• Title/Summary/Keyword: Protection of core technology

Search Result 157, Processing Time 0.029 seconds

An Efficient Secrete Key Protection Technique of Scan-designed AES Core (스캔 설계된 AES 코아의 효과적인 비밀 키 보호 기술)

  • Song, Jae-Hoon;Jung, Tae-Jin;Jeong, Hye-Ran;Kim, Hwa-Young;Park, Sung-Ju
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.2
    • /
    • pp.77-86
    • /
    • 2010
  • This paper presents an efficient secure scan design technique which is based on a fake key and IEEE 1149.1 instruction to protect secret key from scan-based side channel attack for an Advanced Encryption Standard (AES) core embedded on an System-on-a-Chip (SoC). Our proposed secure scan design technique can be applied to crypto IP core which is optimized for applications without the IP core modification. The IEEE 1149.1 standard is kept, and low area, low power consumption, very robust secret-key protection and high fault coverage can be achieved compared to the existing methods.

Short-circuit Protection for the Series-Connected Switches in High Voltage Applications

  • Tu Vo, Nguyen Qui;Choi, Hyun-Chul;Lee, Chang-Hee
    • Journal of Power Electronics
    • /
    • v.16 no.4
    • /
    • pp.1298-1305
    • /
    • 2016
  • This paper presents the development of a short-circuit protection mechanism on a high voltage switch (HVS) board which is built by a series connection of semiconductor switches. The HVS board is able to quickly detect and limit the peak fault current before the signal board triggers off a gate signal. Voltage clamping techniques are used to safely turn off the short-circuit current and to prevent overvoltage of the series-connected switches. The selection method of the main devices and the development of the HVS board are described in detail. Experimental results have demonstrated that the HVS board is capable of withstanding a short-circuit current at a rated voltage of 10kV without a di/dt slowing down inductor. The corresponding short-circuit current is restricted to 125 A within 100 ns and can safely turn off within 120 ns.

A Method for Zoning the Parcel-based Protecting Area of the Ecological Network in Forest (지적 기반 산림생태네트워크 보호구역 설정방안)

  • Jang, Rai-Ik;Jang, Gab-Sue;Jung, Ok-Sik;Ra, Jung-Hwa
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.12 no.6
    • /
    • pp.131-142
    • /
    • 2009
  • The purpose of this study is to detect the protection area around the Geum-buk and Geum-nam Mountains for making a sustainable ecological network. The protection area in the Geum-buk and Geum-nam Mountains was analyzed by using spatial data and a field survey for landscape conservation purposes. A survey scope was fixed using digital elevation model, and the protection area was finally determined based on the parcel map called as the Korea Land Information System (KLIS). Here we have several conclusions in this study. First, spatial data used in this study were a map of ecological and natural degree (MEND), forest distribution map, elevation map, slope map, and several maps for the protection area assigned by laws regarding to the natural resources. Second, we used 4 alternatives to determine the best choice for showing the ecological network in the study area. One alternative (alt. 3) of 4 ones was finally chosen as the best condition for making the ecological network. The condition in elevation and slope was a little modified to a lower level in alt, 3. The result derived from alt, 3 reflected the continuity and connectivity in the ecological network and we estimate that the protection area can protect the core area using the buffer zone around the ecological network. Finally the parcel-based protection area in the Geum-buk and Geum-nam Mountains had $493.92km^2$ of the core area, and $233.99km^2$ of the buffer zone, which means the parcel-based protection area increased by $97.76km^2$ in the core area, but decreased by $76.61km^2$ as of in the topographical map.

A Study on Empirical Model for the Prevention and Protection of Technology Leakage through SME Profiling Analysis (중소기업 프로파일링 분석을 통한 기술유출 방지 및 보호 모형 연구)

  • Yoo, In-Jin;Park, Do-Hyung
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.171-191
    • /
    • 2018
  • Purpose Corporate technology leakage is not only monetary loss, but also has a negative impact on the corporate image and further deteriorates sustainable growth. In particular, since SMEs are highly dependent on core technologies compared to large corporations, loss of technology leakage threatens corporate survival. Therefore, it is important for SMEs to "prevent and protect technology leakage". With the recent development of data analysis technology and the opening of public data, it has become possible to discover and proactively detect companies with a high probability of technology leakage based on actual company data. In this study, we try to construct profiles of enterprises with and without technology leakage experience through profiling analysis using data mining techniques. Furthermore, based on this, we propose a classification model that distinguishes companies that are likely to leak technology. Design/methodology/approach This study tries to develop the empirical model for prevention and protection of technology leakage through profiling method which analyzes each SME from the viewpoint of individual. Based on the previous research, we tried to classify many characteristics of SMEs into six categories and to identify the factors influencing the technology leakage of SMEs from the enterprise point of view. Specifically, we divided the 29 SME characteristics into the following six categories: 'firm characteristics', 'organizational characteristics', 'technical characteristics', 'relational characteristics', 'financial characteristics', and 'enterprise core competencies'. Each characteristic was extracted from the questionnaire data of 'Survey of Small and Medium Enterprises Technology' carried out annually by the Government of the Republic of Korea. Since the number of SMEs with experience of technology leakage in questionnaire data was significantly smaller than the other, we made a 1: 1 correspondence with each sample through mixed sampling. We conducted profiling of companies with and without technology leakage experience using decision-tree technique for research data, and derived meaningful variables that can distinguish the two. Then, empirical model for prevention and protection of technology leakage was developed through discriminant analysis and logistic regression analysis. Findings Profiling analysis shows that technology novelty, enterprise technology group, number of intellectual property registrations, product life cycle, technology development infrastructure level(absence of dedicated organization), enterprise core competency(design) and enterprise core competency(process design) help us find SME's technology leakage. We developed the two empirical model for prevention and protection of technology leakage in SMEs using discriminant analysis and logistic regression analysis, and each hit ratio is 65%(discriminant analysis) and 67%(logistic regression analysis).

Design of the flexible switching controller for small PWR core power control with the multi-model

  • Zeng, Wenjie;Jiang, Qingfeng;Du, Shangmian;Hui, Tianyu;Liu, Yinuo;Li, Sha
    • Nuclear Engineering and Technology
    • /
    • v.53 no.3
    • /
    • pp.851-859
    • /
    • 2021
  • Small PWR can be used for power generation and heating. Considering that small PWR has the characteristics of flexible operating conditions and complex operating environment, the controller designed based on single power level is difficult to achieve the ideal control of small PWR in the whole range of core power range. To solve this problem, a flexible switching controller based on fuzzy controller and LQG/LTR controller is designed. Firstly, a core fuzzy multi-model suitable for full power range is established. Then, T-S fuzzy rules are designed to realize the flexible switching between fuzzy controller and LQG/LTR controller. Finally, based on the core power feedback principle, the core flexible switching control system of small PWR is established and simulated. The results show that the flexible switching controller can effectively control the core power of small PWR and the control effect has the advantages of both fuzzy controller and LQG/LTR controller.

A Trend Analysis and Technology Application of Defense Technology Protection (방위산업 기술보호 동향분석 및 기법적용)

  • Lee, Hyo Keun;Lee, Woon Soon;Oh, Yoo Jin;Park, ShinSuk
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.4
    • /
    • pp.579-586
    • /
    • 2017
  • The defense industry has become a global industry, and military technology is actively being traded between countries to increase their military capabilities. The Republic of Korea has been ranked one of the top 10 countries for exports of military technology. To maintain competitive advantages in the global defense industry, it is essential to protect key technologies employed by exported weapon systems. Various techniques have been developed for protection of confidential technologies in weapon systems, and the U.S. DoD has been leading the development of the protection techniques. This paper reviews current anti-tampering techniques that prevent leakage of key technology from weapon exportation or pillage. Based on the protection techniques employed by the U.S. DoD Anti-Tamper Executive Agent, this paper suggests novel design methods for protection of confidential technologies. The proposed design methods were tested on an actual weapon system.

A Study on the Effect of Blockchain on Personal Information Protection

  • Kim, Seong-Kyu (Steve)
    • Journal of Multimedia Information System
    • /
    • v.6 no.3
    • /
    • pp.125-130
    • /
    • 2019
  • In this paper, Blockchain is mentioned as the next-generation core IT technology. As an immature technology, there are not many practical use cases, but it is expected to be widely applied in various industries such as cryptocurrency, finance, public, etc. to increase efficiency and enable new services that did not exist in the past. Nevertheless, the generalization of blockchain technology is still difficult. In particular, from the viewpoint of personal information protection, GDPR of Europe, etc., is becoming stronger. Considering that the core of the blockchain is the change of information sharing and processing method, it is very important how the blockchain can affect, especially from the viewpoint of privacy, and how the Privacy Act can be applied to the blockchain. However, the discussion on this part also seems to be insufficient. Therefore, in this paper, blockchain By analyzing the implications and implications of technologies and services using them from the perspective of the Privacy Act, we will discuss how the blockchain will be used to prevent leakage of privacy.

Ubiquitous Disaster Protection Infrastructure for Underground Space (지하공간 u-방재시스템 구축을 위한 기반 기술)

  • You Chang-Ho;Park Seung-Yeob;Choi Yun-Soo;Kwon Kie-Wook
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2006.04a
    • /
    • pp.495-499
    • /
    • 2006
  • While the use of large scale underground complex space is increasing currently, this research suggests the methodology of servicing advanced service for civilian and constructing active disaster protection system in order to be free from danger problem of underground complex space by applying new ubiquitous technology. Synchronization between virtual space and real space and construction of ubiquitous disaster protection system arc the core technology. Based on RFID, USN technology, usually, user centered spatial information services are presented. it can be convert to disaster protection system on emergency situation without delay. Through these technology. we can ensure the safety of underground space where the floating population is concentrated in, moreover, utilize for infrastructure that presents various civilian services. Then we can satisfy the increasing civilians desire for safety and welfare and finally, it will contribute to construction of productive city and creation of new conceptual market.

  • PDF

OPΔT and OTΔT Trip Setpoint Generation Methodology (OPΔT 및 OTΔT트립설정치의 생산방법)

  • Ki In Han
    • Nuclear Engineering and Technology
    • /
    • v.16 no.2
    • /
    • pp.106-115
    • /
    • 1984
  • Core safety limits define reactor operating conditions and parameters that will assure fuel rod and reactor system's integrity. Limiting safety system settings (LSSS) programmed into reactor protection system (RPS) then ensure a rapid reactor trip to prevent or suppress conditions which might violate the core safety limits. Generation of the LSSS must properly take into account uncertainties in both calculated and measured parameters in order to assure, with an appropriate degree of confidence, that the RPS will protect the core safety limits. Reviewed in this report are Westinghouse RPS setpoint generation philosophy, methodology of safety limit development and LSSS generation procedure. The Westinghouse RPS trip setpoint generation methodology has been established based on the calculation of core safety limits and the selection of LSSS allowing appropriate uncertainties in a conservative manner. Such conservative values of setpoint assure a high degree of core protection against fuel melting and occurrence of DNB.

  • PDF