• Title/Summary/Keyword: 블록체인 네트워크

Search Result 237, Processing Time 0.021 seconds

A Study on the Protection of Creators' Rights Using Social Media for Non-fungible Token Marketplaces (대체 불가능 토큰 마켓플레이스를 위한 소셜미디어를 활용한 창작자 권리 보호 방법에 대한 연구)

  • Lee, Eun Mi
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.667-673
    • /
    • 2021
  • Unauthorized generations and sales of non-funable tokens (NFTs) without the consent of the creator is one of the biggest problems that arise in NFT Marketplaces. This study proposes a method to practically reduce the problem of NFT sales without the consent of the creator by means of authentication with social media accounts. Through the proposed method, creators who are already using social media as a means of communication and marketing for creative activities can authenticate with their own accounts. Creators who have difficulty authenticating with their own accounts will be provided with alternatives to authenticate using human networks. In addition, the proposed method of protecting creator rights was designed using a flowchart to enable development using only the public API (Application Programming Interface) provided by social media. The proposed method can protect creators' rights and reduce damage caused by NFT fraud by inducing buyers to trade NFTs of authorized sellers through social media.

How to Prove the Identity of Artist When Creating Non-fungible Tokens (대체불가능 토큰을 생성할 때 어떻게 예술가의 신원을 증명할까?)

  • Kim, Taekyung;Yang, Ji Yeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.669-676
    • /
    • 2022
  • Non-fungible tokens (NFTs) have the advantage of being able to reliably manage details after minting, but how can ideas be protected before being converted to NFTs? The use of NFTs to increase the value of digital assets is increasing, but the problem of creating and selling NFTs without the consent of the creator is also increasing. Existing methods for protecting creators include a method of using a traditional authentication system and a method of using a social network, but each has limitations. Therefore, in this study, an identity token utilization method is proposed as a way to supplement the existing limitations. When an identity token is used, a certified NFT is issued through an existing identity authentication authority, so the verification of the authenticity of the token becomes clear. In addition, in inheritance and transfer, it becomes possible to respond to legal problems related to the transfer of creative rights.

N-WPA2: Practical WPA2 Without Key Exchange of 4-way Handshake Using NFT Authentication (NFT를 이용한 4-방향 핸드셰이크의 키 교환이 없는 실용적인 WPA2)

  • Tae-Young Eun;Alshihri Saad;Soo-Yong Park
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.197-208
    • /
    • 2023
  • In the coming future, anyone using the Internet will have more than one NFT. Unlike FT, NFT can specify the owner, and tracking management is easier than FT. Even in the 2022 survey, WPA2 is the most widely used wireless protocol worldwide to date. As it is a protocol that came out in 2006, it is a protocol with various vulnerabilities at this time. In order to use WPA2-EAP or WPA3 (2018), which were released to compensate for the vulnerabilities of WPA2, additional equipment upgrades are required for STA (station) and AP (access point, router), which are connected devices. The use of expensive router equipment solves the security part, but it is economically inefficient to be introduced in Small Office Home Office (SOHO). This paper uses NFT as a means of authentication and uses the existing WPA2 as it is without equipment upgrade, defend crack tools of WPA2 that have been widely used so far and compared to the existing WPA2, it was shown that it was not difficult to actually use them in SOHO.

Enhancing Throughput and Reducing Network Load in Central Bank Digital Currency Systems using Reinforcement Learning (강화학습 기반의 CBDC 처리량 및 네트워크 부하 문제 해결 기술)

  • Yeon Joo Lee;Hobin Jang;Sujung Jo;GyeHyun Jang;Geontae Noh;Ik Rae Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.129-141
    • /
    • 2024
  • Amidst the acceleration of digital transformation across various sectors, the financial market is increasingly focusing on the development of digital and electronic payment methods, including currency. Among these, Central Bank Digital Currencies (CBDC) are emerging as future digital currencies that could replace physical cash. They are stable, not subject to value fluctuation, and can be exchanged one-to-one with existing physical currencies. Recently, both domestic and international efforts are underway in researching and developing CBDCs. However, current CBDC systems face scalability issues such as delays in processing large transactions, response times, and network congestion. To build a universal CBDC system, it is crucial to resolve these scalability issues, including the low throughput and network overload problems inherent in existing blockchain technologies. Therefore, this study proposes a solution based on reinforcement learning for handling large-scale data in a CBDC environment, aiming to improve throughput and reduce network congestion. The proposed technology can increase throughput by more than 64 times and reduce network congestion by over 20% compared to existing systems.

ICT Trend Analysis Based on Research Papers and Patents (논문 및 특허 기반의 ICT 동향 분석 연구)

  • Son, Yeonbin;Kim, Solha;Choi, Yerim
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.12
    • /
    • pp.1-18
    • /
    • 2021
  • ICT is the main driving force of Korea's economic growth. Korea has the world's best ICT competitiveness, and several policies are being implemented to maintain it. However, for successful policy implementation, it is crucial to understand ICT trends accurately. Therefore, this study analyzes the trends of 18 core technologies in the ICT field. In particular, the degree of scientific development and commercialization by technology are investigated through research paper analysis and patent analysis, respectively. Then, the trends shown by document type are compared based on the two analysis results. As a result, artificial intelligence and virtual reality are at the stage where commercialization is actively taking place after scientific development, and at the same time, since research is being conducted, it is expected to develop continuously. On the other hand, quantum computer and implantable device are in the basic research stage. It is necessary to understand the current research status and determine the direction of future support. The results of the ICT trend analysis conducted in this study can be used as a criterion for determining the future direction of Korean policy.

NBAS: NFT-based Bluetooth Device Authentication System (NBAS: NFT를 활용한 블루투스 장치 인증시스템)

  • Hwang, Seong-Uk;Son, Sung-Moo;Chung, Sung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.793-801
    • /
    • 2022
  • Most Bluetooth devices are commonly used in various ways these days, but they can be often lost due to small-size devices. However, most Bluetooth protocol do not provide authentication functions to legitimate owners, and thus someone who obtains the lost Bluetooth device can easily connect to their smart devices to use it. In this paper, we propose NBAS can authenticates legitimate owners using NFT on lossy Bluetooth devices.NBAS generates a digital wallet on the blockchain using the decentralized network Ethereum blockchain and facilitating the MAC address of the Bluetooth device in the digital wallet. The owner of the wallet uses a private key to certify the Bluetooth device using NFT. The initial pairing time of NBAS was 10.25 sec, but the reconnection time was 0.007 sec similar to the conventional method, and the pairing rejection time for unapproved users was 1.58 sec on average. Therefore, the proposed NBAS effectively shows the device authentication over the conventional Bluetooth.

Encryption Method Based on Chaos Map for Protection of Digital Video (디지털 비디오 보호를 위한 카오스 사상 기반의 암호화 방법)

  • Yun, Byung-Choon;Kim, Deok-Hwan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to the rapid development of network environment and wireless communication technology, the distribution of digital video has made easily and the importance of the protection for digital video has been increased. This paper proposes the digital video encryption system based on multiple chaos maps for MPEG-2 video encoding process. The proposed method generates secret hash key of having 128-bit characteristics from hash chain using Tent map as a basic block and generates $8{\times}8$ lattice cipher by applying this hash key to Logistic map and Henon map. The method can reduce the encryption overhead by doing selective XOR operations between $8{\times}8$ lattice cipher and some coefficient of low frequency in DCT block and it provides simple and randomness characteristic because it uses the architecture of combining chaos maps. Experimental results show that PSNR of the proposed method is less than or equal to 12 dB with respect to encrypted video, the time change ratio, compression ratio of the proposed method are 2%, 0.4%, respectively so that it provides good performance in visual security and can be applied in real time.