• Title/Summary/Keyword: User module

Search Result 1,046, Processing Time 0.028 seconds

User Identity Module(UIM) for IMT-2000 systems

  • Chung, Bo-Hyun;Koh, Jong-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10b
    • /
    • pp.1141-1144
    • /
    • 2000
  • User Identity Module(UIM) is widely deployed in GSM(Global System for Mobile communications), Known as SIM(Subscriber Identity Module). We can expect that UIM will be also available for ANSI based third generation systems. Removable User Identity Module(R-UIM) is UIM for ANSI based third generation systems and Universal Subscriber Identity Module(USIM) is UIM for GSM based third generation systems. This paper identifies differences between R-UIM and USIM and studies global roaming in IMT-2000 systems.

  • PDF

A Design of DA_UDC(Double Authentication User.Device.Cross) Module using OTA(One Time Authentication) Key in Home Network Environment (홈 네트워크 환경에서 OTA(One Time Authentication)키를 이용한 DA_UDC(Double Authentication User.Device.Cross) 모듈 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.419-427
    • /
    • 2009
  • This paper propose DA-UDC(Double Authentication User, Device, Cross) Module which solves the cost problem and the appropriation of Certificate using User Authentication, Device Authentication and Cross Authentication with OTA(One Time Authentication) Key, and which is designed not to subscribe to the service of Home network business. Home Server transmits its public key which is needed to create OTA to the user which passed the first step of authentication which verifies User ID, Device ID and Session Key. And it performs the second step of authentication process which verifies the OTA key created by a user. Whenever the OTA key of DA-UDC module is generated, the key is designed to be changed. Therefore, DA-UDC Module prevents the exposure of User and Device ID by performing the two steps of authentication and enhances the authentication security of Home Network from malicious user with OTA key. Also, DA-UDC Module is faster than the existing authentication system in processing speed because it performs authentication calculation only once. Though DA-UDC Module increases data traffic slightly because of the extra authentication key, it enhances the security more than the existing technique.

Development of Post-processing Modules in an Integrated System for Reinforced Concrete Structures Using Object-Oriented Techniques (객체지향 기법을 이용한 RC통합 구조설계 시스템의 후처리 모듈 개발)

  • 이진우;천진호;김우범;이병해
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 1998.10a
    • /
    • pp.352-361
    • /
    • 1998
  • The post-processing modules are parts of an integrated system for reinforced concrete structures. This modules are composed of two modules: member design module and calculation report module. The purpose of this paper is to develope modules that increase efficiency and usefulness of an integrated system used reinforced concrete structures design. The development of post-processing modules is necessary for user to design reinforced concrete structures conveniently and quickly. This modules are connected with central database for the benefit of storing amount of input/output data and being used system with little effort. Post-processing modules used Object-Oriented concepts and techniques include identity, classification, polymorphism, and inheritance. Member design module automatically converts no good members into satisfied members by changing section size or reinforcement bar arrangement. This module can be operated both independent member design modules with user input and a part of integrated system with database input. If user operates member design module, calculation report module is created automatically.

  • PDF

User-Specific Reconfiguable Modular Device for u-Healthcare Services (u-헬스케어 서비스 제공을 위한 사용자 맞춤형 모듈러 디바이스 설계)

  • Kim, Ji-Ho;Song, Oh-Young
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.11
    • /
    • pp.1689-1694
    • /
    • 2012
  • In this paper, we present a reconfigurable mobile platform (RMP) for user-specific applications. The RMP consists of a basic module and more than one extended module that offers specified functions to a portable platform based on the circumstances and purposes of the users. The extend module for specified purposes is connected to the basic module using a common interface that offers interoperability to the traditional interfaces. This paper gives the results of a survey to determine specifications of a reconfigurable mobile platform. Utilizing the results of the survey, we propose a prototype of the reconfigurable mobile platform to enable specialized functions. The design objective is to provide specialized functions required for user specific needs related to their age and physical condition. In addition, it can be used for mobile healthcare applications that are efficient in improving the user's health conditions by executing medical analysis and prescriptions.

CNC System Improvement Research of NC Lathe Abrasion-Based on User Defined Module (NC선반 절삭공구마모 문제점 보정을 위한 CNC 성능개선 시스템 연구)

  • Park, Eun-Sik;Kim, Han-Sik
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.11 no.3
    • /
    • pp.135-140
    • /
    • 2008
  • This paper researched about Development Cutting Tool User Defined Module Based(PMCUDMS) on Simulation that was able to adapt themselves to rapid development of software and hardware to adopt. It is basic research that develops a scheme whereby technic make property. This paper theorized about to realize Cutting Tool User Defined Module Based on Simulation which is developing CNC Software flows from building Windows XP operating system's image that is possible realtime acting and multitasking to correct. And Cutting Tool User Defined Module Based on Simulation component which was consisted of basis OS, NC Code parser, Servo Motor Control, Simulator, Man-Machine Interface.

  • PDF

Development of a Distributed OperatorTtraining System (조업자 훈련을 위한 분산 교육시스템 구축)

  • Cho, Sung-Il;Jang, Byung-Mu;Moon, Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.1424-1427
    • /
    • 1996
  • OTS(Operator Training System) requires computation for the systematic training in real-time. So we have developed a distributed operator training system that is composed of workstation based server and PC based user modules. Sever and OM(OTS Manager) modules are located in the workstation server and user modules are located in PCs. User modules have DCS-like user interfaces and transfer data with OM over the coaxial ethernet. This paper delineates a total system architecture and definition of data transferring between OM and User module. Having applied this system to a batch process, we could analyze operator's tasks.

  • PDF

Multimodal Interface Control Module for Immersive Virtual Education (몰입형 가상교육을 위한 멀티모달 인터페이스 제어모듈)

  • Lee, Jaehyub;Im, SungMin
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.5 no.1
    • /
    • pp.40-44
    • /
    • 2013
  • This paper suggests a multimodal interface control module which allows a student to naturally interact with educational contents in virtual environment. The suggested module recognizes a user's motion when he/she interacts with virtual environment and then conveys the user's motion to the virtual environment via wireless communication. Futhermore, a haptic actuator is incorporated into the proposed module in order to create haptic information. Due to the proposed module, a user can haptically sense the virtual object as if the virtual object is exists in real world.

  • PDF

A Design of Hadoop Security Protocol using One Time Key based on Hash-chain (해시 체인 기반 일회용 키를 이용한 하둡 보안 프로토콜 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.4
    • /
    • pp.340-349
    • /
    • 2017
  • This paper is proposed Hadoop security protocol to protect a reply attack and impersonation attack. The proposed hadoop security protocol is consists of user authentication module, public key based data node authentication module, name node authentication module, and data node authentication module. The user authentication module is issued the temporary access ID from TGS after verifing user's identification on Authentication Server. The public key based data node authentication module generates secret key between name node and data node, and generates OTKL(One-Time Key List) using Hash-chain. The name node authentication module verifies user's identification using user's temporary access ID, and issues DT(Delegation Token) and BAT(Block Access Token) to user. The data node authentication module sends the encrypted data block to user after verifing user's identification using OwerID of BAT. Therefore the proposed hadoop security protocol dose not only prepare the exposure of data node's secret key by using OTKL, timestamp, owerID but also detect the reply attack and impersonation attack. Also, it enhances the data access of data node, and enforces data security by sending the encrypted data.

Implementation of User Account Vulnerability Checking Function System using MS-SQL Database (MS-SQL 데이터베이스에서 특정 계정 취약점 판별 시스템 구현)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2482-2488
    • /
    • 2014
  • This paper proposes that a user account of the MS-SQL is checked whether expirated or not in C++ program environment. Vulnerability checking module decides security weakness for password change time or user configuration time. The proposed module prevents and protects a user account from a malicious user account. Recently, Information Assets becomes more important. If the loss of database information it would make large damage in our life. This paper develops user account checking module, which checks whether user password have not been changed for a long time or whether the user account expirated in the MS-SQL Database. By checking security vulnerability using this feature, a malicious user cannot access the Database.

A Study on the User Toilet Interface for Train Design (철도차량 화장실디자인에 대한 사용자와 제품의 인터페이스)

  • Jin Mi-Ja;Han Suk-Woo;Choe Chel-Hun
    • Proceedings of the KSR Conference
    • /
    • 2003.10b
    • /
    • pp.210-216
    • /
    • 2003
  • This study focuses on the physical environment and human activity of the user of train toilets, on the analysis of factors needed to obtain reasonable toilet design and it also focuses on the understanding of the interface between its user. Moreover it proposes a module of the development process and methods of approaching the User Toilet Interface. The study so presents a design standard under which the concrete data of the characteristics and practicable range and the convergent demands accelerate to the module could be confirmed and criticized.

  • PDF