• Title/Summary/Keyword: 기능카드

Search Result 418, Processing Time 0.028 seconds

Issues and Preventions of Insider Information Leakages in Public Agencies for National Security: Cyber Security and Criminal Justice Perspectives (국가안보를 위한 공공기관의 내부자 정보 유출 예방대책: 사이버 안보·형사정책 관점)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.167-172
    • /
    • 2016
  • The purpose of this study is to provide implications for preventing insider information leakages in public agencies for national security. First, the study examined the definitions and current usage of information security systems of public agencies were examined. Second, web-service base information leaks and malware-base information leaks were discussed and three major credit card companies' personal information leakage cases were analyzed. Based on the analysis, four solutions were provided. First, information leakages can be protected by using web filtering solutions based on the user, which make possible to limit frequencies of malware exposures. Second, vaccine programs and vaccine management system should be implemented to prevent information leakages by malware. Third, limit the use of portable devices within local networks to prevent information leakages and vaccines programs for malware should be regularly used. Forth, to prevent information leakages by smartphone malwares, data encryption application should be used to encrypt important information.

Fabrication of smart alarm service system using a tiny flame detection sensor based on a Raspberry Pi (라즈베리파이 기반 미소 불꽃 감지를 이용한 스마트 경보 서비스 시스템 구현)

  • Lee, Young-Min;Sohn, Kyung-Rak
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.9
    • /
    • pp.953-958
    • /
    • 2015
  • Raspberry Pi is a credit card-sized computer with support for a large number of input and output peripherals. This makes it the perfect platform for interaction with many different devices and for usage in a wide range of applications. When combined with Wi-Fi, it can communicate remotely, therefore increasing its suitability for the construction of wireless sensor nodes. In addition, data processing and decision-making can be based on artificial intelligence, what is performed in developed testbed on the example of monitoring and determining the confidence of fire. In this paper, we demonstrated the usage of Raspberry Pi as a sensor web node for fire-safety monitoring in a building. When the UV-flame sensors detect a flame as thin as that of a candle, the Raspberry Pi sends a push-message to notify the assigned smartphone of the on-site situation through the GCM server. A mobile app was developed to provide a real-time video streaming service in order to determine a false alarm. If an emergency occurs, one can immediately call for help.

Certified Key Management in Multi K-FIDO Device Environment (복수 K-FIDO 기기 환경에서의 인증키 관리)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.293-303
    • /
    • 2017
  • FIDO(Fast IDentity Online) technology is expanding very rapidly which can replace traditional password-based authentication with biometrics technology[1,7]. FIDO provides convenient authentication with biometrics technology and secure key management with smart card technology, but it does not provide user identification, thus traditional user identification technology should be used before a FIDO device is registered to a FIDO server. K-FIDO[3] is an approach to implement FIDO and certificate-based authentication technology into a single device that user can utilize certificate-based authentication in initial registration of FIDO device to FIDO server. It is expected that very shortly users will own and use multiple K-FIDO devices. If we consider the traditional approach of copying single certificate to multiple devices or issuing independent certificate to each device, there will be many complex problems. In this paper we propose more secure and convenient key management technology in multiple K-FIDO device scenario using self-extended certification[4].

Digital Contents Protection Without Server Authentication Using Smart Cards (스마트 카드를 이용한 서버 인증이 필요 없는 디지털 콘텐츠 보호 기법)

  • Kim, Young-Sik;Lim, Dae-Woon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3C
    • /
    • pp.133-139
    • /
    • 2011
  • Nowadays, it is considered as an important task to protect digital contents from illegal use and reproduction. In many cases, there are secure servers to authenticate the allowed users and the user authentication process is performed by communication between the servers and users. However, if the number of users and contents are increased, the servers should treat a large amount of authentication loads and the authentication cost will be considerably increased. Moreover, this scheme is not adequate for some players in which only a limited function of communication is deployed. In order to solve this problem, this paper proposes an authentication method which can certificate both the digital contents and players, and prevent illegal reproduction without the certification server. The proposed scheme is secure in the replay attack, the man in the middle attack, and data substitution attack.

A Study on Implementation of a VXIbus System Using Shared Memory Protocol (공유메모리 프로토콜을 이용한 VXIbus 시스템 구현에 관한 연구)

  • 노승환;강민호;김덕진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.9
    • /
    • pp.1332-1347
    • /
    • 1993
  • Existing instruments are composed independently according to their function and user constructed instrumentation system with those instruments. But in the late 1980s VXI bus enables to construct instrumentation system with various modular type instruments. For an VXI bus system with the word serial protocol, an increase of data size can degrade the system performance. In this paper shared memory protocol is proposed to overcome performance degradation. The shared memory protocol is analyzed using the GSPN and compared with that of the word serial protocol. It is shown that the shared memory protocol has a better performance than the word serial protocol. The VXI bus message based-system with the proposed shared memory protocol is constructed and experimented with signal generating device and FFT analyzing device. Up to 80 KHz input signal the result of FFT analysis is accurate and that result is agree with that of conventional FFT analyzer. In signal generating experiment from 100 KHz to 1.1 GHz sine wave is generated.

  • PDF

Cloning and Expression of Phytochelatin Synthase 1 Gene from Rhizophora stylosa Exposed to Cadmium and Copper (카드뮴과 구리에 노출된 Rhizophora stylosa 의 phytochelatin synthase 1 유전자 클로닝 및 발현)

  • Lee, Gunsup;Hwang, Jinik;Park, Mirye;Chung, Youngjae;Lee, Taek-Kyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.6
    • /
    • pp.3114-3119
    • /
    • 2013
  • The mangrove ecosystems have the capacity to act as a sink of heavy metals entering aquatic ecosystems. Despite their potential exposure to metal contaminated sediments, mangroves appear to be highly tolerant to heavy metals. In this study, we cloned metal tolerance gene from mangrove plant. Using CTAB method, RNA were isolated from leaves and root tissue of Rhizophora stylosa habitated at Weno island in Micronesia Chuuk lagoon using CTAB method and phytochelatin synthase 1 (PCS1) gene was cloned using gene specific primers. Expression of PCS1 gene was increased 1.91 fold and 2.72 fold in mangrove propagules exposed to 100 ppb Cd and 10 ppb Cu, respectively. These results indicate that expression of PCS1 gene are promising tools for health assessment of mangrove ecosystem.

Development of Radiation Shield with Environmentally-Friendly Materials ; Ⅰ: Comparison and Evaluation of Fiber, Rubber, Silicon in the Radiation Shielding Sheet (친환경 소재의 의료 방사선 차폐 시트 개발 ; I: 섬유, 고무, 실리콘 소재 차폐 시트의 성능 비교평가)

  • Kim, Seon-Chil;Park, Myeong-Hwan
    • Journal of radiological science and technology
    • /
    • v.33 no.2
    • /
    • pp.121-126
    • /
    • 2010
  • Traditionally, lead has been primarily used to shield the radiation in the hospital, because of its soft texture, durability and cost effectiveness. However, lead can be dangerous because of its toxicity when exposed to the human body, and it is classified as a heavy metal like cadmium, mercury, and arsenic etc. In order to compensate its noxious properties on the human body, researchers are trying to develop a radiation shield which has similar shielding efficiency and can also be manufactured in any form. In this study, sulfuric acid barium was mixed with fiber, rubber, and silicon all of which are harmless to the human body, tested, and evaluated for its ability of medical radiation shield. The result of this study showed that the sheet containing silicon and barium has the strongest shielding abilities.

Technology Trends, Research and Design of AIM Framework for Authentication Information Management (인증 정보 관리를 위한 기술 동향과 AIM 프레임워크 연구 및 설계)

  • Kim, Hyun-Joong;Cha, Byung-Rae;Pan, Sung-Bum
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.373-383
    • /
    • 2016
  • With mobile-epoch and emerging of Fin-tech, Bio-recognition technology utilizing bio-information in secure method has spread. Specially, In order to change convenient payment services and transportation cards, the combination of biometrics and mobile services are being expanded. The basic concept of authentication such as access control, IA&A, OpenID, OAuth 1.0a, SSO, and Biometrics techniques are investigated, and the protocol stack for security API platform, FIDO, SCIM, OAuth 2.0, JSON Identity Suite, Keystone of OpenStack, Cloud-based SSO, and AIM Agent are described detailed in aspect of application of AIM. The authentication technology in domestic and foreign will accelerate technology development and research of standardization centered in the federated FIDO Universal Authentication Framework(UAF) and Universal 2 Factor Framework(U2F). To accommodate the changing needs of the social computing paradigm recently in this paper, the trends of various authentication technology, and design and function of AIM framework was defined.

An Experience Type Virtual Reality Training System for CT(Computerized Tomography) Operations (컴퓨터 단층 촬영기(CT)의 가상 실습을 위한 3차원 체험형 교육 시스템)

  • Shin, Yong-Min;Kim, Young-Ho;Kim, Byung-Ki
    • The KIPS Transactions:PartD
    • /
    • v.14D no.5
    • /
    • pp.501-508
    • /
    • 2007
  • Simulation system was introduced and used a lot in the fields of aviation, vessel, and medical treatment. 3D Simulation system has been used quite insufficiently as it requires a lot of system resource and huge amount of computer calculation. As the graphic card performance and simulation function developed, however, PC based simulation has been activated and is verified of its possibility as an educational software. However, educational institutions need to invest huge amount of budget and manpower to purchase and maintain CT Equipment. For such a reason, educational institutions entrust their students to hospitals for indirect experience of operation or for mere observation. This study, therefore, developed a CT Virtual reality education system with which medical CT Equipment can be directly operated in PC based 3D Virtual environment.

Implementation of Remote Control System using TeleRemote System (TeleRemote를 이용한 원격 제어 시스템 구현)

  • 김상복;한성호;진현준;박노경
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12B
    • /
    • pp.1115-1123
    • /
    • 2003
  • In this paper, a remote control system called TeleRemote system which can be applied to existing wireless mobile networks or public telephone networks for remote control is designed and implemented. The proposed design employs program technology based on the theory of signal detect control and enables the EPG(Electronic Program Guide) functions such as recording reservation of bidirectional video signals with TV reception card on PC. It can also control recording reservation using remote control program through telecommunication network The PC-EPG system is implemented in Web programs with Server/Clinet architecture and the server system that provides EPG functionalities is in charge of recording reservations and data communications by means of the scheduler program. Data storing to client PCs is performed through TCP/IP and finished by client programs implemented using Visual C++/MFC programs. As remote control system, the developed system can be used for unmanned security system using the Web camera. Building intranet and making connection to internet, the TeleRemote system is believed to create potential for commercial communication system.