• Title/Summary/Keyword: leakage protect

Search Result 209, Processing Time 0.029 seconds

A Authentication technique of Internal Information Hacking Protection based on H/W Information (H/W 정보의 인증을 통한 내부정보유출 방지 기법)

  • Yang, Sun Ok;Choi, Nak Gui;Park, Jae Pyo;Choi, Hyung Il
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.1
    • /
    • pp.71-81
    • /
    • 2009
  • To the cause of the development of IT technology and the Internet, information leakage of industry is also facing a serious situation. However, most of the existing techniques to prevent leakage of information disclosure after finding the cause of defense. Therefore, in this paper by adding information about the Hardware to offer a way to protect the information. User authentication information to access the data according to different security policies to reflect a little more to strengthen security. And the security agent for the data by using a log of all actions by the record was so easy to analyze. It also analyzes and apply the different scenarios possible. And the analysis of how to implement and how to block. The future without the use of security agents to be able to control access to data and H/W information will be updated for the study will be done.

Structure Properties of Semiconductor Devices to Protect Electronic Circuit (회로보호용 반도체 소자의 구조적 특성)

  • 홍경진;민용기;조재철
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2001.07a
    • /
    • pp.373-376
    • /
    • 2001
  • When varistors for circuit protection is used at high voltage, it's operation properties were unstable because of leakage current and nonlinear coefficient with grain size. For the purpose of improving of ZnO varistor properties, high voltage ZnO varistor was fabricated with Y$_2$O$_3$addition. Electrical properties were investigated according to sintering conditions and mixing conditions. ZnO varistors was shown ohmic Properties when it's applied voltage was below critical voltage. It was shown non-ohmic properties over critical voltage, because current was increased with decreasing resistance.

  • PDF

Study of Circuit Analysis & Application for Isolated Power System for the medically used rooms (의료실의 비접지 배선방식 회로해석 및 적용에 관한 연구)

  • Kim, Young-Bae
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2005.11a
    • /
    • pp.89-93
    • /
    • 2005
  • Today, the sciences in medical and nursing fields are becoming progressively more dependent on electrical apparatus for the preservation of life of hospitalized patients. Therefore, it is required more safety medical power distribution system in order to protect patients and physicians more securely from unexpected leakage of current. Especially for the medically used rooms which use life sustaining equipment, power should be provided as supplying continuously without interrupting with lowest leakage current. This thesis proposed the reason why Isolation Power System is safety through the circuit analysis and applications.

  • PDF

Secure Multi-Party Computation of Technology FinTech (FinTech를 위한 다자간 컴퓨팅 암호기술)

  • Park, Chankil;Choi, Youngwha;Lee, Cheulhee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.61-66
    • /
    • 2019
  • FinTech has expanded to the extent that not only businesses but almost everyone can feel the impact. The spread of the scope of use has introduced a variety of new financial services that are changing the way we live. In these environments, it is important to develop reliable security measures to protect against cyber attacks. The number of mobile financial transactions in the financial sector is also increasing, making security vulnerable. In this study, we studied security through mutual authentication method that can safely handle financial security and focused on FinTech's security processing through multi-party mutual authentication method that strongly prevents leakage of information even in the event of continuous and sophisticated attacks.

A Study on the Security Management System for Preventing Technology Leakage of Small and Medium Enterprises in Digital New Deal Environment

  • Kim, Sun-Jib
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.355-362
    • /
    • 2021
  • Through the Korean version of the New Deal 2.0, manufacturing-oriented SMEs are facing a new environmental change called smart factory construction. In addition, SMEs are facing new security threats along with a contactless environment due to COVID-19. However, it is practically impossible to apply the previously researched and developed security management system to protect the core technology of manufacturing-oriented SMEs due to the lack of economic capacity of SMEs. Therefore, through research on security management systems suitable for SMEs, it is necessary to strengthen their business competitiveness and ensure sustainability through proactive responses to security threats faced by SMEs. The security management system presented in this study is a security management system to prevent technology leakage applicable to SMEs by deriving and reflecting the minimum security requirements in consideration of technology protection point of view, smart factory, and remote access in a non-contact environment. It is also designed in a modular form. The proposed security management system is standardized and can be selectively used by SMEs.

A License Administration Protocol Providing User Privacy in Digital Rights Management (디지털 저작권 관리에서 사용자의 프라이버시 보호를 제공하는 라이센스 관리 프로토콜)

  • 박복녕;김태윤
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.189-198
    • /
    • 2003
  • As people are damaged increasingly by personal information leakage, awareness about user privacy infringement is increasing. However, the existing DRM system does not support the protection of user's personal information because it is not necessary for the protection of copyrights. This paper is suggesting a license administration protocol which is more powerful to protect personal information in DRM. To protect the exposure of users identifier, this protocol uses temporary ID and token to guarantee anonymity and it uses a session key by ECDH to cryptography and Public-Key Cryptosystem for a message so that it can protect the exposure of personal information and user's privacy.

A Study on Security Solution for USB Flash Drive (USB 메모리를 위한 보안 솔루션에 관한 연구)

  • Lee, Sun-Ho;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.93-101
    • /
    • 2010
  • A USB flash drive is a portable storage device. For its promising moderate price, portability and high capacity USB flash drive users are increasing rapidly. Despite these advantages USB flash drives have critical problems as well. Such as personal information data leakage due to easy loss of the portable device. As these personal information leakage incidents increases various security measure solutions are produced and distributed. Despite these security measures and solutions it is not enough to perfectly protect personal data leakage. Hence the necessity of a more concrete, secure, user-friendly security measure solution is required. In this paper we provide you with portable USB flash drive security solution analysis and provide you with the latest secure, user-friendly security measure solutions.

Analysis and Countermeasures for False-Tripping of Earth Leakage Breaker Due to Lightning Surge (누전차단기의 뇌써지 동작특성 분석 및 오동작 대책)

  • Lee, Jae-Bok;Myeong, Seong-Ho;Jo, Yeon-Gyu;Jang, Seok-Hun;Kim, Jeom-Sik
    • The Transactions of the Korean Institute of Electrical Engineers C
    • /
    • v.51 no.10
    • /
    • pp.479-484
    • /
    • 2002
  • Recently it is reported that many a malfunction of ELB which is represented by non-operated type ELB for an impulse wave, is caused by lightning impulse and transient ground potential rise due to nearby lightning strokes. In order to examine the cause of malfunction, 5 samples were investigated experimentally in this study. As each ELB has a different leakage current detecting circuit and wiring method, various characteristics were measured. As a result, all of them brought about malfunctions under the lightning impulse voltage less than 7 kV and the surge current less than 3 kA. Also the different aspects were measured with a polarity of injected surge and a position of MOV to protect the inner circuit of ELB. The Position and effects of protecting devices were suggested as a remedy.

Study on the Blocking Voltage and Leakage Current Characteristic Degradation of the Thyristor due to the Surface Charge in Passivation Material (표면 전하에 의한 Thyristor 소자의 차단전압 및 누설전류특성 연구)

  • Kim Hyoung-Woo;Seo Kil-Soo;Bahng Wook;Kim Ki-Hyun;Kim Nam-Kyun
    • The Transactions of the Korean Institute of Electrical Engineers C
    • /
    • v.55 no.1
    • /
    • pp.34-39
    • /
    • 2006
  • In high-voltage devices such as thyristor, beveling is mostly used junction termination method to reduce the surface electric field far below the bulk electric field and to expand the depletion region thus that breakdown occurs in the bulk of the device rather than at the surface. However, coating material used to protect the surface of the device contain so many charges which affect the electrical characteristics of the device. And device reliability is also affected by this charge. Therefore, it is needed to analyze the effect of surface charge on electrical characteristics of the device. In this paper, we analyzed the breakdown voltage and leakage current characteristics of the thyristor as a function of the amount of surface charge density. Two dimensional process simulator ATHENA and two-dimensional device simulator ATLAS is used to analyze the surface charge effects.

A Study on DLP System for Preventing Internal Information Leakage (내부정보유출방지를 위한 DLP시스템 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.121-126
    • /
    • 2018
  • The development of modern ICT and network technologies has made the business environment smart.and under such circumstances, a great deal of data is being generated, stored and used. The important information that becomes an energy source for corporate management creates economic profit and value and is also utilized as a basis for strong influence. Therefore, important information must ensure its availability and convenience while ensuring confidentiality and integrity, which is the basic objective of information protection. However, most companies are seeing more and more incidents of serious damage due to the leakage of important internal information. In this study, we deal with the Data Loss Prevention (DLP) technologies and solutions to prevent internal information leakage and establish stable data security and information protection management.

  • PDF