• Title/Summary/Keyword: Protect Device

Search Result 385, Processing Time 0.023 seconds

Development of wearable device with smart key function and convergence of personal bio-certification and technology using ECG signal (심전도 신호를 이용한 개인 바이오인증 기술 융합과 smart key 기능이 탑재된 wearable device 개발)

  • Bang, Gul-Won
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.637-642
    • /
    • 2022
  • Self-authentication technology using electrocardiogram (ECG) signals is drawing attention as a self-authentication technology that can replace existing bio-authentication. A device that recognizes a digital electronic key can be mounted on a vehicle to wirelessly exchange data with a car, and a function that can lock or unlock a car door or start a car by using a smartphone can be controlled through a smartphone. However, smart keys are vulnerable to security, so smart keys applied with bio-authentication technology were studied to solve this problem and provide driver convenience. A personal authentication algorithm using electrocardiogram was mounted on a watch-type wearable device to authenticate bio, and when personal authentication was completed, it could function as a smart key of a car. The certification rate was 95 per cent achieved. Drivers do not need to have a smart key, and they propose a smart key as an alternative that can safely protect it from loss and hacking. Smart keys using personal authentication technology using electrocardiogram can be applied to various fields through personal authentication and will study methods that can be applied to identification devices using electrocardiogram in the future.

The Technological Method for Safe Processing of Sensitive Information in Network Separation Environments (망분리 환경에서 민감정보를 안전하게 처리하기 위한 기술적 방안)

  • Juseung Lee;Ilhan Kim;Hyunsoo Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.125-137
    • /
    • 2023
  • Companies that handle sensitive information, led by public institutions, establish separate networks for work and the Internet and protect important data through strong access control measures to prevent cyber attacks. Therefore, systems that involve the junction where the Intranet(internal LAN for work purposes only) and the Internet network are connected require the establishment of a safe security environment through both administrative and technical measures. Mobile Device Management(MDM) solutions to control mobile devices used by institutions are one such example. As this system operates by handling sensitive information such as mobile device information and user information on the Internet network, stringent security measures are required during operation. In this study, a model was proposed to manage sensitive information data processing in systems that must operate on the Internet network by managing it on the internal work network, and the function design and implementation were centered on an MDM solution based on a network interconnection solution.

A Design of 40V Power MOSFET for Low Power Electronic Appliances (저용량 가전용 40V급 Power MOSFET 소자의 설계 및 제작에 관한 연구)

  • Kang, Ey-Goo;Ann, Byoung-Sup;Nam, Tae-Jin;Kim, Bum-June;Lee, Young-Hon;Chung, Hun-Suk
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2009.06a
    • /
    • pp.115-115
    • /
    • 2009
  • Current sensing in power semiconductors involves sensing of over-current in order to protect the device from harsh conditions. This technique is one of the most important functions in stabilizing power semiconductor device modules. The Power MOSFET is very efficient method with low power consumption, fast sensing speed and accuracy. In this paper, we have analyzed the characteristics of proposed sense FET and optimized its electrical characteristics to apply conventional 40 V power MOSFET by numerical and simulation analysis. The proposed sense FET has the n-drift doping concentration $1.5\times10^{14}\;cm^{-3}$, size of $600\;{\mu}m^2$ with $4.5\;{\Omega}$, and off-state leakage current below $50\;{\mu}A$. We offer the layout of the proposed Power MOSFET to process actually. The offerd design and optimization methods are meaningful, which the methods can be applied to the power devices having various breakdown voltages for protection.

  • PDF

METHODOLOGY TO ENHANCE THE PREDICTABILITY OF I/O DATA EXCHANGE BETWEEN DEVICE AND TASKS (장치와 태스크 간 입출력 데이터 교환의 예측성 향상 방안)

  • Koo, Cheol-Hea;Yang, Koon-Ho;Choi, Seong-Bong
    • Journal of Astronomy and Space Sciences
    • /
    • v.24 no.4
    • /
    • pp.451-456
    • /
    • 2007
  • Data coming from devices shall be transported to a specific task to be used in a software with the most accurate time and data integrity. During this process, a potential cause for invoking structured hazard and performance degradation is dormant. In this paper, a method which can protect the data integrity from the possible data corruption when collision has happened during I/O data exchange between device and tasks is presented. Also, an example diagram of mechanism according to the method is shown and the effect, merits and demerits of the method is evaluated.

A Risk Analysis on the Error Code of Vehicle Inspection Utilizing Portfolio Analysis (Portfolio 분석을 활용한 자동차 검사의 부적합항목에 대한 위험도분석)

  • Choi, Kyung-Im;Kim, Tae-Ho;Lee, Soo-Il
    • Journal of the Korean Society of Safety
    • /
    • v.27 no.4
    • /
    • pp.121-127
    • /
    • 2012
  • Vehicle Inspection System is to examine the condition of vehicle regularly at the national level to protect lives and properties of the people from traffic accidents due to vehicle's fault. However, the vehicle inspection method, criteria, period and effectiveness have become a controversial issue, because of examining safety management of vehicle by drivers regardless of regular vehicle inspection. Therefore, the aim of this study is to investigate vehicle inspection timeliness and risk level of inspection items through basic statistical survey and portfolio analysis. The results of the research through practical analysis are: (1) The inspection failure rates between 3 and 6 model year tend to increase. (2) The failure of inspection items for safety highly impacts on traffic accident rate in terms of accident risks. (3) According to the result of portfolio analysis, faulty items located 1st quadrant are riding device, driveline system, controlling device, steering actuator, and fuel system.

Secret Information Protection Scheme for Device in Home Network (홈 네트워크에서 디바이스를 위한 비밀 정보 보호 기법)

  • Maeng, Young-Jae;Kang, Jeon-Il;Mohaisen, Abedelaziz;Lee, Kyung-Hee;Nyang, Dae-Hun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.341-348
    • /
    • 2007
  • Even though the secret information stored in home device in home network must be handled very safely and carefully, we have no measure for protecting the secret information without additional hardware support. Since already many home devices without consideration of the security have been used, the security protection method for those devices have to be required. In this paper, we suggest two schemes that protect the security information using networking function without additional hardware support, and those hybrid method to supplement the defects of each scheme. We also consider the our proposals in the aspects of security and cost.

Design and Implementation of User Authentication System Using USIM Information (USIM 정보를 이용한 사용자 인증 방안 설계 및 구현)

  • Lee, Jin-Woo;Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.571-578
    • /
    • 2017
  • In order to approach information system through smart device and pc, user has to authenticate him or herself via user authentication. At that time when user tries reaching the system, well-used user authentication technologies are ID/PW base, OTP, certificate, security card, fingerprint, etc. The ID/PWbased method is familiar to users, however, it is vulnerable to brute force cracking, keylogging, dictionary attack. so as to protect these attacks, user has to change the passwords periodically as per password combination instructions. In this paper, we designed and implemented a user authentication system using smartphone's USIM without using password while enhancing security than existing ID / PW based authentication technology.

A Study on the Improvement of Anti-Fire System of Temples (사찰 화재예방시스템의 개선방안에 관한 연구)

  • Kong, Ha-Sung
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.8 no.4
    • /
    • pp.87-90
    • /
    • 2008
  • This research is to study and analyze our country's management of disasters, the present condition of cultural heritages bases on the examples of temples, and Japan's safety management prevention of buddhist temple. As a result, this research aims to how to improve the temple fire prevention system. To improve the anti-fire system of temples, it is important to make new laws about fire lose to minimize cultural property lose. Secondly, to protect self-contained type fire alarm device, with aerosol type hand propelled fire extinguishers to prevent fire lose. Lastly, construction work of electric engineer is necessary to prevent temple fire loses.

Mathematical Analysis for Efficiency of Eavesdropping Attack Using Directional Antenna in mmWave Band (밀리미터파 대역에서 지향성 안테나 사용에 의한 도청공격 대응 효율성의 수학적 분석)

  • Kim, Meejoung;Kim, Jeong Nyeo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.1074-1077
    • /
    • 2013
  • This paper analyzes the benefit of using directional antennas against eavesdropping attack in millimeter wave (mmWave)-based networks. All devices are equipped with a directional antenna or an omni-directional antenna in a single-hop communications. The probability of a device being detected by an eavesdropper is analyzed based on the exposure region of a device. The relative detection rate is introduced to represent the benefit of using directional antenna. Numerical results show that there exists an optimal number of devices that maximizes the detection probability and it varies according to the parameters such as antenna beamwidth. It shows that the use of directional antenna enables to protect the devices from the detection by an eavesdropper for almost the whole situation in mmWave band communication.

A Study on the Reactor Protection System Composed of ASICs

  • Kim, Sung;Kim, Seog-Nam;Han, Sang-Joon
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1996.11a
    • /
    • pp.191-196
    • /
    • 1996
  • The potential value of the Application Specific Integrated Circuits(ASIC's) in safety systems of Nuclear Power Plants(NPP's) is being increasingly recognized because they are essentially hardwired circuitry on a chip, the reliability of the system can be proved more easily than that of software based systems which is difficult in point of software V&V(Verification and Validation). There are two types of ASIC, one is a full customized type, the other is a half customized type. PLD(Programmable Logic Device) used in this paper is a half customized ASIC which is a device consisting of blocks of logic connected with programmable interconnections that are customized in the package by end users. This paper describes the RPS(Reactor Protection System) composed of ASICs which provides emergency shutdown of the reactor to protect the core and the pressure boundary of RCS(Reactor Coolant System) in NPP's. The RPS is largely composed of five logic blocks, each of them was implemented in one PLD, as the followings. A). Bistable Logic B). Matrix Logic C).Initiation Logic D). MMI(Man Machine Interface) Logic E). Test Logic.

  • PDF