• Title/Summary/Keyword: USB Memory

Search Result 66, Processing Time 0.031 seconds

Implementation of Intelligent Preference Goods Recommendation System Using Customer's Profiles and Interest Measuring based on RFID (RFID 기반의 고객 프로파일과 관심도 측정을 이용한 지능형 선호상품 추천 시스템의 구현)

  • Lim, Sang-Min;Lee, Keun-Wang;Oh, Myoung-Kwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.6
    • /
    • pp.1625-1631
    • /
    • 2008
  • This paper is going to research about RFID real time position finder technology and the offline shopping mall's client shop list managed by the RF fused Tag USB memory to analyze out the output of the data for providing real time interactive customer intelligence commodity system.

Design of Security Protocal for Mobility Memory Secunity Using PUF (이동성 메모리 보안을 위한 PUF을 이용한 보안 시스템 프로토콜 설계)

  • Jung, Young-Min;Park, Seok-Cheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.625-628
    • /
    • 2013
  • 기술이 발달함에 따라 USB메모리, 보안 SD카드, 보안인증토큰 등 이동형 저장 매체도 비약적인 발전을 하고 있다. USB의 가격이 저렴해지고 작아지면서 용량의 확장도 증가하여 다양한 이용을 할 수 있게 되었다. 하지만 분실율이 높고 보안성이 낮아 다수의 사용자에게 중요한 회사의 기밀이나 개인의 인적 사항들이 노출 될 수 있다. 이를 위해 PUF를 이용하여 플래시 메모리 마다 고유키를 저장, 생성하여 외부 유출이 없이 사용자 인증을 하기 위한 플래시 드라이버의 구조 및 프로토콜을 제안하고자 한다.

Multiple LCD System Development of daisy-chain Method using LVDS (LVDS를 이용한 daisy-chain 방식의 다중 LCD 시스템 개발)

  • Kim, Jae-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2747-2754
    • /
    • 2012
  • This thesis explains the development of multiple LCD system with the additional function to maximize the utilization of PC contents. The newly developed system is composed of host LCD and slave LCD. Host LCD decodes and outputs the image and voice of NTSC, PAL, SECAM signals. It also converts the decoded signals into LVDS signals before transmitting them to slave LCD stage. In addition, the installation of CF Memory and USB Memory helps display multi-media data. Unlike the host LCD, since not including the tuner and memory part, the slave LCD can't receive TV signals and play video signals. It only has the function to receive LVDS image signals and display on a LCD panel. This newly developed multi-LCD system has competitiveness in various aspects. With its simple structure, the failure rate, price and display power are relatively low due to its simplification of the control part. It has price and functional competitiveness as the product whose host LCD can control the entire slave LCD in terms of channel, volume, and video output.

Development of PCM Data Recorder for Telemetry System (원격측정용 PCM 데이터 저장장치 개발)

  • Koh, Kwang-Ryul;Lee, Sang-Bum;Lee, Hyun-Kyu;Kim, Whan-Woo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.4
    • /
    • pp.607-614
    • /
    • 2011
  • This paper describes the development of pulse code modulation(PCM) data recorder with design, implementation and environmental test. PCM serial data that diverged from telemetry encoder output is used as the input and is reformed to parallel signal through FPGA processing. Controllers construct the packet by the sector and record it into non-volatile memory. Compact flash(CF) memory for data storage media, USB interface for data downloading, and a software for operating status diagnosis and file format conversion are used.

A Study of Acquisition and Analysis on the Bios Firmware Image File in the Digital Forensics (디지털 포렌식 관점에서 BIOS 펌웨어 이미지 파일 수집 및 분석에 관한 연구)

  • Jeong, Seung Hoon;Lee, Yun Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.491-498
    • /
    • 2016
  • Recently leakages of confidential information and internal date have been steadily increasing by using booting technique on portable OS such as Windows PE stored in portable storage devices (USB or CD/DVD etc). This method allows to bypass security software such as USB security or media control solution installed in the target PC, to extract data or insert malicious code by mounting the PC's storage devices after booting up the portable OS. Also this booting method doesn't record a log file such as traces of removable storage devices. Thus it is difficult to identify whether the data are leaked and use trace-back technique. In this paper is to propose method to help facilitate the process of digital forensic investigation or audit of a company by collecting and analyzing BIOS firmware images that record data relating to BIOS settings in flash memory and finding traces of portable storage devices that can be regarded as abnormal events.

Tracking Cold Blocks for Static Wear Leveling in FTL-based NAND Flash Memory (메모리에서 정적 마모도 평준화를 위한 콜드 블록 추적 기법)

  • Jang, Yonghun;Kim, Sungho;Hwang, Sang-Ho;Lee, Myungsub;Park, Chang-Hyeon
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.3
    • /
    • pp.185-192
    • /
    • 2017
  • Due to the characteristics of low power, high durability and high density, NAND flash memory is being heavily used in various type of devices such as USB, SD card, smart phone and SSD. On the other hand, because of another characteristic of flash cell with the limited number of program/erase cycles, NAND flash memory has a short lifetime compared to other storage devices. To overcome the lifetime problem, many researches related to the wear leveling have been conducted. This paper presents a method called a TCB (Tracking Cold Blocks) using more reinforced constraint conditions when classifying cold blocks than previous works. TCB presented in this paper keeps a MCT (Migrated Cold block Table) to manage the enhanced classification process of cold blocks, with which unnecessary migrations of pages can be reduced much more. Through the experiments, we show that TCB reduces the overhead of wear leveling by about 30% and increases the lifetime up to about 60% compared to BET and BST.

A Study On Artifacts Analysis In Portable Software (무 설치 프로그램에서의 사용자 행위 아티팩트 분석)

  • Taeyeong Heo;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.2
    • /
    • pp.39-53
    • /
    • 2023
  • Non-installation program (hereinafter referred to as "portable program") is a program that can be used without an installation process, unlike general software. Since there is no separate installation process, portable programs have high mobility and are used in various ways. For example, when initial setup of multiple PCs is required, a portable program can be stored on one USB drive to perform initial setup. Alternatively, when a problem occurs with the PC and it is difficult to boot normally, Windows PE can be configured on the USB drive and portable programs can be stored for PC recovery. And the portable program does not directly affect PC settings, such as changing registry values, and does not leave a trace. This means that the portable program has high security. If a portable program is deleted after using it, it is difficult to analyze behavior in a general way. If a user used a portable program for malicious behavior, analysis in a general way has limitations in collecting evidence. Therefore, portable programs must have a new way of behavioral analysis that is different from ordinary installation software. In this paper, after installing the Windows 10 operating system on a virtual machine, we proceed with the scenario with a portable program of Opera and Notepad++. And we analyze this in various ways such as file analysis of the operating system and memory forensics, collect information such as program execution time and frequency, and conduct specific behavioral analysis of user.

  • PDF

Implementation of A Security Token System using Fingerprint Verification (지문 인증을 이용한 보안 토큰 시스템 구현)

  • 문대성;길연희;안도성;반성범;정용화;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.63-70
    • /
    • 2003
  • In the modern electronic world, the authentication of a person is an important task in many areas of online-transactions. Using biometrics to authenticate a person's identity has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. To gain maximum security in the verification system using biometrics, the computation of the verification as well as the store of the biometric pattern has to be taken place in the security token(smart card, USB token). However, there is an open issue of integrating biometrics into the security token because of its limited resources(memory space, processing power). In this paper, we describe our implementation of the USB security token system having 206MHz StrongARM CPU, 16MBytes flash memory, and 1MBytes RAM. Also, we evaluate the performance of a light-weighted In-gerprint verification algorithm that can be executed in the restricted environments. Based on experimental results, we confirmed that the RAM requirement of the proposed algorithm was about 6.8 KBytes and the Equal Error Rate(EER) was 1.7%.

Development of Portable Conversation-Type English Leaner (대화식 휴대용 영어학습기 개발)

  • Yoo, Jae-Tack;Yoon, Tae-Seob
    • Proceedings of the KIEE Conference
    • /
    • 2004.05a
    • /
    • pp.147-149
    • /
    • 2004
  • Although most of the people have studied English for a long time, their English conversation capability is low. When we provide them portable conversational-type English learners by the application of computer and information process technology, such portable learners can be used to enhance their English conversation capability by their conventional conversation exercises. The core technology to develop such learner is the development of a voice recognition and synthesis module under an embedded environment. This paper deals with voice recognition and synthesis, prototype of the learner module using a DSP(Digital Signal Processing) chip for voice processing, voice playback function, flash memory file system, PC download function using USB ports, English conversation text function by the use of SMC(Smart Media Card) flash memory, LCD display function, MP3 music listening function, etc. Application areas of the prototype equipped with such various functions are vast, i.e. portable language learners, amusement devices, kids toy, control by voice, security by the use of voice, etc.

  • PDF

The Difference of the Changes of Images on Ultrasound Scanner Setting Parameters

  • Kang, Hae-Kyung;Kim, Youn-Min;Kim, Hyun-Soo;Lee, Sung-Hee;Cho, Se-Youn;Lyu, Young-Eun;Jung, In-A
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.12 no.2
    • /
    • pp.81-87
    • /
    • 2010
  • The setting parameters of ultrasound scanner give influences to change of image. Sonographers have used a Matlab program to make Low Contrast Sensitivity(LCS) value and compared original images in order to evaluate the use of the supersonic diagnosis machinery. We confirmed the change of image in Grayscale values using Photoshop program. Experiment equipment of our research used A Medison Accuvix V10, A Multi-Tissue Ultrasound Phantom(040 GSE) of CHRIS Company, A Adobe Photoshop CS4 Program, A Convex Probe, A USB memory stick, A Probe Fixation Equipment. The method used Gain, Dynamic Range(DR) of the setting parameters of ultrasound scanner and researched Gain and DR was set to 10 dB. We changed the different settings to see the changes of images using Grayscale values of a Photoshop program about tissue images of a phantom. This study evaluated DR and Gain whether it is an image controller to get the optimum contrast to produce an image to see the how effect on the images. We did not use Gateway in supersonic diagnosis machinery. We can easily open to open the files through Photoshop program before we get Digital Imaging and Communications in Medicine(DICOM) files use USB memory stick in supersonic diagnosis machinery. When we diagnosed the lesion of the patient with ultrasound, the contrast and the Gray scale value of image are very important. In this research, we determined the optimum setting parameters that provided useful information to diagnose disease and evaluated the change of improved images.

  • PDF