• Title/Summary/Keyword: Electronic Security Service

Search Result 304, Processing Time 0.026 seconds

STATCOM Helps to Guarantee a Stable System

  • Andersen, B.R;Gemmell, B.D.;Horwill, C.;Hanson, D.J.
    • Journal of Power Electronics
    • /
    • v.1 no.2
    • /
    • pp.65-70
    • /
    • 2001
  • Transmission System Operators are governed by operational security standards that are applied in real time. During system disturbances, the System Operators must rely on the installed protection and control equipment, prior to human intervention. New power electronic solutions bring rapid and repeatable responses to disturbances, which will help System Operators to guarantee a stable system. Last year, Alstom completed the world's first competitively bid STATCOM to support the voltage on National Grid's 400kV network that supplies London and the Southeast from the north of the UK. It is rated ${\pm}75MVAr$ and forms part of a Static Var System (SVS) with a total rating of 0 to 225MVAr. This paper will describe the reasons for its size, location, its chain-link configuration and give examples of its operating performance. The paper will also describe the features that allow this STATCOM to deliver much more than reactive compensation in support of a wider transmission service objective, as system conditions require.

  • PDF

Study on the Security Threats Factors of A Bluetooth Low Energy (저전력 블루투스의 보안 위협 요인들에 관한 연구)

  • Jeon, Jeong Hoo
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.3-9
    • /
    • 2017
  • Recently, Wireless communication has been widely used as a short distance communication medium in various industrial fields as well as communication connection between home appliances due to the appearance of the Internet of Things. And Most commonly used wireless communication media include WiFi, Bluetooth, and NFC. Among them, Bluetooth is widely used for communication between smart devices as well as computer peripheral devices. And Bluetooth in the home network fields is being used to control electronic products. However, since Bluetooth security vulnerabilities are known, more and more attacks are being exploited. As the application range of Bluetooth is expanding, it is necessary to prepare countermeasures accordingly. Therefore, this study investigates the security threat factors of through Bluetooth'attack case and attack technology. And By proposing countermeasures against this problem, we intend to utilize it as data for improving the security of wireless network service in the future.

A Study on Modeling Instruction And Training Program for Korean Private Security Guard (한국 민간경호원 교육프로그램 방향에 관한 연구)

  • Lee, Sang-Chul;Shin, Sang-Min
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.201-235
    • /
    • 2005
  • This study is designed to contribute for development of Private Security Business by fact-finding in instruction and training of private security guard serviced in this realm and domestic and foreign guard service and modeling effective and rational instruction and training program based on drawn problem. For this study, basically I collected and analyzed documents, theses, and papers of the inside and outside of the country. For practical use of data, I used materials of private security related institutes and police agency. And for private security educating training programs of the inside and outside of the country, I collected materials on internet, and with the help of police agency and interpol. For korean private security company's educating training programs, I made a study with the interview of private security company's businessmen. This study's conclusion is as follows. In a domestic private security enterprise, when set theory instruction minimize instruction and training program and must set up instruction and training program as practical affairs center enemy instruction, and theory instruction must be composed for instruction me that it is connected to practical affairs instruction too. The instruction course of private security guard instruction and training program composed with a security outline, a security plan, an information-gathering, civilian expenses, a security way, terror and terrorism, a related law, security trial, electronic security, a security analysis technique, company introduction, instruction and training program about a professional tube with theory instruction. Practical affairs instruction composed with the selection and a preventive security, close contact attendance security, vehicle security, security driving the security martial arts and self-protection liquor, first aid, security equipment, a gun and shooting, a security protocol, customer satisfaction, facilities security and expenses, a fire fighting instruction, teamwork training, explosive and a dangerous substance, physical strength, a documentation practical affairs, service, instruction and training program about foreigh language instruction.

  • PDF

The Study on the e-Service Quality Factors in m-Shopping Mall App based on the Kano Model (카노 모형을 이용한 모바일 쇼핑몰 앱의 서비스 품질 요인 분석에 관한 연구)

  • Kim, Sang-Oh;Youn, Sun-Hee;Lee, Myung-Jin
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.12
    • /
    • pp.63-72
    • /
    • 2018
  • Purpose - In this study, it is classified the service quality dimension of mobile shopping app using Kano model. In addition, it is evaluated quality factors suitable for strategic management from the viewpoint of service provider through mobile application through binary dimension analysis. Research design, data, and methodology - In this study, seven quality dimensions such as information quality, reliability, immediacy, convenience, design, security and customer service were derived through related studies to make binary shopping quality app quality measurement. 37 sub-variables were set by each quality dimensions. Each questionnaire was composed of positive and negative items like Kano's proposed method, and the satisfaction coefficient suggested by Timko(1993) was examined to understand the influence of each factors on customer satisfaction. Results - As a result of research, shopping app users perceived unity quality factor in most items of service quality dimension such as information quality, reliability, immediacy, convenience and customer service. In addition, the satisfaction coefficient showed a good impression, quick response of the result, fast delivery, and the unsatisfactory coefficient showed more interest in personal information such as payment method safety, and transaction security. As a result of research, shopping app users perceived unity quality factor in most items of service quality dimension such as information quality, reliability, immediacy, convenience and customer service. And, in information quality, the information overload was classified as an apathetic quality component, while the related information provision belonged to an attractive quality component. In reliability quality, customized service provision was classified as an attractive quality component. In instant connectivity, the quality of the connection during transport was classified as an attractive quality component. In convenience quality, access to product information was classified as a one-way quality component. All components of designs quality were classified as attractive quality components, and in security quality, all of their components were all classified as one quality component. Lastly, in customer service, they components were all classified as a single quality component. In addition, the satisfaction coefficient showed a good impression, quick response of the result, fast delivery, and the unsatisfactory coefficient showed more interest in personal information such as payment method safety, and transaction security. Conclusion - In the online service environment, which is difficult to differentiate in terms of upward upgrading only by technological implementation and function, the results of this study can be suggested as a differentiating factor for major channels with customers rather than improve the brand image.

A Routing Security Authentication using S-EKE in MANET Environments (MANET 환경에서 S-EKE를 이용한 라우팅 보안 인증)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.4
    • /
    • pp.433-438
    • /
    • 2014
  • The demanding in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on MANET and the application of MANET has been paid much attention as a Ubiquitous computing which is growing fast in the field of computer science. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing but have vulnerable points, about lack of dynamic network topology due to mobility, network scalability, passive attacks, and active attacks which make it impossible to manage continuous security authentication service. In this study, proposes S-EKE authentication mechanism for a robust authentication based on MANET and through identify wireless environment security vulnerabilities, currently being used in OTP S/Key and DH-EKE analyzes.

Design of One-Time-Pad based on PKI Coordinates Technique for a Safe Key Transmission in E-Commerce Applications (전자상거래 응용에서 안전한 키 전송을 위한 PKI 좌표기법 One-Time-Pad의 설계)

  • Lee, Kil-Hun;Jun, Moon-Seok;Choi, Do-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.51-60
    • /
    • 2015
  • As electronic commerce service became more popular, information equivalent to currency prevails in network. Accordingly, hacking into network often occurs and thus OTP (One-Time-Password) has emerged as an alternative secondary security system. However, weakness has been found in even existing One-Time Password that used to be considered 'perfect'. Therefore, it becomes very urgent to have an additional security countermeasure. As security recommendation is not considered as solution anymore, more specific plan becomes necessary. The present study proposes PKI coordinates technique-based OTP (One-Time-Pad) for a safe key transmission in E-commerce.

A User Authentication Technique for the E-commerce (전자상거래를 위한 사용자 인증 기술)

  • Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.29-36
    • /
    • 2005
  • The industrial structure of the Internet is changing from off-line to on-line. E-commerce on the Internet will be formed a big market by developing of network. E-commerce on the Internet is natural. And it will be increase in interest of many people. By the way, it must support to institutional and technical problem. First of all, we need user authentication technique. In this paper, we described about safe Electronic shopping mall construction and operation by three main categories. First is security solution method of E-commerce, Second is analyzing about various threats and vulnerability when is user authentication in Electronic shopping mall. Third is to propose countermeasures of that.

  • PDF

Verifiable Self-Certified Schemes for Authentication Service of Electronic Commerce (전자상거래 인증 서비스를 위한 검증 가능한 자체인증 방식)

  • Joo, Mi-Ri;Lee, Bo-Young;Yang, Hyung-Kyu;Won, Dong-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.9
    • /
    • pp.2894-2902
    • /
    • 2000
  • In this paper, for authentication service of electronic commerce, we propose the verifiable self-certified schemes based on the $\gamma^{th}$-residuosity, thich are combine the benefit of certifiction based schemes and Girault's self-certified public keys. The security of our schemes is based on the difficulty of $\gamma^{th}$-residuosity problem and discrete logarithm problem simultaneously.

  • PDF

Study on the System Design of a Service Method for a Customized Electronic Card (주문형 전자카드 서비스 방법 및 시스템설계에 관한 연구)

  • Park Hwa-Jin;Kim Sang-Beom
    • Journal of Digital Contents Society
    • /
    • v.4 no.1
    • /
    • pp.1-10
    • /
    • 2003
  • This research focuses on the system design of a service method for a customized electronic card on the internet. It develops the system which covers from the input stage of the credit information including a credit card number, a debit card number, and a bank account number, through the process of decision for issuing the customized electronic card and for the payment of business transaction, to the payment stage. Users are allowed to make their own customized card depending on their situations by choosing a limit of balance, a number of usage, expiration date, recharge, and, anonymity of electronic card on the internet. These characteristics enhances convenience and security of card users. In addition, user's financial damage can be minimized when a credit card is lost by any reason.

  • PDF

The Legal Problems and Policy Suggestions for Vitalizing Cyber Trade Transactions (사이버무역거래에 관한 법적 문제와 활성화방안)

  • 이신규
    • The Journal of Information Technology
    • /
    • v.4 no.3
    • /
    • pp.1-17
    • /
    • 2001
  • This study is to examine some legal problems of cyber trade transactions and to suggest some policy implications to vitalize cyber trade by internet accomplishes electronic business from all process integration of production, marketing and customer service. However, there are some legal problems for the electronic commerce to be used in international trade activities such as trade contract transport documents and payment systems by internet. First international trade rules have to be legislated so that electronic documents has same legal function like traditional documents. Also electronic signature must has authenticity, integrity, non-repudiation, writing and confidentiality. Second, traditionally international payment systems such as letters of credits, remittance, documentary collections and open account have been operated as an important and popular method of payment. In the modern world of electronic commerce, information technology has made it possible to pay for the sale of goods and services over the internet. The payment methods such as Credit Card, Debit Card, Electronic Cash, Electronic Fund Transfers enable partly sellers, buyers and service providers to settle payment electronically through the internet. To settle the problems of payment systems, the security requirements for safe electronic Payments such as authenticity, integrity, non-repudiation have to be guaranteed. Also, electronic data interchange in transport documents has to be adopted and negotiability of electronic bills of lading has to be guaranteed. Electronic payment systems through SWIFT enable the sellers and the buyers to conduct and settle international business-to-business electronic commerce in case of solving the above problems and harmonizing the Bolero project.

  • PDF