• Title/Summary/Keyword: One-Way Transmission

Search Result 261, Processing Time 0.034 seconds

A Study of Definition of Security Requirements on Encryption and Audit Logging (암호화와 감사 로깅에서 보안 요건 정의 연구)

  • Shin, Seong-Yoon;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.85-91
    • /
    • 2014
  • Encryption is a method to convert information to no-sense code in order to prevent data from being lost or altered by use of illegal means. Audit logging creates audit log of users' activities, exceptions, and information security events, and then conserves it for a certain period for investigation and access-control auditing. Our paper suggests that confidentiality and integrity of information should be guaranteed when transmitting and storing important information in encryption. Encryption should consider both one-way encryption and two-way one and that encryption key should assure security. Also, all history related to electronic financial transactions should be logged and kept. And, it should be considered to check the details of application access log and major information. In this paper, we take a real example of encryption and log audit for safe data transmission and periodic check.

T-DMB System Based on Limited Reception Function (제한수신 기능 기반 T-DMB 시스템)

  • Lee, Jong-Won;Kang, In-Shik;Yu, Dae-Sang;Kim, Jong-Moon;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.5
    • /
    • pp.957-962
    • /
    • 2016
  • Current terrestrial Digital Multimedia Broadcasting (T-DMB) is conducting the emergency alert broadcast, or can view a variety of broadcasting. However, propagation shadow area is a situation where the service is limited due to limitations of facilities investment. In addition, there is the problem of T-DMB broadcasting is for viewing only a restricted area and a mobile device because the mobile is also T-DMB viewing device impossible. In this paper, it receives a T-DMB broadcasting as a way to solve the problems of the T-DMB system, which was studied the re transmission to the mobile device. Accordingly, by receiving the broadcast may be watched in the mobile device the T-DMB reception impossible. Also provides a one-way/two-way authentication mechanism using a conditional access function, and the system was configured so that the user can watch only the registered broadcasting.

Design and Implementation of a Security Program for Supersafe Document Using Ancient and Modern Cryptography (고대 및 현대 암호 방식을 결합한 초안전 문서 보안 프로그램의 설계 및 구현)

  • You, Yeonsoo;Lee, Samuel Sangkon
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1913-1927
    • /
    • 2017
  • Encryption technology is to hide information in a cyberspace built using a computer and to prevent third parties from changing it. If a malicious user accesses unauthorized device or application services on the Internet of objects, it may be exposed to various security threats such as data leakage, denial of service, and privacy violation. One way to deal with these security threats is to encrypt and deliver the data generated by a user. Encrypting data must be referred to a technique of changing data using a complicated algorithm so that no one else knows the content except for those with special knowledge. As computers process computations that can be done at a very high speed, current cryptographic techniques are vulnerable to future computer performance improvements. We designed and implemented a new encryption program that combines ancient and modern cryptography so that the user never knows about data management, and transmission. The significance of this paper is that it is the safest method to combine various kinds of encryption methods to secure the weaknesses of the used cryptographic algorithms.

Optical and Heat Transfer Characteristics in a Rapid Thermal Annealing System for LCD Manufacturing Procedures (LCD 제작용 급속 열처리 시스템내의 광학 및 열전달 특성)

  • Lee, Seong-Hyuk;Kim, Hyung-June;Shin, Dong-Hoon;Lee, Joon-Sik;Choi, Young-Ki;Park, Seung-Ho
    • Proceedings of the KSME Conference
    • /
    • 2004.04a
    • /
    • pp.1370-1375
    • /
    • 2004
  • This article investigates the heat transfer characteristics in a RTA system for LCD manufacturing and suggests a way to evaluate the quality of a poly-Si film from the thin film optics analysis. The transient and one-dimensional conductive/radiative heat transfer equation considering wave interference effect is solved to predict surface temperatures of thin films. In dealing with radiative heat transfer, a one-dimensional two-flux method is used and the ray tracing method is also utilized to account for the wave interference effects. It is assumed that each interface is assumed diffusive but the spectral radiative properties are included. It is found that the selective heating region exists for various wavelengths and consequently may contribute to heat the poly-Si film. Using the formalism of the characteristic transmission matrix, the lumped structure reflectance, transmittance, and absorptance are calculated and they are compared with experimental data of the poly-Si film during the SPC process via the FE-RTA (Field-Enhanced RTA) technology.

  • PDF

NEAR INFRARED REFLECTANCE SPECTROSCOPY AS A TOOL TO PREDICT QUALITATIVE AND QUANTITATIVE MEAT AND BONE MEAL PRESENCE IN COMPOUND FEEDS

  • Fernandez, Maria;Martinez, Adela;Modrono, Sagrario;De La Roza, Begona
    • Proceedings of the Korean Society of Near Infrared Spectroscopy Conference
    • /
    • 2001.06a
    • /
    • pp.1269-1269
    • /
    • 2001
  • The Bovine Spongiform Encephalopathy (BSE) is one of the more important problems that have affected the economy of european cattles and the Public Safety. Their transmission is mainly through digestive system, and the compound feeds made with animal proteins are one source of infection for healthy cows. Nowadays the official method for meat and bone meal (MBM) detection in compound feeds is a microscopy technique. However, this methodology is subjective, and that alter the fact to make one exhaustive quantitative analysis and one differentiation between mammalian and poultry bones. In addition, the separation of the differents fractions in a sample by density before the analysis, requires the use of organochlorates products as $CCl_4$, which produce serious damages in the atmosphere ozone content. NIR methodology is another possible way to confirm and identifying animal ingredients in compound feeds, Its capabilities for quantitative and qualitative analysis of foods and feeds has been enought demonstrated. The objective of this work was to use NIR as a tool to make an qualitative and quantitative analysis and a prediction of the meat and bone meal presence in compound feeds from North Spain cattle farms. Using a global population of compound feeds, on make three different groups depending of MBM percentage presence (0, 0-100, 100), to build and validate one calibration equation to determine MBM content and make one discriminant analysis between these three groups. The preliminary dates obtained with another differents samples of known composition showed promising results.

  • PDF

Design and Implementation of Network Adaptive Streaming through Needed Bandwidth Estimation (요구대역 측정을 통한 네트워크 적응형 스트리밍 설계 및 구현)

  • Son, Seung-Chul;Lee, Hyung-Ok;Kwag, Yong-Wan;Yang, Hyun-Jong;Nam, Ji-Seung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.380-389
    • /
    • 2010
  • Since the internet is intend to be the best effort service, the system that stream a large amount of high quality medias need a techniques to overcome the network status for implementation. In this paper, we design and implement a method that estimate quickly whether network permits the needed bandwidth of media and a method that control QoS through that. Presented system uses Relative One-Way Delay(ROWD) trend in the case of the former, and leverages temporal encoding among Scalable Video Coding(SVC) that is apt to apply real time comparatively in the case of the latter. The streaming server classifies the medias by real time to several rates and begins transmission from top-level and is reported ROWD trend periodically from the client. In case of the server reported only 'Increase Trend', the sever decides that the current media exceeds the available bandwidth and downgrades the next media level. The system uses probe packet of difference quantity of the target level and the present level for upgrading the media level. In case of the server reported only 'No Increase Trend' by the ROWD trend response of the probe packet from client, the media level is upgraded. The experiment result in a fiber to the home(FTTH) environment shows progress that proposed system adapts faster in change of available bandwidth and shows that quality of service also improves.

Efficient Transmission Structure and Key Management Mechanism Using Key Provisioning on Medical Sensor Networks (의료 센서 네트워크에서의 효율적인 전송 구조 및 Key Provisioning을 사용한 키 관리 기법 연구)

  • Seo, Jae-Won;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.285-298
    • /
    • 2009
  • According to the development of ubiquitous technologies, sensor networks is used in various area. In particular, medical field is one of the significant application areas using sensor networks, and recently it has come to be more important according to standardization of the body sensor networks technology. There are special characteristics of their own for medical sensor networks, which are different from the one of sensor networks for general application or environment. In this paper, we propose a hierarchical medical sensor networks structure considering own properties of medical applications, and also introduce transmission mechanism based on hierarchical structure. Our mechanism uses the priority and threshold value for medical sensor nodes considering patient's needs and health condition. Through this way Cluster head can transmit emergency data to the Base station rapidly. We also present the new key establishment mechanism based on key management mechanism which is proposed by L. Eschenauer and V. Gligor for our proposed structure and transmission mechanism. We use key provisioning for emergency nodes that have high priority based on patients' health condition. This mechanism guarantees the emergency nodes to establish the key and transmit the urgent message to the new cluster head more rapidly through preparing key establishment with key provisioning. We analyze the efficiency of our mechanism through comparing the amount of traffic and energy consumption with analysis and simulation with QualNet simulator. We also implemented our key management mechanism on TmoteSKY sensor board using TinyOS 2.0 and through this experiments we proved that the new mechanism could be actually utilized in network design.

Implementation of a Medical Information Transmission Protocol Based on Mobile Wireless Communication (무선 이동통신 기술에 기반한 의료 정보 전송 프로토콜 구현)

  • 정희창;한민수
    • Journal of Biomedical Engineering Research
    • /
    • v.19 no.1
    • /
    • pp.19-24
    • /
    • 1998
  • The main goal of this paper is to propose and to test a radio protocol based CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) for the purpose of enhancing the existing medical information system. The feature of the new medical information system, Medical Application Radio System(MARS), which operating in real time is the transmission of medical information in bi-direction between the hospital control office and patients mobile stations. MARS monitors patients linked to the network by radio and provides quick alarm, flexible documentation capabilities, asnd fast treatment for the analysis of collected medical data. The existing medical information system, radio telemetry system which transfers the message of patients to the CAP(Central Access Point) unit in one way at the speed of 9.6Kbps and operates a channel frequency bandwidth. To verify the Performance of the proposed system, we have performed the numerical analysis and have implemented a test system which consists of the 2.4Ghz radio transceiver and personal computer.

  • PDF

A Inter-layer Path Provisioning System Architecture in Multi-layer Networks (다계층 광네트워크에서 계층간 경로설정 시스템 구조 연구)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.25-31
    • /
    • 2013
  • Looking at the recent value change of users and the usage pattern of network users, it is changing from simple web information, one-way information acquisition and data transmission to increase of usage of multimedia, increasing demand for security and customization, and increasing demands for free mobility. Due to this change of demand, the services which were provided individually, developed into a form which is merged, the network also seems to develop into the combined network from the individual network for individual service, and the communication network control technology which is the core technology is also rapidly developing. To reflect the users' demands, the next generation network created the multi-layer network which is based on the WDM/IP transmission system and added the to make it easy to restructure. P-OTS (Packet-Optical Transport System) can be defined as a platform that combines SONET/SDH, Ethernet, DWDM, optical transport network (OTN) switching and reconfigurable optical add-drop multiplexers (ROADMs). In this paper, we suggested that the optimum path choice be performed through diversification of the PCE-based path selection using the information of various layers altogether in the multi-layer environment, compared with the established path selection method when the path was selected using the information of each layers.

Study for Guideline of CD copy Issue to Secure Personal Information (개인정보 보호를 위한 의료영상 복사발급 지침에 대한 고찰)

  • Lee, Jong-Woong;Kang, Ji-Yeon;Kim, Eun-Jeong
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.10 no.2
    • /
    • pp.11-16
    • /
    • 2008
  • Images of medical treatment on PACS environment are digitized and they make saving and transmission of patient's information easy with CD format causing increase of patients transfer rate between hospital and data transmission as well. Figuring out the configuration of confining status of copied images of medical treatment with CD format and present the appropriate way of identification for personal information. 20 general hospital over 500 beds which are utilizing PACS currently. Questionnaire investigation focusing on PACS operation center and it's management people. In accordance with the law of securing personal information of public organizations, it says "Anyone who wants to see his or her information via representative he or she needs to make a letter of attorney and turn in this to the president of it's possessing facility" in the article 16. Based on the investigation of general hospital for CD copy issue status near metropolitan area, 8 out of 20, were issuing CD copy through personal identification process(the person oneself and representative) and 10 general hospital were doing by getting signature of receiptor only without identification of the person oneself and 2 general hospital confirmation process is not at all. By the law of securing personal information of public organization, article 16, confirmation process is supposed to mandate lawfully with a letter of attorney when there is any request of reading and/or copies of one's information. But in reality, there were no consistent rules on reading, the process and coverage of copy issue, rejection coverage of copy issue of CD copy in each general hospital PACS operation center. Therefore there is a big need for consolidated format which is applicable by law when the representative requests to issue of CD copy that is storing medical treatment images. By issue through this consolidated format, securing medical information of individual and systemic operation and management will be valid and effective.

  • PDF