• Title/Summary/Keyword: Middle Server

Search Result 71, Processing Time 0.02 seconds

Digital Contents Protection Without Server Authentication Using Smart Cards (스마트 카드를 이용한 서버 인증이 필요 없는 디지털 콘텐츠 보호 기법)

  • Kim, Young-Sik;Lim, Dae-Woon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3C
    • /
    • pp.133-139
    • /
    • 2011
  • Nowadays, it is considered as an important task to protect digital contents from illegal use and reproduction. In many cases, there are secure servers to authenticate the allowed users and the user authentication process is performed by communication between the servers and users. However, if the number of users and contents are increased, the servers should treat a large amount of authentication loads and the authentication cost will be considerably increased. Moreover, this scheme is not adequate for some players in which only a limited function of communication is deployed. In order to solve this problem, this paper proposes an authentication method which can certificate both the digital contents and players, and prevent illegal reproduction without the certification server. The proposed scheme is secure in the replay attack, the man in the middle attack, and data substitution attack.

Design and Implementation of Blockchain Network Based on Domain Name System (블록체인 네트워크 기반의 도메인 네임 시스템 설계 및 구현)

  • Heo, Jae-Wook;Kim, Jeong-Ho;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.36-46
    • /
    • 2019
  • The number of hosts connected to the Internet has increased dramatically, introducing the Domain Name System(DNS) in 1984. DNS is now an important key point for all users of the Internet by allowing them to use a convenient character address without memorizing a series of numbers of complex IP address. However, relative to the importance of DNS, there still exist many problems such as the authorization allocation issue, the disputes over public registration, security vulnerability such as DNS cache poisoning, DNS spoofing, man-in-the-middle attack, DNS amplification attack, and the need for many domain names in the age of hyper-connected networks. In this paper, to effectively improve these problems of existing DNS, we proposed a method of implementing DNS using distributed ledger technology, blockchain, and implemented using a Ethereum-based platform. In addition, the qualitative analysis performance comparative evaluation of the existing domain name registration and domain name server was conducted, and conducted security assessments on the proposed system to improve security problem of existing DNS. In conclusion, it was shown that DNS services could be provided high security and high efficiently using blockchain.

Development on Real Time Application System for Fisheries Oceanography Information (실시간 어장정보 생산 부이시스템 개발 및 활용연구)

  • Lee, Chu;Suh, Young-Sang;Hwang, Jae-Dong
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.8 no.3
    • /
    • pp.142-149
    • /
    • 2005
  • To provide observed oceanography data at coastal fish and shellfish farm in the northeastern sea of the Korean peninsula on real time base, we developed real time application system for fisheries oceanography information. The system has been made up a mooring buoy system, a server for oceanography data collection, a server for archiving data and a database system, and a web server for providing fisheries oceanography information using internet. Futhermore, to support letters service on a cellular phone, we developed the communication system from mooring buoy to cell phone on real time base. The oceanography data derived from the system are water temperature speed and direction of current in surface layer middle layer and bottom layer in hour. We were able to quantify short term variation of ocean conditions within several days at shellfish farm such as a scallop sea farm using our system. To reduce damages of fish and shellfish farm from abnormal phenomena of ocean conditions such as a broken stratification of water, an occurrence of abnormal coastal cold water and warm water we will be able to move vertically and horizontally the sea farm facilities to proper conditions using real time oceanography information derive from the system.

  • PDF

A Design of Information Security Education training Databank System for Preventing Computer Security incident (침해사고 예방을 위한 정보보안 교육훈련 문제은행 시스템)

  • Mo, Eun-Su;Lee, Jae-Pil;Lee, Jae-Gwang;Lee, Jun-Hyeon;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.277-280
    • /
    • 2015
  • Smishing, Phishing personal privacy caused by Incident accidents such as Phishing information security has become a hot topic. Such incidents have privacy in personal information management occurs due to a lack of user awareness. This paper is based on the existing structure of the XML Tag question bank used a different Key-Value Structure-based JSON. JSON is an advantage that does not depend on the language in the text-based interchange format. The proposed system is divided into information security sector High, Middle and Low grade. and Provides service to the user through the free space and the smart device and the PC to the constraints of time. The use of open source Apache Load Balancing technology for reliable service. It also handles the user's web page without any training sessions Require server verification result of the training(training server). The result is sent to the training server using jQuery Ajax. and The resulting data are stored in the database based on the user ID. Also to be used as a training statistical indicators. In this paper, we design a level training system to enhance the user's information security awareness.

  • PDF

A Study on the Development of a Database for a Health Care System - Focusing on Health Care Management for Hypertensive Patients and Middle-aged Women - (보건소 건강증진사업을 위한 데이터베이스 시스템 구축 - 고혈압과 갱년기 여성건강관리를 중심으로 -)

  • Lee, Hae-Ja;Kim, Chun-Mi;Choi, Jeong-Myung
    • Research in Community and Public Health Nursing
    • /
    • v.15 no.3
    • /
    • pp.365-375
    • /
    • 2004
  • Purpose: This study intends to make a database for hypertensive patients and middle-aged women who are visiting the Yeojoo County Health Center. While building up the database, the study reviewed the current assessment tools used in the health center, developed appropriate health care programs, and designed a computerized health care system. Method: The modeling of a database for the system was constructed by MS-Access for DBMS (Database Management System) and Visual Basic. The system is to be used only in the health center by being designed as a client server method, making it possible for many public employees to be interconnected, and enables them to retrieve and search data from the database simultaneously. Results: The health management system systematically follows nursing processes including assessment, diagnosis, intervention and evaluation. Diagnosis. once it is done according to the self determined criteria, saves time and provides appropriate health information for the members. Also, the health education program was developed to follow up on the health status of the members on a continuous basis. Conclusion: Based on these results, it is required to evaluate health care programs provided for the members by using the database system and to develop more practical health care programs. It is also necessary to connect the system to other databases. which contain information about members.

  • PDF

Interworking of SIP Authentication with DIAMETER and Security Analysis (SIP와 DIAMETER의 인증 연동 및 안전성 분석)

  • 박성준;정수환;이병길;김현곤
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3C
    • /
    • pp.426-435
    • /
    • 2004
  • The DIAMETER protocol provides Authentication, Authorization, and Accounting (AAA) transactions across the Internet. SIP(Session Initiation Protocol) will be used for new types of signaling, such as instant messaging and application level mobility across networks. And SIP will be a major signaling protocol for next generation wireless networks. But the Digest authentication scheme is not using a secure method of user authentication in SIP, and it is vulnerable to man-in-the-middle attacks or dictionary attacks. This study focused on designing a SIP proxy for interworking with AAA server with respect to user authentication and security analysis. We compared and analyzed the security aspects of the scenarios and propose two proposals that a response which include the user address and password-based mutual authentication and key agreement protocol. It is claimed to be more secure against common attacks than current scenarios.

A Password-based Efficient Key Exchange Protocol (패스워드 기반의 효율적인 키 교환 프로토콜)

  • 이성운;김현성;유기영
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.347-352
    • /
    • 2004
  • In this paper, we propose a new key exchange protocol which authenticates each other and shares a session key between a user and a server over an insecure channel using only a small password. The security of the protocol is based on the difficulty of solving the discrete logarithm problem and the Diffie-Hellman problem and the cryptographic strength of hash function. The protocol is secure against the man-in-the-middle attack, the password guessing attack, the Denning-Sacco attack, and the stolen-verifier attack, and provide the perfect forward secrecy. Furthermore, it is more efficient than other well-known protocols in terms of protocol execution time because it could be executed in parallel and has a simple structure.

Design of Mobile Supervisory System that Apply Action Tracing by Image Segmentation (영상분할에 의한 동작 추적 기법을 적용한 모바일 감시 시스템의 설계)

  • 김형균;오무송
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.282-287
    • /
    • 2002
  • This paper action tracing by techniques to do image sequence component to watch invader based on Mobile internet use. First, detect frame in animation that film fixed area, and make use of image subtraction between two frame that adjoin, segment fixed backing and target who move. Segmentalized foreground object detected and did so that can presume middle value of gouge that is abstracted to position that is specified and watch invader by analyzing action gouge. Those watch information is stored, and made Mobile client send out SMS Message about situation of watch place to server being stored to sensed serial numbers, date, Image file with recording of time.

The Design of User-Authentication technique using QR-Code recognition (스마트폰의 QR-Code의 인식 기법을 이용한 사용자 인증 기법 설계)

  • Lee, Yong Jae;Kim, Young Gon;Park, Tae Sung;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.85-95
    • /
    • 2011
  • Smart phones, greatly expanding in the recent mobile market, are equipped with various features compared to existing feature phones and provide the conveniences to in several ways. The camera, one of the features of a smartphone, creates the digital contents, such photos and videos, and plays a role for the media which transmits information, such as video calls and bar code reader. QR-Code recognition is also one of the camera features. It contains a variety of information in two-dimensional bar code type in matrix format, and makes it possible to obtain the information by using smart phones. This paper analyzes the method of QR-Code recognition, password method-the existing user-authentication technique, smart card, biometrics and voice recognition and so on and thenn designs a new user-authentication technique. The proposed user-authentication technique is the technique in which QR-Code, which can be simply granted is read by smart phones and transmitted to a server, for authentication. It has the advantages in view that it will simply the process of authentication and conteract the disadvantages, such as brute force attack, man-inthe-middle attack, and keyboard hacking, which may occur in other authentication techniques.

Performance Analysis of Ship IPMS Simulator Based on DDS integrated with Different Operating System Equipment (이종 운영체제 장비를 통합한 DDS 기반 선박 IPMS 시뮬레이터 성능 분석)

  • Seongwon Oh
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.2
    • /
    • pp.210-215
    • /
    • 2024
  • With increasing automation in ships and the development of autonomous ships, an IPMS (Integrated Platform Management System) in ship needs to integrate and process large amounts of real-time data from various equipment operating on different operating systems. A ship IPMS simulator based on data distribution service (DDS) was developed and its performance was evaluated to handle data processing similar in real ship environment. Errors were monitored while 1,000 topics/sec were asynchronously published and subscribed from data acquisitive units (DAUs) and an IPMS server operating on different operating systems. Except for the loss of some topics during the initial 4 seconds, topics were received without an error thereafter. The developed simulator demonstrates the feasibility of using DDS to integrate various control systems using different operating systems in actual ships.