• Title/Summary/Keyword: illegal

Search Result 1,457, Processing Time 0.024 seconds

A License Audit Model for Secure DRM System in Home Network Environment (홈네트워크 환경에서의 안전한 DRM 시스템을 위한 라이센스 감사 모델)

  • Jang, Ui-Jin;Jung, Byung-Ok;Yeo, Sang-Soo;Shin, Yong-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.438-447
    • /
    • 2009
  • Digital home devices aims at providing the multimedia service which is not limited at time and space in home network environment. However, it is incapable of the fair use of consumers who legally buys contents, and causes damage to the contents providers owing to the indiscriminate distribution and use of illegal contents. DRM system appeared to solve this problem cannot protect the license stored on digital home devices and manage license by redistribution. This paper proposes a license audit model which makes an inspection of illegal access, modification and redistribution and reports alert logs to server.

  • PDF

A Study on Important Matters of the State Tort Liability (국가배상책임(國家賠償責任)의 요건(要件)에 관한 고찰(考察) - 위법성(違法性)과 과실(過失)을 중심(中心)으로 -)

  • Kyoung, Jai-Uhng
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.1-26
    • /
    • 2004
  • The current consitutional law 29-1 is ordaining the State Tort Liability for the illegal action of public service personnel. Based on this regulation, the State Tort Liability Act 2-1 actualizes by indicating, the nation or the local self-governing community is responsible for the public service personnels damaging others during their office hours whether it is accidental or intentional. However, the same law is considered to be inappropriate for the damage relief. In order to supplement this problem, through examinations at both theoretical and systematic levels of Prima facie as well as the objectification and standardization of the damages are required for the national compensation for the police action. According to the objectification and standardization of the damage theory, the faulty actions of the public service personnel are the defects occurred during the office hours. In the case of the police action that frequently uses infringement administration, invading the liberty and rights of the people, it is necessary to interpret faulty damages during the office duties more comprehensively so as to extend its scope of the ordinary public service personnel accidental illegality. In order to warrant effectiveness of the securing the rights, it is crucial to distinguish whether the faulty actions are accidental or intentional. When proven to be damages by illegal police action, the police personnel is responsible for the faults, called Prima facie, the nation is liable for the damage relief.

  • PDF

Dimming Level Control Technique for Lighting / Communication Functions in Visible Light Communication Systems (가시광통신 시스템에서 조명/통신 기능을 위한 효과적인 Dimming level control 기법)

  • Lee, Kyu-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.153-158
    • /
    • 2018
  • In this paper, we have studied a dimming level control method to satisfy both lighting and communication performance in visible light communication system. In the case of the most commonly used OOK and RZ-OOK modulation schemes, continuous Burst Zero Duration will seriously degrade the lighting function. This causes not only the illumination but also the performance of the entire system to deteriorate. Through this study, we analyzed the dimming level characteristics of the existing system and proposed the Illegal Pulse Insertion (IPI) algorithm as a technique to increase the dimming level. Through this, it is possible to effectively control the dimming level and improve the QoS of both lighting and communication by resolving the flicker phenomenon and dimming level reduction in the existing modulation and demodulation system.

Insensitivity Towards Safety and Tasks of KC Mark (Korea Certification Mark) (KC마크의 안전 불감과 과제)

  • Kim, Myeong-Yeol;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.18 no.1
    • /
    • pp.111-118
    • /
    • 2016
  • KC Mark is one of the country's integrated legal force to the minimum mandatory certification mark system for safety. That is absolutely needed for manufacturing and sales of goods in Korea. This thesis intended to see what is prevalent for both imports and domestic products for illegal and defect and rebuild the ecosystem as soon as possible for the healthy development through public awareness. In this theses point out the seriousness of the problem based on the various kinds of press releases, data of KCA(Korea Consumer Agency), MOTIE(Ministry of Trade, Industry and Energy) and KCA(Korea Customs Service) to the problem of certification system of KC mark and propose a solution to that issue. This study is considered to make befit the nation's place in the world and sustainable development is possible about the system of certification KC. This study expect more research on this issue in order to make enhance the confidence of KC mark.

Anomaly Detection Model Using THRE-KBANN (THRE-KBANN을 이용한 이상현상탐지모델)

  • Shim, Dong-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.38 no.5
    • /
    • pp.37-43
    • /
    • 2001
  • Since Internet has been used anywhere, illegal intrusion to a certain host or network become the ciritical factor in security. Although many anomaly detection models have been proposed using the statistical analysis, data mining, genetic algorithm/programming to detect illegal intrusions, these models has defects to detect new types of intrusions. THRE-KBANN (theory-refinement knowledge-based artificial neural network) which can learn continuously based on KBANN, is proposed for the anomaly detection model in this paper. The performance of this model is compared with that of the model based on data mining using the experimental data. The ability of continual learning for the detection of new types of intrusions is also evaluated.

  • PDF

Basal Area-Stump Diameter Models for Tectona grandis Linn. F. Stands in Omo Forest Reserve, Nigeria

  • Chukwu, Onyekachi;Osho, Johnson S.A.
    • Journal of Forest and Environmental Science
    • /
    • v.34 no.2
    • /
    • pp.119-125
    • /
    • 2018
  • The tropical forests in developing countries are faced with the problem of illegal exploitation of trees. However, dearth of empirical means of expressing the dimensions, structure, quality and quantity of a removed tree has imped conviction of offenders. This study aimed at developing a model that can effectively estimate individual tree basal area (BA) from stump diameter (Ds) for Tectona grandis stands in Omo Forest Reserve, Nigeria, for timber valuation in case of illegal felling. Thirty-six $25m{\times}25m$ temporary sample plots (TSPs) were laid randomly in six age strata; 26, 23, 22, 16, 14, and 12 years specifically. BA, Ds and diameter at breast height were measured in all living T. grandis trees within the 36 TSPs. Least square method was used to convert the counted stumps into harvested stem cross-sectional areas. Six basal area models were fitted and evaluated. The BA-Ds relationship was best described by power model which gave least values of Root mean square error (0.0048), prediction error sum of squares (0.0325) and Akaike information criterion (-15391) with a high adjusted coefficient of determination (0.921). This study revealed that basal area estimation was realistic even when the only information available was stump diameter. The power model was validated using independent data obtained from additional plots and was found to be appropriate for estimating the basal area of Tectona grandis stands in Omo Forest Reserve, Nigeria.

Design and Implementation of Firewall Log Message Analysis System based on XML (XML 기반의 침입차단 로그 메시지 분석 시스템 설계 및 구현)

  • 전석훈;김석훈;손우용;이창우;송정길
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.125-130
    • /
    • 2004
  • The Internet is aggregate of trustless networks essentially. Because the Internet is very difficult to control flowing of information, taking advantage of enough sporadic resource, security problem that can protect internal important stock from the Internet is risen seriously. Recently, virus accident and generation rate about system intrusion that happen become much higher and various than past. On these time, is progressing researcher for invasion cutout to keep away illegal act vigorouslyand do continuous development. In this paper, reporting administrator log information about invader's illegal act depending on XML format form, and I wished to solve problem that happen in administration side developing invasion interception system that can control to remote.

  • PDF

A Study on Conditional Access System for Data Confidential using Smart-Card (스마트 카드를 이용한 자료 유출 제한 시스템에 대한 연구)

  • 김신홍;이광제
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.5
    • /
    • pp.125-131
    • /
    • 2000
  • In this paper, we proposed conditional access algorithm for data confidential using smart card. This algorithm is constructed smart card and E-mail gateway for restricting of user's illegal confidential data transmission. After processing of certification procedure in smart card, each E-mail forwarded to E-mail gateway(EG). The EG selects outgoing E-mail and it is sent to fire-wall E-mail processing program, it is checked attached file in transmission mail and if it is attached file, it writes to database. This time, it can be used evidence data about user's illegal confidential data transmission, because of using registered content and smart card certification data in database. in addition to, we can get psychologically effect of prevention to send illegally, and this system can prevent spam mail in EG, also.

  • PDF

Development of Hadoop-based Illegal Parking Data Management and Analysis System (하둡 기반 불법 주·정차 데이터 관리 및 분석 시스템 개발)

  • Jang, Jinsoo;Song, Youngho;Baek, Na-Eun;Chang, Jae-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.167-170
    • /
    • 2017
  • 자동차 보급 증가로 인한 주차 공간 부족 문제는 불법 주정차 차량 발생의 원인이 되어, 교통 체증을 야기하는 심각한 사회문제가 되었다. 따라서 각 지방자치단체에서는 불법 주정차 문제 해결을 위한 법안을 마련하기 위해 노력하고 있으며, 불법 주정차문제를 해결하기 위한 연구가 진행되고 있다. 한편, 정보통신의 발달에 의해 데이터의 양이 매우 빠른 속도로 증가하고 있으며, 아울러 공공 데이터의 양도 매우 빠른 속도로 증가하고 있다. 따라서 공공 빅데이터를 효율적으로 처리하기 위한 연구가 필요하다. 그러나 현재 공공 빅데이터 관리 및 분석을 수행하기 위한 효율적인 시스템을 구축하는 데는 아직 미흡한 실정이다. 따라서 본 논문에서는 불법 주정차 데이터와 같은 공공데이터를 효율적으로 분석하고 효과적인 주 정차 단속을 위한 하둡 기반 불법 주 정차 데이터 관리 및 분석 시스템을 제안한다.

  • PDF

Security Vulnerability of Internet of Things and Its Solution (사물인터넷 보안 문제제기와 대안)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.69-78
    • /
    • 2015
  • Internet of Things(IoT) is electronic devices and household appliances use wireless sensor network in environment of high speed wireless network and LTE mobile service. The combination of the development of Internet and wireless network led to development of new forms of service such as electronic devices and household appliances can connect to the Internet through various sensors and online servers such as a Home Network. Even though Internet of Things is useful, there are problems in Internet of Things. In environment of Internet of Things, information leakage could happens by illegal eavesdropping and spoofing. Also illegal devices of wireless communication interference can cause interfere in Internet of things service, physical damage and denial of service by modulation of data and sensor. In this thesis, it will analyze security threats and security vulnerability in environment of mobile services and smart household appliances, then it will suggest plan. To solve security issues, it is important that IT and RFID sensor related companies realize importance of security environment rather than focus on making profit. It is important to develop the standardized security model that applies to the Internet of Things by security-related packages, standard certification system and strong encrypted authentication.