• Title/Summary/Keyword: security technology

Search Result 6,816, Processing Time 0.037 seconds

Design and Implementation of a Manage System for CORBA-based Distrbuted Multimedia Services (CORBA 기반의 분산 멀티미디어 서비스를 위한 관리시스템의 설계와 구현)

  • Gong, Ji-Yeong;Hong, Won-Gi;Kim, Dong-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.5
    • /
    • pp.564-573
    • /
    • 1999
  • Recently, as the development and use of distributed multimedia services are growing explosively in every aspects of our lives, administrators of multimedia services are very concerned with providing users with reliable and efficient services. However, the management of distributed multimedia services is a very complex and troublesome work such that a flexible but powerful management system is necessary. This paper proposes a management system for managing CORBA-based distributed multimedia services. We have developed an architecture for the management system and defined a set of management services needed to monitor and control distributed multimedia services. The architecture consists of several objects, which perform configuration management, fault management, security management and event management. A generic distributed multimedia service (DMS) MIB has been defined for the management of various multimedia services and applications. In addition, as a proof of concept, we have developed a Web-based management system for a CORBA-based distributed multimedia system called MAESTRO. The prototype management system uses OrbixWeb to interface with the management server which is implemented as a set of CORBA objects. Though our management system has been developed for distributed multimedia services, it can easily manage other CORBA-based services and applications.

(A New Key Recovery Protocol of Wireless Authentication Key Establishment for the M-Commerce) (M-Commerce상에서 키 복구를 지원하는 무선 인증 및 키 설립 프로토콜)

  • 이용호;이임영
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.371-376
    • /
    • 2003
  • As Mobile Internet gets more popular, the switchover of E-Commerce to M-Commerce gets faster and many service providers offer diverse M-Commerce service by using mobile technology. Also, as M-Commerce makes rapid progress, the security protocol gets more widely recognized for its significance. In particular, WAKE(Wireless Authentication and Key Establishment) protocol carried out wirelessly is of great importance, since the user and service provider must get through to carry out the M-Commerce. Key recovery method is a part of the key management in order to provide an emergency recovery of key whenever necessary, like when the user lost the key or the cryptosystem was illegally used. The ASPeCT project first tried to support the key recovery function in WAKE Protocol Since then, a variety of WAKE Key Recovery protocols have been proposed. In this thesis, problems of WAKE Key Recovery protocols proposed so far are analyzed and new WAKE Key Recovery protocol is suggested to solve those problems.

A Study on Secure Remote User Authentication Scheme using Smart Card (스마트카드를 이용한 안전한 원격 사용자 인증기법에 관한 연구)

  • Go, Sung Jong;Lee, Im Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.503-510
    • /
    • 2013
  • Recently, the rapid development of network technology has enabled people to use various services on the internet. However, the existing password-based user authentication system used in the internet environment requires a password table, which is a potential security threat as it could be leaked by an insider. To solve this issue, remote user authentication methods that do not require a user password table have been proposed. Regarding remote user authentication using a smart card in particular, various methods have been suggested to reduce expenses and to improve stability and efficiency, but the possibility of impersonation attacks and password-guessing attacks using information saved in a user's smart card still exist. Therefore, this study proposes a remote user authentication method that can safeguard against impersonation attacks and password guessing attacks, by analyzing weak points of conventional methods and creating a smart card's ID and password that are based on the user's ID and password.

Real-Time Ransomware Infection Detection System Based on Social Big Data Mining (소셜 빅데이터 마이닝 기반 실시간 랜섬웨어 전파 감지 시스템)

  • Kim, Mihui;Yun, Junhyeok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.10
    • /
    • pp.251-258
    • /
    • 2018
  • Ransomware, a malicious software that requires a ransom by encrypting a file, is becoming more threatening with its rapid propagation and intelligence. Rapid detection and risk analysis are required, but real-time analysis and reporting are lacking. In this paper, we propose a ransomware infection detection system using social big data mining technology to enable real-time analysis. The system analyzes the twitter stream in real time and crawls tweets with keywords related to ransomware. It also extracts keywords related to ransomware by crawling the news server through the news feed parser and extracts news or statistical data on the servers of the security company or search engine. The collected data is analyzed by data mining algorithms. By comparing the number of related tweets, google trends (statistical information), and articles related wannacry and locky ransomware infection spreading in 2017, we show that our system has the possibility of ransomware infection detection using tweets. Moreover, the performance of proposed system is shown through entropy and chi-square analysis.

Architecture Evaluation Utilizing CBAM and AHP (생체인식 소프트웨어의 품질 평가모듈에 관한 연구)

  • Yang, Hae-Sool;Lee, Man-Ho;Yoon, Young-Mi
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.699-708
    • /
    • 2006
  • The latest biometric field have marched fast with security technology of IT. As importance of present biometrics is realized, internal and external biometrics software market is trend that is soaring. Accordingly, high reliability of biometric software and request of high quality software are enlarged. Evaluation items and criteria must be established for biometric software quality assurance. In this paper, we development the evaluation module for biometric software test based on ISO/IEC 12119 that is the standard about software quality requirement and test, and ISO/IEC 9126 that is standard about evaluation of software product, and ISO/IEC 14598-6 that is the standard about construction of the evaluation module. Constituents of biometric software products(product descriptor, user document program and data) is subject to the quality evaluation module that we developed in this paper, we can expect improvement in the quality of software by using with a standard such as ISO/IEC 9126-3 that can be used in software development process.

Data-Driven Signal Decomposition using Improved Ensemble EMD Method (개선된 앙상블 EMD 방법을 이용한 데이터 기반 신호 분해)

  • Lee, Geum-Boon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.279-286
    • /
    • 2015
  • EMD is a fully data-driven signal processing method without using any predetermined basis function and requiring any user parameters setting. However EMD experiences a problem of mode mixing which interferes with decomposing the signal into similar oscillations within a mode. To overcome the problem, EEMD method was introduced. The algorithm performs the EMD method over an ensemble of the signal added independent identically distributed white noise of the same standard deviation. Even so EEMD created problems when the decomposition is complete. The ensemble of different signal with added noise may produce different number of modes and the reconstructed signal includes residual noise. This paper propose an modified EEMD method to overcome mode mixing of EMD, to provide an exact reconstruction of the original signal, and to separate modes with lower cost than EEMD's. The experimental results show that the proposed method provides a better separation of the modes with less number of sifting iterations, costs 20.87% for a complete decomposition of the signal and demonstrates superior performance in the signal reconstruction, compared with EEMD.

Highly Efficient Checklist for the Safety Management of Reinforced Concrete construction (철근콘크리트 공사의 효율적 안전관리를 위한 체크리스트 제안에 관한 연구)

  • Shim, Un-Jun;Suh, Hyung-Suk;Ahn, Yong-Sun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.10 no.6
    • /
    • pp.7-17
    • /
    • 2010
  • Modern construction technology has been highly systemized, which has simplified the construction methods applied to construction sites. However, on reinforced concrete construction sites, there have recently been many new disasters, and these have been bigger than before due to the heavy dependency on manpower. This study investigates the cause and cases of disasters during reinforced concrete construction. In addition, the study surveyed the psychological condition of construction site personnel in relation to the safety awareness and the causes of disasters, while deriving the basic components related to disasters on construction sites in order to analyze the relationship between each component to suggest an efficient safety management measures checklist. Construction site personnel should utilize the results drawn from this study as a disaster prevention tool to use in a safety education class, and not consider this simply as statistical data, but as a checklist to ensure full awareness of the appropriate priorities for safety categories to utilize in the reinforced concrete construction in order to execute reasonable safety management.

Study of Modulation Effect in Integrated Interface Under Controlling Switching Light-Emitting Diode Lighting Module

  • Hong, Geun-Bin;Jang, Tae-Su;Kim, Yong-Kab
    • Transactions on Electrical and Electronic Materials
    • /
    • v.12 no.6
    • /
    • pp.253-257
    • /
    • 2011
  • This study was carried out to solve problems such as radio frequency band depletion, confusion risk, and security loss in existing visible wireless communication systems, and to determine the applicability of next-generation networks. A light-emitting diode (LED) light communication system was implemented with a controlling switching light module using the ATmega16 micro-controller. To solve the existing modulation effect and disturbance in visible light communication, an integrated interface was evaluated with a driving light module and analyzes its reception property. A transmitter/receiver using the ATmel's micro-controller, high-intensity white LED-6 modules, and infrared sensor KSM60WLM and visible sensor TSL250RD were designed. An experiment from the initial value of distance to 2.5 m showed 0.46 V of the voltage loss, and if in long distance, external light interference occurred and light intensity was lost by external impact and thus data had to be modified or reset repeatedly. Additionally, when we used 6 modules through the remote controller's lighting dimming, data could be transmitted up to 1.76 m without any errors during the day and up to 2.29 m at night with around 2~3% communication error. If a special optical filter can reduce as much external light as possible in the integrated interface, the LED for lighting communication systems may be applied in next generation networks.

Social network analysis of keyword community network in IoT patent data (키워드 커뮤니티 네트워크의 소셜 네트워크 분석을 이용한 사물 인터넷 특허 분석)

  • Kim, Do Hyun;Kim, Hyon Hee;Kim, Donggeon;Jo, Jinnam
    • The Korean Journal of Applied Statistics
    • /
    • v.29 no.4
    • /
    • pp.719-728
    • /
    • 2016
  • In this paper, we analyzed IoT patent data using the social network analysis of keyword community network in patents related to Internet of Things technology. To identify the difference of IoT patent trends between Korea and USA, 100 Korea patents and 100 USA patents were collected, respectively. First, we first extracted important keywords from IoT patent abstracts using the TF-IDF weight and their correlation and then constructed the keyword network based on the selected keywords. Second, we constructed a keyword community network based on the keyword community and performed social network analysis. Our experimental results showed while Korea patents focus on the core technologies of IoT (such as security, semiconductors and image process areas), USA patents focus on the applications of IoT (such as the smart home, interactive media and telecommunications).

An Analytical Evaluation on Buckling Resistance of Tapered H-Section Deep Beam (춤이 큰 웨브 변단면 H형 보의 휨내력에 대한 해석적 평가)

  • Lee, Seong Hui;Shim, Hyun Ju;Lee, Eun Taik;Hong, Soon Jo;Choi, Sung Mo
    • Journal of Korean Society of Steel Construction
    • /
    • v.19 no.5
    • /
    • pp.493-501
    • /
    • 2007
  • Recently, in the domestic amount of materials,curtailment and economic efficiency security by purpose, tapered beam application is achieved, but the architectural design technology of today based on the material non-linear method does not consider solutions to problems such as brittle fracture. So, geometric non-linear evaluation thatincludes initial deformation, width-thickness ratio, web stiffener and unbraced length is required. Therefore, in this study, we used ANSYS, a proven finite elementanalysis program,and material and geometric non-linear analysis to study existing and completed tapered H-section as deep beam's analysis model. Main parameters include the width-thickness ratio of web, stiffener, and flange brace, with the experimental result obtained by main variable buckling and limit strength evaluation. We made certain that a large width-thickness ratio of the web decreases the buckling strength and short unbraced web significantly improves ductility.