• Title/Summary/Keyword: End Users' Information Security System

검색결과 39건 처리시간 0.027초

이중 방법을 지원하는 임베디드 보안 팩스 서버 개발 (Development of Embedded Security Fax Server Supporting Dual Mode)

  • 이상학;정태충
    • 정보처리학회논문지A
    • /
    • 제11A권3호
    • /
    • pp.129-138
    • /
    • 2004
  • Even though the Internet applications such as e-mail and FTP are widely used, fax is still an important media for data communications till today. Many researches on security over the Internet data communication have been done over the years, on the other hand not many researches have been dedicated to the fax security issue which is as important as the Internet. In this paper, we describe the development of hardware and software of the embedded security fax server which increases the security in supporting existing fax. The developed system is designed and implemented to maintain security while minimizing the delay due to encryptionㆍdecryption. Since there's international or domestic tryptographic standard and each nation have their policy to restrict the use of cryptographic system, we adopt domestic standard cryptographic protocol admitted in Korea. And the system supports two modes: Security mode and Non-Security mode that user can choose from. The system can be applied directly which is the requirements of users at company ,End the government. We verify the performance and functioning of the system in various real environment.

Mobile IPv6 Session Key Distribution Method At Radius-based AAAv6 System

  • Lee Hae Dong;Choi Doo Ho;Kim Hyun Gon
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 학술대회지
    • /
    • pp.581-584
    • /
    • 2004
  • Currently, there are many subscriber access networks: PSTN, ADSL, Cellular Network, IMT200 and so on. To these service providers that provide above network service, it is important that they authenticate and authorize legal subscribers and account for their usage. At present, There exist the several protocols that Support AAA(Authentication, Authorization and Accounting) service : RADIUS, Diameter, TACACS+. Nowadays, RADIUS has used for AAA service widely. It has been extended to support other access network environment. So, we extend RADIUS to support environment of Mobile IPv6. Mobile IPv6 uses IPsec as a security mechanism, basically. But, IPsec is a heavy security technology for small, portable, mobile device. Especially, it is serious at IKE, the subset of IPsec. IKE is a key distribution protocol that distributes the key to the endpoints of IPsec. In t:lis paper, we extend RADIUS to support environment of Mobile IPv6 and simplify the IKE phase of IPsec by AAA system distributing the keys by using its security communication channel. Namely, we propose the key distribution method for IPsec SA establishment between mobile node and home agent. The suggested method was anticipated to be effective at low-power, low computing deyice. Finally, end users feel the faster authentication.

  • PDF

IPSec과 L2TP를 이용한 VPN과 EDI 시스템의 연동 (Interface of EDI System and VPN with IPSec and L2TP)

  • 최병훈;이건호;정병희
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회 2004년도 추계학술대회 및 정기총회
    • /
    • pp.357-360
    • /
    • 2004
  • Electronic Data Interchange (EDI) between a number of companies goes on increasing on the internet. Although a conventional EDI system reduces business process efforts, time, resources, etc., important information is easily and frequently exposed by well trained hackers and crackers, which inflict a severe loss on the company and even put the company under a crisis. This study integrates the conventional EDI system and Virtual Private Net (VPN) to maximize an overall efficiency of speed and security in data transaction by the level of importance. The EDI system properly interfaced to IPSec and L2TP of VPN allows us to select two modes: the one focuses on a high speed with a low or a medium level security or the other does on a high level security with a low or a medium level speed. Both the company and the end users get a lot of tangible and intangible advantages by integrating the EDI system and VPN.

  • PDF

컨텐츠 스트리밍을 위한 안전한 DRM 시스템 설계 및 구현 (Design and Implementation of Secure DRM System for Contents Streaming)

  • 이진흥;김태정;박지환
    • 정보보호학회논문지
    • /
    • 제13권4호
    • /
    • pp.177-186
    • /
    • 2003
  • DRM(Digital Rights Management)은 인터넷상에서 디지털 컨텐츠의 안전한 유통과 저작권을 관리하는 기술이다. 기존의 DRM 시스템은 암호화된 컨텐츠를 다운로드 한 후에 간단한 인증 절차를 거쳐 사용을 허가하는 형태가 일반적이다. 본 논문에서는 종단간의 실시간 데이터 전송을 위해 RTP(Real-time Transport Protocol)를 이용한다. 그리고 주기적인 사용자 인증을 통해 컨텐츠의 안전한 유통 및 저자권 보호를 가능한 시스템을 설계하고, 그것을 기반으로 하는 DRM 시스템을 구현하였다. 제안된 시스템은 인증된 사용자만이 라이센스에 대한 접근 권한을 부여 받음으로써 네트워크 상에서 컨텐츠의 불법 유통 및 불법 복제가 불가능하도록 하였다.

셋톱박스 가상화를 통한 향상된 IPTV 사용자 인증 시스템 (STB Virtualization based Enhanced IPTV User Authentication System)

  • 고웅;곽진
    • 정보보호학회논문지
    • /
    • 제21권4호
    • /
    • pp.137-147
    • /
    • 2011
  • 인터넷과 방송 통신과의 융합으로 IPTV서비스가 제공되면서, 사용자는 멀티미디어 콘텐츠를 시간에 상관없이 이용할 수 있게 되었다. 또한, 기존의 단방향 서비스에서 양방향 서비스로 변화하면서 사용자에게 좀 더 효율적이고 유용한 서비스 제공이 가능하게 되었다. 그러나 기존의 IPTV 서비스가 단말에 설치된 셋톱박스를 통해 멀티미디어 콘텐츠를 제공하면서, 개별적 사용자 인증이 이루어지지 않아 개별적 서비스에 한계점이 나타났다. 또한 셋톱박스가 방송 통신 사업자마다 달라 서비스 변경 시 호환성 문제도 대두되었다. 따라서 본 논문에서는 개별적 사용자 인증 및 서비스 호환성 향상을 위한 셋톱박스 가상화를 통한 향상된 IPTV 사용자 인증 시스템을 제안한다.

A Web-Based IPTV Content Syndication System for Personalized Content Guide

  • Yang, Jinhong;Park, Hyojin;Lee, Gyu Myoung;Choi, Jun Kyun
    • Journal of Communications and Networks
    • /
    • 제17권1호
    • /
    • pp.67-74
    • /
    • 2015
  • In this paper, we propose a web-based content syndication system in which users can easily choose Internet protocol television (IPTV) contents. This system generates personalized content guide to provide a list of IPTV contents with respect to users' interests and statistics information of their online social community. For this, IPTV contents and relevant metadata are collected from various sources and transformed. Then, the service and content metadata are processed by user metadata including audience measurement and community metadata. The metadata flows are separated from content flows of transport network. The implementation of IPTV content syndication system demonstrates how to arrange IPTV contents efficiently from content providers to the end user's screen. We also show that the user metadata including online community information are important for the system's performance and the user's satisfaction.

모바일 앱 서비스 이용 증가로 인한 보안 위협 분석 (Analysis of Security Threats from Increased Usage of Mobile App Services)

  • 최희식;조양현
    • 디지털산업정보학회논문지
    • /
    • 제14권1호
    • /
    • pp.45-55
    • /
    • 2018
  • Recently, because the arrival of the fourth industrial revolution era, many information and telecommunication services have grown rapidly in the mobile business market. So, companies are based Mobile Apps on user customized services and expanding their services. From the standpoint of the business, to generate revenue, the company needs to maintain the existing current computer environment and develop Mobile Apps to offer convenience in various areas such as finance, admiration, e-commerce and sales support. However, as the number of users increase due to expansion of various Mobile services, security threats that are related to Mobile Apps are increasing and its damage is also increasing. Due to the rapid technological transformation of Mobile devices using the Internet, the level of security threats to Smartphones are rising and getting more advance, so this thesis is structured as follows. In Chapter 2, it will look at the overall trends of Mobile Apps as related research. In Chapter 3, it will discuss various security concerns that related to the latest Mobile Apps and learn about the threatening factors. In Chapter 4, it will compare and analyze the threatening factors. Then it will find and suggest the possible plan. In Chapter 5, it will end with conclusion. Finally, to protect mobile devices from security threats, the environment of operating system which manages the resources and data of Apps needs to be protected. Also, it is important that users to have awareness and check activation FinTech technology security in the process of simple payment with fingerprint or IC card.

ISO10303 응용프로토콜을 이용한 트러스교의 3차원 형상 및 해석정보 데이터베이스 구축 (Construction of Truss Bridge Database for 3-D Shape and Structural Analysis Information by using ISO10303 Application Protocols)

  • 임승완;김봉근;김효진;이상호
    • 한국재난관리표준학회지
    • /
    • 제2권1호
    • /
    • pp.81-89
    • /
    • 2009
  • 본 연구에서는 트러스 교량의 표준화된 데이터베이스 구축을 통해 웹 환경에서 정보 공유를 실현하는 정보관리 시스템을 개발하였다. 이를 위해, 형상정보는 STEP에서 제시하는 AP 203을 기반으로 데이터 구조를 구성하여 정보를 저장하였으며, 웹상의 3차원 가시화는 Web 3D 기술을 적용하여 구현함으로써 사용자의 편의를 돕고 구조물에 대한 기하학적인 이해를 용이하게 하였다. 해석정보는 AP 209를 사용하여 유한요소해석모델과 해석결과 및 물성 정보를 관계형 데이터베이스에 저장하였다. 구축된 데이터베이스를 기반으로 트러스 교량의 정보관리를 위한 통합된 시범시스템을 개발하였으며, 개발된 시스템은 시방규정 및 안전점검과 같은 제반정보를 형상객체와 연계하여 사용자에게 제공한다.

  • PDF

Extended Linear Vulnerability Discovery Process

  • Joh, HyunChul
    • Journal of Multimedia Information System
    • /
    • 제4권2호
    • /
    • pp.57-64
    • /
    • 2017
  • Numerous software vulnerabilities have been found in the popular operating systems. And recently, robust linear behaviors in software vulnerability discovery process have been noticeably observed among the many popular systems having multi-versions released. Software users need to estimate how much their software systems are risk enough so that they need to take an action before it is too late. Security vulnerabilities are discovered throughout the life of a software system by both the developers, and normal end-users. So far there have been several vulnerability discovery models are proposed to describe the vulnerability discovery pattern for determining readiness for patch release, optimal resource allocations or evaluating the risk of vulnerability exploitation. Here, we apply a linear vulnerability discovery model into Windows operating systems to see the linear discovery trends currently observed often. The applicability of the observation form the paper show that linear discovery model fits very well with aggregate version rather than each version.

연결완전성 제고와 프라이버시 보호를 위한 유비쿼터스 지불 프로세스의 설계

  • 이경전;정무정
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2005년도 공동추계학술대회
    • /
    • pp.226-233
    • /
    • 2005
  • Ubiquitous computing is a study area explained in a myriad of contexts and technological terms. So when you try to define it with simple words, it gets even more confusing. Payment. however, refers in nature to an act of money transfer from one entity to another, and it is obvious that a payment method will be valued as long as the transaction can be completed with safety no matter what technology was used. In the end, the key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme by looking at the characteristics of seamlessness under the ubiquitous environments, Strong Personal Device, and peer-based if information transactions. We also propose U-SDT Protocol integrating critical technologies such as Radio Frequency Identification (RFID), Bluetooth, Personal Payment Device, Account Managing Application and Transaction ID as a way to make transactions between users seamless and secure better privacy protection.

  • PDF