• Title/Summary/Keyword: information Protection

Search Result 4,510, Processing Time 0.031 seconds

A Design of BJT-based ESD Protection Device combining SCR for High Voltage Power Clamps

  • Jung, Jin-Woo;Koo, Yong-Seo
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.14 no.3
    • /
    • pp.339-344
    • /
    • 2014
  • This paper presents a novel bipolar junction transistor (BJT) based electrostatic discharge (ESD) protection device. This protection device was designed for 20V power clamps and fabricated by a process with Bipolar-CMOS-DMOS (BCD) $0.18{\mu}m$. The current-voltage characteristics of this protection device was verified by the transmission line pulse (TLP) system and the DC BV characteristic was verified by using a semiconductor parameter analyzer. From the experimental results, the proposed device has a trigger voltage of 29.1V, holding voltage of 22.4V and low on-resistance of approximately $1.6{\Omega}$. In addition, the test of ESD robustness showed that the ESD successfully passed through human body model (HBM) 8kV. In this paper, the operational mechanism of this protection device was investigated by structural analysis of the proposed device. In addition, the proposed device were obtained as stack structures and verified.

An LED Drive Circuit and it's Protection Circuit (LED 구동회로의 보호회로)

  • Park, Yu-Cheol;Kim, Hoon;Kim, Hee-Jun;Chae, Gyun;Kang, Eui-Byoung
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.1063-1064
    • /
    • 2008
  • In this paper, two kinds of the protection circuits are proposed and simulated to verify their performances. One is an over current protection circuit, and the other is a no load protection circuit which reduces power consumption. These protection circuits of an LED drive circuit can reduce power consumption and prevent to damage the elements.

  • PDF

ESD damage mechanism of CMOS DRAM internal circuit and improvement of input protection circuit (정전기에 의한 CMOS DRAM 내부 회오의 파괴 Mechanism과 입력 보호 회로의 개선)

  • 이호재;오춘식
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.31A no.12
    • /
    • pp.64-70
    • /
    • 1994
  • In this paper, we inverstigated how a parricular internal inverter circuit, which is located far from the input protection in CMOS DRAM, can be easily damaged by external ESD stress, while the protection circuit remains intact. It is shown in a mega bit DRAM that the internal circuit can be safe from ESD by simply improving the input protection circuit. An inverter, which consists of a relatively small NMOSFET and a very large PMOSFET, is used to speed up DRAMs, and the small NMOSFET is vulnerable to ESD in case that the discharge current beyond the protection flows through the inverter to Vss or Vcc power lines on chip. This internal circuit damage can not be detected by only measuring input leakage currents, but by comparing the standby and on operating current before and after ESD stressing. It was esperimentally proven that the placement of parasitic bipolar transistor between input pad and power supply is very effective for ESD immunity.

  • PDF

Design of Unequal Error Protection for MIMO-OFDM Systems with Hierarchical Signal Constellations

  • Noh, Yu-Jin;Lee, Heun-Chul;Lee, Won-Jun;Lee, In-Kyu
    • Journal of Communications and Networks
    • /
    • v.9 no.2
    • /
    • pp.167-176
    • /
    • 2007
  • In multimedia communication systems, efficient transmission system design should incorporate the use of matching unequal error protection (UEP), since source coders exhibit unequal bit error sensitivity. In this paper, we present UEP schemes which exploit differences in bit error protection levels in orthogonal frequency division multiplexing (OFDM) systems over frequency selective fading channels. We introduce an UEP scheme which improves the link performance with multiple transmit and receive antennas. Especially, we propose a new receiver structure based on two stage Maximum Likelihood detection (MLD) schemes which can approach the performance of a full search MLD receiver with much reduced computational complexity. In the performance analysis, we derive a generalized pairwise error probability expression for the proposed UEP schemes. Simulation results show that the proposed schemes achieve a significant performance gain over the conventional equal error protection (EEP) scheme.

A Study on the Protective Coordination and Automatic Setting Method using Agents in Distribution System with Loop (루프 배전계통에서 Agent를 이용한 보호협조 및 자동정정 방법에 관한 연구)

  • Jin, Young-Taek;Lee, Seung-Jae;Choi, Myeon-Song;Lim, Seong-Il;Kim, Wan-Tae
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.8
    • /
    • pp.1107-1114
    • /
    • 2012
  • In this paper, we propose protective coordination and automatic setting method using agents for distribution system with loop. The proposed protection scheme adopts an agent technology assuming communication among protection agents and auto-switch agents. Having exchanged fault-related information with each other, protection agents and auto-switch agents perform the primary and backup protection and fault section isolation, respectively. this proposed scheme using agents for distribution system with loop is implemented by matlab. Because of the various configuration of distribution system, It's difficult to find cooperative agents for each agent. This paper develops a program to automatically set the cooperative route for the agents.

Design and Implementation of a Protection System for the Mentally Handicapped Using a GPS Receiver and Mobile Communications (이동통신과 GPS 수신기를 이용한 지적장애인 보호 시스템의 설계 및 구현)

  • Seol, Tae-Min;Yoon, Sang-Ho;Kang, Chang-Soon
    • Journal of Information Technology Services
    • /
    • v.9 no.4
    • /
    • pp.207-217
    • /
    • 2010
  • This paper is concerned with a protection system for the mentally handicapped, which is utilizing a GPS receiver and mobile communications. The protection system consists of a location notification equipment, a location identification and management server, and a cell phone of guardian. The location notification equipment is made up of a GPS receiver, a CDMA communication module and a microprocessor. The equipment transfers the location of the mentally impaired to the location identification and management server when the handicapped gets out of a certain bound of the designated facility. The server marks the handicapped's location on the map in the server and also notifies the guardian's cell phone of the locations. With applying the proposed protection system to social welfare organizations related to the mentally handicapped, it is expected to efficiently contribute to the promotion of the handicapped's welfare.

Collection of Location Data and Human Rights to Information projected onto the Apple Inc.'s Case (애플사(社)의 위치정보 수집과 정보인권)

  • LEE, Min-Yeong
    • Informatization Policy
    • /
    • v.19 no.1
    • /
    • pp.74-90
    • /
    • 2012
  • This thesis analyzes the Apple Inc.'s case from the viewpoint of the necessity for the protection of information privacy related to location data as for information society and ubiquitous community. Meanwhile, the regulatory conformity to equilibrium of contradictional value between personal data protection and utilization of information is debated from the fundamental right as for constitutional law concept to the commercial and technological structure in terms of economic and business point. Therefore, this paper reaches the conclusion that the legislative system should form a harmonious relationship between legal protection and lawful utilization to reappraise the present condition of legalization on personal data protection from guaranteeing rights and interests of information subject in the perspective of human rights to information guarantee consequently. As a result, it is required to revaluate the lawfulness of the fine on the violation of administrative duty levied by KCC(Korea Communications Commission).

  • PDF

A Proposal of Enhanced Personal Information Security management Framework of Consigning of Personal Information (개인정보보호 강화를 위한 위탁 업무 보안관리 프레임웍 제안)

  • Ko, Youngdai-Dai;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.383-393
    • /
    • 2015
  • Recently, the number of companies consigning their personal information management work has been increasing; they consign the work for various reasons and purposes, for example, in order to reduce costs related to personal information managers, improve efficiency through professional performance and to improve service quality. As such, since the cases where an consigning agency - not the personal information manager - handles personal information are increasing due to the increase of consigning of the personal information management work, we need to concerned with and pay attention to how much such agency makes efforts for personal information protection. In this regard, this study suggests a plan for efficient management of the agency during the course of consigning work as well as a list of requirements for personal information protection to be considered in each phase of the following; establishment of personal information protection framework for all consigning work processes, selection of consigning agency, execution of consigning contract, operation and management of consigning work, and termination of contract.

A Study on the Protection of Biometric Information against Facial Recognition Technology

  • Min Woo Kim;Il Hwan Kim;Jaehyoun Kim;Jeong Ha Oh;Jinsook Chang;Sangdon Park
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2124-2139
    • /
    • 2023
  • In this article, the authors focus on the use of smart CCTV, a combnation of biometric recognition technology and AI algorithms. In fact, the advancements in relevant technologies brought a significant increase in the use of biometric information - fingerprint, retina, iris or facial recognition - across diverse sectors. Both the public and private sectors, with the developments of biometric technology, widely adopt and use an individual's biometric information for different reasons. For instance, smartphone users highly count on biometric technolgies for the purpose of security. Public and private orgazanitions control an access to confidential information-controlling facilities with biometric technology. Biometric infomration is known to be unique and immutable in the course of one's life. Given the uniquness and immutability, it turned out to be as reliable means for the purpose of authentication and verification. However, the use of biometric information comes with cost, posing a privacy issue. Once it is leaked, there is little chance to recover damages resulting from unauthorized uses. The governments across the country fully understand the threat to privacy rights with the use of biometric information and AI. The EU and the United States amended their data protection laws to regulate it. South Korea aligned with them. Yet, the authors point out that Korean data aprotection law still requires more improvements to minimize a concern over privacy rights arising from the wide use of biometric information. In particular, the authors stress that it is necessary to amend Section (2) of Article 23 of PIPA to reflect the concern by changing the basis for permitting the processing of sensitive information from 'the Statutes' to 'the Acts'.

Faultless Protection Methods in Self-Healing Ethernet Ring Networks

  • Lee, Kwang-Koog;Ryoo, Jeong-Dong;Joo, Bheom Soon
    • ETRI Journal
    • /
    • v.34 no.6
    • /
    • pp.816-826
    • /
    • 2012
  • Self-healing Ethernet rings show promise for realizing the SONET/SDH-grade resilience in Carrier Ethernet infrastructures. However, when a ring is faulty, high-priority protection messages are processed in less time than low-priority data frames are processed. In this situation, any delayed data frames either being queued or traveling through long ring spans will cause the ring nodes to generate incorrect forwarding information. As a result, the data frames spread in the wrong direction, causing the ring to become unstable. To solve this problem, we propose four schemes, that is, dual flush, flush delay timer setting, purge triggering, and priority setting, and evaluate their protection performance under various traffic conditions on a ring based on the Ethernet ring protection (ERP) method. In addition, we develop an absorbing Markov chain model of the ERP protocol to observe how traffic congestion can impact the protection performance of the proposed priority setting scheme. Based on our observations, we propose a more reliable priority setting scheme, which guarantees faultless protection, even in a congested ring.