• Title/Summary/Keyword: 안전성 강화

Search Result 1,266, Processing Time 0.032 seconds

BCON : Blockchain-based Content Management Service Using DID

  • Kim, Hye-Won;Lee, Young-Eun;Kwon, Min-Ho;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.97-105
    • /
    • 2021
  • In this paper, we propose BCON, a service that allows individuals to store personal contents safely, and reliably guarantee their ownership of contents, certifying their identities with DIDs(Decentralized identifiers). DID technology, which supports decentralized identification service based on a blockchain that cannot forgery or alter data, allows users to selectively provide their information, controlling personal information and reinforcing their sovereignty over their identity. BCON stores information about the content specified by a user on the blockchain and Authenticates the user's identity based on DID technology. It also provides functions for the user to safely upload and download the user's content to a distributed database. BCON consists of the content service verifier, the content storage service, the content management contract, and the user application, administrating rhe DID registry for Authority management.

A Study on the Interaction Factors in Implementing Virtual Reality to Solve Safety Problems in Public Toilets (공중화장실의 안전문제 해결 위한 가상현실 구현 시 상호작용 요소 연구)

  • Shin-Sook, Yoon;Jeong-Hwa, Song
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1167-1174
    • /
    • 2022
  • In this study, it was considered that not only the physical form should be electronically copied in virtual reality modeling for real problem solving, but also the interrelationship between the object and the user to be simulated. To this end, a plan was proposed to add user-space interaction elements that occur in real space to virtual reality application. This study is set in virtual reality modeling to solve safety problems in public toilets, and there should be a reasonable principle to add interaction elements with users to virtual reality modeling, and the basic environmental design strategy for crime prevention was used. As a result, it was shown that it was reasonable to derive interaction elements according to certain principles, such as the basic strategy for environmental design for crime prevention.

Robust Detection Technique for Abandoned Objects to Overcome Visual Occlusion (시각적 가려짐을 극복하는 강인한 유기물 탐지 기법)

  • Kim, Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.23-29
    • /
    • 2010
  • Nowadays it is required to design intelligent visual surveillance systems which automatically detect abandoned objects in public places to strengthen the social safety. Already recognized abandoned objects can be occluded partially or fully by surrounding people in public places after the first recognition. To improve an essential recognition performance index PAT, the system should overcome the occlusion problems. In this research, a design scheme is newly proposed to construct the robust detection system which is comprised of multiple stages considering the occlusion problem. To show the feasibilities of the proposed system, the evaluation was tried for the prepared image streams including 6 various situations and the experimental results show 96% and 75% in PAT performance for intrusion and abandoning events, respectively. Finally in spite of full occlusions by multiple persons, the proposed system shows the capability to continuously recognize the abandoned object after complex occlusions disappear.

Design of an Authentication Protocol for Privacy Protection in RFID Systems (RFID 시스템에서 프라이버시 보호를 위한 인증프로토콜 설계)

  • Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.155-160
    • /
    • 2012
  • This paper proposes an authentication protocol based on hash and AES safe from various types of attacks in order to assure the security of communication between tags and readers, which exchange data with each other wirelessly in a RFID system. The proposed authentication protocol resolves a problem in existing hash-based protocols whereby the same hidden value is generated for the same identification in each session. In order to hide tag identification information a number of complicated calculations were required, but using the proposed AES protocol reduces such calculations, strengthens security against replay attack, spoofing attack, traffic analysis, eavesdropping, etc. and assure mutual authentication between tags and readers.

Study of the Improvement of Hazardous Chemical Management for Chemical Accident Prevention (화학사고 예방을 위한 유해화학물질 관리 개선 연구)

  • Lee, Deok-Jae;Lee, Tae-Hyung;Shin, Chang-Hyun
    • Fire Science and Engineering
    • /
    • v.31 no.1
    • /
    • pp.74-80
    • /
    • 2017
  • Chemicals are convenient for humans but the damage caused by hazardous chemicals can be widespread if they are not managed properly. The Chemical Substance Management Act strengthened the management of hazardous chemicals and the management of handling facilities. On the other hand, an analysis of chemical accidents occurring in the past 4 years showed that chemical accidents occurring at the handling facilities are increasing, and additional preventive measures are needed. In this study, to prevent chemical accidents of hazardous chemicals, the causes and problems of accidents were analyzed through the case study of chemical accidents and measures for improvement are proposed.

Enhanced Password Based User Authentication Mechanism Using Mobile Storage Medium/Channel (이동 저장매체를 활용한 패스워드 기반 사용자 인증 강화 방안)

  • Kim, Seon-Young;Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.533-540
    • /
    • 2014
  • As for the application system or the user authentication scheme that is used in the system, various technologies including simple ID/PW, certificate, fingerprint/iris, phone, security card, and OTP are being used. But simple ID/PW and phone certification lack security features. As for the certificate, fingerprint/iris, and security card/OTP, the weakness in security has been quite strengthened, but there are costs and complexity involved to use these. This paper proposes a new measure of much safer and low-cost user authentication that improves the security level and uses mobile external storage media such as USB that people commonly have.

Realization of the Information Visualization of Electric Power Monitoring System for MV/LV Distribution Customers (중소규모 수용가용 전력감시시스템에서의 정보시각화 구현에 관한 연구)

  • 강봉석;김재철;문종필;박기주;권영복
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.2
    • /
    • pp.157-166
    • /
    • 2004
  • Recently, switchboards for MV/LV distribution customers have been united and digitalized rapidly. This paper suggestes the effective information visualization method for the data mesured from cubicle switchboard for MV/LV distribution customers. We developed the algorithm that analyzes a large number of mesured data and displays them to users overall, such as fire index, power condition index, switchboard safety index, and power diminution index. Using a touch screen made users to operate it easily. User interface was also strengthened by taking graph visualization. We guess the information visualiztion method suggested in this paper shows the new direction that heavy electrical equipments including switchboards are going to develop in the future.

A design of the security protocol in Optical Burst Switching Networks (OBS 기반 광 네트워크에서 정보보호 프로토콜 설계)

  • Kim Soo-hyeon;No Sik-sun;Ahn Joung-chol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.7
    • /
    • pp.1518-1523
    • /
    • 2005
  • With the expansion of service over the internet, the recent network demands the amount of the more bandwidth and fast transfer rate. Optical Burst Switching has considered as a promising solution for supporting high-speed Internet Service. Because of OBS architecture, it has the security threats such as eavesdropping, masquerading, denial of service and so on. In this Paper, We analyze OBS-specific security threats and requirement for supporting security protocol n OBS networks. We propose an authentication and key exchange protocol for supporting the security service. This protocol supports explicit key authentication by using the control messages and protects the control message by using the session key.

고효율 모터

  • 대한전기협회
    • JOURNAL OF ELECTRICAL WORLD
    • /
    • s.295
    • /
    • pp.68-73
    • /
    • 2001
  • 최근 들어서는 지구환경보호와 에너지자원 고갈의 위기감 속에 에너지절약기기의 니즈가 급속하게 가속화되고 있다. 산업분야에서의 에너지절약기기로서는 고효율모터나 인버터가 사용되고 있는데 아직 이들 기기의 보급률은 낮은 실정이다. 점차 에너지절약기기에 대한 관심이 높아 가는 가운데, 한편 산업용전력 사용량의 약 70$\%$를 모터가 차지하고 있다고 알려지고 있으며 모터 유닛의 손실 삭감으로 큰 에너지절약 효과를 기대할 수 있기 때문에 3상모터의 고효율화 요구와 인버터구동에 의한 에너지절약니즈가 급속히 퍼지고 있다. 3상모터의 에너지절약 니즈에는 위험지구(폭발성 분위기) 안에서 사용되는 용도도 많아 이와 같은 위험장소에서 사용되는 방폭전기기기에서는 1993년의 국제규격(IEC 규격)에 정합(整合)된 신JIS 방폭규격의 발행으로 정전의 일본독자적인 방폭규격은 폐지되고 이 새로운 JIS 방폭규격에의 통합 움직임이 있었다. 미쓰비시전기는 이와 같은 동향에 대응하기 위하여 고성능$\cdot$에너지절약 모터 ''수퍼라인 에코시리즈''로서 고효율 시리즈, 인버터구동 전용토크 시리즈, 신JIS방폭규격대응 안전증(安全增) 방폭형 시리즈를 제품화하였다. 수퍼라인 에코시리즈는 동사 독자의 강판프레임을 사용하여 철저한 저손실 설계의 채택으로 업계 톱클래스의 고효율$\cdot$에너지절약을 실현하였다. 인버터구동에 최적한 특성, 내환경성의 강화와 베어링의 장수명화에 의한 장기(長期) 메인터넌스프리화 및 저소음$\cdot$저진동화를 실현한 고성능모터이다.

  • PDF

NoSQL-based User Behavior Detection System in Cloud Computing Environment (NoSQL 기반 클라우드 사용자 행동 탐지 시스템 설계)

  • Ahn, Kwang-Min;Lee, Bong-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.804-807
    • /
    • 2012
  • Cloud service provider has to protect client's information securely since all the resources are offered by the service provider, and a large number of users share the resources. In this paper, a NoSQL-based anomaly detection system is proposed in order to enhance the security of mobile cloud services. The existing integrated security management system that uses a relational database can not be used for real-time processing of data since security log from a variety of security equipment and data from cloud node have different data format with unstructured features. The proposed system can resolve the emerging security problem because it provides real time processing and scalability in distributed processing environment.

  • PDF