• Title/Summary/Keyword: Digital Contents Protection

Search Result 280, Processing Time 0.022 seconds

Analysis of Blockchain Network and Cryptocurrency Safety Issues

  • Taegyu Lee
    • International journal of advanced smart convergence
    • /
    • v.12 no.3
    • /
    • pp.40-50
    • /
    • 2023
  • Blockchain is a technology designed to prevent tampering with digital documents or information, safeguarding transaction data and managing it in a structured manner. This proves beneficial in addressing issues of trust and data protection in B2B, B2C, and C2B transactions. Blockchain finds utility not only in financial transactions but also across diverse industrial sectors. This study outlines significant cases and responses that jeopardize the security of blockchain networks and cryptocurrency technology. Additionally, it analyzes safety and risk factors related to blockchain and proposes effective testing methods to preemptively counter these challenges. Furthermore, this study presents key security evaluation metrics for blockchain to ensure a balanced assessment. Additionally, it provides evaluation methods and various test case models for validating the security of blockchain and cryptocurrency transaction services, making them easily applicable to the testing process.

Smartcard Authentication for IPTV Contents Protection (IPTV의 콘텐츠 보호를 위한 스마트카드 인증시스템)

  • Hwang, Jin-Wook;Kim, Sun-Jae;Oh, Hae-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.699-700
    • /
    • 2009
  • IPTV(Internet protocol TV)가 상용화되고 가입자 수가 증가하면서 제공하는 콘텐츠의 양이 많아지고 많은 정보를 얻게 되었다. 이러한 많은 콘텐츠의 저작권을 보호하기 위해 수신제한시스템(Conditinal Access System, CAS)과 DRM(Digital Right Management) 기술이 사용되고 있다. 하지만 나날이 발전하는 개인정보의 유출과 해킹을 통한 불법 다운로드, 복제에서 저작권이 위협을 받고 있다. 따라서 현재 서비스 제공자들은 콘텐츠의 저작권을 보호하기 위한 많은 연구들이 진행되고 있다. 본 논문에서는 IPTV에서의 스마트카드를 이용한 인증체계 시스템을 제시하여 기존의 보안시스템보다 더 강화된 보안을 구축 할 수 있다.

A Study on the Affordance Factors for Enhancing Safety Behavior in Safety Education App (안전교육 앱에서 안전행동 증진을 위한 어포던스 요인에 관한 연구)

  • Baek, Hyeon-Gi;Ha, Tai-Hyun
    • Journal of Digital Contents Society
    • /
    • v.17 no.6
    • /
    • pp.489-497
    • /
    • 2016
  • This study focused on the focus group interview based on the questionnaire. Prior to the interview, we used questionnaires from the previous researchers in order to select the questionnaires and interviews of the focus group. In order to measure the possibility, which is the expression characteristic of the safety education app, the items related to cognitive, sensual, physical, and safety behaviors were used as constituent factors. And the safety education app to analyze was selected 'Water Go GO!' App developed by the National Emergency Management Agency. The results of this study are as follows: First, the learner should help to participate in learning continuously in order to make meaningful learning activities in safety education app learning environment. Second, learners must interact with mobile devices in their apps to facilitate learning while reducing the number of factors that can interfere with learners' learning. This study is meaningful in that it can utilize this design principle as a guideline for enhancing safety behaviors.

Application of TRA in u-health system focusing on moderating effect of health privacy information (유헬스 시스템에 대한 TRA의 적용에 관한 연구: 건강개인정보의 조절 효과를 중심으로)

  • Kim, Mincheol;Yang, Young-Bae;Ha, Tai-Hyun
    • Journal of Digital Contents Society
    • /
    • v.17 no.6
    • /
    • pp.537-543
    • /
    • 2016
  • The purpose of this study is to analyze the moderating effect of health privacy information on the relationship between the factors that affect the behavioral intention of the usage of u-health system have. Therefore, as a research hypothesis in TRA (Theory of Reasoned Action), self-efficacy and perceived usefulness will have a positive effect on the behavioral intention of the u-health system, and in the path, that personal information factors have an effect on each path. This study used the PLS-SEM methodology to verify the proposed research model. As a result of the analysis, this study showed that the moderating effect of health personal information in the presented model affects to some extent by the increase of R2 explanatory power. However, it was found that it was more consistent with the role of the independent variable rather than the moderating influence on the perceived usefulness.

Implementation of Encrypted Mail Program using SMTP and POP3 (SMTP와 POP3를 활용한 암호화 메일 프로그램 구현)

  • Kong, Keon-Woong;Won, Yonggwan
    • Journal of Digital Contents Society
    • /
    • v.18 no.7
    • /
    • pp.1403-1409
    • /
    • 2017
  • As the Internet evolves, security becomes more important. Especially, e-mail has become one of the most important services that companies and ordinary users use on the Internet. However, security vulnerabilities such as sniffing attacks, IDs, and password spoofs are causing many problems. This paper introduces an example of implementation of encrypted mailing program with which the secured mail is encrypted by symmetric key methode and the encrypted message can not be read without proper decryption. In order to use the current mailing systems, we keep the rules related to SMTP and POP3, and only the encrypted message is stored in the mail server system and the message can be decrypted only at the terminals of the senders and the receivers with the key which is shared in advanced by independent route between them. This implementation scheme can provide an efficiency that it does not request any change of current mailing system, which can be an additional security protection.

AIS application program implementation and test based on IMO Maritime Cloud analysis (IMO 마리타임 클라우드 분석을 통한 AIS응용 프로그램 구현 및 테스트)

  • Lee, Jea-Wook;Mun, ChangHo;Lee, Seojeong
    • Journal of Digital Contents Society
    • /
    • v.16 no.6
    • /
    • pp.927-934
    • /
    • 2015
  • IMO e-Navigation is ongoing project for safety navigation and protection of maritime environment. Maritime Cloud is a part of e-Navigation Strategy Implementation Plan. It is IT framework technology for exchanging information among maritime stakeholders. We found configuration and operation process by analysis on Maritime Cloud architecture and EPD which is a client program. Through the result, we actually implemented client program. Client program targets Berthing data serviced on AIS-ASM. And we used MMS which is function of message exchanging of Maritime Cloud. The test result show data exchanging succeeded. And it will be helpful to develop Maritime Cloud service, to advance Korean Maritime Cloud.

A Study on the Effects of Literacy Therapy Program for the Prevention of Adolescents' Smartphone Addiction (청소년의 스마트폰 중독 예방을 위한 문학치료 프로그램 효과에 관한 연구)

  • Baek, Hyeon-Gi;Ha, Tai-Hyun
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.269-276
    • /
    • 2018
  • The purpose of the study is to verify whether literature therapy program for prevention of smartphone addiction is effective for adolescents. The subjects of this study were 150 students of J City, K middle school. After completing the program, they were conducted post-test for both the experimental and control groups. The study found that the program was effective in mitigating smartphone addiction but not in reducing the directed life problem. It was also found to be effective in reducing tolerance and loss of control and problems of withdrawal and emotional experience. The study suggests that institutional arrangements are needed for linking with related organizations in the region because it is difficult to effectively prevent the increasing problem of smartphone addiction unless an adolescents program for youth is linked to the school. Therefore, it is necessary to conduct parent education for prevention of smartphone addiction in computer curriculum of school subjects.

A Building Method of High Availability Protection Architecture in Next Generation Network (NGN) Information Security System (차세대통신망(NGN) Infrastructure에서의 정보보호시스템 고가용성 차단구조 설계)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.8 no.4
    • /
    • pp.483-489
    • /
    • 2007
  • The high availability of information security system shall be primarily studied in relation to the Next Generation Network(NGN) Information Security infrastructure, because it is very important to maintain availability at each moment as a variety of intrusions occur continuously. The high availability of the security system can be realized with the topology and configuration properly defined to fully utilize the recovery function of the security system in the thoroughly planned optimized method. The active-active high availability on the NGN information security infrastructure system in is assured by letting the failover mechanism operate upon the entire structure through the structural design and the implementation of functions. The proposed method reduces the system overload rating due to trouble packets and improves the status of connection by SNMP polling trap and the ICMP transport factor by ping packet.

  • PDF

Proposal for Social Casino Game Policy based on Responsible Game System (책임게임시스템 기반 소셜 카지노 게임 정책 제언)

  • Song, Seung-keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2039-2044
    • /
    • 2016
  • This study aims to investigate the safety instrument to prepare the policy alternative for social web-board game which will be developed to base on social network in the future although social casino game is not available in Korea now. We reviewed several literature about responsible game system applied to especially U.S. New Jersey, responsible gambling system acted in the being advanced all countries. Game experts built up user protection model as previous work to prepare the law and policy which such a responsible game system will apply for current web-board gaem and future social casino game. As a result, this research revealed that standard of judgement which can identify four kind of addiction danger user group are raised. We expect to help this user protection alternative to provide the law and policy instrument for future social casino game and complement the problem of current web-board enforcement.

Implementation of Play and Copy Control of DMB contents using Watermarking and Encryption on PMP (워터마킹과 암호화를 이용한 DMB 콘텐츠의 재생 및 복사 제어를 PMP에 구현)

  • Jeong, Yong-Jae;Moon, Kwang-Seok;Kim, Jong-Nam
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.2
    • /
    • pp.52-57
    • /
    • 2009
  • Recently, the regular service of a terrestrial digital multimedia broadcasting(T-DMB) made faster distribution of T-DMB receiver. The problem of an illegal distribution is increasing owing to a large distribution of T-DMB receiver. In this paper, we propose a watermarking and encryption method on T-DMB bit-stream for a copy and Play control to prevent an illegal distribution of T-DMB contents. We implement our proposed method on a portable multimedia player (PMP) which has T-DMB receiver. The proposed method insert the encrypted information for control of copy and play after finding padding area of program map table (PMT) and program association table (PAT) from analysis of transport stream (TS) of T-DMB. In implementation result, we can control use of contents according to information of copy and play control. The proposed method can be used to content Protection software for blocking of an illegal distribution of T-DMB contents on a mobile T-DMB receivers.