• Title/Summary/Keyword: 위조상품

Search Result 30, Processing Time 0.027 seconds

Analysis about EPC Class 1 and C1G2 Security (EPC Class1과 C1G2 보안성 분석)

  • Kim, Keon-Woo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.70-72
    • /
    • 2005
  • 최근들어 Radio Frequency Identification (RFID) 태그가 다수의 상품에 부착되고 절러 분야에 적용되기 시작했지만, 비용문제로 인해 인증이나 암호화 같은 보안기능은 고려하지 않고 있다. 보안 기능이 없는 RFID시스템은 개인정보 노굴, 불법 리더의 접근, 위조 태그의 남용과 같은 심각한 부작용을 초래하지만 현 단계에서는 보안기능을 적용하기가 쉽지않다. 절러 기술을 따르는 수동형 태그중 EPCglobal의 EPC Class 1과 Class 1 Generation 2(C1G2)는 산업계의 여러 분야에서 특히, supply-chain 모델에서 사실상 국제표준으로 여겨진다. EPC Class1 수준의 태그는 자체 밧데리를 가지지 않는 수동형 태그이고, 암호 프리미티브를 적용한 알고리즘이나 프로토콜은 제공하지 않는다. EPC Class1 과 EPC C1G2의 유일한 보안 대책으로는 태그를 영원히 동작하지 못하게 하는 Kill 기능이 있다. Kill을 수행한 태그는 RFID 태그로서의 의미가 사라진다. 본 논문에서는 Kill 기능에 대한 EPC Class1 시스템의 취약성을 보이고 또한, EPC C1G2 시스템에서 Kill 관점에서의 보안성을 분석한다.

  • PDF

Proposal on EPC C1G2 mutual authentication protocol (EPC C1G2 상호인증 프로토콜 제안)

  • Kim, Keon-Woo
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1113-1116
    • /
    • 2005
  • 최근들어 Radio Frequency Identification(RFID) 태그가 다수의 상품에 부착되고 여러 분야에 적용되기 시작했지만, 편리성이나 비용문제로 인해 인증과 암호화 같은 보안기능은 적용되지 않고있다. 보안 기능이 없는 RFID 시스템은 개인정보 노출, 불법 리더의 접근, 위조 태그의 남용과 같은 심각한 부작용을 초래하지만, 태그 자원의 제약으로 인해 보안기능을 적용하기가 쉽지않다. 현재 여러 기술을 따르는 RFID 시스템 중 EPCglobal 의 EPC Class 1 Generation 2(C1G2) 는 산업계의 여러 분야에서 특히, supply-chain 모델에서 사실상 국제표준으로 여겨진다. 본 논문에서는, RFID 보안 프로토콜 중 EPC C1G2 메커니즘의 Inventory 과정에서 태그가 리더를 인증하는 기법을 제안한다. C1G2 시스템에서는 인증되지 않은 리더의 태그 액세스가 가능한데, 이는 태그의 리더 인증으로서 차단될 수 있다. 또한, EPC C1G2 태그-리더 간의 상호인증 기법을 제안한다. 이 과정에서 태그 ID 는 노출되지 않고 전송되며, 태그 인증을 통해 태그 위변조를 방지할 수도 있다. 제안 메커니즘은 태그를 식별하는 절차에서 인증을 위해 프로토콜 패스 수의 증가가 없다. 다만 리더와 태그에서 Inventory 과정의 ACK command 와 태그의 reply 구현에 약간의 수정을 필요로 한다.

  • PDF

A security implementation based on the sensor tag (센서 태그를 이용한 보안 장치 구현)

  • Kim, Sang-Choon;Park, Ji-Mann
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.19-24
    • /
    • 2011
  • This paper describes a passive SID sensor tag that provide physical security functions based on a sensor interface module. It elementarily consists of a serial I/O interface, control module, and sensor module. In this paper, it show tamper-proof security functions by comparison and encryption with the sensor signal data using the physical resistors. The passive SID sensor tag can be realized by the real time management for the safety, forgery, and so on. The proposed SID tag embedded with a sensor module is expected to find wide physical security applications.

The Implementation of Inventory Control System by Using EPC Information Service (EPC 정보 서비스를 이용한 재고관리 시스템 구현)

  • Oh Jeong-Jin;Moon Gwang-Hyun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.590-595
    • /
    • 2005
  • RFID is rising as a means which recognizes products efficiently and correctly. The use of RFID technology can reduce the expense of excess stocktaking, forgery, labor and improve supply network. RFID technology uses RF to recognize the products. EPC, a small tag, is attached to each product, which includes specific product information. Each EPC is only one and can recognize each product. If EPC tag moves to a specific location, the reader reads the tag, the data of which get to be stored in EPC information service, a data storage system. All services can approach EPC information service through web and whenever users demand services, they are provided with the data they want. This study shows an inventory control system is implemented by EPC information service.

  • PDF

Analysis and Improvement Plan for Competitive Korea's Parallel Import Market (국내 병행수입 시장의 실태분석과 향후 개선방안에 관한 연구)

  • KIM, KEE-HONG;SOHN, SUNG-PYO
    • International Commerce and Information Review
    • /
    • v.16 no.5
    • /
    • pp.3-25
    • /
    • 2014
  • The megatrends of the Korean distribution industry market in 2014 reflect opportunities in parallel import & overseas direct purchase. Korean government addressed that "Monopoly & Oligopoly consumer goods import improvement plan" to stabilizing importing goods prices and domestic consumers' burden relief through accelerating market competition. and moreover it is to improving distribution channel and promoting parallel import market business. The Korean market is very unique in that consumers' real sensory index of open up importation effect level is low, but nominal open up importation effect level is high. This is due to difficulties in creating a proper importing goods distribution market and alternative importing routes are very rare. Thus, the purpose of this study is to analyze the market situation and parallel import to improve Korean government's "Monopoly & Oligopoly consumer goods import improvement plan" policy for the revitalization of the domestic market economy and to boost up a new growth engine industry.

  • PDF

Freshness Extension of Tomatoes by Packaging Methods (포장 방법에 따른 토마토의 품질변화)

  • 박형우;박종대;김동만
    • Food Science and Preservation
    • /
    • v.6 no.3
    • /
    • pp.255-259
    • /
    • 1999
  • This study was measured weight loss, total ascorbic acids, titratable acidity and soluble solids contents to investigate the effect of EPS(expended polystrene foam) box, double wall corrugated paperboard box and LDPE film pouches during storage at 25oC. The rate of weight loss was 5.9% in corrugated paperboard box after 7 days, but those of 20LD, 40LD film and EPS box were 1.1, 1.0, and 1.1% , respectively. Total ascorbic acid content of EPS box was 20% higher than that in corrugated paperboard box, but the obvious differents were not observed among the LDPE film pouches and EPS box. The titratable acidity was decrease during storage, but total soluble solids content was increase. Overall appearences of LDPE pouches and EPS box were better than those of corrugated paperboard box.

  • PDF

Changes of Quality in Ginger according to Storage Conditions (저장조건에 따른 생강의 품질변화)

  • 정문철;이세은;남궁배;정태연;김동철
    • Food Science and Preservation
    • /
    • v.5 no.3
    • /
    • pp.224-230
    • /
    • 1998
  • In order to establish proper storage conditions for ginger, the quality changes of gingers stored at three different temperatures(7$^{\circ}C$, 12$^{\circ}C$ and 20$^{\circ}C$) and three different relative humidities(75%, 85% and 95%RH) were investigated during 150 days of storage. Gingers stored at 7$^{\circ}C$ and 20$^{\circ}C$ showed rapid quality deterioration due to chilling injury and spouting respectively in any range of relative humidity. Ginger stored at 7$^{\circ}C$ was staled to show symptoms of the chilling injury such as moldiness, shrivelling, discoloration etc after 30 days of storage ; then it was deteriorated after 90 days of storage. Ginger stored at 20$^{\circ}C$ was completely lost its storage-life after 30 days of storage because of high sprouting ratio. However ginger stored at 12$^{\circ}C$, 75%RH showed better quality than ones stored at both 7$^{\circ}C$ and 20$^{\circ}C$, but it was not so good as the one at 7$^{\circ}C$, 95%RH. Consequently storage conditions of 12$^{\circ}C$, 95%RH was observed the best effecive condition for keeping rhizomes in good quality from weight loss, spouting, mouldiness and so on.

  • PDF

The Cyber world of the Matrix as a typical type of 'Simulacre' (시뮬라크르의 전형(典型)으로서 매트릭스(Matrix)의 가상 세계)

  • 이종한
    • Archives of design research
    • /
    • v.17 no.1
    • /
    • pp.339-346
    • /
    • 2004
  • Matrix, produced by Larry & Andy Wachowski, was relatively precisely dealt with the cyber world. After the movie was released, it had a mania for the movie and was adopted into a various forms of cultural products. It was remade not only into the parodies of the other movies and TV programs, but also the clothes and miscellaneous items of the movie were reincarnated as an unique cultural trend. The cause of the popularity is the fresh storyline as well as the sophisticated visual effects and good-looking actors. The agony of the protagonist was connected with the people outside the movie who are yearning for the ideal world. He was confused at the fact that his circumstances which were believed as the real world were not tortally true, complicated between the sensually phisical truth and the spiritual truth and had an will for the freedom that would ransack the truth and save the other people from the fictitious world. Consequently, the movie has got sympathies with many audiences suggesting the situation that has no a firm belief of the reality, the difference between the real and the cyber world is meaningless and the faked images of the high-technology are overturned This thesis tries to study the present that the real images are excessly duplicated and consumed, related to the Jean Baudrillard's theory, 'Hyperreel'. Replaced the real objects by a technical programming in the Matrix world, there happens the image-violence that the true nature is slaughterred by images. In the world where the reproducts are more actual than the reality and pretends to be real, only semiotics are consumed and produced. That is to say, the tortally programmed images has no references and aims, therefore should be produced in an 'impediment-strategy' like a faked crisis. That is the step of 'Simulation' that artificially reincarnates the real. Based upon the Baudrillard's theory, 'Simulacre', this study tries to research today's post-modern situation that the boundary of the real world and the faked copy is vague and vanishing, through the analysis of the cyber world of the movie 'Matrix'.

  • PDF

The Security Risk and Countermeasures of Blockchain based Virtual Currency Trading (블록체인 기반 가상화폐 거래의 보안 위험 및 대응방안)

  • Chung, Young-Seek;Cha, Jae-Sang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.100-106
    • /
    • 2018
  • Since the concept of virtual currency called Bitcoin was announced in 2008, the blockchain technology, which is the basis of Bitcoin, is attracting attention as an important platform technology in the era of the 4th industrial revolution that can change our society in the future. Although Existing electronic financial transactions store and manage all transaction history at a reliable central organization such as government and bank, blockchain-based electronic financial transactions are composed of a distributed structure in which all participants participating in the transaction store and manage the transaction history, it is possible to secure transaction transparency while reducing system construction and operation costs. Besides the virtual currency that started with bit coins, the technology of these blockchains has been extended in various fields such as smart contracts and document management. The key technology area of this blockchain is security based on proven cryptographic technology to make it difficult to forge and hack, but there are security risks such as security vulnerabilities in the virtual currency trading service, We will discuss security risks in using virtual currency and discuss countermeasures. Especially security accidents of virtual currency exchanges are occurring frequently recently, the damage of users who trade the virtual currency is also increasing, we propose security threats and security countermeasures against virtual currency exchanges.

Yield Loss of Spring Chinese Cabbage as Affected by Infection Time of Clubroot Disease in Fields (봄배추 무사마귀병의 포장 감염시기와 피해)

  • 김충회;조원대;김홍모
    • Research in Plant Disease
    • /
    • v.6 no.1
    • /
    • pp.23-26
    • /
    • 2000
  • Effects of infection time of the clubroot pathogen, Plasmodiophora brassicae, on yield loss of Spring-sown Chinese cabbage plants were examined in field experiments. Yield loss of Chinese cabbage plants increased as the infection time becomes early. Plants infected at 20 days after transplanting or earlier were completely killed before harvest, and those infected at 30 days after transplanting were healthy in appearance but their head weights were reduced to 59% with poor commodity value. The plants infected 40 days after transplanting were not affected in yield. Development of root hairs in diseased plants was greatly reduced as the infection progressed, and root length was reduced to 1/2 to 1/3 of that of healthy plants. root galls were first developed 20 days after inoculation and rapidly enlarged to reach the peak in size 20 days from initial development, and decayed thereafter. Development and decay of root galls tended to be faster at later season as air temperature became high, regardless of the infection time. Diseased plants started to wilt approximately 10 days after root gall development. Root galls began to decay 10 days after initial plant wilting, and then were completely rotten within following 10 days. Based on the results, root gall development stages on spring-sown Chinese cabbage plants could be grouped into 20 days of root gall enlargement period, and 10 days of root gall decay period, followed by survival period in soil.

  • PDF