and MCU(Micro Controller Unit). Through the development of smart app based android mobile services in an integrated management system, it's represent for liquefier to a DB server for remote management(MS SQL 2012) and a web server (OS: Windows 2008).

Design and Implementation of Web Server for Analyzing Clickstream (클릭스트림 분석을 위한 웹 서버 시스템의 설계 및 구현)

  • Kang, Mi-Jung;Jeong, Ok-Ran;Cho, Dong-Sub
    • The KIPS Transactions:PartD
    • /
    • v.9D no.5
    • /
    • pp.945-954
    • /
    • 2002
  • Clickstream is the information which demonstrate users' path through web sites. Analysis of clickstream shows how web sites are navigated and used by users. Clickstream of online web sites contains effective information of web marketing and to offers usefully personalized services to users, and helps us understand how users find web sites, what products they see, and what products they purchase. In this paper, we present an extended web log system that add to module of collection of clickstream to understand users' behavior patterns In web sites. This system offers the users clickstream information to database which can then analyze it with ease. Using ADO technology in store of database constructs extended web log server system. The process of making clickstreaming into database can facilitate analysis of various user patterns and generates aggregate profiles to offer personalized web service. In particular, our results indicate that by using the users' clickstream. We can achieve effective personalization of web sites.

Development of Construction Information Management Module through the Use of Vector-Photo (벡터사진 활용을 통한 시공정보 관리모듈 개발)

  • Kim, Kyoon-Tai;Lim, Myung-Gu;Kim, Gu-Taek
    • Journal of the Korea Institute of Building Construction
    • /
    • v.13 no.6
    • /
    • pp.619-626
    • /
    • 2013
  • Many pictures are taken at a construction site, but the information of the pictures is not managed in an efficient and systematic manner. For this reason, when a construction worker has scant field experience or knowledge, it is hard to communicate with others efficiently. Therefore, the information of the pictures taken is not fully utilized in any deliberation or conflict among interested parties, facilities maintenance, and construction of another structure, although they were taken for those purposes. This study discusses the need for combining vector-photos with image and 5W and 1H information, and develops a prototype module for creating vector-photos and saving them in a server. The vector-photos taken can be saved to a server in real time, and efficiently managed by a DB system. If a system to link the vector-photos with a BIM model is developed in the future, it is expected that the vector information in the picture can be connected with the property information of an object. As a result, the vector-photos can be utilized in more diverse ways.

A Study on the Threat Review to use Secure Smartphone Applications (안전한 스마트폰 앱 사용을 위한 위협 요소 검토 연구)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.41-54
    • /
    • 2020
  • In this paper, it will study various problems such as personal information infringement from when using various useful Apps in the Smartphone environment. It also researched the vulnerabilities Mobile Apps and the risks of personal information leakage when using Smartphone information to decrease threat and find solution. In the second chapter, it will check the existing Mobile App related Apps. In the third chapter, it will check the threats and major factors that caused by the leakage of personal information which related to the app. Then it will suggest solution and end with conclusion. This paper also looked at various problems that caused by illegal adverse effect from illegal personal information collection. Then it researched and made suggestion to make consideration on safety of personal information and privacy infringement that threat to personal information For safety of mobile banking, it proposed a safety method to separate and manage the code which has the core logic which required to run the App. For safety of direction App, when running the direction App, even if the information is collected, location information for unauthorized accessed will encrypt and store in DB, so that access to personal information is difficult. For delivery App environment, by using the national deliver order call center's representative phone to receive a telephone order then, the customer information is delivered to the branch office when it receive order and it will automatically delete information from the server when the delivery is completed by improving DB server of order. For the smart work app environment, the security solution operates automatically by separating and make independent private and work areas. Then it will suggest initialization for company's confidential business information and personal information to safe from danger even if loss.

Design of Monitoring System based on IoT sensor for Health Management of an Elderly Alone

  • Hur, Hwa-La;Park, Myeong-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.81-87
    • /
    • 2020
  • In this paper, proposes a health status monitoring system for socially marginalized elderly households living alone. This system is implemented by collecting various PHR biometric signals and residential environment information through IoT devices. In addition, the company aims to establish a basic infrastructure that can understand the situation of lonely deaths and implement prevention programs by strengthening the predictive ability through data analysis of the DB server based on PHR and information collected from IoT sensors. The sensor consists of an environmental information collection sensor and a noncontact and wearable sensor for biometric signal collection. A gateway is required to transmit the collected data to the server, and the prototype is presented in this paper. The paper has a discussion purpose of policy task for expanding medical welfare service. The results of this study are believed to help expand services to the socially marginalized and improve the medical environment of the people.