• Title/Summary/Keyword: contents security system

Search Result 571, Processing Time 0.021 seconds

Design and Implementation of Secure DRM System for Contents Streaming (컨텐츠 스트리밍을 위한 안전한 DRM 시스템 설계 및 구현)

  • 이진흥;김태정;박지환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.177-186
    • /
    • 2003
  • DRM(Digital Rights Management) is a technology that manages secure distributions and copyrights of digital contents on the Internet. It is general giving the rights to use the encrypted contents that are downloaded by a simple authorization process in the existing DRM system. Once this is done you are allowed to access. In this paper, we use RTP(Real-time Transport Protocol) for end-to-end real-time data transmission. And the system is designed to make it Possible to Protect copyrights and to distribute contents with safety through periodic authentication. We implemented DRM system to stand this basis. The proposed system vests only authorized users with authority to access the license. Hence it prevents contents to be distributed and copied illegally on networks.

Design of files and directories with security features within the Windows O.S using Visual C++ (Visual C++을 이용한 윈도우 운영체제 내의 파일 및 디렉토리 보안 기능 설계)

  • Jang, Seung-Ju;Kim, Jun-ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.510-514
    • /
    • 2009
  • This program was developed in Visual C + +, the Windows operating system has security features within the files and directories. File and directory security, encryption / decryption operations yirueojimyeo file security can be round, to know the value of the key and security password I need to know the directory is designed to be decrypted. In addition, ECB, CBC algorithm and 3DES, SEED algorithms and methods, and encryption. De0 can not run that created the file extension, as has been developed to allow for double security.

  • PDF

Design and Implementation of Image Communication System Based on Power Line Communication (전력선통신 기반 영상 송수신시스템 설계 및 구현)

  • Chang, Rak-Ju;Lee, Soon-Yi;Kang, Suk-Won
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2010.05a
    • /
    • pp.31-33
    • /
    • 2010
  • The image communication system based on power line communication(PLC) that manages the status of workers in deteriorated. work environments such as high temperature and pressures as realtime is designed and implemented in this paper. The major design considerations for system design are such that the adaptation of simple architecture, simplicity of installation and movement, tolerances about high temperature and pressures, transmission of high quality image under various noise environments.

  • PDF

Flexible Video Authentication based on Aggregate Signature

  • Shin, Weon;Hong, Young-Jin;Lee, Won-Young;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.6
    • /
    • pp.833-841
    • /
    • 2009
  • In this paper we propose a flexible video authentication scheme based on aggregate signature, which provides authenticity of a digital video by means of cryptographic signature to guarantee right of users. In contrast to previous works, the proposed scheme provides flexible usages on content distribution system, and it allows addition of new contents to the signed contents and deletion of some parts of the signed contents. A modification can be done by content owner or others. Although contents are modified by one or more users, our scheme can guarantee each user's right by aggregation of the each user's signatures. Moreover, proposed scheme has half size of Digital Signature Algorithm (DSA) with comparable security.

  • PDF

IPTV Content Protection Technology: CAS and DRM (IPTV 콘텐츠 보호 기술의 비교 - CAS와 DRM 중심으로)

  • Woo Je-Hak;Roh Chang-Hyun;Lee Wan-Bok
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.8
    • /
    • pp.157-164
    • /
    • 2006
  • According to the IT839 strategy which was announced by the Ministry of Information and Communication(MIC) in 2004, the convergence trend of the broadcasting and the communication would be much more promoted. Thus, the methods for protecting the broadcasting contents will be indispensible elements for the successful IPTV service achievement. This paper describes the characteristics of IPTV and the related contents protection techniques. To evaluate several security issues, we suggest a security model for IPTV, and speculate the most widespread, two security technologies for IPTV such as CAS and DRM. Moreover, candidate models of IPTV protection system are suggested based on these technologies.

  • PDF

Developing a Framework for the Implementation of Evidence Collection System: Focusing on the Evaluation of Information Security Management in South Korea

  • Choi, Myeonggil;Kang, Sungmin;Park, Eunju
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.5
    • /
    • pp.13-25
    • /
    • 2019
  • Recently, as evaluation of information security (IS) management become more diverse and complicated, the contents and procedure of the evidence to prepare for actual assessment are rapidly increasing. As a result, the actual assessment is a burden for both evaluation agencies and institutions receiving assessments. However, most of them reflect the evaluation system used by foreign government agencies, standard organizations, and commercial companies. It is necessary to consider the evaluation system suitable for the domestic environment instead of reflecting the overseas evaluation system as it is. The purpose of this study is as follows. First, we will present the problems of the existing information security assessment system and the improvement direction of the information security assessment system through analysis of existing information security assessment system. Second, it analyzes the technical guidance for information security testing and assessment and the evaluation of information security management in the Special Publication 800-115 'Technical Guide to Information Security Testing and Assessment' of the National Institute of Standards and Technology (NIST). Third, we will build a framework to implement the evidence collection system and present a system implementation method for the '6. Information System Security' of 'information security management actual condition evaluation index'. The implications of the framework development through this study are as follows. It can be expected that the security status of the enterprises will be improved by constructing the evidence collection system that can collect the collected evidence from the existing situation assessment. In addition, it is possible to systematically assess the actual status of information security through the establishment of the evidence collection system and to improve the efficiency of the evaluation. Therefore, the management system for evaluating the actual situation can reduce the work burden and improve the efficiency of evaluation.

A Rule Protecting Scheme with Symmetric Cryptosystem for Intrusion Detection System (암호화 기법을 적용한 침입 탐지 시스템의 룰 보호 기법)

  • Son Hyung-Seo;Kim Hyun-Sung;Bu Ki-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.3-13
    • /
    • 2004
  • Kvarnstrom et al. ${in}^{[10]}$ proposed a rule protection scheme by using one-way hash function to protect rules in security systems over ubiquitous environment. Son et at. ${in}^{[5-6]}$ also prooposed a rule protection scheme for Snort, which is one of the most common IDS. These schemes provide security only for the header information but not for its contents. To solve this problem, this paper presents a scheme based on the symmetric cryptosystem over Snort not only for the header information but also contents. This paper uses the key management based on PCMCIA security module proposed ${by}^{[12]}$ for the symmetric cryptosystem. Our scheme could be adjusted to other security systems, which use the rule based detection.

A Study on the Secure Storage Device for Protecting Cryptographic Keys in Untrusted DRM Client Systems (신뢰할 수 없는 DRM 클라이언트 시스템 하에서 키 보호를 위한 Secure Storage Device의 연구)

  • 이기정;권태경;황성운;윤기송
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.3-13
    • /
    • 2004
  • DRM is the ability to brand digital contents with features that ensure copy Protection and affect the way in which digital contents are played back. DRM is a technology that enables the secure distribution, promotion and sale of digital contents on the Internet. The DRM Client System that operates on the untrusted user environments has to meet the requirements of the contents owner, including copyright and contents protection. After the DRM Client System is installed on the untrusted user environments, it verifies and plays digital contents. With these procedures it cuties out user authentication, contents decryption, and license management. During these procedures, the sensitive data, including authentication information, decryption data and license data, must be secured against any illegal access from users. The goal of this thesis is to introduce the implementation of Secure Storage Device which can protect user's authentication key, cryptographic key, and license data in safe where the DRM Client System is running.

Development of Freelance System for Private Security Work (민간경비업무 프리랜서제도 발전방안)

  • Ha, Jeong Hoon
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.137-153
    • /
    • 2019
  • The private security industry in Korea has developed considerably with the development of economic growth and IT technology. The purpose of this study is to explore the development method of the freelance system for private security work based on the problems of the freelance system that CEO of the security company in the private security work field recognize. To accomplish the purpose of this study, we interviewed 3 professors and 6 CEO of the security company to analyze the data. They suggested the development of the freelance system of private security work as follows. First, the systematic management of freelance security guards is needed. Secondly, the training for the manager of the freelance security guards should be done. Third, a minimum wage compliance check is required. Fourth, the contents of freelance system should be added to the reality in accordance with the security law. Fifth, the social security system of freelance security guards should be improved. Sixth, the establishment of a freelance security guard cooperative is necessary.

Economic Analysis of The Operational Policy for Data Backup with Information Security Threats (정보보호위협하에서 경제적인 데이터백업 운영 정책 분석)

  • Yang, Won Seok;Kim, Tae-Sung;Lee, Doo Ho
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.10
    • /
    • pp.270-278
    • /
    • 2014
  • The stability and security management of IT data becomes more important because information security threats increases rapidly in Big Data era. The operational policy of the data backup considering information security threats is required because the backup policy is the fundamental method that prevents the damage of security threats. We present an economic approach for a data backup system with information security threats which damage the system. The backup operation consists of the differential backup and the batch backup. We present a stochastic model considering the occurrence of information security threats and their damage. We analyze the stochastic model to derive the performance measures for the cost analysis. Finally we analyze the average cost of the system and give numerical examples.