• Title/Summary/Keyword: 광보안

Search Result 177, Processing Time 0.025 seconds

All Optical Header Recognition for Information Processing of Packet by Packet in The Access Network based on FTTH (FTTH 기반의 가입자망에 있어 패킷단위의 정보처리를 위한 전광학 헤더 인식)

  • Park, Ki-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.69-76
    • /
    • 2010
  • We describe an all-optical circuit which recognizes the header information of packet-by-packet in the access networks based on FTTH. The circuit's operation is confirmed by an experiment in the recognition of 3 and 4 header bits. The output from the header recognition circuit appears in a signal assigned in the time axis according to the header information. The recognition circuit of header for self-routing has a very simple structure using only delay lines and switches. The circuit is expected that it can be constructed of the high reliability and the low cost. Also, the circuit can solve the problems of the power loss and private security which is the weak point of the TDM-PON method by being established a unique transmission line to each subscriber.

Key Distribution Protocol and Call Control for Secure ISDN (안전한 종합정보통신망을 위한 키 분배 프로토콜과 호 제어)

  • Jeong, Hyeon-Cheol;Sin, Gi-Su;Lee, Seon-U;Kim, Bong-Han;Kim, Jeom-Gu;Lee, Jae-Gwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.1
    • /
    • pp.195-208
    • /
    • 1997
  • ISDN is network which has been developed to integrate and transfer some information(data, video, voice). In the ISDN, security problem that threat and intrusion about important information resource increase because every information is transferred in the form of digital and access of network has patiency. In this paper, for protect important information resource, studied that apply application method and encryption system to ISDN, and system structure, ITU-T Q.931 protocol were analyzed, and proposable encryption key distribution protocol, call control with hybrid encryption system for user information privacy to provide security service.

  • PDF

A Study on the Northeast Asia Frequency and Standadization of IoT trends (동북아 지역 IoT 주파수 공동이용을 위한 동향분석 및 기술표준 방향 연구)

  • Lee, Dong-Chul;Baek, Seong Jun;Gue, Kyo Kwang;Kwen, Tae Ho;Kim, Sung Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.399-401
    • /
    • 2018
  • 몇 년 사이에 IoT는 통신 프로토콜과 디바이스 중심의 단순한 개념에서 점점 진화 하여, 디바이스, 인터넷기술, 그리고 사람(사물, 데이터 등)이 보안, 프라이버시, 신뢰도 문제를 해결하는 것까지 포함한 비즈니스 혁신, 재현성, 상호 운용성을 위한 완전한 생태계를 창조하는 것으로 개념이 바뀌어 가고 있다. IERC는 실제와 가상의 사물들이 고유특성과 물리적 가상적 특성을 가지고 있고, 지능형 인터페이스를 사용하며, 끊김없이 정보네트워크를 통합 하는 표준과 상호운용 통신 프로토콜을 기반으로 자기 스스로 재구성이 가능한 동적인 글로벌 네트워크 인프라로 정의함으로써 IoT의 범위를 인프라까지 확대 정의하고 있는 추세이다. 이와 같은 IoT 영역이 확대되면서, 일반적으로 IoT의 4대 기술 분야를 센싱기술, 유 무선 통신 네트워크 기술, 플랫폼 기술 및 서비스 기술로 분류하고 있으며, 이 중에서 다양한 전파서비스를 제공하기 위해서는 무선통신망 구축이 필수이며, 이를 실현하기 위해서는 주파수 자원 확보가 매우 중요하다. 본고에서는 이를 실현화 시킬 수 있는 동북아지역 IoT주파수 동향 및 표준화에 대하여 결과를 제시하고자 한다.

  • PDF

A Study of Automatically Authentication System for Virtual Resource Organization on Grid (그리드상의 가상 자원 조직에 대한 자동 인증 시스템 연구)

  • 최병선;이원구;이재광
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.301-306
    • /
    • 2004
  • The Grid VO(Virtual Organization) is temporary VO where gather indivisual, authority, or system resource, differ from previous VO concept that controled by internal principal and policy set. It have many problems in case of indivisuals, authorities, or system resources that became member\ulcorner of some Grid VO at same time and combination followed changing condition of system resource for building Grid VO. This paper propose lightweighted Grid VO authentication system based on XML security to solve the authentication of the problems occuring in building Grid VO. In this paper, Grid VO authentication system is including Grid VO authentication module that is intermediate management system in PH to previous authentication service structure and provide effective authentication service to Grid VO.

  • PDF

A Study on Implementation of Finger-Print Identification System Using Optical Sensor (광센서를 이용한 지문인식 시스템의 구현에 관한 연구)

  • Shin, Gi-Bong;Jung, Kyong-Hun;Kang, Dong-Wook;Kim, Ki-Doo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2005.11a
    • /
    • pp.67-69
    • /
    • 2005
  • 지문인식 시스템이란 저장되어서 가지고 있는 지문data와 지금 현재sensor로 입력받은 지문data의 유사도를 측정하는 system이다. 현 시대의 보안에 관한 요구가 많아지면서, 개인password나PIN(Personal Identification Number)같이 외워서 사용해야만 하는 불편함이 없고, 본인임을 쉽게 증명할 수 있는 생체정보를 이용한 ID system이 각광을 받고 있다. 이러한 상황 속에서 가장 손쉽게 접할 수 있는Finger-print Identification system을 구현할 것이다. 지문인식 시스템은 sensor의 방식에 따라 여러가지로 분류되는데, 본 논문에서는 광학방식 센서를 이용한 지문인식 시스템을 구현 하였다. 본 지문인식 시스템은 처음 지문영상을 센서로 입력 받고 그 입력된 영상을 전처리(pre-processing)해서 지문의 특징점을 추출한다. 이렇게 특징점들을 획득한 후, 후처리(post-processing)과정을 거쳐서 database에 저장 한다. 이렇게 지문영상의database를 구성한 후, 비교하고자 하는 지문영상을 센서로 입력 받아 지문영상을 획득할 때와 같은 processing과정을 거치고, 그 결과물과 database에 저장되어있는 지문과 1:N matching을 한다. 이렇게 해서 유사한 지문영상을 유사도에 따라 출력한다.

  • PDF

A Study of Automatically Resources Authentication over Grid VO (그리드 VO 상에서의 자동화된 자원 인증 시스템 연구)

  • 이원구;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.739-743
    • /
    • 2004
  • The Grid VO(Virtual Organization) is temporary VO where gather indivisual, authority, or system resource, differ from previous VO concept that controled by internal principal and policy set. It have many problems in case of indivisuals, authorities, or system resources that became member of some Grid VO at same time and combination followed changing condition of system resource for building Grid VO. This paper propose lightweighted Grid VO authentication system based on XML security to solve the authentication of the problems occuring in building Grid VO. In this paper, Grid VO authentication system is including Grid VO authentication module that is intermediate management system in PKI to previous authentication service structure and provide effective authentication service to Grid VO.

  • PDF

Active Network Performance Improvement for Security Application (보안 응용을 위한 능동 네트워크 성능 향상 방안)

  • 채철주;이명선;김상국;임정목;이성현;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.416-419
    • /
    • 2004
  • Computer simulation has used to a area of military training in recent years. Computer simulation endow a military nan with field raining such as combat experience without operating combat strength or capabilities. To samely construct simulation environment against actual combat environment is to well construct ㏈ to operate war game model, associate among federates on network. we construct virtual combat environment enabling to efficiently manage network traffic among federates(or active nodes) on active network that construct virtual military training spare such as urgent combat field needed to rapidly transfer combat information including image and video.

  • PDF

Cut off of Smartcard Forgery and Alteration Based on Holographic Security Encryption (홀로그래픽 암호화 기법을 적용한 스마트카드 위.변조 차단)

  • Jang, Hong-Jong;Lee, Seong-Eun;Lee, Jeong-Hyeon
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.173-180
    • /
    • 2002
  • Smartcard is highlighted as infrastructure that has an excellent security for executing functions such as user authentication, access control, information storage and control, and its market is expanding rapidly. But possibilities of forgery and alteration by hacking are increasing as well. This Paper makes cut off of Smartcard forgery and alteration that use angular multiplexing and private key multiplexing hologram on holographic security Encryption, and proposes system capable verfication of forgery and alteration impossible on existing smartrard by adopting smartcard chip and holographic memory chip.

Implementation of Secure I-Mail System based on lava (타원곡선 알고리즘을 이용한 안전한 자바 메일 시스템의 설계 및 구현)

  • 이원구;조한진;이재광
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.700-702
    • /
    • 2001
  • As computers and networks become popular, distributing information on the Interment is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mall is gamins popularity abroad and domestically because of their nature of prodding security. That is. it has been used a variety of fields such as general mail and e-mail for advertisement But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mall system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design implement secure mall system with non-repudiation service and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

  • PDF

A Basic Study on the Development of Standard Service Model Provided by Korea Coast Guard at Fishing Port (어항의 해양경찰 서비스 표준 모델개발에 관한 기초 연구)

  • Park, Seong-Ryong;Jin, Sung-Yong;Ju, Jong-Kwang;Lee, Eun-Bang
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2008.05a
    • /
    • pp.25-31
    • /
    • 2008
  • In order to develope the standard service model of coast guard at fishing ports, which responses to the demand of users and provides them with the good and tailored maritime administration services with limited resources, the services of Korea coast guard related to fishermen are sorted and their demands are analyzed at Nokdong fishing port. The standard service model for Nokdong on the basis of user's requests and maritime administration demands in the future is designed.

  • PDF