• Title/Summary/Keyword: USB Device

Search Result 135, Processing Time 0.026 seconds

User Authentication System Using USB Device Information (USB 장치 정보를 이용한 사용자 인증방안)

  • Lee, Jin-Hae;Jo, In-June;Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.276-282
    • /
    • 2017
  • Password-based authentication is vulnerable because of its low cost and convenience, but it is still widely used. In order to increase the security of the password-based user authentication method, the password is changed frequently, and it is recommended to use a combination of numbers, alphabets and special characters when generating the password. However, it is difficult for users to remember passwords that are difficult to create and it is not easy to change passwords periodically. Therefore, in this paper, we implemented a user authentication system that does not require a password by using the USB memory that is commonly used. Authentication data used for authentication is protected by USB data stored in USB memory using USB device information to improve security. Also, the authentication data is one-time and reusable.Based on this, it is possible to have the same security as the password authentication system and the security level such as certificate or fingerprint recognition.

Process of Collection for a Removable Storage Device Image Using a Software (소프트웨어를 이용한 이동식 저장매체 이미지 수집 절차)

  • Baek, Hyun Woo;Jeon, Sang Jun;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.1
    • /
    • pp.17-24
    • /
    • 2017
  • As the prevalence of removable device, critical intelligences are often stored in the removable device. For that reason, in seizure and search, the removable device became a important evidence of while it could be has a salient key for prove a crime. When we acquired a removable device for proof, we image it by a imaging device or software with a write protection. However, these are high-priced exclusive equipments and sometimes it could be out of order. In addition, we found that some secure USB and inbuilt vaccine USB are failed to connect to the imaging device. Therefore, in this paper, we provide a suitable digital evidence collection procedure for real.

A Study on Security Solution for USB Flash Drive (USB 메모리를 위한 보안 솔루션에 관한 연구)

  • Lee, Sun-Ho;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.93-101
    • /
    • 2010
  • A USB flash drive is a portable storage device. For its promising moderate price, portability and high capacity USB flash drive users are increasing rapidly. Despite these advantages USB flash drives have critical problems as well. Such as personal information data leakage due to easy loss of the portable device. As these personal information leakage incidents increases various security measure solutions are produced and distributed. Despite these security measures and solutions it is not enough to perfectly protect personal data leakage. Hence the necessity of a more concrete, secure, user-friendly security measure solution is required. In this paper we provide you with portable USB flash drive security solution analysis and provide you with the latest secure, user-friendly security measure solutions.

NFC Handover Technology for W-USB (W-USB를 위한 NFC Handover 기술)

  • Han, Young-Sun;Kim, Tae-Seon
    • The KIPS Transactions:PartA
    • /
    • v.17A no.3
    • /
    • pp.137-144
    • /
    • 2010
  • Recently, as the consumer market of the mobile device is explosively getting bigger and bigger, both of the usability and applicability of the mobile device are also growing rapidly. The customers prefer to transfer data between the different mobile devices and download multimedia data via the wireless connection even wherever they are. The trend of mobile devices also shows the tendency of employing the various connectivity technologies such as Bluetooth, Wi-Fi, W-USB, NFC, and so on in a single mobile device. With this market trend, the importance of the technology associating different devices is getting increased gradually. In this paper, we present how to support the NFC association of the W-USB technology by extending the existing NFC's handover protocol. We also explain the differences between the NFC association and the handover protocol, and propose the method to resolve the differences by extending the handover protocol of the NFC technology. Finally, we describe how to implement the NFC system supporting the W-USB handover protocol.

A USB classification system using deep neural networks (인공신경망을 이용한 USB 인식 시스템)

  • Woo, Sae-Hyeong;Park, Jisu;Eun, Seongbae;Cha, Shin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.535-538
    • /
    • 2022
  • For Plug & Play of IoT devices, we develop a module that recognizes the type of USB, which is a typical wired interface of IoT devices, through image recognition. In order to drive an IoT device, a driver for communication and device hardware is required. The wired interface for connecting to the IoT device is recognized by using the image obtained through the camera of smartphone shooting to recognize the corresponding communication interface. For USB, which is a most popular wired interface, types of USB are classified through artificial neural network-based machine learning. In order to secure sufficient data set of artificial neural networks, USB images are collected through the Internet, and additional image data sets are secured through image processing. In addition to the convolution neural networks, recognizers are implemented with various deep artificial neural networks, and their performance is compared and evaluated.

  • PDF

A USB Device for Plug&Play of Sensor/Actuator In Linux (리눅스에서 센서/구동기의 Plug&Play를 위한 USB장치)

  • Eun, Seongbae;So, Sun Sup
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.329-332
    • /
    • 2022
  • Since IoT devices include various sensors and drivers, application programmers need to understand the structure and characteristics of sensors and actuators. If the manufacturer provides the driver of the sensor or actuator, IoT development can be efficiently carried out, which is called the Plug & Play technique. What matters is that the technique proposed by this research team in the past are not suitable for Arduino or Raspberry-Pi, which are recently used. In this paper, we propose a USB sensor device that can be mounted on a Raspberry-Pi. When the device is plugged into the Raspberry-Pi, the built-in driver is transmitted and played. The configuration of the USB sensor device was presented, and considerations for chip selection for processing sensors and drivers were presented.

Wireless USB Cluster Tree based Distributed Reservation Protocol for Mobility Support of Wireless USB device (무선 USB 디바이스의 이동성 지원을 위한 무선USB 클러스터 트리 기반의 분산 예약 프로토콜)

  • Lee, Seong-Ro;Kim, Jeong-Uk;Yang, Jun-Cheol;Bang, Jong-Dae;Kim, Dong-Jin;Jo, Yong-Ok;Kim, Beom-Mu;Yang, Hu-Yeol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.331-333
    • /
    • 2012
  • 본 논문은 UWB 기술 기반 무선 USB(WUSB) 프로토콜에서, 디바이스들의 이동성으로 인해 발생하는 Private Distributed Reservation Protocol (DRP) 예약 충돌 현상을 분석한다. 그리고 Private DRP 예약 충돌 시 발생하는 성능 저하를 감소시키기 위해 Private DRP 충돌 회피 방식을 제안한다. 본 논문에서 제안하는 Private DRP 충돌 회피 프로토콜은 DRD (Dual Role Device)를 이용하여 3홉 범위의 디바이스들의 이동으로 인한 충돌을 방지하는 기법을 제안한다.

  • PDF

GUI Environmental Controller Design with USB IF (USB IF를 이용한 GUI환경의 제어기 개발)

  • Sun-Hag Hong
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.449-454
    • /
    • 2003
  • In this paper, GU environmental controller is implemented with USB(Universal serial bus) IF(interface). Especially, the performance examination of ultrasound diagnostic device which connects external USB port with front panel is automatically inspected by VC++ examination program. The test program minimizes the operation of inspector with making the examined result audible or visible, and maximizes the productivity of custom device. The GUI environmental controller controls a standard keyboard, a track ball with dedicated buttons to emulate a standard two-button mouse, switches, rotary encoders, an analog potentiometer group, two alpha-numeric displays. and a touch screen; all of which generate events for the host.

  • PDF

A Study of USB Device Kernel Hardening Using DLM, in Linux Operating System (리눅스 운영체제에서 DLM을 이용한 USB 디바이스 커널 하드닝에 관한 연구)

  • Jang, Seung-Ju;Choi, Eun-Seok
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.693-698
    • /
    • 2009
  • Computer system to operate normally without interruption, is one of the important issues. Likewise, a computer system to operate without interruption, failure to endure a variety of techniques, development and commercial use is arranged. Most guards will take a lot of technique failure endure. In this paper on the Linux operating system, dynamic module (DLM) to connect using the USB device to use USB devices can cause the symptoms to reduce the kernel PANIC hadeuning technique for studying the kernel.

  • PDF

A MAC Design for Collision Avoidance in Wireless USB Home Networks (WUSB 홈네트워크에서의 충돌회피를 위한 MAC설계)

  • Sim, Jae-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.1
    • /
    • pp.55-64
    • /
    • 2013
  • The USB-IF has specified a Wireless USB (WUSB) protocol based on UWB for high speed wireless home networks and WPANs. In this paper, firstly, performance degradation due to the Private Distributed Reservation Protocol (DRP) conflict problem caused by devices' mobility is analyzed. And a novel relay transmission protocol combined with Private DRP conflict resolution is proposed to overcome the performance degradation at Private DRP conflicts. In order to give the loser device due to Private DRP conflicts another chance to maintain resources, the proposed relay transmission protocol executed at each device helps the loser device reserve another indirect link maintaining the required resources via a relay node.