• Title/Summary/Keyword: PersonalJava

Search Result 57, Processing Time 0.026 seconds

Design of Garbage Collector for Java-based Embedded Systems (Java 기반 임베디드 시스템을 위한 쓰레기 수집기 설계)

  • 배유석;김태근
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10a
    • /
    • pp.421-423
    • /
    • 1999
  • 가전 제품이나 정보 가전 기기를 포함하는 실시간 임베디드 응용 분야에서 Java를 소프트웨어 개발 플랫폼으로 선택하는 범위가 확대되고 있다. 현재 Sun에서 제공하는 PersonalJava 기술은 동적인 메모리 할당에 대하여 마크-회수(mark-sweep) 방식의 자동 쓰레기 수집(garbage collection) 기능을 지원하는데, 이 방법은 쓰레기 회수 수행전 응용프로그램의 수행을 중지시키는 방식으로 실시간 임베디드 환경에 적합하지 않다. 본 논문에서는 Java 기반 인터넷 셋톱박스나 디지털 가전기기에 탑재할수 있는 Java 플랫폼을 대상으로 기존에 적용된 비실시간 마크-회수 메모리 관리 기법을 대체하는 실시간 자동 메모리 관리 기법을 제시한다.

  • PDF

Research of Personal Java Vi ritual Machine Platform for Mobile Device (모바일 단말기용 퍼스널 자바 플랫폼에 대한 연구)

  • 권오형;진민식;유홍식;조증보;정준영;정민수
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.11a
    • /
    • pp.859-863
    • /
    • 2001
  • 자바는 썬 마이크로 시스템사가 1999년 6월에 플랫폼이나 개발 성격에 따라서 3가지 Edition으로 나누었다. Java 1.1 버전까지는 일반적인 자바 Applet이나 Application의 개발이 목적이였다. 그러나 Java 1.2 버전 이상에서는 자바의 용도가 좀 더 다양해지고 자바가 올라갈 수 있는 플랫폼이 다양해져 그 특성에 맞는 자바가 등장하게 되었다. 본 연구는 모바일 단말기용 Java VM 플랫폼 중 PVM 플렛폼을 연구하는 데에 기초로 한다.

  • PDF

A Study on the Multi-Modal Browsing System Using Java RMI (Java RMI를 이용한 Multi-Modal Browsing 시스템에 관한 연구)

  • 장준식;윤재석;김국보
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.167-170
    • /
    • 2003
  • 개인용 컴퓨터나 무선 전화, PDA(Personal Digital Assistants)의 기술 발전으로 이들이 인터넷에 접속할 수 있게 되었으며, 사용자들은 좀 더 다양한 방법으로 인터넷을 Browsing할 수 있는 방법을 찾고 있다. 본 연구는 표준 입출력 모드와 음성 인식과 음성 합성 모드를 동시에 적용할 수 있는 Multi-Modal Browsing 시스템을 연구하여 보았다. 이때 각 모드간에 동기화를 위한 이벤트 메시지 교환과 각 모드의 상태 저장 방법으로 Java RMI 모델을 제안하였다.

  • PDF

Design and Implementation of GUI in CVM on Real-Time Operating System, iRTOS (실시간 운영체제에서 iRTOS에서의 CVM GUI 설계 및 구현)

  • Choi, chan-woo;Lee, cheol-hoon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.551-554
    • /
    • 2008
  • JVM(Java Virtual Machine) has GUI(Graphical User Interface) facility and Platform Independance and is used on the embedded device such as set-top box and smart phone. This needs JVM to execute Java application in the embedded device. CVM(Classic Virtual Machine) which is the kind of JVM is designed for embedded device to have limited resources. To support GUI facility of JAVA uses PBP(Personal Basis Profile) which is included on CVM. The PBP defines the GUI Stardard API to support GUI facility. When the GUI Stardard API is implemented, JNI(Java Native Interface) is used to connect between Java Native Method and Native function in Operating System. In this pater, PBP which is defined by CVM has designed and implemented on the Real-Time Operating System, iRTOS.

  • PDF

Low-Power Encryption Algorithm Block Cipher in JavaScript

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.252-256
    • /
    • 2014
  • Traditional block cipher Advanced Encryption Standard (AES) is widely used in the field of network security, but it has high overhead on each operation. In the 15th international workshop on information security applications, a novel lightweight and low-power encryption algorithm named low-power encryption algorithm (LEA) was released. This algorithm has certain useful features for hardware and software implementations, that is, simple addition, rotation, exclusive-or (ARX) operations, non-Substitute-BOX architecture, and 32-bit word size. In this study, we further improve the LEA encryptions for cloud computing. The Web-based implementations include JavaScript and assembly codes. Unlike normal implementation, JavaScript does not support unsigned integer and rotation operations; therefore, we present several techniques for resolving this issue. Furthermore, the proposed method yields a speed-optimized result and shows high performance enhancements. Each implementation is tested using various Web browsers, such as Google Chrome, Internet Explorer, and Mozilla Firefox, and on various devices including personal computers and mobile devices. These results extend the use of LEA encryption to any circumstance.

Diversification of User Authentication by Writing Applet on Java Card (자바카드 애플릿 설정에 따른 사용자 인증의 다각화)

  • Song, Young-Sang;Shin, In-Chul
    • Journal of IKEEE
    • /
    • v.13 no.4
    • /
    • pp.89-95
    • /
    • 2009
  • Recently, IC cards are used to protect personal information and to have user verification. Among them, the usage of Java Cards which can contain applications after issuing are increasing and installing several applets on Java card is possible. When Java Cards are used, applet works after completing user identification. In this paper, we designed, embodied and verified the mechanism of user identification process according to PIN setting of applets; Stored_PIN, Install_PIN and Update_PIN. These several applications of Java cards will be used for user identification independently or multiply, while using diverse user identification.

  • PDF

JsSandbox: A Framework for Analyzing the Behavior of Malicious JavaScript Code using Internal Function Hooking

  • Kim, Hyoung-Chun;Choi, Young-Han;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.766-783
    • /
    • 2012
  • Recently, many malicious users have attacked web browsers using JavaScript code that can execute dynamic actions within the browsers. By forcing the browser to execute malicious JavaScript code, the attackers can steal personal information stored in the system, allow malware program downloads in the client's system, and so on. In order to reduce damage, malicious web pages must be located prior to general users accessing the infected pages. In this paper, a novel framework (JsSandbox) that can monitor and analyze the behavior of malicious JavaScript code using internal function hooking (IFH) is proposed. IFH is defined as the hooking of all functions in the modules using the debug information and extracting the parameter values. The use of IFH enables the monitoring of functions that API hooking cannot. JsSandbox was implemented based on a debugger engine, and some features were applied to detect and analyze malicious JavaScript code: detection of obfuscation, deobfuscation of the obfuscated string, detection of URLs related to redirection, and detection of exploit codes. Then, the proposed framework was analyzed for specific features, and the results demonstrate that JsSandbox can be applied to the analysis of the behavior of malicious web pages.

A Study on Process Finalization algorithm for Personal JAVA Virtual Machine (퍼스널 가상머신위한 프로세스 종료기법에 관한 연구)

  • 유홍식;조유섭;정민수
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.1007-1011
    • /
    • 2002
  • 소형 플랫폼에 자바 언어를 구동하기 위한 PJAVA VM(이하 PVM)이 많은 관심을 끌고 있다. PVM 역시 JVM과 같이 클래스 로더, 서브시스템, 런타임 데이터 영역 (메소드 영역, 힙 자바 스택, PC레지스터, 원시 메소드 스택), 실행 엔진으로 구성되어 있다. 본 논문의 서론은 PDA 및 set-top등을 소개하고 JAVA 언어를 구동하기 위해 필요한 플랫폼을 소개하고, J2ME와 PJAVA를 관계를 소개하였다. 관련연구는 PVM의 메소드 구조에 대해 연구하였다. 그리고 본론으로 PVM에서 프로세서 마무리 처리과정을 분석하고 이 과정에서 프로세서의 종료 작업 알고리즘을 개선 하였다.

  • PDF

A Study of Effective Privacy Protection System on High Concurrent Transaction Database System (동시 트랜잭션이 많은 데이터베이스에서 효과적인 개인정보보호 시스템 연구)

  • Kang, Ji-Won
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.107-113
    • /
    • 2012
  • Recently, according to the establishment of personal information protection Act, the public and private organizations are taking a step to protect personal information rights and interests by employing the technical methods such as the access control mechanism, cryptography, etc. The result of the personal information leakage causes a serious damage for the organization image and also has to face with the responsibility by law. However, applying access control and cryptographic approach on the personal information item for every connection to large database system causes significant performance degradation in a large database system. In this paper, we designed and implemented the light weight system using JVM (Java Virtual Machine) for the Oracle DBMS environment which the concurrent transaction occurs many, thereby the proposed system provides the minimum impact on the system performance and meets the need of personal information protection. The proposed system was validated on the personal information protection system which sits on a 'A' public organization's portal site and personnel information management system.

Design and Implementation of File Access Control System using Java Card (자바카드를 이용한 파일 접근제어 시스템의 설계 및 구현)

  • Koo, Eun-Bee;Woo, Chan-Il
    • 전자공학회논문지 IE
    • /
    • v.43 no.1
    • /
    • pp.46-51
    • /
    • 2006
  • Recently, smart card system which is known as easy to portable and also safe from physical, electrical, and software attack is observed to manage information that becomes the target of security in safety. And java card graft upon java technology to smart card platform is having very good advantage with object-oriented techniques and also, java card have the open type OS that can show the same action in different hardware characteristic which allows various application programs. In this paper, we introduced independent execution characteristic of java platform because being set to each smart card was uncomfortable till now and we designed access control member card that allows several administrators in different access privilege by single card using java card. Several administrators can approach to various information of file type that is included on issued card to user by using different PIN. In the proposed method, confirmation of personal information, administration contents update, demand by contents, is possible by single card. At this moment, wish to do safer user certification that improve security limitation which is from PIN, used for user certification, and signature data. In the proposed method, as design and implementation of utilization technology of java card, biometrics, user certification which uses multi PIN, provide that more safety and conveniently.