• Title/Summary/Keyword: Security Design

Search Result 3,382, Processing Time 0.032 seconds

Design of DID-based Verification Protocol for Strengthening Copyright Holders' Sovereignty (저작권자의 주권 강화를 위한 DID 기반 검증 프로토콜 설계)

  • Kim, Ho-Yoon;Shin, Seung-Soo
    • Journal of Industrial Convergence
    • /
    • v.20 no.9
    • /
    • pp.47-58
    • /
    • 2022
  • Digital content is difficult to distinguish between the original and the replica due to its nature. For this reason, NFT technology using blockchain technology is attracting attention because it can guarantee the proof and scarcity of the original digital content. However, the NFT buyer does not own the copyright to the digital content, but the ownership. In particular, since the minting process of issuing NFTs is possible for anyone, there is a copyright threat to the copyright holder. In this study, we propose a verification protocol based on DID for the process of issuing and transacting NFTs for copyright protection of copyright holders' digital contents. As a research method, the problems of research cases related to digital contents were analyzed and the safety was comparatively analyzed. NFT issuance can only be issued by copyright holders whose identity has been verified through DID, and only users who have completed authentication can participate in the transaction to prevent indiscriminate theft and use of digital content and form a safe and transparent transaction market.

Design of Indoor Location-based IoT Service Platform

  • Kim, Bong-Han
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.231-238
    • /
    • 2022
  • In this paper, among short-range wireless communication technologies such as Beacon, Bluetooth, UWB (Ultra-wideband), ZigBee, NFC (Near Field Communication), Z-Wave, 6LoWPAN (IPv6 over Low power WPAN), D2D (Device to Device), etc., proposed an IoT service platform based on a beacon that can provide indoor positioning. And, a beacon-linked web server was designed by blocking indiscriminate beacon spam signals and applying REST web service technology with flexibility and scalability. Data accessibility between different devices was verified by testing the success rate of data transmission, the success rate of blocking beacon push, the success rate of IoT interlocking processing, the accuracy of location positioning, and the success rate of REST web service-based data processing. Through the designed IoT service platform, various proposals and research on short-distance-based business models and service platforms will be conducted in the future.

A Study on the Perceived Value of Video Conferencing Platform: Focused on Heuristic-Systematic Model and Value-based Adoption Model (화상회의 플랫폼의 지각가치에 관한 연구: 휴리스틱-체계적 모델과 가치기반수용모델을 중심으로)

  • Tran, To-Diem-Hang;Kim, Min-Sook
    • Asia-Pacific Journal of Business
    • /
    • v.12 no.2
    • /
    • pp.205-222
    • /
    • 2021
  • Purpose - Due to the Covic-19 pandemic, the perceived value of video conferencing platforms has been increased drastically. However, there is little guidance on how service providers can improve video conferencing platforms. The purpose of this study is to investigate the factors that influence the users' perceived value of video conferencing services based on the heuristic-systematic model and the value-based adoption model. Design/Methodology/Approach - In this paper, we theoretically explore the relationship of the antecedents of perceived value(credibility, expertise, attractiveness, economic feasibility, security, and interactivity) and its outcomes (perceived usefulness, perceived risk and perceived value). The outcomes of this research is a conceptualization of antecedents of perceived value supported by research hypothesis based on the existing literature. A total of 100 valid questionnaires were collected to empirically test the research model. Findings - The analysis results showed that credibility, economic feasibility, and interactivity positively influenced perceived usefulness. On the other hand, credibility, professionalism and interactivity negatively influenced perceived risk. Perceived usefulness positively affects perceived value and perceived risk has a negative effect on perceived value. The brand image as a moderating variable was found to decrease the effect of perceived risk on perceived value. Research Implications - The contribution of this study is significant for video conferencing providers as follows. First, a service provider can actively utilize influencers or referees with high credibility and expertise to maximize the perceived usefulness of users. Second, economic feasibility should be ensured in respect of users through various alliance discount strategies. Third, a video conferencing service company needs to build a positive brand image in order to increase users' perceived value.

Design of a Secure Keypads to prevent Smudge Attack using Fingerprint Erasing in Mobile Devices (모바일 단말기에서 지문 지우기를 활용한 스머지 공격 방지를 위한 보안 키패드 설계)

  • Hyung-Jin, Mun
    • Journal of Industrial Convergence
    • /
    • v.21 no.2
    • /
    • pp.117-123
    • /
    • 2023
  • In the fintech environment, Smart phones are mainly used for various service. User authentication technology is required to use safe services. Authentication is performed by transmitting authentication information to the server when the PIN or password is entered and touch the button completing authentication. But A post-attack is possible because the smudge which is the trace of using screen remains instead of recording attack with a camera or SSA(Shoulder Surfing Attack). To prevent smudge attacks, users must erase their fingerprints after authentication. In this study, we proposed a technique to determine whether to erase fingerprints. The proposed method performed erasing fingerprint which is the trace of touching after entering PIN and designed the security keypads that processes instead of entering completion button automatically when determined whether the fingerprint has been erased or not. This method suggests action that must erase the fingerprint when entering password. By this method, A user must erase the fingerprint to complete service request and can block smudge attack.

Implementation of a KPI Focused e-QMS: A Case Study in the Aerospace & Defense Industry (KPI 중심의 e-QMS 구현: 우주항공 및 방위 산업 사례 연구)

  • Jae Young Shin;Wan Seon Shin
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.1
    • /
    • pp.131-154
    • /
    • 2023
  • Purpose: The purpose of this paper is to design an integrated informatization system that can manage quality & KPI by integrating management systems in the aerospace and defense industry, and study the effect on KPI when applied to related companies. Methods: The 7 management systems required for integration in the AS&D industry were studied, and an empirical analysis was conducted for H company in South Korea for the application of e-QMS integrated informatization & KPI system based on security environment and open quality. Results: The results of this study were analyzed to have an effect on the improvement of customer satisfaction and the positive improvement of quality failure cost in the aerospace and defense industry. And it was analyzed that it works to continuously comply with ethical management and environmental laws and prevent safety accidents. Conclusion: The greatest significance of this study is that it attempted to build an e-QMS integrated system in the aerospace and defense industry. Considering that the case of integrated management system and integrated operation of KPI in related industries has not been introduced in the existing literature, the results of this study will be shared as a meaningful preceding study in the era of digital quality information. In addition, the fact that the open-quality quality innovation methodology emphasizing measurement(M), tracking(T), and connection(C) was actually applied in an AS&D company and its effectiveness was objectively proven. It is expected that it will be a good paper for follow-up research.

Design of Reconfigurable Processor for Information Security System (정보보호 시스템을 위한 재구성형 프로세서 설계)

  • Cha, Jeong-Woo;Kim, Il-Hyu;Kim, Chang-Hoon;Kim, Dong-Hwi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.113-116
    • /
    • 2011
  • 최근 IT 기술의 급격한 발전으로 개인정보, 환경 등 다양한 정보를 수시로 수집 및 관리하면서 사용자가 원할시 즉각적인 정보서비스를 제공하고 있다. 그러나 유 무선상의 데이터 전송은 정보의 도청, 메시지의 위 변조 및 재사용, DoS(Denial of Service)등 외부의 공격으로부터 쉽게 노출된다. 이러한 외부 공격은 개인 프라이버시를 포함한 정보서비스 시스템 전반에 치명적인 손실을 야기 시킬 수 있기 때문에 정보보호 시스템의 필요성은 갈수록 그 중요성이 부각되고 있다. 현재까지 정보보호 시스템은 소프트웨어(S/W), 하드웨어(ASIC), FPGA(Field Progr- ammable Array) 디바이스를 이용하여 구현되었으며, 각각의 구현방법은 여러 가지 문제점이 있으며 그에 따른 해결방법이 제시되고 있다. 본 논문에서는 다양한 환경에서의 정보보호 서비스를 제공하기 위한 재구성형 SoC 구조를 제안한다. 제안된 SoC는 비밀키 암호알고리즘(AES), 암호학적 해쉬(SHA-256), 공개키 암호알고리즘(ECC)을 수행 할 수 있으며, 마스터 콘트롤러에 의해 제어된다. 또한 정보보호 시스템이 요구하는 다양한 제약조건(속도, 면적, 안전성, 유연성)을 만족하기 위해 S/W, ASIC, FPGA 디바이스의 모든 장점을 최대한 활용하였으며, MCU와의 효율적인 통신을 위한 I/O 인터페이스를 제안한다. 따라서 제안된 정보보호 시스템은 기존의 시스템보다 다양한 정보보호 알고리즘을 지원할 뿐만 아니라 속도 및 면적에 있어 상충 관계를 개선하였기 때문에 저비용 응용뿐만 아니라 고속 통신 장비 시스템에도 적용이 가능하다.

A Hybird Antibody Model Design using Genetic Algorithm Scheme (유전 알고리즘 기법을 이용한 HA 모델 설계)

  • Shin, Mi-Yea;Jeon, Seoung-Heup;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.159-166
    • /
    • 2009
  • A nature immunity system responds sensitively to an external invasion with various functions in a lot of bodies, besides it there is a function to remember information to have been currently infected. we propose a hybrid model similar to immune system which combine with the antibody which applied genetic algorithm as select antibody and the arbitrary abnormal system call sequence that applied negative selection of a nature immunity system. A proposed model uses an arbitrary abnormal system Kol sequence in order to reduce a positive defect and a negative defect. Data used to experiment are send mail data processed UNM (University of New Maxico). The negative defect that an experiment results proposal model judged system call more abnormal than the existing negative selection to normal system call appeared 0.55% low.

Design for Position Protection Secure Keypads based on Double-Touch using Grouping in the Fintech (핀테크 환경에서 그룹핑을 이용한 이중 터치 기반의 위치 차단이 가능한 보안 키패드 설계)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.3
    • /
    • pp.38-45
    • /
    • 2022
  • Due to the development of fintech technology, financial transactions using smart phones are being activated. The password for user authentication during financial transactions is entered through the virtual keypad displayed on the screen of the smart phone. When the password is entered, the attacker can find out the password by capturing it with a high-resolution camera or spying over the shoulder. A virtual keypad with security applied to prevent such an attack is difficult to input on a small touch-screen, and there is still a vulnerability in peeping attacks. In this paper, the entire keypad is divided into several groups and displayed on a small screen, touching the group to which the character to be input belongs, and then touching the corresponding character within the group. The proposed method selects the group to which the character to be input belongs, and displays the keypad in the group on a small screen with no more than 10 keypads, so that the size of the keypad can be enlarged more than twice compared to the existing method, and the location is randomly placed, hence location of the touch attacks can be blocked.

Design and Implementation of an Automated Privacy Protection System over TPM and File Virtualization (TPS: TPM 및 파일 가상화를 통한 개인정보보호 자동화 시스템 디자인 및 구현)

  • Jeong, Hye-Lim;Ahn, Sung-Kyu;Kim, Mun Sung;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.2
    • /
    • pp.7-17
    • /
    • 2017
  • In this paper, we propose the TPS (TPM-enhanced Privacy Protection System) which is an automated privacy protection system enhanced with a TPM (Trusted Platform Module). The TPS detects documents including personal information by periodic scanning the disk of clients at regular intervals and encrypts them. Hence, system manages the encrypted documents in the server. In particular, the security of TPS was greatly enhanced by limiting the access of documents including the personal information with regard to the client in an abnormal state through the TPM-based platform verification mechanism of the client system. In addition, we proposed and implemented a VTF (Virtual Trusted File) interface to provide users with the almost identical user interface as general document access even though documents containing personal information are encrypted and stored on the remote server. Consequently, the TPS automates the compliance of the personal information protection acts without additional users' interventions.

Design and Implement a Forgery-safe Blockchain-based Academic Credential Verification System (위변조에 안전한 블록체인 기반 학력 검증 시스템 설계 및 구현)

  • Jung-oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.7
    • /
    • pp.41-49
    • /
    • 2023
  • In recent years, various educational institutions have used online certificate services to verify academic achievement related to graduation and grades. However, the certificate of the existing system has limitations in verifying and tracking whether it is true or not and detailed academic background. In this regard, cases of forgery/falsification of online/offline certificates continue to occur. This study proposes a blockchain-based verification method that is safe from forgery and alteration, focusing on university institutions. Necessary information such as detailed class categories for each department, attendance, and detailed grades was collected/analyzed to create a linkage relationship through blockchain. In addition, the system/network environment required for blockchain sharing was considered, and it was implemented as an extension module in the form of an independent web application. As a result of the block chain verification, it was proved that the safe trust verification of educational information and the relationship between detailed information can be traced. This study aims to contribute to the improvement of academic credential verification services and information security for Korean educational institutions in the future.