• Title/Summary/Keyword: Protect Device

Search Result 385, Processing Time 0.022 seconds

A Study on Security Solution for USB Flash Drive (USB 메모리를 위한 보안 솔루션에 관한 연구)

  • Lee, Sun-Ho;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.93-101
    • /
    • 2010
  • A USB flash drive is a portable storage device. For its promising moderate price, portability and high capacity USB flash drive users are increasing rapidly. Despite these advantages USB flash drives have critical problems as well. Such as personal information data leakage due to easy loss of the portable device. As these personal information leakage incidents increases various security measure solutions are produced and distributed. Despite these security measures and solutions it is not enough to perfectly protect personal data leakage. Hence the necessity of a more concrete, secure, user-friendly security measure solution is required. In this paper we provide you with portable USB flash drive security solution analysis and provide you with the latest secure, user-friendly security measure solutions.

Study of 7 Degree of Freedom Desktop Master Arm (7자유도 탁상식 마스터 암의 설계 연구)

  • Choi, Hyeungsik;Lee, Dong-Jun;Ha, Kyung-Nam
    • Journal of Ocean Engineering and Technology
    • /
    • v.26 no.6
    • /
    • pp.59-65
    • /
    • 2012
  • In this research, a novel mater arm was studied as a teaching device for an underwater revolute robot arm used as a slave arm. The master arm was designed to be a seven-degree-of-freedom (DOF) structure, with a structure similar to that of the slave arm, and to be desktop size to allow it to be worn on a human arm. The master arm with encoders on the joints was used as an input device for teaching a slave robot arm. In addition, small electric magnets were installed at the joints of the master arm to generate the haptic force. A control system was designed to sense excessive force and torque in the joints of the master arm and protect it by controlling the position and velocity of the slave arm through the encoder signal of the master arm.

Protection of Incumbent Services and Its Impact on Coverage of TV Band Device Networks in TV White Space

  • Kang, Kyu-Min;Park, Jae Cheol;Cho, Sang-In;Park, Seungkeun
    • ETRI Journal
    • /
    • v.38 no.1
    • /
    • pp.112-122
    • /
    • 2016
  • This paper presents a set of candidate regulatory requirements for TV band devices (TVBDs) in the Rep. of Korea. To guarantee the protection of incumbent services, especially digital TV (DTV) and wireless microphones, in TV frequency bands, we suggest minimum separation distances of TVBDs from the noise-limited contour according to incumbent users and TVBD types. This paper also deals with multiple sets of separation distances of a co-channel TVBD network from a DTV protected contour on the basis of the radio propagation characteristics of different geographic areas to make good use of TV white space (TVWS) and safely protect the DTV service. We present a low-power transmission mode of TVBDs and the relevant separation distances for small-cell deployment. The service coverage reduction ratio of a TVBD network is investigated in the presence of DTV interference in four geographic areas. The TVWS field verification results, conducted on the island of Jeju (Rep. of Korea), show that incumbent services operate well without harmful interference from neighboring TVBDs with the proposed separation distances.

Design and Implementation of Flash Cryptographic File System Based on YAFFS (YAFFS 기반의 암호화 플래시 파일 시스템의 설계 및 구현)

  • Kim, Seok-Hyun;Cho, Yoo-Kun
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.15-21
    • /
    • 2007
  • As the amount of flash memory being used in embedded device is increased and embedded devices become more important in many computing environments, embedded file system security becomes more important issue. Moreover embedded devices can be easily stolen or lost because of it's high portability. If the lost embedded device has very important information, there's no means to protect it except data encryption. For improving embedded devices' security this paper propose design and implementation of flash cryptographic file system. For this purpose YAFFS is used. By the modified YAFFS cryptographic file system, the security of embedded devices can be improved.

  • PDF

A Study on the Surge Protection Device for Computer Networks by International Standards (국제규격 대응 컴퓨터 네트워크용 서지방호장치 개발에 관한 연구)

  • Park, Dae-Won;Seo, Hwang-Dong;Song, Jae-Yong;Han, Joo-Sup;Kil, Gyung-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.277-280
    • /
    • 2005
  • This paper dealt with the development of a surge protection device (SPD) that can protect high speed computer network devices from overvoltages caused by switching operations or lightning surges. The designed SPD is a form of hybrid circuit which is composed of a gas tube having large current diverting capability, high response bi-directional avalanche diodes, and fast recovery diodes to reduce insertion loss on high frequency domain. Surge protection and signal transmission characteristics of the fabricated SPD was tested according to the international standards, IEC 61000-4-5 and IEC 61643-21. From the test results, the SPD is satisfied with the international standards and the high cut-off frequency was 204MHz. Also, the SPD showed a good performance without an insertion loss on a field test of 100Mbps class Local Area Network

  • PDF

Risk Analysis for Protecting Personal Information in IoT Environments (사물인터넷(IoT) 환경에서의 개인정보 위험 분석 프레임워크)

  • Lee, Ae Ri;Kim, Beomsoo;Jang, Jaeyoung
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.41-62
    • /
    • 2016
  • In Internet of Things (IoT) era, more diverse types of information are collected and the environment of information usage, distribution, and processing is changing. Recently, there have been a growing number of cases involving breach and infringement of personal information in IoT services, for examples, including data breach incidents of Web cam service or drone and hacking cases of smart connected car or individual monitoring service. With the evolution of IoT, concerns on personal information protection has become a crucial issue and thus the risk analysis and management method of personal information should be systematically prepared. This study shows risk factors in IoT regarding possible breach of personal information and infringement of privacy. We propose "a risk analysis framework of protecting personal information in IoT environments" consisting of asset (personal information-type and sensitivity) subject to risk, threats of infringement (device, network, and server points), and social impact caused from the privacy incident. To verify this proposed framework, we conducted risk analysis of IoT services (smart communication device, connected car, smart healthcare, smart home, and smart infra) using this framework. Based on the analysis results, we identified the level of risk to personal information in IoT services and suggested measures to protect personal information and appropriately use it.

Study on Compatibility between WPT Device at ISM band and Radio Modem (ISM 대역의 WPT 기기와 무선 모뎀의 공존 방안 연구)

  • Kim, SeungNam;Lee, Ilkyoo;Min, Kyoungil
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.4
    • /
    • pp.47-52
    • /
    • 2014
  • Recently, the interest of Wireless Power Transmission(WPT) has been increased for Mobile device application. It is necessary to analyze interference between wireless devices for the efficient use of frequency resource. The Minimum Coupling Loss(MCL) method and the Monte Carlo(MC) method were used for the interference analysis. In this paper, the impact of the 3rd order harmonics of the wireless charger for Cellular Phone on the existing Radio Modem was analyzed. As a result, the separation distance and the allowable number of interferer on the basis of service radius were obtained to protect the Radio Modem from the wireless charger for Cellular Phone.

A Prototype Development of Personal Low-frequency Stimulator with Characteristic Analysis (개인용 저주파 자극기의 특성분석 및 Prototype개발)

  • Lee, Gi-Song;Lee, Dong-Ha;Yu, Jae-Taek
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.349-352
    • /
    • 2003
  • A personal low-frequency stimulator is a portable device to relax muscle pains of a person. The stimulator generates combined low-frequency pulses to be applied to pads attached to painful muscles. This paper reports a development of such device with its characteristic analyses. The major components of our stimulator are MCU, high-voltage generating circuit part, high-voltage switching circuit part, input switch part and display unit. High-voltage generating circuit is designed by using a boost converter circuit and allows user control of the output voltage. High-voltage switching circuit, controlled by MCU, generates output voltage to be applied to pads. Input switch part is composed of power supply, intensity selection, mode selection and memory. Display unit adopts a text LCD module to display modes, Intensity, output frequency and user set-up time. Our designed safety circuit, to protect human body from possible electric shock, slowly increases the output voltage to the selected output intensity. It continuously checks the output pulse shape and disable the output when dangerous pulses are detected. This paper also shows some experimental results.

  • PDF

The Cryption Tool Transfer System for Digital Broadcasting Service (디지털 방송 서비스를 위한 암호화 툴 전송시스템)

  • Cao, Ke-Rang;Hwang, Kyung-Min;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1075-1081
    • /
    • 2008
  • The growth of digital content market inducted to develope consuming device of various content. And through this, digital content consuming is more Promoted. But digital content cryption tool need to handle to protect and consume digital content safely. Also, interoperability of cryption tool management is impossible, because of not standardized transfer protocol between device. In this paper, we defined transfer protocol of cryption tool for protecting and consuming digital content. And in this base, we designed and implemented transfer server/client system.

The Ablation Effect of Fabric/EPDM Rubber with Manufacturing process (Fabric/EPDM계 고무의 제작 공정에 따른 삭마 특성)

  • Kim, Jin-Yong;Rho, Tae-Ho;Lee, Won-Bok;Cho, Won-Man;Rhee, Young-Woo
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2012.05a
    • /
    • pp.92-95
    • /
    • 2012
  • The dual pulse rocket motor is a pressure vessel containing two pulse grains separated by a pulse separation device such as a fragile bulkhead. One of the important things in this systems is case insulation design using the excellent materials in the 1st stage pulse motor. We investigated manufacturing process of fabric/EPDM chamber insulations in order to protect the 1st stage pulse motor case with high intensity gas flow. Simulation motor connected with extension tube having FRP disc was designed to study ablation characteristics of insulation.

  • PDF