• Title/Summary/Keyword: Security architecture

Search Result 1,092, Processing Time 0.03 seconds

Hardware Architecture of High Performance Cipher for Security of Digital Hologram (디지털 홀로그램의 보안을 위한 고성능 암호화기의 하드웨어 구조)

  • Seo, Young-Ho;Yoo, Ji-Sang;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.17 no.2
    • /
    • pp.374-387
    • /
    • 2012
  • In this paper, we implement a new hardware for finding the significant coefficients of a digital hologram and ciphering them using discrete wavelet packet transform (DWPT). Discrete wavelet transform (DWT) and packetization of subbands is used, and the adopted ciphering technique can encrypt the subbands with various robustness based on the level of the wavelet transform and the threshold of subband energy. The hologram encryption consists of two parts; the first is to process DWPT, and the second is to encrypt the coefficients. We propose a lifting based hardware architecture for fast DWPT and block ciphering system with multi-mode for the various types of encryption. The unit cell which calculates the repeated arithmetic with the same structure is proposed and then it is expanded to the lifting kernel hardware. The block ciphering system is configured with three block cipher, AES, SEED and 3DES and encrypt and decrypt data with minimal latency time(minimum 128 clocks, maximum 256 clock) in real time. The information of a digital hologram can be hided by encrypting 0.032% data of all. The implemented hardware used about 200K gates in $0.25{\mu}m$ CMOS library and was stably operated with 165MHz clock frequency in timing simulation.

A Reliability Enhancement Technique of Mobile Payment (모바일 결제의 신뢰성 향상 방안)

  • Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.319-325
    • /
    • 2016
  • A variety of services for mobile payments by the activation of FinTech have been developed. Various payment methods were developed, and an authentication method was developed to improve the reliability of the payment. On the other hand, when mobile easy payment services are used, they have weak security because the authentication by phone number. Therefore, this paper proposes a technique for increasing the reliability of the authentication process using the unique device ID of the mobile device to improve the authentication process based on the telephone number. The core research contents are the architecture and process for the authentication of mobile payments based on the mobile device ID. The mobile payment architecture consists of a mobile device, authentication service, and mobile payment application. The mobile device consists of mobile device ID and phone number, and the authentication server consists of authentication module and encryption module. The mobile payment service consists of a pre-authentication module and decryption module. The process of mobile payment service is processed by the encrypted authentication information (device ID, phone number, and authentication number) among mobile devices, authentication server, and mobile payment application. The mobile device sends the telephone number and the device ID to the authentication server and the authentication server authenticates the user through an authentication process and encryption process. The mobile payment application performs the pre-authentication process by decrypting the received authentication number. This paper reports a difference that can prevent the risk of leakage of the authentication number in existing payment services through the authentication process of the authentication server and the pre-authentication process of the mobile payment service of this paper.

Design of the Network Computer Architecture based on a Web Browser (웹 브라우저 기반의 네트워크 컴퓨터 아키텍쳐 설계)

  • Song, Min-Gyu
    • Journal of Digital Contents Society
    • /
    • v.9 no.4
    • /
    • pp.607-616
    • /
    • 2008
  • By the advancement of computer & network technology, the paridigm of 'Network Computer' has been realizing`. In what is called network computer, computer system and computing resource is incomparably seem to be expanded compared with conventional network technology[1]. Network connected computer system consitute a massive virtual computer, it is possible for people to use an enourmous amout of computing resource distributed widely through the network. It is also possible that we make client lightweight by the use of computer system & all shared computing resources on the network in our computer processing and we call this type of client system as thin-client. Thin-client and network computer are on and the same network paradigm in that both paradigm featuring the active use of computer system and resource on the network[2]. In network computer paragem, network itself is regarded as a basic platform for the transfer of application, so it is possible that client access remote serve system to run remote applications through the network[3]. In this paper, we propose the system architecture for the implementation of network computer by the use of Web browser, X window system and Pyjamas. By the use of network computer proposed in this paper, it is possible for people to run application on the server system as if he run local application, and it is expected to improve the security and maintenance efficiency.

  • PDF

A New Method of Registering the XML-based Clinical Document Architecture Supporting Pseudonymization in Clinical Document Registry Framework (익명화 방법을 적용한 임상진료문서 등록 기법 연구)

  • Kim, Il-Kwang;Lee, Jae-Young;Kim, Il-Kon;Kwak, Yun-Sik
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.10
    • /
    • pp.918-928
    • /
    • 2007
  • The goal of this paper is to propose a new way to register CDA documents in CDR (Clinical Document Repository) that is proposed by the author earlier. One of the methods is to use a manifest archiving for seamless references and visualization of CDA related files. Another method is to enhance the CDA security level for supporting pseudonymization of CDA. The former is a useful method to support the bundled registration of CDA related files as a set. And it also can provide a seamless presentation view to end-users, once downloaded, without each HTTP connection. The latter is a new method of CDA registration which can supports a do-identification of a patient. Usually, CDA header can be used for containing patient identification information, and CDA body can be used for diagnosis or treatment data. So, if we detach each other, we can get good advantages for privacy protection. Because even if someone succeeded to get separated CDA body, he/she never knows whose clinical data that is. The other way, even if someone succeeded to get separated CDA header; he/she doesn't know what kind of treatment has been done. This is the way to achieve protecting privacy by disconnecting association of relative information and reducing possibility of leaking private information. In order to achieve this goal, the method we propose is to separate CDA into two parts and to store them in different repositories.

A Basic Study of iBUM Development based on BIM/GIS Standard Information for Construction of Spatial Database (공간자료 구축을 위한 BIM/GIS 표준정보 기반 건축도시통합모델(iBUM)의 개발에 관한 기초연구)

  • Ryu, Jung Rim;Choo, Seung Yeon
    • Spatial Information Research
    • /
    • v.22 no.5
    • /
    • pp.27-41
    • /
    • 2014
  • Recently, BIM(Building Information Modeling) has been applied to the infrastructure such as road and bridge, and information about the outside environment of buildings is needed for maintaining and managing the large urban facilities. In addition, the convergence between spatial information and Big-data has a large potentiality, in respect that considerable profits and developments in other application problems such as various simulations and urban plans, national land security, may be brought about on the basis of the interoperability of information between BIM and GIS. Therefore, this study attempted to suggest the development direction of a model integrating building for spatial information analysis and city on the subject by comparing and analyzing difference between information system and shape expression of IFC, CityGML and LandXML to efficiently link information between IFC as a standard model of BIM and CityGML as a standard model in the GIS sector and to prepare a basic fusion strategy and a method of utilization between BIM and GIS. The result of the study are as follow. Firstly, contents and structure of IFC, CityGML and LandXML are compared and analyzed. Secondly, the development direction of iBUM(Integrated Building and Urban Model) suggested, which is based on convergence technology for analysis of space information. Finally, a strategy and method of the BIM and GIS are proposed in the iBUM environment.

Studies on the Current Ideas and Institution of Natural Environmental Conservation in Japan -Policy and Institution of Open Space and Forest - (일본의 자연환경보전사조 및 관련제도의 변천에 관한 연구)

  • 김승환
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.17 no.1
    • /
    • pp.1-16
    • /
    • 1989
  • ^x As mentioned above, I consider the change of role that is related with Japanese thought of Natural Environmental Conservation, and I divide each part of periods into forest, farmland, open space, urban planning, environmental conservation etc. To summary the content of each period of Natural Environmental Conservation thought is as follows. 1) Previous period before formation(before 1919) In the previous period of Meiji, it could be said that the consciousness of the Natural Environmental Conservation was coming to existence. In this, so called, Natural Environmental Conservation, the thought of Forest Preservation was the main current and it was the thought of territorial integrity for the security of resource, the forestry conservancy and flood control in the forestry farmland. Since the age of Meiji, the theory of Natural Conservation appears from the theory of Japanese landscaping and systematic management about public parks was enforced, but the regular theory of Natural Environmental Conservation did not attain full growth. 2) The period of formation(1919~ 1954) In the period of formation, the base of Natural Environmental Conservation had been established. Parks and Open spaces were admitted as a public facilities in each city, and legislations which supported it had been continuously enacted and so on. In this period, the afforestation counter plan was emphasized on the side of territorial integrity. In the mountainous district. tree planting was emphasized to recover the forest which had been destroied by war. 3) The period of development(1955~ 1974) In the period of development, varied policies was institutionalized for the Natural Environmental Conservation. However, all sorts of development policy had performed simultaneously, thus development had complicated relation with preservation. But after 1970's the framework of system of Natural Environmental Conservation improvement was constituted to control the many kinds of development, and the spontaneous campaign of nature preservation by private lead was being taken root. This is the more progressive period. 4) The pried of root(after 1975) After the latter of 1970's, the role of Natural Environmental Conservation began to take root not in the direction of control but inducement, and, getting out of development - oriented policy, aimed at relation between human being and natural environment and the side of amenity of human environment. Besides, the current of Natural Environmental Conservation had been seperately progressed in the cities and forests. Since this period, it was the character that cities and forests began to be unified as 'amenity'space of man.

  • PDF

Single Path Phase-only Security System using Phase-encoded XOR Operations in Fourier Plane (푸리에 영역에서의 위상 변조 Exclusive-OR 연산을 이용한 단일 경로 위상 암호화 시스템)

  • Shin, Chang-Mok;Cho, Kyu-Bo;Kim, Soo-Joong;Noh, Duck-Soo
    • Korean Journal of Optics and Photonics
    • /
    • v.16 no.4
    • /
    • pp.326-333
    • /
    • 2005
  • Phase-only encryption scheme using exclusive-OR rules in Fourier plane and a single path decryption system are presented. A zero-padded original image, multiplied by a random phase image, is Fourier transformed and its real-valued data is encrypted with key data by using XOR rules. A decryption is simply performed based on 2-1 setup with spatial filter by Fourier transform for multiplying phase-only encrypted data by phase-only key data, which are obtained by phase-encoding process, and spatial filtering for zero-order elimination in inverse-Fourier plane. Since the encryption process is peformed in Fourier plane, proposed encryption scheme is more tolerant to loss of key information by scratching or cutting than previous XOR encryption method in space domain. Compare with previous phase-visualization systems, due to the simple architecture without a reference wave, our system is basically robust to mechanical vibrations and fluctuations. Numerical simulations have confirmed the proposed technique as high-level encryption and simple decryption architecture.

Integration Process of Federation Object Model for Interoperation of Federations (페더레이션 연동을 위한 객체 모델 통합 프로세스)

  • Kwon, Se Jung;Yu, Minwook;Kim, Tag Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.2
    • /
    • pp.1-8
    • /
    • 2017
  • High Level Architecture(HLA) is a specification for interoperation among heterogeneous simulators which are executed in a distributed environment. HLA originally allows many federates to join in a federation using a single RTI(Run-Time Infrastructure). As the target systems become more complex, the need for the interoperation of federations, performed in a RTI-RTI interoperation environment, has been growing. It can be performed by the confederation interface with the agents, which subrogate the API calls and callbacks of each federation. The existing studies have assumed that the object models of each federation are based on same HLA standard and their object descriptions are equal. Because the existing federations are usually not under this assumption, this paper proposes the integration process of object models for the federation interoperation environment. To integrate the object models for the interoperation of federations, this process resolves the differences of HLA standards, provides conversion process between objects with different descriptions and excludes the security objects. We expect that this process enhances the reusability and effectiveness of interoperation of federations in various domains.

A Study on the Method of Rural Rental Housing Management by Analysis of Rural-Fishing New Town Rental Housing (농어촌 뉴타운 공공임대주택 관리 분석을 통한 농촌형 임대주택 관리방안에 관한 연구)

  • Park, Mi-Lan;Park, Heon-Choon;Kim, Jin-Wook;Ryoo, Yeon-Su
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.17 no.3
    • /
    • pp.55-62
    • /
    • 2015
  • Recently as return farmers has been increased rapidly, the introduction of a system of rental housing is being considerated in order to induce regional fixation. It was examined organizational management, business scope of rural type rental housing, management role, through the analysis about the management realities of the business of similar form Rural-Fishing New Town project. Jangseonggun and Hwasungun have maneged rental housing 280ho in Rural-Fishing New Town project. It is large village among Rural Rental Housing. And these counties have organized the complex on a large scale among the rental housing. Local governments have managed and operated directly, also these governments have two different methods for the co-management, and the way of making payment. Rental housing management services are divided into rental management, housing management, tenant management. Rental management services such as residents of recruitment, tenants and retreat, rent collection and the storage, management and leasing promotion of the cantilever, surveys of residents. Housing management services such as check of various facilities, maintenance and maintenance work, security and cleaning and daily facility management. Tenant management is life management in connection with housing welfare. In the rural type of rental housing, there are few cases to operate a management office. It is often supplied by rental housing to buy a house or vacant land within the existing village. In this case, by utilizing community facilities within the existing village instead of establishment of extra facilities,It doesn't need to make payment for maintenance fee. In the smaller complex than No. 20, it is self-managed by the tenants in order to reduce the administrative costs and specify the necessary municipal manager. Organization form can be maneged directly from local governments and part of for the management of the building can be employed a mixed management system to delegate management to private organizations such as non-profit organizations or neighborhood association. Tenant management helps people who move in a rental house live on stable circumstance in there area by connection with the program of life support.

Unveiling the Potential: Exploring NIRv Peak as an Accurate Estimator of Crop Yield at the County Level (군·시도 수준에서의 작물 수확량 추정: 옥수수와 콩에 대한 근적외선 반사율 지수(NIRv) 최댓값의 잠재력 해석)

  • Daewon Kim;Ryoungseob Kwon
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.25 no.3
    • /
    • pp.182-196
    • /
    • 2023
  • Accurate and timely estimation of crop yields is crucial for various purposes, including global food security planning and agricultural policy development. Remote sensing techniques, particularly using vegetation indices (VIs), have show n promise in monitoring and predicting crop conditions. However, traditional VIs such as the normalized difference vegetation index (NDVI) and enhanced vegetation index (EVI) have limitations in capturing rapid changes in vegetation photosynthesis and may not accurately represent crop productivity. An alternative vegetation index, the near-infrared reflectance of vegetation (NIRv), has been proposed as a better predictor of crop yield due to its strong correlation with gross primary productivity (GPP) and its ability to untangle confounding effects in canopies. In this study, we investigated the potential of NIRv in estimating crop yield, specifically for corn and soybean crops in major crop-producing regions in 14 states of the United States. Our results demonstrated a significant correlation between the peak value of NIRv and crop yield/area for both corn and soybean. The correlation w as slightly stronger for soybean than for corn. Moreover, most of the target states exhibited a notable relationship between NIRv peak and yield, with consistent slopes across different states. Furthermore, we observed a distinct pattern in the yearly data, where most values were closely clustered together. However, the year 2012 stood out as an outlier in several states, suggesting unique crop conditions during that period. Based on the established relationships between NIRv peak and yield, we predicted crop yield data for 2022 and evaluated the accuracy of the predictions using the Root Mean Square Percentage Error (RMSPE). Our findings indicate the potential of NIRv peak in estimating crop yield at the county level, with varying accuracy across different counties.