• Title/Summary/Keyword: Secure storage device

Search Result 41, Processing Time 0.029 seconds

A System of Authentication and Security threat solution for N-screen services (N-스크린을 위한 인증 및 보안 위협 해결 시스템)

  • Hwang, Deuk-Young;Moon, Jeong-Kyung;Kim, Jin-Mook
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.775-781
    • /
    • 2013
  • N-screen is a Service that can be provide for One Service Multi Device. If the network is changed or if the device is changed after authentication the device fits seamlessly send footage. Security threats that occur here have a problem with user authentication. In this paper proposes available in a multi-device the authentication system. Homomorphic Encryption Algorithm of authentication scheme used. Among the authentication mechanism that already exists is a simple and lightweight authentication mechanism. In addition, N-screen service that uses multiple devices is simple authentication process of the device. Review the results of proposed authentication protocol, encryption algorithm to process a small storage capacity and is easy to work in low processor. And was suitable for use with multiple devices.

A Study of Selective Encryption for Images using Tree Structures (트리구조를 이용한 이미지의 선택적 암호화에 관한 연구)

  • Han, Myung-Mook;Kim, Geum-Sil
    • Journal of Internet Computing and Services
    • /
    • v.10 no.6
    • /
    • pp.219-228
    • /
    • 2009
  • The increased popularity of multimedia applications places a great demand on efficient data storage and transmission techniques. Some methods have been proposed to combine compression and encryption together to reduce the overall processing time, but they are either insecure or intensive computationally. specially, they are unsuitable to wireless communication of mobile device. We propose a novel solution called partial encryption, We introduce quadtree and zerotree wavelet image compression in this paper, it reduces computation for date transmission in mobile device, and does not reduce the compression rate. In conclusion, the proposed partial encryption schemes are fast, secure, and do not reduce the compression performance of underlying compression algorithm.

  • PDF

Development of hybrid system with fuel cell and lithium secondary battery (연료전지와 리튬 이차전지의 하이브리드 시스템 개발)

  • Hwang, Sangmoon;Jung, Eunmi;Son, Dongun;Shim, Taehee;Song, Hayoung
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2010.06a
    • /
    • pp.143.2-143.2
    • /
    • 2010
  • Therefore, with this development assignment we'd like to develop the hybrid system combining 800W DMFC (Direct Methanol Fuel Cell) and 1.6kW of Lithium secondary battery pack which can be applied to the most common small cart. a scooter, to secure the development capability of hundreds of Watts DMFC, the high-capacity Lithium secondary battery pack, the technology of BMS (Battery Management System) and the development technology of hybrid system. DMFC, in fact, has lower energy efficiency than PEMFC (Polymer Electrolyte Membrane Fuel Cell); however, it has several advantages in terms of fuel storage and use. It is pretty easy to be stored and used without any additional colling and heating devices because of its insensitive liquid methanol to temperature. In conclusion, DMFC system is the most suitable device for small mobile vehicles.

  • PDF

An Analysis for the Dynamics of a Pico Slider during the Ramp Loading Process (Ramp Loading 피코 슬라이더의 거동 해석)

  • Kim Bum-Joon;Cho Kwang-Pyo;Rhim Yoon-Chul
    • Proceedings of the Korean Society of Tribologists and Lubrication Engineers Conference
    • /
    • 2003.11a
    • /
    • pp.291-298
    • /
    • 2003
  • Recently, load/unload(L/UL) process is applied to a computer information storage device due to its advantages such as lower power consumption, larger data zone, simpler fabrication of disk for no bumped parking zone, and rarer contact between the slider and media. An analysis of the transient motion for the slider is very important to design an air bearing surface (ABS) of the slider to secure the stable performance of the system. During the L/UL process, however, there are several issues occurred such as contact or collision between slider and media. Sometimes this will cause the system failure. In this study, the dynamics of the slider during the loading process are investigated through a numerical simulation using FEM analysis and experiment.

  • PDF

A Study on Smartcard-based Certification System using Kerberos and X.509 (Kerberos와 X.509를 이용한 스마트카드 기반 인증시스템에 관한 연구)

  • 박정용;남길현
    • Journal of the military operations research society of Korea
    • /
    • v.26 no.1
    • /
    • pp.115-124
    • /
    • 2000
  • In this paper, we are introduced a certification system for open network environment. The Kerberos which was developed by MIT uses a secret key cryptosystem for authentication. It is secure and efficient for closed network users to authenticate each others. However, the kerberos has a disadvantage of managing a lot of secret keys for In this paper, we are introduced a certification system for open network environment. users in the open network environment. This paper suggests a method that uses X.509 to provide public keys with certification to Kerberos users for authentication in the X.500 directory standard. And we also suggest the smartcard as data storage device to enhance the security and availability.

  • PDF

Design and Implementation of Secure Document Loss Prevention System by Real-Time Storage Device Packet Analysis (실시간 저장장치 패킷분석을 통한 안전한 문서 유출 방지 시스템의 설계 및 구현)

  • Kim, Hyun-Min;Kim, Su-Hyun;Lee, Sun-Ho;Lee, Im-Yeong
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1217-1220
    • /
    • 2010
  • 휴대용 저장장치의 발달로 인하여 많은 보안상의 문제점들이 나타나고 있으며, 특히 공공기관 혹은 기업체 내에서 USB메모리 등 보조기억매체를 활용한 정보유출이 갈수록 증가하고 있다. 이에 따라 본 논문에서는 전송이 허가된 문서에 인증패킷의 삽입 후 실시간 패킷분석을 이용하여 휴대용 저장장치로 전송하는 문서의 이동경로 확인 및 허가되지 않은 문서들에 대한 제어가 가능하도록 시스템을 제안하게 되었다.

Trust Evaluation Metrics for Selecting the Optimal Service on SOA-based Internet of Things

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.129-140
    • /
    • 2019
  • In the IoT environment, there is a huge amount of heterogeneous devices with limited capacity. Existing trust evaluation methods are not adequate to accommodate this requirement due to the limited storage space and computational resources. In addition, since IoT devices are mainly human operated devices, the trust evaluation should reflect the social relations among device owners. There is also a need for a mechanism that reflects the tendency of the trustor and environmental factors. In this paper, we propose an adaptable trust evaluation method for SOA-based IoT system to deal with these issues. The proposed model is designed to minimize the confidence bias and to dynamically respond to environmental changes by combining direct evaluation and indirect evaluation. It is expected that it will be possible to secure trust through quantitative evaluation by providing feedback based on social relationships.

A Study on High Speed Playback of AR Contents based on Beacon RSSI Signals (무선 RSSI 신호 기반의 AR 콘텐츠 초고속 재생에 관한 연구)

  • Kim, Goo;Kim, Jin-Woo;Ha, Yeon-Chul
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.21 no.2
    • /
    • pp.67-72
    • /
    • 2020
  • AR service using the client-server method and existing physical markers(eg, OR Codes, etc.) causes a delay in the playback time of the contents because the contents download is executed after the marker recognition. In the case of the one-time installation method rather than the client-server method, proactive download of high-capacity contents for playback may cause an inefficiency of the storage space of the device(eg, smartphone, etc.). Therefore, in AR contents playback based on beacon's RSSI to secure the efficiency of the playback device storage space and to quickly play AR contents. The technique for high-speed playback in this study can be applied to various fields such as MICE exhibition using beacon signal.

Reliability analysis methods to one-shot device (일회용품의 신뢰성분석 방안)

  • Baik, Jaiwook
    • Industry Promotion Research
    • /
    • v.7 no.4
    • /
    • pp.1-8
    • /
    • 2022
  • There are many one-shot devices that are used once and thrown away. One-shot devices such as firecrackers and ammunition are typical, and they are stored for a while after manufacture and then disposed of after use when necessary. However, unlike general operating systems, these one-shot devices have not been properly evaluated. This study first examines what the government does to secure reliability in the case of ammunition through ammunition stockpile reliability program. Next, in terms of statistical analysis, we show what the reliability analysis methods are for one-shot devices such as ammunition. Specifically, we show that it is possible to know the level of reliability if sampling inspection plan such as KS Q 0001 which is acceptance sampling plan by attributes is used. Next, non-parametric and parametric methods are introduced as ways to determine the storage reliability of ammunition. Among non-parametric methods, Kaplan-Meier method can be used since it can also handle censored data. Among parametric methods, Weibull distribution can be used to determine the storage reliability of ammunition.

Design of Safety and Arming Device of the Fuze using Solenoid for Improving Safety (안전성 증대를 위해 솔레노이드를 적용한 신관 안전장전장치 설계)

  • An, Ji Yeon;Jung, Myung Suk;Kim, Ki Lyug
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.10
    • /
    • pp.197-203
    • /
    • 2014
  • The safety and arming device(SAD), one of the components of the fuzes, shall provide safety that is consistent with handling, storage, transportation, use, and disposal. In this paper, we describes the design of the SAD which includes the solenoid assembly and the solenoid driving circuit to improve the safety of the fuzes. The solenoid assembly consists of a coil assembly, a restoring spring, and a core. The solenoid assembly is added in the SAD as an additional safety device. In case of the normal circumstances, the core of the solenoid assembly restrains the $1^{st}$ and $2^{nd}$ safety devices of the SAD for those devices not to operate at all, so that the SAD can secure safety for storage, transportation, and use. In contrast, when the battery power is provided to the solenoid driving circuit just before the flight, the core confirms the power level and starts removing the restraint from the $1^{st}$ and $2^{nd}$ safety devices of the SAD, and then the SAD is able to change its mode from safety mode to armed mode. After firing, once the SAD's operations complete, the turned-on arming switch stops providing the power to the solenoid assembly automatically. It can reduce the power consumption at solenoid assembly. Therefore, the proposed solenoid driving circuit for the solenoid assembly not only unlocks the restrained solenoid assembly from the safety devices, but also saves the power consumption during the flight.