• Title/Summary/Keyword: 도메인 키

Search Result 66, Processing Time 0.026 seconds

Rights Management Service for Contents Transfer of Mobile Users (이동 통신 사용자의 컨텐츠 교환을 위한 권한 관리 서비스)

  • 장경아;이병래
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.373-375
    • /
    • 2003
  • 본 논문에서는 이동 통신 사용자 기기의 한계적 계산 능력 및 무선 링크의 대역폭과 디지털 컨텐츠 제공자와의 연결을 고려하여 선택적 Proxy 서비스를 수용한 컨텐츠 교환 목적의 권한 관리 서비스 프로토콜을 제안하였다. 제안한 서비스는 이동 통신 사용자 기기의 한계적 능력에 대해 해당 도메인의 Proxy와 공개키를 기반으로 인증 서비스를 수행하도록 하였으며, 이후 종단 사용자는 해당 인증 결과를 기반으로 인터넷 기반의 디지털 컨텐츠 제공자와의 메시지 교환을 수행하도록 하였다. 또한 사전에 인터넷 기반 구조에 대한 컨텐츠 교환 서비스 요청에 한하여 Proxy의 부분적 서비스를 수행하도록 허용하여 시스템의 대단위 계산 능력에 대한 효율성을 보장할 수 있다.

  • PDF

Color Image Zero-Watermarking on DCT Domain through Comparison of Two Channels (두 채널 비교를 통한 DCT 영역 컬러 이미지 제로-워터마킹)

  • Kim, HyoungDo
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.9
    • /
    • pp.11-20
    • /
    • 2015
  • Digital watermarking provides electronic means for proving the copyrights of distributed digital media copies. Research on digital watermarking for images is recently directed toward that for color images extensively used in real life, based on the substantial results in digital watermarking for gray-scale images. Color images have multiple channels, each of which corresponds to a gray-scale image. While there are some watermarking techniques for color images that just apply those for gray-scale images to one channel of the color images, the correlation characteristics between the channels are not considered in them. This paper proposes a zero-watermarking technique that makes keys via combining an image dependent watermark, created through comparing two channels of the color image and copyright watermark scrambled. Due to zero-watermarking, it does not change anything of cover(host) images. Watermark images are robust against some common attacks such as sharpening, blurring, JPEG lossy compression, scaling, and cropping.

Multimedia Statistic Post-office Box System using Fuzzy Filtering Structures (퍼지 필터링 구조를 이용한 멀티미디어 통계 사서함 시스템)

  • Lee Chong Deuk;Kim Dae Kyung
    • The KIPS Transactions:PartB
    • /
    • v.11B no.6
    • /
    • pp.709-716
    • /
    • 2004
  • According to the current increase of the usefulness of information by Internet Communication network, several methods are proposed in which a specific domain information nay be efficiently constructed and serviced. This paper proposes Relationship Grouping of Fuzzy Filtering Objects for Multimedia Statistic Post-office Box Construction. The proposed method exploits RelCRO( $D_{omain}$, Gi), RelSRO( $D_{omain}$, Gi) and FAS in order to group using (equation omitted)-cut. To know how well the proposed method is able to work, this paper have test against the methods with 1600 items of multimedia type information, and our system are compared with Random-Key, OGM and the proposed method. The results shows that the proposed method provides the better performance than the other methods.

Design and Implementation of a Augmentative and Alternative Communication System Using Sentence Generation (문장생성에 의한 통신보조시스템의 설계 및 구현)

  • Woo Yo-Seop;Min Hong-Ki;Hwang Ein-Jeong
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.9
    • /
    • pp.1248-1257
    • /
    • 2005
  • This paper designs and implements a sentence generation for an augmentive and alternative communication system(AAC). The AAC system is assistive communication device to help the mute language disorder communicate more freely and the system have an objected to reduce time and keystrokes for sentence generating. The paper of sentence generation make up for merits and demerits in the existing sentence generation method and in order to sentence generation. One aspect of Korean language that confines nouns defending on the verbs or postpositional words is used for sentence generation. The distinctive feature of this paper is to connect verbs to nouns using domain knowledge. We utilize the lexical information that exploits characteristics of Korean language for sentence generation. A comparison with other approaches is also presented. This sentence generation is based on lexical information by extracting characteristics of sentences.

  • PDF

Improved Time Checking Scheme for Detecting Malicious Host (악의적인 호스트 검출을 위한 개선된 타임 체킹 기법)

  • Jeong Don Yeom;Dong Hyun Kang;Hyunsu Jang;Young Ik Eom
    • Annual Conference of KIPS
    • /
    • 2008.11a
    • /
    • pp.1525-1528
    • /
    • 2008
  • 이동 에이전트는 분산 컴퓨팅 환경에서 유용하게 쓰이는 컴퓨터 통신 분야의 새로운 응용기술이지만, 에이전트가 이동함으로써 발생하는 여러 가지 보안상의 문제점들을 가지고 있다. 특히, 악의적인 호스트로부터 이동 에이전트를 보호하는 방법의 중요성이 점점 높아지고 있으며, 타임 체킹 기술을 이용한 보호 기법 등이 기존에 제안되었다. 그러나 기존에 제안된 타임 체킹 기술은 데이터를 누적함으로써 네트워크 부하를 초래할 수 있다. 또한, 동일한 도메인 내에서는 동일한 세션키를 사용하여 에이전트를 암호화함으로써 타임 체킹 기법의 중요한 데이터인 에이전트 도착 및 출발 시간이 조작될 가능성이 있다. 본 논문에서는 기존에 제안된 타임 체킹 기술을 기반으로 에이전트의 누적 데이터 크기를 제한하여 네트워크 부하를 줄일 수 있는 기법과 RSA 암호화 기법을 사용하여 이미 기록된 에이전트의 도착 및 출발 시간 조작을 방지할 수 있는 기법을 제안한다.

3S: Scalable, Secure and Seamless Inter-Domain Mobility Management Scheme in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 3S를 고려한 도메인간 이동성관리 기법)

  • Kang, Min;Jeong, Jong-Pil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.99-114
    • /
    • 2012
  • Proxy Mobile IPv6 (PMIPv6) has received considerable attention between telecommunications and the Internet communities and does not require active participation of the Mobile Node (MN) by way of network-based mobility management. The PMIPv6 domain is studying establishment in progress to support extensively a number of MN by using a low handover latency. In this research, we are propose a novel 3S scheme for building Scalable and Secure and Seamless PMIPv6 domains. In the proposed scheme, all of Mobility Access Gateway (MAG) are acting as the Local Mobility Anchor (LMA) and composing a virtual ring with another MAG. General hashing is used in the efficient distribution-mapping between each MN and the MN's LMA of all MAGs. And, MAG and MN are authenticated using the symmetric key. Through mathematical analysis, we verifies the safety, scalability, and seamless service for 3S. Also, we're propose a handover procedure of 3S and show better than the existing schemes in terms of handover latency.

A Credit Card based Payment Protocol Assuring End-to-End Security in Wireless Internet (무선인터넷에서의 종단간 보안을 제공하는 신용카드 기반의 지불 프로토콜)

  • 임수철;강상승;이병래;김태윤
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.645-653
    • /
    • 2002
  • The WPP payment protocol uses the WAP protocol to enable credit card payment on the wireless internet. Since the security of the WAP protocol is based on the WTLS security protocol, there exists an end-to-end security weakness for the WPP payment protocol. This paper is suggesting a payment protocol, which is making use of the Public-Key Cryptosystem and the Mobile Gateway, so assuring end-to-end security independently of specific protocols. As the on-line certification authority is participating on the authentication process of the payment protocol, the suggested payment protocol enables wireless devices to get services from service providers on other domains.

A Study on the Localized Key Management Using AAA in Mobile IPv6 (Mobile IPv6 상에서 AAA 기반의 지역화된 키 관리 기법에 관한 연구)

  • Kim Mi-Young;Mun Young-Song
    • Journal of Internet Computing and Services
    • /
    • v.4 no.1
    • /
    • pp.19-25
    • /
    • 2003
  • Mobile IPv6 services exposes its vulnerability when a mobile node is roaming across the subnets which belongs to the different domains. The AAA Infrastructure Is strongly recommended when the ISPs need to authenticate the mobile user come from the different domains. In addition to the basic requirements for AAA service, the authentication latency and AAA message overhead should be minimized for contiguity of the service. This paper considers the roaming service with AAA infra structure in Mobile IPv6 and proposes the key distribution method to authenticate the mobile node with secure manner by reducing and optimizing the exchanged messages for AAA entities.

  • PDF

Identity-Based Secure Many-to-Many Multicast in Wireless Mesh Networks (무선 메쉬 네트워크에서의 아이디 기반 프록시 암호화를 이용한 안전한 다대다 멀티캐스트 기법)

  • Hur, Jun-Beom;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.1
    • /
    • pp.72-83
    • /
    • 2010
  • Group communication in a wireless mesh network is complicated due to dynamic intermediate mesh points, access control for communications between different administrative domains, and the absence of a centralized network controller. Especially, many-to-many multicasting in a dynamic mesh network can be modeled by a decentralized framework where several subgroup managers control their members independently and coordinate the inter-subgroup communication. In this study, we propose a topology-matching decentralized group key management scheme that allows service providers to update and deliver their group keys to valid members even if the members are located in other network domains. The group keys of multicast services are delivered in a distributed manner using the identity-based encryption scheme. Identity-based encryption facilitates the dynamic changes of the intermediate relaying nodes as well as the group members efficiently. The analysis result indicates that the proposed scheme has the advantages of low rekeying cost and storage overhead for a member and a data relaying node in many-to-many multicast environment. The proposed scheme is best suited to the settings of a large-scale dynamic mesh network where there is no central network controller and lots of service providers control the access to their group communications independently.

Sender Authentication Mechanism based on DomainKey with SMS for Spam Mail Sending Protection (대량 스팸메일 발송 방지를 위한 SMS 기반 DomainKey 방식의 송신자 인증 기법)

  • Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.4
    • /
    • pp.20-29
    • /
    • 2007
  • Although E-mail system is considered as a most important communication media, 'Spam' is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Therefore advanced anti-spam techniques are required to basically reduce its transmission volume on sender mail server or MTA, etc. In this study, we propose a new sender authentication model with encryption function based on modified DomainKey with SMS for Spam mail protection. From the SMS message, we can get secret information used for verification of its real sender on e-mail message. And by distributing this secret information with SMS like out-of-band channel, we can also combine proposed modules with existing PGP scheme for secure e-mail generation and authentication steps. Proposed scheme provide enhanced authentication function and security on Spam mail protection function because it is a 'dual mode' authentication mechanism.