• Title/Summary/Keyword: 과금

Search Result 308, Processing Time 0.028 seconds

유무선 지능망 환경에서 대량호 착신 과금 서비스를 위한 동적 큐 관리자의 설계

  • Choe, Han-Ok;An, Sun-Sin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.1
    • /
    • pp.103-112
    • /
    • 2000
  • As today's market share of Intelligent Network (IN) service and wireless tele-communication is growing rapidly, the increment in service requests of wireless IN service subscribers and users has to be taken into account for implementing advanced IN services. In this paper, we design Global Service Logic for IN Freephone service, which is one of the commercially most interesting IN services, applied call queuing service feature with mass call processing to enhance call completion rate by considering the mobility of wireless service subscribers with mobile terminals as well as existing wireline service subscribers. Due to the location management of each IN subscribers 'mobile terminals, we design the structure and operation mechanism of Queue Manager which adjusts dynamically service subscribers groups according to their mobility. We optimize the queue size according to the call attempt rate and drop rate, and present the appropriate waiting time in the queue.

  • PDF

Unlocking Shared Bike System by Exploiting an Application Log (애플리케이션 로그를 이용한 공유 자전거 시스템의 잠금장치 해제 방법)

  • Cho, Junwan;Lee, Jeeun;Kim, Kwangjo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.719-728
    • /
    • 2019
  • Recently, there has been a growing market for shared mobility businesses that share 'transport' such as cars and bikes, and many operators offer a variety of services. However, if the fare can not be charged normally because of security vulnerability, the operator can not continue the business. So there should be no security loopholes. However, there is a lack of awareness and research on shared mobility security. In this paper, we analyzed security vulnerabilities exposed in application log of shared bike service in Korea. We could easily obtain the password of the bike lock and the encryption key of the AES-128 algorithm through the log, and confirmed the data generation process for unlocking using software reverse engineering. It is shown that the service can be used without charge with a success rate of 100%. This implies that the importance of security in shared mobility business and new security measures are needed.

A Study on Realtime Cost Estimation Model of PC Laboratory Service based on Public Cloud (공용 클라우드 기반 PC 실습실 서비스의 실시간 비용 예측 모델 연구)

  • Cho, Kyung-Woon;Shin, Yong-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.17-23
    • /
    • 2019
  • IaaS is well known as a very cost effective computing service which enables required infrastructures to be rented on demand without ownership of real hardwares. It is very suitable for price sensitive services due to pay-per-use style. Operators of such services would want to adjust utilization policy quickly by estimating costs for cloud infrastructures as soon as possible. However, swift response is not possible due to that cloud service providers provide a dozen or so hours delayed billing information. Our work proposes a realtime IaaS cost estimation model based on usages monitored by virtual machine instance. We operate PC laboratory service on a public cloud during full semester to validate our suggested model. From that experiment, an averaged disparity between estimation and actual cost is less than 5.2%.

Analysis of User Transfer of Successful Battle Royale Games - From Player Unknown's Battleground to Fortnite (성공적인 배틀 로얄 게임에서의 사용자 이동 원인 분석 - 배틀그라운드에서 포트나이트로)

  • Song, Doo Heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.71-76
    • /
    • 2020
  • A battle royale game is a multiplayer video game genre that blends the survival and exploration with last-man-standing gameplay. The genre has been hot in recent years and the 'Player Unknown's Battleground' produced by Korean enterprise PUBG had been the hottest during 2017 and the first half of 2018. However, a similar battle royale game 'Fortnite' became the game of the year in 2018 and the Player Unknown's Battleground sustains the predominance only in Korea and China. In this paper, we investigate the game structure of those two games on combat, survival, farming and charging elements, We also conduct a user survey on what might be the weak point of the Player Unknown's Battleground and why they choose Fornite among users played both but currently play Fortnite. The result shows that the Player Unknown's Battleground sustains the advantage on battle elements but creative charging policy and the efficient survival elements are the reasons of choosing Fortnite between the two.

An AAA Mechanism using ID-based Ticket offer Anonymity (익명성을 지원하는 ID기반 티켓을 이용한 AAA 메커니즘)

  • Moon, Jong-Sik;Paek, Chang-Hyun;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.87-98
    • /
    • 2007
  • AAA protocol is an information protection technology which systematically provides authentication, authorization and accounting function not only in the existing wire network but also in the rapidly developing wireless network, various services and protocol. Nowadays, standardization of the various application services is in progress with the purpose of AAA standardization fer the mobile user in the wireless network. And various researches are being conducted fur using AAA in the roaming service and mobile IPv6 network between heterogeneous networks. In this paper uses OTP and ID-based ticket for user authentication in the mobile device under the ubiquitous environment, and service is seamlessly provided even though the mobile device moves from the home network to the foreign network. In addition, with the ticket renewed from the foreign network, the overhead of the home authentication server can be reduced, and provides anonymity of service through the anonymity ID.

A Study on Image Copyright Archive Model for Museums (미술관 이미지저작권 아카이브 모델 연구)

  • Nam, Hyun Woo;Jeong, Seong In
    • Korea Science and Art Forum
    • /
    • v.23
    • /
    • pp.111-122
    • /
    • 2016
  • The purpose of this multi-disciplinary convergent study is to establish Image Copyright Archive Model for Museums to protect image copyright and vitalize the use of images out of necessity of research and development on copyright services over the life cycle of art contents created by the museums and out of the necessity to vitalize distribution market of image copyright contents in creative industry and to formulate management system of copyright services. This study made various suggestions for enhancement of transparency and efficiency of art contents ecosystem through vitalization of use and recycling of image copyright materials by proposing standard system for calculation, distribution, settlement and monitoring of copyright royalty of 1,000 domestic museums, galleries and exhibit halls. First, this study proposed contents and structure design of image copyright archive model and, by proposing art contents distribution service platform for prototype simulation, execution simulation and model operation simulation, established art contents copyright royalty process model. As billing system and technological development for image contents are still in incipient stage, this study used the existing contents billing framework as basic model for the development of billing technology for distribution of museum collections and artworks and automatic division and calculation engine for copyright royalty. Ultimately, study suggested image copyright archive model which can be used by artists, curators and distributors. In business strategy, study suggested niche market penetration of museum image copyright archive model. In sales expansion strategy, study established a business model in which effective process of image transaction can be conducted in the form of B2B, B2G, B2C and C2B through flexible connection of museum archive system and controllable management of image copyright materials can be possible. This study is expected to minimize disputes between copyright holder of artwork images and their owners and enhance manageability of copyrighted artworks through prevention of such disputes and provision of information on distribution and utilization of art contents (of collections and new creations) owned by the museums. In addition, by providing a guideline for archives of collections of museums and new creations, this study is expected to increase registration of image copyright and to make various convergent businesses possible such as billing, division and settlement of copyright royalty for image copyright distribution service.

The proposal of detection mechanism against Cross-service attack (Cross-service 공격 탐지를 위한 메커니즘 제안)

  • Oh, Seung-Hee;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.647-650
    • /
    • 2008
  • 네트워크 환경이 컨버젼스(convergence)되면서 하나의 단말에서 제공하는 서비스 역시 다양화되고 있다. 개인용 휴대 단말들도 기존에 개별 기능만을 주로 다루던 형태에서 다양한 융복합 서비스를 하나의 단말에서 제공하는 형태로 발전하고 있다. 따라서 본 논문에서는 컨버젼스 네트워크 환경에서 제공되는 여러 서비스를 동시에 지원하는 단말을 "복합단말(All-in-one Mobile Device)"이라 정의한다. 복합단말은 기능, 성능, 네트워크 인터페이스 측면에서 다양한 컨버젼스가 제공되고 있는데, 이 중에서 다양한 네트워크 인터페이스의 제공으로 인터페이스간 교차로 인해 기존에 존재하지 않았던 새로운 형태의 보안 위협인 Cross-service 공격이 등장하고 있다. 기존 모바일 디바이스와는 달리 복합단말에서의 Cross-service 공격은 사용자에게 과금이나 배터리 소모와 같은 치명적인 문제점을 발생시킨다. 본 논문에서는 Cross-service 공격으로부터 복합단말을 보호하기 위한 탐지 메커니즘 및 보안 요구사항을 제시한다.

  • PDF

A Study of Authentication Model for Mobility elevation of Public Wireless LAN (공중 무선랜의 이동성 향상을 위한 인증 모델 연구)

  • 김관연;한국민;김신효;정병호;박세현
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.204-207
    • /
    • 2002
  • 공중무선랜은 오늘날 빠르게 증가하고 있는 무선인터넷 서비스에서 빠른 전송속도와 저렴한 설치비용 등으로 빠르게 성장하고 있는 중요한 기반요소로 평가되고 있다. 하지만 무선랜 시장에 대한 기대 뒤에는 보안에 대한 우려 또한 높아지고 있으며 로밍이나 핸드오버에 대한 수요가 커지고 있으나 실제로는 서비스 반경이 작고, 간섭에 의해 서비스 품질을 보장하기 어려우며 사용자 인증, 접근제어, 과금 부분에 있어 믿을 만한 초기 단말 인증이 보장되지 않아 도메인간 연동 문제가 쉽지 않다. 이러한 문제를 보완하여 초고속 멀티미디어 서비스를 제공할 수 있는 Mobile IP 기반 로밍 및 핸드오버에 대한 기반 기술 및 Mobile IP에 적용되는 사용자 인증 서비스에 대한 기반기술인 802.1x를 비롯하여 802.11f, Mobile IP등을 고려하여 이동성이 보장된 공중 무선랜 서비스를 위한 인증 방안을 제안하고 검증하며 제안된 방안은 차후로 ALL-IP 기반의 차세대 3G 이동통신망에서 이용될 수 있는 AAA 방안으로 확장하여 적용이 가능한 AAA 모델의 기반기술이 될 것이다.

  • PDF

Implementation of SLA Data Analysis System (SLA정보 분석 시스템의 구현)

  • Park Noh-Sam;Lee Gil-Haeng
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.553-555
    • /
    • 2005
  • SLA는 네트워크 서비스 사업자와 가입자 사이에 서비스 품질을 정의하는 협약으로서, 일정 수준의 서비스 제공을 위해 SLA 관리 시스템(SLM)의 필요성이 대두되었다. 본 논문에서는 SLA에 대한 데이터 분석을 통해 네트워크 사업자에게 신속하고 효율적인 의사결정 지원정보를 제공할 수 있는 SLA 데이터 분석 시스템을 제안한다. 본 논문의 시스템은 SLM의 일반정보, 위반정보, 과금정보 등을 바탕으로, 각각 추이분석과 통계현황 기능을 수행한다. 분석 결과는 테이블, 그래프 등의 다양한 형태로 제공되며, 분석 결과에 대해서는 각각의 분석 모형에 대한 개요 및 기준치 등을 제시함으로써 시스템에 대한 신뢰성을 높일 수 있다.

  • PDF

Design and Implementation of an IPFIX-based Real-time Flow Analysis Tool (IPFIX 기반 실시간 플로우 분석 도구의 설계 및 구현)

  • Shin S.;Lee Y.;Kwon T.
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.283-285
    • /
    • 2005
  • 인터넷 사용자의 증가와 항께 인터넷 트래픽 역시 기하급수적으로 증가하고 있다. 이에 따라 네트워크 보안, 트래픽의 특성 분석, 사용자별/응용별 과금, 및 트래픽 엔지니어링을 수행하기 위해서는 네트원크 모니터링 도구가 필수적이다. 그러나, 기존 연구에 많이 사용되고 있는 Cisco NetFlow v5는 포트번호를 기반으로 응용 트래픽을 분류하여 분석할 수 있지만, IPv6과 MPLS 등의 다양한 프로토콜에 대한 트래픽을 분석할 수는 없다. 따라서, IETF에서는 IPFIX표준을 제정하여 확장성 있고 SCTP/TCP 전송 프로토콜을 이용하여 신뢰성있는 플로우 측정 프레임워크를 제시하였다. 본 논문은 Cisco NetFlow v5와 NetFlow v9(IPFIX의 기본 프로토콜)를 모두 지원하여 IPv4/IPv6 트래픽을 실시간으로 분석할 수 있는 플로우 기반 트래픽 모니터링 도구를 구현하였고, 실험을 통하여 IPv6 트래픽을 신뢰성있게 분석할 수 있다는 것을 보였다.

  • PDF