• Title/Summary/Keyword: Information Protection Mechanism

Search Result 234, Processing Time 0.023 seconds

Management Mechanism for the Protection of Information in Smart Phone

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.6
    • /
    • pp.43-50
    • /
    • 2015
  • In order to protect important information of smart phone from these security threats, this paper has studied a mechanism for protecting information from the leakage of various information and personal information stored in the smart phone. This paper has configured the basic protection scope for the information protection and applied real time encodement when new contents were created. Also, this paper has applied a security function so that the content of the protected scope can be managed and erased remotely in preparation for loss and burglary.

RFID-based Secure Communication for Smart Device in Future Home Network Environment

  • Li, Nong-Jun;Choi, Kee-Hyun;Jang, Kyung-Soo;Shin, Dong-Ryeol
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.5 no.1
    • /
    • pp.18-22
    • /
    • 2013
  • We introduce, in this paper, a novel approach of protection mechanism for data which are transmitted not only between the networked devices but also between the digital media devices. As the devices are getting more powerful and more storage capacity, they can process the encoded/encrypted data autonomously. However, all devices must know the secret key that used to encrypt data, and also use secure method to distribute that key. Moreover, there are no protection mechanisms supporting end-to-end copy protection which result in the fact that the data passed through various devices can be manipulated or captured. Therefore, we propose a RFID-based key distribution and protection mechanism to resolve these problems.

A Study on Daemon Process Protection System Using Linux Based Resource Access Control Module(LPM) (리눅스 기반 자원 접근제어 모듈(LPM)을 이용한 데몬 프로세스 보호 시스템에 관한 연구)

  • 나형준;이병호
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1593-1596
    • /
    • 2003
  • In this paper, we propose mechanism of system call control, monitor, and manage by user level, and for this purpose we propose the mechanism using system call intercept and a logging system. Proposed mechanism is more convenient in that there is no necessity for modification of linux source code, so general users can actively apply and modify. As an application model for the mechanism, we can explain for the Daemon Process Protection System which can have a complete control on system daemon processes.

  • PDF

A Fast and Scalable Inter-Domain MPLS Protection Mechanism

  • Huang, Chang-Cheng;Messier, Donald
    • Journal of Communications and Networks
    • /
    • v.6 no.1
    • /
    • pp.60-67
    • /
    • 2004
  • With the fast growth of Internet and a new widespread interest in optical networks, the unparalleled potential of Multi-Protocol Label Switching (MPLS) is leading to further research and development efforts. One of those areas of research is Path Protection Mechanism. It is widely accepted that layer three protection and recovery mechanisms are too slow for today’s reliability requirements. Failure recovery latencies ranging from several seconds to minutes, for layer three routing protocols, have been widely reported. For this reason, a recovery mechanism at the MPLS layer capable of recovering from failed paths in 10’s of milliseconds has been sought. In light of this, several MPLS based protection mechanisms have been proposed, such as end-to-end path protection and local repair mechanism. Those mechanisms are designed for intra-domain recoveries and little or no attention has been given to the case of non-homogenous independent inter-domains. This paper presents a novel solution for the setup and maintenance of independent protection mechanisms within individual domains and merged at the domain boundaries. This innovative solution offers significant advantages including fast recovery across multiple nonhomogeneous domains and high scalability. Detailed setup and operation procedures are described. Finally, simulation results using OPNET are presented showing recovery times of a few milliseconds.

A Cache Privacy Protection Mechanism based on Dynamic Address Mapping in Named Data Networking

  • Zhu, Yi;Kang, Haohao;Huang, Ruhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6123-6138
    • /
    • 2018
  • Named data networking (NDN) is a new network architecture designed for next generation Internet. Router-side content caching is one of the key features in NDN, which can reduce redundant transmission, accelerate content distribution and alleviate congestion. However, several security problems are introduced as well. One important security risk is cache privacy leakage. By measuring the content retrieve time, adversary can infer its neighbor users' hobby for privacy content. Focusing on this problem, we propose a cache privacy protection mechanism (named as CPPM-DAM) to identify legitimate user and adversary using Bloom filter. An optimization for storage cost is further provided to make this mechanism more practical. The simulation results of ndnSIM show that CPPM-DAM can effectively protect cache privacy.

Reliability Analysis of CMOS Circuits on Electorstatic Discharge (CMOS 회로의 ESD에대한 신뢰성 문제 및 보호대책)

  • 홍성모;원태영
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.30A no.12
    • /
    • pp.88-97
    • /
    • 1993
  • Electrostatic Discharge(ESD) is one of the major reliability, issues for today's VLSI production. Since the gate oxide with a thickness of 100~300$\AA$ is vulnerable to several thousand volt of ESD surge, it is necessary to control the ESD events and design an efficient protection circuit. In this paper, physical mechanism of the catastrophic ESD damage is investigated by transient analysis based upon Human Body Model(HBM). Using two-dimensional electrothermal simulator, we study the failure mechanism of the output protection devices by ESD and discuss the design issues for the optimun protection network.

  • PDF

Protection and Restoration of GMPLS LSP using CR-LDP Detours (CR-LDP 우회를 통한 GMPLS LSP의 보호 및 복구)

  • 김진형;정재일
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12B
    • /
    • pp.1051-1059
    • /
    • 2003
  • The key feature of GMPLS is the provision of network resources and the automatic set-up of a path. And the mechanism of protection and restoration of a path is presented when network component fails. This paper suggests CR-LDP Static Detour Mechanism and Dynamic Detour Mechanism. CR-LDP Detours are a mechanism to set up detour paths automatically at every node to protect working path. Hence suggested mechanism performance is compared with existing mechanisms by computer simulation.

Automatic Protection Switching Schemesfor Network Survivability in ATM-PON Networks (ATM-PON망에서 망 생존성을 위한 자동보호절체)

  • 김영구
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.9A
    • /
    • pp.1441-1451
    • /
    • 2000
  • There are two types of protection switching : a) automatic switching and b) forced switching. The switching mechanism is generally realised by OAM functions, therefore, the required OAM information field should be reserved in the PLOAM cells. This paper proposes an unidirectional and a bidirectional protection switching method and potential advantages. The unidirectional protection switching method can be faster than the bidirectional method because the unidirectional method does not require an APS protocol for protection switching. The bidirectional protection switching method uses APS K1 byte and K2 byte, which is included in octets of a PST message through downstream or upstream PLOAM cells, for protection switching. As making comparisons between the unidirectional and the bidirectional protection. switching method, this paper proposes an effective constructing method for ATM-PON network.

  • PDF

License Distribution Mechanism for the Rights Sharing Between Consumers

  • Liu, Zong-Hua;Lee, Byung-Wook;Han, Myung-Mook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.981-984
    • /
    • 2007
  • Most existing DRM systems give too much power to rights holders and have not concerned the requirements of the consumers. In this paper, we propose a mechanism for license distribution that considers the distribution of rights between consumers. we describe the protection of digital content in two digital licenses, formal license and peer license. Also we propose an extending mechanism to control the distribution of rights between consumers. For this mechanism, we define it by extending the ODRL model in the end.

  • PDF

ESD damage mechanism of CMOS DRAM internal circuit and improvement of input protection circuit (정전기에 의한 CMOS DRAM 내부 회오의 파괴 Mechanism과 입력 보호 회로의 개선)

  • 이호재;오춘식
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.31A no.12
    • /
    • pp.64-70
    • /
    • 1994
  • In this paper, we inverstigated how a parricular internal inverter circuit, which is located far from the input protection in CMOS DRAM, can be easily damaged by external ESD stress, while the protection circuit remains intact. It is shown in a mega bit DRAM that the internal circuit can be safe from ESD by simply improving the input protection circuit. An inverter, which consists of a relatively small NMOSFET and a very large PMOSFET, is used to speed up DRAMs, and the small NMOSFET is vulnerable to ESD in case that the discharge current beyond the protection flows through the inverter to Vss or Vcc power lines on chip. This internal circuit damage can not be detected by only measuring input leakage currents, but by comparing the standby and on operating current before and after ESD stressing. It was esperimentally proven that the placement of parasitic bipolar transistor between input pad and power supply is very effective for ESD immunity.

  • PDF