• Title/Summary/Keyword: Message exchange

Search Result 297, Processing Time 0.028 seconds

A Comparative Legal Study on the Electronic Transactions Act in Thailand (태국의 전자거래법에 대한 비교법적 고찰 - 전문 및 일반규정을 중심으로 -)

  • Shim, Chong-Seok;Oh, Hyon-Sok
    • International Commerce and Information Review
    • /
    • v.12 no.4
    • /
    • pp.405-427
    • /
    • 2010
  • This legal study is to compare the Electronic Transactions Act in Thailand(hereinafter 'ETA') with mainly other countries electronic transactions acts, such as UNCITRAL MLEC, UECIC, VETA, UCITA and Korea' Electronic Transactions Act The ETA is consisted of 6 chapters which included preamble and definitions. Each chapter's main point as follows. Preamble is related to the name, time of legal effect, scope and definitions. Chapter 1 is not only general principles of electronic transactions, required restriction in addition to specify the limit of application, documentation, evidential weight in reference to the data message, but also the conditions of offer and acceptance through data message, time and place of dispatch and receipt of data message, certification between origination and addressee. According to media-neutrality and the effectiveness security requirement of data message under the information system, legal certification is related to the exchange's declaration of intention, define about origination-addressee of data message. Chapter 2 is composed to provide expressly about the effectiveness security in electronic signature. Those contents are to compare the MLEC, UECIC and Electronic Transactions Act in Korea. Chapter 3 is related to legal definitions that present legal requirement about service relating electronic transaction which contents accept domestic law, the adequate requirement as eligibility, satisfied matter, self-reliance ratio of finance and other detail standard Chapter 4 is deal with the transaction which are public sector and those application requirements. And also this chapter are composed regulations about direct-indirect purpose of Thailand domestic electronic government.

  • PDF

Real-time Message Network System for a Humanoid Robot

  • Ahn, Sang-Min;Gong, Jung-Sik;Lee, Bo-Hee;Kim, Jin-Geol;Huh, Uk-Youl
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.2296-2300
    • /
    • 2005
  • This paper deals with the real-time message network system by a CAN (controller area network) based on the real-time distributed control scheme to integrate actuators and sensors in a humanoid robot. In order to apply the real-time distributed processing for a humanoid robot, each control unit should have the real-time efficient control method, fast sensing method, fast calculation and real-time valid data exchange method. Moreover, the data from sensors and encoders must be transmitted to the higher level of control units in maximum time limit. This paper describes the real-time message network system design and the performance of the system.

  • PDF

Secure Message Transmission against Remote Control System

  • Park, Taehwan;Seo, Hwajeong;Bae, Bongjin;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.14 no.4
    • /
    • pp.233-239
    • /
    • 2016
  • A remote control system (RCS) can monitor a user's confidential information by using the broadcast receivers in Android OS. However, the current RCS detection methods are based only on a virus vaccine. Therefore, if the user's smartphone is infected by a brand new RCS, these methods cannot detect this new RCS immediately. In this paper, we present a secure message transmission medium. This medium is completely isolated from networks and can communicate securely through a QR code channel by using symmetric key cryptography such as the AES block cipher and public key cryptography such as elliptic curve cryptography for providing security. Therefore, the RCS cannot detect any confidential information. This approach is completely immune to any RCS attacks. Furthermore, we present a secure QR code-based key exchange protocol by using the elliptic curve Diffie-Hellman method and message transmission protocols; the proposed protocol has high usability and is very secure.

Design and Implementation of Platform for Monitoring of Notification System in Firebase Message

  • Oh, Am-Suk
    • Journal of information and communication convergence engineering
    • /
    • v.19 no.1
    • /
    • pp.16-21
    • /
    • 2021
  • In this paper, to prevent accidents of school vehicles used by students, which have emerged as a continuous social problem, a boarding and leaving notification system using Bluetooth beacons is proposed. The platform structure uses Bluetooth, a smartphone, and an application, and provides real-time message reception between parents and teachers. It is not simply a system with Bluetooth capability alone, but also an IcT technology that is closely related to real life using two-way communication. The purpose is to provide user-friendly ICT technology as an integrated system for more practical effects. Two-way exchange of information between parents and teachers using cloud servers is made possible. By using this Bluetooth beacon notification system, safety accidents in student vehicles are reduced, which brings confidence from traffic accidents to schoolchildren of parents and teachers. Therefore, it is expected that parents and teachers are expected to improve their mental stability and quality of life from traffic accidents.

An approach to define variable length messages using ASN.1 (ASN.1을 이용한 가변 길이 메시지 표현 방법)

  • Baek, Haeun;Kang, Sungwon;Kim, Jingyu;Kim, Jungmin;Kwon, Koohyung;Kim, Sangsoo
    • Journal of Software Engineering Society
    • /
    • v.25 no.2
    • /
    • pp.35-47
    • /
    • 2012
  • Variable Message Format(VMF) is a communications protocol that allows computers to exchange tactical military information over low-data-rate bearers. VMF is designed to define message length and structure variably in order to allow the user to transmit only the relevant information by using indicators. However, flexibility of messages makes it difficult to analyze messages structure and figure out meanings. Furthermore, whenever messages are added or modified, message processing software should be updated and distributed to systems. In this paper, we propose a systematic approach to defining VMF messages that uses the international standard notation ASN.1. By describing VMF messages in ASN.1, protocol architects can deal with VMF messages accurately and conveniently, and use various ASN.1 tool. This paper develops ASN.1 description templates for VMF message segments, and presents an approach to describing VMF messages in ASN.1 by combining the templates.

  • PDF

Improved Preimage Attacks on RIPEMD-160 and HAS-160

  • Shen, Yanzhao;Wang, Gaoli
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.727-746
    • /
    • 2018
  • The hash function RIPEMD-160 is a worldwide ISO/IEC standard and the hash function HAS-160 is the Korean hash standard and is widely used in Korea. On the basis of differential meet-in-the-middle attack and biclique technique, a preimage attack on 34-step RIPEMD-160 with message padding and a pseudo-preimage attack on 71-step HAS-160 without message padding are proposed. The former is the first preimage attack from the first step, the latter increases the best pseudo-preimage attack from the first step by 5 steps. Furthermore, we locate the linear spaces in another message words and exchange the bicliques construction process and the mask vector search process. A preimage attack on 35-step RIPEMD-160 and a preimage attack on 71-step HAS-160 are presented. Both of the attacks are from the intermediate step and satisfy the message padding. They improve the best preimage attacks from the intermediate step on step-reduced RIPEMD-160 and HAS-160 by 4 and 3 steps respectively. As far as we know, they are the best preimage and pseudo-preimage attacks on step-reduced RIPEMD-160 and HAS-160 respectively in terms of number of steps.

Design of XML message-based the heterogeneous P2P Data sharing System (XML 메시지 교환을 이용한 이기종 P2P 데이터 공유시스템 설계)

  • Jung, Hun;Kang, Byung-Wook;Seo, Yeung-Su
    • Journal of the Korea society of information convergence
    • /
    • v.1 no.1
    • /
    • pp.1-8
    • /
    • 2008
  • If the management through the center server is unnecessary and JXTA is connected to a network, a communication with any kind of devices or some device is possible. And features that a communication with heterogeneous P2P systems is possible have. The important module of the designed Data exchange system an interworking between the P2P system which it is made we used API and the each other different protocol the possible data for replacement Data exchange system were designed this kind of a feature was to the utmost utilized may account for the XML Parser Component(XPC) which we use it parses the or about a request and the generated request, and the structure of the XML Making Component(XMC) which we use in generating the inappropriate a request and response.

  • PDF

Lightweight Protocol for Low Power and Reliability Improvement Based on CoAP in the Internet of Things(IoT) Environment (사물인터넷 환경에서 CoAP 기반의 저전력, 신뢰성 향상을 위한 경량 프로토콜)

  • Seo, Doook;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.21-28
    • /
    • 2019
  • Internet of Things(IoT) is a technology or environment that collects data by attaching sensors to objects and transmits the collected information to each other through wired / wireless communication in real time. It is expected that when the Internet of objects is activated, many objects can identify and recognize each other by themselves and provide various services to facilitate our lives through mutual information exchange. In addition, the internet market for things is growing rapidly each year, and various IT technologies are expected to converge. In the Internet environment of objects, data exchange technology between object devices, that is, message protocol, is classified as one of important technologies. In this paper, we examine various lightweight message protocols suitable for the Internet environment of objects, and compare the reliability of the CoAP protocol structure with the MQTT protocol for a limited environment. Finally, we confirm the reliability of TCP / TLS and WebSockets-based CoAP transmission protocol of IETF's CoRE WG that can use various transport layers other than UDP in Internet environment including cloud infrastructure.

Development of Test Cases of STEP AP216 for the Exchange of Hullform Data (선형정보 교환을 위한 STEP AP216 Test Case 개발)

  • 이순섭;김용대;서정우;김수영
    • Korean Journal of Computational Design and Engineering
    • /
    • v.8 no.3
    • /
    • pp.141-149
    • /
    • 2003
  • The ship STEP is an international standard for the computer-interpretable representation of ship product information and for the exchange of ship product model data. The ship STEP consists of several APs(Application Protocol), such as AP215(ship arrangement), AP216(ship moulded form), AP218(ship structures), AP226(ship mechanical systems), and AP234(operating logs, records, message). The STEP AP216(ISO 10303) are an application protocol for the exchange of ship arrangement and ship moulded forms. The AP216 specifies the geometric shape and the hydrostatic properties of the ship moulded form. This paper introduces the state-of-the-art of ship STEP AP216 and develops the test case for the validation of data structure of AP216.

A Study for the Message Exchange of the EVSE Communication Controller using XML Schema Transformation

  • Un, Koaunghi;Jang, Hyuksoo;Kim, Myongsoo;Kim, Hwimin
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.2 no.1
    • /
    • pp.71-81
    • /
    • 2016
  • An EVSE and the EV exchange XML formatted communication messages with each other, whose structure is described by the V2G CI schema in the ISO/IEC 15118 international standard, and the EVSE and the power grid exchange messages based on SCL file with each other, whose structure is described by SCL schema in the IEC 61850 international standard. Because XML files can be restructured by XSLT, V2G messages can be transformed to/from SCL files using XSLT. In this study, the two schemas are analyzed and compared in order for the restructuring of the two differently structured XML instances. As a result, two XSL scripts can be produced for the transformation between XML files conforming ISO/IEC 15118 V2G CI schema and IEC 61850 SCL schema respectively to avoid manual data mapping which can happen in every application development cases.