• Title/Summary/Keyword: 인터페이스 보안

Search Result 316, Processing Time 0.026 seconds

Design and Implementation of Security Reconfiguration for Effective Security Management of Mobile Communication Device (휴대용통신단말의 효과적인 보안관리를 위한 보안 재구성기법의 설계 및 구현)

  • An, Gae-Il;Kim, Ki-Young;Seo, Dong-Il
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.691-698
    • /
    • 2009
  • A mobile communication device is a small size of portable computer which provides communication service, such as smart phone and PDA. Currently, one of the biggest barriers in developing the mobile communication device is security issue. Even though there are excellent security functions which can remove the security issues, there is a problem that the mobile communication device can not be loaded with all the functions because it has low storage, poor computational power, and inconvenient user interface, compared to the desktop personal computer. This paper proposes a context-aware security reconfiguration scheme for effective security management of the mobile communication device. The scheme can provide the mobile communication device with the optimized security service which is most adapted to its current security context. Through the prototype implementation and the experiments of the proposed scheme, we have confirmed that the proposed scheme is excellent in terms of computing resource efficiency and usability, without degrading security level.

A Design of Security SoC Prototype Based on Cortex-M0 (Cortex-M0 기반의 보안 SoC 프로토타입 설계)

  • Choi, Jun-baek;Choe, Jun-yeong;Shin, Kyung-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.251-253
    • /
    • 2019
  • This paper describes an implementation of a security SoC (System-on-Chip) prototype that interfaces a microprocessor with a block cipher crypto-core. The Cortex-M0 was used as a microprocessor, and a crypto-core implemented by integrating ARIA and AES into a single hardware was used as an intellectual property (IP). The integrated ARIA-AES crypto-core supports five modes of operation including ECB, CBC, CFB, CTR and OFB, and two master key sizes of 128-bit and 256-bit. The integrated ARIA-AES crypto-core was interfaced to work with the AHB-light bus protocol of Cortex-M0, and the crypto-core IP was expected to operate at clock frequencies up to 50 MHz. The security SoC prototype was verified by BFM simulation, and then hardware-software co-verification was carried out with FPGA implementation.

  • PDF

A Method for developing the User Interface of a Smart-TV App based on a Smart-phone (스마트TV의 사용자 경험 향상을 위한 스마트폰 기반의 사용자 인터페이스 개발 방법론)

  • Ko, Kwang-Il
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.67-74
    • /
    • 2011
  • One of the major requisites for the success of the smart-TV is to create a circumstance where smart-TV app's are produced and purchased on a large scale. However, the smart TV app's may succeed only under the condition that the user interface of the smart TV is greatly evolved from the typical TV remote controller. Several equipments have been devised to tackle the problem of the poor user interface of the smart-TV; however, they are not satisfactory in the aspects that they usually increase the costs of TV-set and they do not help practically the app developers. The equipments are pre formed so that it is hard for the app developers to design their own user interface using them. In the paper, sMartUX, a method for developing the smart-TV app is introduced. sMartUX provides a new paradigm and development environment for designing, implementing, and operating the user interface of the smart TV app using a smart-phone. With sMartUX, app developers can design their own user interface using the various facilities of a smart-phone, and they need not to care the details of various smart-phones and how to launch their user interface onto a smart-phone.

A Product Line Scope of Shopping Mall Systems (쇼핑몰 시스템의 제품 라인 범위)

  • 조영호;윤병권;최윤석;정기원
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.385-387
    • /
    • 2001
  • 대부분의 B2C 쇼핑몰 시스템은 사용사 인터페이스에서만 큰 차이를 보일 뿐 기능적/비기능적 요구사항과 아키텍처는 유사하며 쇼핑몰 시스템 구성요소들의 재사용은 매우 높다. 이에 B2C 쇼핑몰 시스템의 제품 라인 구축 시 입력몰인 1) 제푸 제약사항, 2)스타일, 패턴 및 프레임워크, 3)생산 제약사항, 4)생산 전략, 5)기존 구성품의 재고조사를 정의하고 B2C 쇼핑몰의 모델 분류와 기본적인 사용자 요구사항을 바탕으로 쇼핑몰 시스템의 공통점과 차이점을 제품 라인 범위로 제시한다. 일반적인 B2C 쇼핑몰 시스템이 제공하여야 하는 고객 정보 관리, 상품 정보 관리, 주문관리, 보안, 상품 운송 등의 기본 기능이 공통점으로 추출되었으며 가격의 고정 여부, 사용자 인터페이스, 멀티미디어 서비스 지원 여부, 포탈 사이트와 비슷한 검색 기능, 온라인 지불 기능의 지원과 사용자 인터페이스 및 데이터 베이스 스키마 등이 차이점으로 추출되었다.

  • PDF

The Security Life Cycler Energy Service Platform for Universal Middleware (유니버설미들웨어기반 생명주기 보안에너지 서비스플랫폼 연구)

  • Lee, Hae-Jun;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1197-1202
    • /
    • 2017
  • Security services that support electric energy service gateway require relatively high reliability. In particular, the application services that accompany communications and data are run organically. Each of the security services should support a secure service platform that supports a secure, scalable life cycle for existing services which should be extends security layer of Universal Middleware. In this convergence platform, it is the study of security transfer modular services that allow independent life cycle management of systems through Universal middleware. First, It is modular in terms of energy consumption service and data, enabling real-time operation, communications, remote management and applications. Second, the life cycle of the secure module to support start, stop and updating of the security module by applying the security policy module layer concept. It is modular system enabling to design of dyanmic models in the smart grid, the service was intended to be standardized and applied to the security service platform.

이동인터넷에서의 E-to-E M-Commerce

  • 김기천
    • Proceedings of the CALSEC Conference
    • /
    • 2001.08a
    • /
    • pp.351-368
    • /
    • 2001
  • ◆ 이동 인터넷 기반의 무선 전자상거래 ◆ 무선 디바이스 사용ㆍ 인터넷 기반 휴대전화, 무선 기반 PDA 등. ◆ 보안 및 인증, 사용자 인터페이스가 중요한 문제임 ◆블루투스(Bluetooth) 기술을 내장한 휴대전화, PDA, 노트북 등의 장비가 m-commerce 시장을 더 활성화 시킬 것으로 예상됨. ◆ H-commerce를 위한 무선 인터넷 플랫폼으로는 WAP, MME(Microsoft ME), i-Mode 등이 있음. WAP - 011, 017, 019 MME - 016, 018 i-Mode : 일본 NTT 도코모(중략)

  • PDF

u-Healthy 기술 - (2) u-헬스케어 기술의 특징

  • Na, Seung-Gwon
    • The Monthly Diabetes
    • /
    • s.286
    • /
    • pp.58-59
    • /
    • 2013
  • u-헬스케어를 지원하는 의료시스템은 환자에 대한 정보와 환경을 스스로 인지하고 판단하기 위한 센서, 프로세서, 통신 그리고 환자와 의료인 간의 자연스러운 의사소통을 가능하게 하기 위한 통신, 인터페이스, 보안기술 등이 통합되어야 하고, 환자의 건강을 극대화하기 위한 전자건강시스템은 적재적시에 지능적으로 활성화되고 사용되어야 한다. u-Health 기술 내용중 두 번째로 u-헬스케어 기술의 특징을 알아본다.

  • PDF

수용가 중심의 수요반응을 위한 모델 및 확대 방안 연구

  • Kim, Il-Yeon;Lee, Hyeon-Gi
    • Information and Communications Magazine
    • /
    • v.34 no.5
    • /
    • pp.76-82
    • /
    • 2017
  • 본고에서는 수요반응을 위한 스마트가전과 서비스사업자 간 인터페이스의 요구사항을 서술한다. 전체 시스템 구조는 NIST Special Publication 1108R2를 참조하되 보안에 대해서는 다루지 않는다. 또한 향후 수용가 중심의 수요반응 보급 및 확산을 위한 발전방향에 대해 알아본다.

The Study of Security Life Cycler Energy Service Platform or Universal Middleware (유니버설미들웨어상의 생명주기기반 보안에너지 서비스플랫폼 연구)

  • Lee, Hae-Jun;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.291-293
    • /
    • 2017
  • Security services that support electric energy service gateway require relatively high reliability. In particular, the application services that accompany communications and data are run organically. Each of the security services should support a secure service platform that supports a secure, scalable life cycle for existing services which should be extends security layer of Universal Middleware such as OSGi platform. In this convergence platform, it is the study of security transfer modular services that allow independent life cycle management of systems through Universal middleware. First, It is modular in terms of energy consumption service and data, enabling real-time operation, communications, remote management and applications. Second, the life cycle of the secure module to support the life cycle of secure, delete, start and updating of the security module by applying the security policy module layer concept. It is modular in terms of power generation and accountability, enabling us to distinguish between reliability and accountability in a large volume of data models in the smart grid, the service was intended to be standardized and applied to the security service platform.

  • PDF

Research on SecureOS Module Based on File System for Data Protection (데이터 보호를 위한 파일시스템 기반의 SecureOS Module에 관한 연구)

  • Yonggu JANG;Inchul KIM;Jisong RYU
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.26 no.4
    • /
    • pp.67-79
    • /
    • 2023
  • Service environments through laptops, smart devices, and various IoT devices are developing very rapidly. Recent security measures in these Internet environments mainly consist of network application level solutions such as firewall(Intrusion Prevention Systems) and IDS (intrusion detection system). In addition, various security data have recently been used on-site, and issues regarding the management and destruction of such security data have been raised. Products such as DRM(Digital Rights Management) and DLP(Data Loss Prevention) are being used to manage these security data. However despite these security measures, data security measures taken out to be used in the field are operated to the extent that the data is encrypted, delivered, and stored in many environments, and measures for encryption key management or data destruction are insufficient. Based on these issues we aim to propose a SecureOS Module, an OS-based security module. With this module users can manage and operate security data through a consistent interface, addressing the problems mentioned above.