• Title/Summary/Keyword: Information Security Check

Search Result 298, Processing Time 0.024 seconds

The automatic generation of MPTCP session keys using ECDH (MPTCP에서 ECDH를 이용한 세션 키 자동생성에 관한 연구)

  • Sun, Seol-hee;Kim, Eun-gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1912-1918
    • /
    • 2016
  • MPTCP(Multipath Transmission Control Protocol) is able to compose many TCP paths when two hosts connect and the data is able to be transported through these paths simultaneously. When a new path is added, the authentication between both hosts is necessary to check the validity of host. So, MPTCP exchanges a key when initiating an connection and makes a token by using this key for authentication. However the original MPTCP is vulnerable to MITM(Man In The Middle) attacks because the key is transported in clear text. Therefore, we applied a ECDH(Elliptic Curve Diffie-Hellman) key exchange algorithm to original MPTCP and replaced the original key to the ECDH public key. And, by generating the secret key after the public key exchanges, only two hosts is able to make the token using the secret key to add new subflow. Also, we designed and implemented a method supporting encryption and decryption of data using a shared secret key to apply confidentiality to original MPTCP.

The Characteristics and Medical Utilization of Migrant Workers (외국인 노동자의 특성과 의료이용 실태)

  • Ju, Sun Me
    • Korean Journal of Occupational Health Nursing
    • /
    • v.7 no.2
    • /
    • pp.164-176
    • /
    • 1998
  • This study deals with the current medical utilization for migrant workers and the characteristics of them. The purpose of this study is to provide the basic information to establish proper medical policy. For the study self-made questionnaire was used, which was answered by 453 migrant workers working in the area of manufacturing and non-technical work in 10 cities like Seoul, Inchon, Namyangju, Sungnam, Kwangju, Pyungchon, Kunpo, Kimpo, Masuk in Kyungki-do and Chunan in Chungchungnam-do. Besides, 303 medical records of those who had visited free medical check-up center were analyzed. The period of accumulating data is 6 months, from November 1st, 1996 to April 30th, 1997. The characteristics of migrant workers and current medical utilization are analyzed by percentage and the relation between characteristics and current medical utilization were analyzed using ${\chi}^2$-test, t-test, ANOVA. The finding of this study was as follows : 1) The number of nationality was 16. The first majority was Philippians as 32.0%. Among 16 nationalities Southeastern and Northern Asians were 48.9%, Southwestern Asian was 46.5%, the rest was 7.3%. Men were 81.0%, those who are aged from 26 to 30 were 39.0%, Graduatee from high school 92.7%, Christians 56.3%, unmarried 55.4% and salary from 600,000 Won to 800,000 Won 53.8% averaging monthly payment 669,810 Won. As for their residence, those who resided over 3 years were 31.9% and the illegal residence reached 77.4%. As for Korean language, those who speak in middle level were 5.6%. 2) As for kind of work and circumstances, manufacturing was 81.1%, 4 off-days per month 72.2% and 9-10 working hours per day 42.1%. As for accommodation, residence in fabric was 62.6% and one or two members as roommate 40.2%. 3) The characteristics of health behavior showed that 89.4% of migrant workers had 3 meals, 70.9% of them did not drink alcohol, 73.5% of them did not smoke. 4) As a characteristic of health status, 71.8% of them perceived of their health. 76.1% thought that they had no illness before coming Korea. Among them who recognized their illness, those who had problem in circulatory system was 35.3%, respiratory system ENT 19.1% and nervous system 19.1%.66.2% of those having illness had already had sickness when coming to Korea. 5) During last one month, 79.2% of them were known as ones having no illness. Among the sick, those who had problem in circulatory system was 31.6%, nervous system 23.7% and respiratory system 21.1%. 60.3% of the sick were not cured at that time. 6) Sorting the symptom of those who visited free medical check up, dental care was 24.2%, orthopedic 14.0% and digestive system 13.8%. Teethache was 34.4%, stomach problem 11.6%, upper respiratory inflammation 10.2% and back pain 5.9%. Averagely they visited free medical check up 1-2 times. According to symptom, epilepsy 25.5 times, heart and vascular disease 9 times, constipation 2.8%, neurosis 2.38 times and stomach problem 2.34 times. 7) The most frequently visited medical service by migrant workers was hospital. The most mentioned reason was good healing as 36.3%. The medical service satisfied migrant workers mostly was hospital as 64.3%. The reason of satisfaction was also good healing as 45.9%. 8) 77.2% of respondents did not spend money for medical check. Average monthly medical cost was 25,100 Won, 3.7% of income. Those who had no medical security was 73.4%. In their case, 67.7% got discount from hospital or support from working place and religious organization. 9) As for the difference of medical utilization according for the characteristics of migrant workers, legal workers and no-Korean speaker used hospital more frequently. 10) Those who were satisfied most of all with the service of hospital were female workers, hinduists and buddhists, legal workers or manufacture workers. 11) Christians, those who have 3 meals or recognize themselves as healthy ones mostly had no illness. As a result, the most of migrant workers in Korea are from Asia. They are good educated but are working in manufacturing and illegal. Their average income is under 700,000 Won which in not enough for medical cost. They have no medical security and medical fee is supported by religious organization or discounted. Considering these facts the medical policy by government is to be established.

  • PDF

A Study on the Traffic Patterns of Dangerous Goods Carriers in Busan North and Gamcheon Port (부산 북항·감천항의 위험화물운반선 통항패턴에 관한 연구)

  • Kim, Jong-Kwan;Kim, Se-Won;Lee, Yun-Sok
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.23 no.1
    • /
    • pp.9-16
    • /
    • 2017
  • As a preliminary study of enter or leaving traffic patterns of the Korea main port, port Management Information System (Port-MIS) data was used to check the volume of vessels entering and leaving the port of Busan, and three consecutive days from each seasons were selected for study. Selected 12-day General Information Center on Maritime Safety & Security (GICOMS) data was also used to analyze the traffic pattern in the main traffic lane of Busan port for dangerous goods carrier. Also, the distance between dangerous goods carriers and Oryukdo breakwater of east breakwater in the main traffic lane was analyzed. Collision probability was estimated using the cumulative probability distribution function of the normal distribution for the maritime traffic safety audit scheme based on the assumption that a ship's trajectory has a normal distribution for a section of the route. However, in case of entry or leaving thorough the Oryukdo breakwater and entry thorough the east breakwater, ship's sailing trajectories were revealed not to follow a normal distribution via regularity testing using a KS-test and SW-test. Especially in the north port, the tendency of the right side of the ship to pass was remarkable. It is desirable to develop a traffic model suitable for the characteristics of the port rather than to apply general traffic theories, and to apply this model to a maritime traffic safety diagnosis, so further research is needed.

The Influence of Factors on the Level of Digitalization of World Economies

  • Pyroh, Olha;Kalachenkova, Kateryna;Kuybida, Vasyl;Chmil, Hanna;Kiptenko, Viktoriia;Razumova, Oleksandra
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.183-191
    • /
    • 2021
  • The advanced development of the world's economies requires a detailed study of the impact of factors on the level of digitalization, to ensure economic growth and promote the use of information and communication technologies in the digital economy. Digitalization of the world's economies is ensured through the implementation of relevant regulations and policy decisions to implement public policy and strategy of the digital economy. The purpose of the study is to establish the pattern of the impact of factors on the level of digitalization of world economies by conducting a regression analysis to reflect the dependence of the impact of factors on the level of digitalization in 25 economies (by IMD digital competitiveness), to check the level of digitalization of the world's economies. It is necessary to analyze the ranking of countries in the world according to the DiGiX Index, IMD, and DESI Digital Competitiveness Rating. Research methods: information synthesis method; regression analysis; systematization, and generalization. Results. It was found that because of regression analysis, the value of the coefficient of determination indicates that the regression model by 78% explains the relationship between future readiness of countries to implement digital technologies and information and communication technologies, but there are still a small number of other factors not included in the regression model. It is determined that the greatest progress among EU member states for the period 2015-2020 according to the DESI index belongs to Ireland, the Netherlands, Malta, and Spain. It is established that Estonia, Spain, and Denmark are in the lead in the DESI rating, in terms of e-government implementation. The study found that the impact of factors on the level of digitalization of world economies contributes to solving current economic problems through further implementation of information and communication technologies and improving legislation in the digital economy, which will ensure the implementation of effective digital policy. It is established that ensuring the appropriate level of digitalization of the world's economies should solve the problems in the digital economy sector faced by governments and businesses, which requires the implementation of measures to regulate and ensure the continued operation of the digital economy.

Safety Verification Techniques of Privacy Policy Using GPT (GPT를 활용한 개인정보 처리방침 안전성 검증 기법)

  • Hye-Yeon Shim;MinSeo Kweun;DaYoung Yoon;JiYoung Seo;Il-Gu Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.207-216
    • /
    • 2024
  • As big data was built due to the 4th Industrial Revolution, personalized services increased rapidly. As a result, the amount of personal information collected from online services has increased, and concerns about users' personal information leakage and privacy infringement have increased. Online service providers provide privacy policies to address concerns about privacy infringement of users, but privacy policies are often misused due to the long and complex problem that it is difficult for users to directly identify risk items. Therefore, there is a need for a method that can automatically check whether the privacy policy is safe. However, the safety verification technique of the conventional blacklist and machine learning-based privacy policy has a problem that is difficult to expand or has low accessibility. In this paper, to solve the problem, we propose a safety verification technique for the privacy policy using the GPT-3.5 API, which is a generative artificial intelligence. Classification work can be performed evenin a new environment, and it shows the possibility that the general public without expertise can easily inspect the privacy policy. In the experiment, how accurately the blacklist-based privacy policy and the GPT-based privacy policy classify safe and unsafe sentences and the time spent on classification was measured. According to the experimental results, the proposed technique showed 10.34% higher accuracy on average than the conventional blacklist-based sentence safety verification technique.

XML Document Encrypt Implementation using Elliptic Curve Cryptosystem (타원곡선 알고리즘을 이용한 XML 문서 암호 구현)

  • Ko, Hoon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.1
    • /
    • pp.79-85
    • /
    • 2007
  • As the use of the computer and networks generalized, the various tasks which are requested secrets can be processed such os the banking transaction. And because of increasing of data exchange, Internet, and mobile networks, the method which is not connected only but also used with many users has been changed. Especially because of the structural problem of the Internet, a lot of information is leaked out when we use the Internet banking. If we check the Internet banking by using an existing cypher method which is either simple of slow, a credit card number, an account number or password will be leaked out. Because the security of information doesn't meet our expectation, we need more powerful cryptography. But, the wasted space-time which is required shouldn,t be ignored when the whole transferred data are encrypted. So, by using both the Elliptic Curve algorithm which is based on mobile networks and the partial encryption of the DTD of XML in this essay, we will implement more faster cypher method of the partial XML.

  • PDF

FIDO Platform of Passwordless Users based on Multiple Biometrics for Secondary Authentication (암호 없는 사용자의 2차 인증용 복합생체 기반의 FIDO 플랫폼)

  • Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.65-72
    • /
    • 2022
  • In this paper, a zero trust-based complex biometric authentication was proposed in a passwordless environment. The linkage of FIDO 2.0 (Fast IDENTITY Online) transaction authentication platforms was designed in conjunction with metaverse. In particular, it was applied with the location information of a smart terminal according to a geomagnetic sensor, an accelerator sensor, and biometric information for multi-factor authentication(MFA). At this time, a FIDO transaction authentication platform was presented for adaptive complex authentication with user's environment through complex authentication with secondary authentication based on situational awareness such as illuminance and temperature/humidity. As a result, it is possible to authenticate secondary users based on zero trust with behavior patterns such as fingerprint recognition, iris recognition, face recognition, and voice according to the environment. In addition, it is intended to check the linkage result of the FIDO platform for complex integrated authentication and improve the authentication accuracy of the linkage platform for transaction authentication using FIDO2.0.

A Study on the Improvement of the Safety and Safe Living Standards of Apartment Houses through AHP Analysis (AHP 분석을 통한 공동주택 안전 및 안심생활 수준 향상에 관한 연구)

  • Ji, Yung il;Shin, Seung Ha;Choi, Byong Jeong
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.2
    • /
    • pp.289-305
    • /
    • 2021
  • Purpose: The purpose of this study is to check the importance of higher level, sub higher level and lower alternative factor and the factor for relieved life and also check the comprehensive priority in executed "Safety and relieved life level improvement of apartment house residents by AHP analysis". Method: The safety management evaluation elements and alternatives have been arranged as hierarchical structure based on the preceding studies and the advice of experts for the maintenance and system of apartment house in this study. Study model is used for the survey of pair wise comparison composition targeting experts and AHP analysis method is used for alternative plan ranking, etc. Result: The response result of survey secured the consistency and it is confirmed that safety inspection for apartment house electricity facility is most important for higher level, safety inspection, detailed inspection and diagnosis evaluation are most important for sub higher level and plumbing equipments is most important for alternatives based on the analysis result of relative weight comparison for sub higher level and alternatives for final goal attainment of the study. Conclusion: Plumbing equipments, crime prevention safety and electrical safety are shown as top priority alternatives when observe it with expert manager's point of view for apartment house. It shows that securing the importance of living safety accident and deciding the level of relieved life can be improved are the alternatives of pre-prevention and management strengthening.

Counting and Localizing Occupants using IR-UWB Radar and Machine Learning

  • Ji, Geonwoo;Lee, Changwon;Yun, Jaeseok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.1-9
    • /
    • 2022
  • Localization systems can be used with various circumstances like measuring population movement and rescue technology, even in security technology (like infiltration detection system). Vision sensors such as camera often used for localization is susceptible with light and temperature, and can cause invasion of privacy. In this paper, we used ultra-wideband radar technology (which is not limited by aforementioned problems) and machine learning techniques to measure the number and location of occupants in other indoor spaces behind the wall. We used four different algorithms and compared their results, including extremely randomized tree for four different situations; detect the number of occupants in a classroom, split the classroom into 28 locations and check the position of occupant, select one out of the 28 locations, divide it into 16 fine-grained locations, and check the position of occupant, and checking the positions of two occupants (existing in different locations). Overall, four algorithms showed good results and we verified that detecting the number and location of occupants are possible with high accuracy using machine learning. Also we have considered the possibility of service expansion using the oneM2M standard platform and expect to develop more service and products if this technology is used in various fields.

A Study on the Design of Smart Contracts mechanism based on the Blockchain for anti-money laundering (자금 세탁 방지를 위한 블록체인 기반 스마트 컨트랙트 메커니즘 설계)

  • Kang, Heejung;Kim, Hye Ri;Hong, Seng-phil
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.1-11
    • /
    • 2018
  • The Blockchain is a technique that prevents data from being manipulated and guarantees the integrity and reliability of the data by all participants in the network jointly owning and validating the data. Since the Blockchain characterized by security, scalability and transparency, it is used in a variety of fields including logistics, distribution, IoT and healthcare, including remittance. In particular, there is a growing interest in smart contract that can create different forms of contracts and automate implementation based on Blockchain. Smart Contract can be used to pre-programme contracts and are implemented immediately when conditions are met. As a result, digital data can be more reliable. In this paper, we are conducting a study on the smart contract design as a way to solve such problems as illegal misuse of funds on virtual currency, which has become an issue recently. Through this process, we applied the customer identification and money laundering prevention process using smart contract, and then check the possibility of preventing money laundering and propose the ASM (AML SmartContract Mechant) design.