• Title/Summary/Keyword: 정보보호시장

Search Result 518, Processing Time 0.036 seconds

A Study on Robustness Indicators for Performance Evaluation of Immersive 360-degree Video Filtering (실감형 360도 영상 필터링 성능 평가를 위한 강인성 지표에 관한 연구)

  • Jang, Seyoung;Yoo, Injae;Lee, Jaecheng;Park, Byeongchan;Kim, Youngmo;Kim, Seok-Yoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.437-438
    • /
    • 2020
  • 국내 실감형 콘텐츠 시장은 전년도비 42.9%의 연평균 성장률을 보이며 2020년에는 약 5조 7,271억원의 규모에 이를 것으로 전망된다. 특히 2018년 기점으로 하드웨어보다는 콘텐츠 시장이 확대되었다. 최근 실감형 콘텐츠의 유통이 본격적으로 시작됨에 따라 저작권 침해 사례들이 나타나고 있으나 시장의 저변확대 측면에서 그렇게 주목받지 못하고 있다. 실감형 저작물을 제작하는 업체가 주로 소기업이고, 제작하는 비용이 고비용인 점을 고려할 때 저작권 보호 기술인 필터링 기술이 절대적으로 요구되고 있다. 필터링 기술의 성능 평가할 기준인 강인성 지표가 미정립 된 상태이다. 따라서 본 논문에서는 특정 기술에 종속되지 않는 실감형 360도 영상 콘텐츠 강인성 지표를 제안한다.

  • PDF

A Review of the Legal Nature that Users of the Virtual Currency Exchange Obtain and the Compensation Responsibility for the Damages Caused By Internet Problems or Network Errors (가상통화거래소 이용자가 가지는 법적 성격과 전산장애로 인한 손해배상 책임 연구)

  • Choi, JangWon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.287-294
    • /
    • 2018
  • This thesis covers legal aspects of the crypto-currency exchange and the legal rights of crypto-currencies holders. Unlike financial markets in which central authorities or intermediaries determine the validity of transactions and manage records, crypto-currency markets utilize a decentralization system based on block chain technology. Such distinct characteristics distinguish crypto-currency from currency, notes, or financial instruments. Therefore, we need to check closely the legal principles that are applicable to crypto-currency. Crypto-currency users possess rights indirectly through the crypto-currency exchange. However, we should look at whether crypto-currency can be an object of ownership. This research found that legal protection for crypto-currency exchanges are limited. Domestic laws have many shortcomings to protect users' rights. This study found that users who incurred damages due to internet computation errors at exchanges require a protective system like stock markets. Therefore, studies on the legal controls and system regulations are required to protect users' rights. Also, crypto-currency information exchanges keep inside and protections for users' private information need to be further examined.

Research Trend of Biometrics (생체인식기술의 연구동향)

  • Kim, Jin-Whan;Cho, Hyuk-Gyu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.824-827
    • /
    • 2005
  • The need to be able to identify other individual human beings is fundamental to the security and has been true since the beginning of human history. Physical or behavioral characteristics (finger-scan, face-scan, voice, palm, iris, retina, signature, human DNA, keystroke, vain, gait etc.) of a person are used to authenticate the person. The biometric technologies allow for a greater reliability of authentication as compared with password systems for physical access, network security, e-commerce, and so on. In this paper, we describe various technologies, market analysis, multi-modal system, standardization, privacy issue and future prospect of biometrics.

  • PDF

A Study of the Internet of Thing Industry and Policy Implications (사물인터넷 산업 현황 및 정책적 대응방향)

  • Chun, Hwang-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.724-727
    • /
    • 2014
  • This paper is analyzing the situation of the Internet of Things Industry and draw the policy implications to promote Internet of Things industry. Major IT companies as Apple, Google, IBM, Sony, and Samsung have developed various smart glass and smart watch as a Iot products. In order to promote Iot Industry, we should take the build up of eco system between IT makers and the various contents provider, protection of personal information and data, development of killer applications and business models, and the conversion from IPv4 to IPv6 as a next internet address infra, build up of international standard platform on IoT.

  • PDF

An Anonymous asymmetric public key traitor tracing scheme (익명성을 보장하는 비대칭 공개키 공모자 추적 기법)

  • 최은영;이동훈;홍도원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.49-61
    • /
    • 2004
  • In broadcast encryption schemes, traceability is a useful property to trace authorized subscribers, called traitors, who collude for manufacturing a pirate decoder. Unfortunately, this is usually achieved with a sacrifice of a privacy. Most traitor tracing schemes in the literature have been developed without considering a subscriber's anonymity, which is one of important requirements for electronic marketplaces to offer similar privacy as current marketplace. It would be unsatisfactory for the subscriber to reveal his/her identity to purchase multimedia contents. In this paper we propose an anonymous broadcast encryption scheme, where a user can subscribe anonymously and one purchases multimedia contents without giving a lot of information about his lifestyle, habits, and etc, but anonymity control is provided, i.e., a data supplier can date traitors.

A survey and categorization of anomaly detection in online games (온라인 게임에서의 이상 징후 탐지 기법 조사 및 분류)

  • Kwak, Byung Il;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1097-1114
    • /
    • 2015
  • As the online game market grows, illegal activities such as cheating play using game bots or game hack programs, running private servers, hacking game companies' system and network, and account theft are also increasing. There are various security measures for online games to prevent illegal activities. However, the current security measures are not enough to prevent all highly evolving game attacks and frauds. Some security measure can do harm game players usability, game companies need to develop usable security measure that is well fit to game genre and contents design. In this study, we surveyed the recent trend of various security measure applied in online games. This research also classified illegal activities and their related countermeasure for detection and prevention.

A Study on the Efficient RFID Tag Identification considering Performance Information of Individual Nodes in a Grid Environment (그리드 환경에서 노드별 성능정보를 고려한 효율적인 RFID 태그 판별에 관한 연구)

  • Shin, Myeong-Sook;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.797-802
    • /
    • 2011
  • RFID is recognized to technically occupy important position in ubiquitous computing environment and expected to create new markets in a variety of fields from now on. In order to generalize RFID system, it is required to solve the problem of privacy invasion and expedite lots of tags We suggest efficient RFID Tag Identification to identify tags quickly on the satisfaction with 3 security requirements of privacy protection in this paper. This methods are transferred to Grid environment through parallel analysis of Hash-Chain, and we measure performance of each nodes under the Grid environment. Then, We'll suggest SP-Division Algorithm to identify tags with each nodes and implement it in a Grid environment.

Factor analysis of VoIP Security Checklists using AHP (AHP를 이용한 VoIP 정보보호 점검항목의 중요도 분석)

  • Yoon, Seokung;Park, Haeryong;Yoo, Hyeong Seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1115-1122
    • /
    • 2012
  • VoIP service is steadily growing due to the spread of smartphones, enhanced network, and various VoIP applications. But, VoIP has many security vulnerabilities because it is based on IP network. This paper analyzes the important weight of VoIP security checklists for incident prevention and response using AHP. The results of AHP analysis showed that network security, incident response, and access control were the most important in technical, administrative, physical standpoint. This study proposes factor analysis of VoIP security checklist at first time. By doing this, it will be used helpfully when VoIP service providers establish their own security policies and inspect their VoIP environment according to their security policies.

A Study on Blockchain Based Secure Financial Transaction System for Person-to-Person Payment Environment (Person-to-Person 결제 환경에 적합한 블록체인 기반의 안전한 금융 거래 시스템 연구)

  • Park, Byeong-ju;Kwak, Jin
    • Annual Conference of KIPS
    • /
    • 2017.04a
    • /
    • pp.250-253
    • /
    • 2017
  • 최근 모바일 결제 시장의 규모가 2015년 45억 달러에서, 2016년 62억 달러로 성장하며, P2P 거래량도 함께 증가하고 있다. 또한, P2P 결제 시장에 페이팔, 비자와 같은 온라인 결제 업체와 대형은행 뿐만 아니라, 페이스북, 구글, 애플, 삼성 등 IT회사들도 참여하고 있다. 안전하고 편리한 P2P 결제를 위해 다양한 거래 방식이 연구되고 있지만, 다양한 기업 및 은행들의 참여로 인해 서로 다른 방식으로 사용자들이 불편을 겪고 있으며, 모바일 환경의 특성으로 인해 많은 보안위협들이 발생하고 있는 실정이다. 이에 따라, 모바일 환경에서의 P2P 결제를 고려한 통합적인 보안 기술이 개발되어야 하며, 민감 정보라고 할 수 있는 사용자의 계좌번호, 금융거래 관련 정보 등을 보호하기 위한 기술이 필수적이다. 따라서 기존 은행권의 P2P 거래 방법의 문제점을 분석하고 블록체인 시스템과 DHT에 대해 분석한 후, P2P 결제 환경에 적합한 안전한 블록체인 기반 금융 거래 시스템을 연구함으로써, P2P 거래 환경의 안전성을 향상시키고자 한다.

A Mid/Short Term Prospect of the I&T Industry (정보통신산업의 성장요인 및 중·단기 성장전망 분석)

  • Lee, J.W.
    • Electronics and Telecommunications Trends
    • /
    • v.16 no.5 s.71
    • /
    • pp.125-135
    • /
    • 2001
  • 본 고는 정보통신산업의 성장.발전에 중.단기적으로 영향을 미치고 있는 영향요인들을 살펴본 후, 2001년부터 2005년까지의 정보통신산업 성장전망을 분석해 보기 위하여 작성되었다. 특히, 본 고는 최근 들어 정보통신산업의 새로운 성장엔진으로 부각되고 있는 인터넷, 이동통신, 디지털방송, 정보보호, 정보가전 등 신기술산업들의 성장세를 바탕으로 현재의 IT 경기 침체가 2002년을 고비로 회복세로 전환될 것이라는 다소 낙관적인 전제 하에 향후의 정보통신산업 발전가능성을 모색해 보았다. 향후의 정보통신산업 발전전망을 정확히 예측한다는 것은 어려운 일이지만, 현재의 상황을 정확히 파악함으로써 적시에 적절한 대책을 마련하여 추진하는 것은 국가 경쟁력 향상을 위해 매우 긴요한 일이 될 것이다. 마지막으로 본 고에서는 최근 발생한 미국 테러사태의 충격이 장기화하지 않을 것이라는 전제에도 불구하고 2001년도 정보통신산업의 생산시장 증가율이 1% 수준 이하에 그칠 것이라는 점을 지적하였다.