• Title/Summary/Keyword: 주소정보

Search Result 1,330, Processing Time 0.026 seconds

Information Right Management System using Secret Splitting of Hardware Dependent Encryption Keys (하드웨어에 종속된 암호키 비밀 분할을 이용한 정보권한관리 시스템)

  • Doo, So-Young;Kong, Eun-Bae
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.3
    • /
    • pp.345-351
    • /
    • 2000
  • This paper presents a right management scheme using secret splitting protocol. Right management schemes combat piracy of proprietary data (such as digital music). In these schemes, encryption has been used and it is essential to protect the keys used in encryption. We introduce a new key protection method in which a secret encryption key is generated using both user's hardware-dependent unique information (such as MAC address) and cryptographically secure random bit strings provided by data owner. This scheme prevents piracy by checking hardware-dependent information during rendering and improves the secrecy of the data by individualizing the encryption key for each data.

  • PDF

A Study on Detecting Black IPs for Using Destination Ports of Darknet Traffic (다크넷 트래픽의 목적지 포트를 활용한 블랙 IP 탐지에 관한 연구)

  • Park, Jinhak;Kwon, Taewoong;Lee, Younsu;Choi, Sangsoo;Song, Jungsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.821-830
    • /
    • 2017
  • The internet is an important infra resource that it controls the economy and society of our country. Also, it is providing convenience and efficiency of the everyday life. But, a case of various are occurred through an using vulnerability of an internet infra resource. Recently various attacks of unknown to the user are an increasing trend. Also, currently system of security control is focussing on patterns for detecting attacks. However, internet threats are consistently increasing by intelligent and advanced various attacks. In recent, the darknet is received attention to research for detecting unknown attacks. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. In this paper, we proposed an algorithm for finding black IPs through collected the darknet traffic based on a statistics data of port information. The proposed method prepared 8,192 darknet space and collected the darknet traffic during 3 months. It collected total 827,254,121 during 3 months of 2016. Applied results of the proposed algorithm, black IPs are June 19, July 21, and August 17. In this paper, results by analysis identify to detect frequency of black IPs and find new black IPs of caused potential cyber threats.

Active IP-RFID System for Maritime Logistics (실시간 해운물류를 위한 능동형 IP-RFID 시스템)

  • Kim, Tae-Hoon;Lee, Byung-Ha;Park, Byung-Kwon;Choi, Sung-Pil;Moon, Young-Sik;Jung, Jun-Woo;Kim, Jae-Joong;Choi, Hyong-Rim
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2511-2519
    • /
    • 2015
  • In maritime logistics, the technology for transmitting status information has been greatly developed, but it has not been available in general logistics environment or it is impossible to support two-way communication as it simply receives and transfers a container's information. In particular, to support two-way communication in all sections of the global maritime logistics, the address value, which can identify the tag, should be managed. In this context, to improve the 433 MHz-based RFID, the project called "DASH 7" has been conducted in recent years. However, it has stopped proceeding because of its slow progress, including the standardization and development of references. In this paper, we introduced an active IP-RFID system configuration for real-time communication in global maritime logistics using a two-way communication-which is characteristic of an IP-applying virtual address values in the RFID tag, and proposing its process and function. When you apply the IP-RFID system proposed in this paper, not only real-time status tracking in the maritime logistics area is possible, but it is also applicable for controlling the tag.

Strengthening security structure of open Blockchain platform to enhance privacy protection of DApp users (DApp 사용자의 프라이버시 보호 강화를 위한 공개형 블록체인 플랫폼 보안구조 강화방안)

  • Hwang, Seonjin;Ko, DongHyun;Bahk, Taeu;Choi, Yoon-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.1-9
    • /
    • 2020
  • Along with the growth of Blockchain, DApp (Distributed Application) is getting attention. As interest in DApp grows, market size continues to grow and many developers participate in development. Many developers are using API(Application Programming Interface) services to mediate Blockchain nodes, such as Infura, for DApp development. However, when using such a service, there is a serious risk that the API service operator can violate the user's privacy by 1 to 1 matching the account address of the Transaction executed by the DApp user with the IP address of the DApp user. It can have an adverse effect on the reliability of public Blockchains that need to provide users with a secure DApp service environment. The proposed Blockchain platform is expected to provide user privacy protection from API services and provide a reliable DApp use environment that existing Blockchain platforms did not provide. It is also expected to help to activate DApp and increase the number of DApp users, which has not been activated due to the risk of an existing privacy breach.

An Extended Virtual LAM System Deploying Multiple Route Server (다중 라우트 서버를 두는 확장된 가상랜 시스템)

  • Seo, Ju-Yeon;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.2
    • /
    • pp.117-128
    • /
    • 2002
  • Virtual LAN (VLAN) is an architecture to enable communication between end stations as if they were on the same LAN regardless of their physical locations. VLAN defines a limited broadcast domain to reduce the bandwidth waste. The Newbridge Inc. developed a layer 3 VLAN product called VIVID, which configures a VLAN based on W subnet addresses. In a VIVID system, a single route server is deployed for address resolution, VLAN configuration, and data broadcasting to a VLAN. If the size of the network, over which the VLANS supported by the VIVID system spans, becomes larger, this single route server could become a bottleneck point of the system performance. One possible approach to cope with this problem is to deploy multiple route servers. We propose two architectures, organic and independent, to expand the original VIVID system to deploy multiple route servers. A course of simulations are done to analyze the performance of each architecture that we propose. The simulation results show that the performances of the proposed architectures depend on the lengths of VLAN broadcasting sessions and the number of broadcast data frames generated by a session. It has also been shown that there are tradeoffs between the scalability of the architecture and their efficiency in data transmissions.

Low Power TLB Supporting Multiple Page Sizes without Operation System (운영체제 도움 없이 멀티 페이지를 지원하는 저전력 TLB 구조)

  • Jung, Bo-Sung;Lee, Jung-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.1-9
    • /
    • 2013
  • Even though the multiple pages TLB are effective in improving the performance, a conventional method with OS support cannot utilize multiple page sizes in user application. Thus, we propose a new multiple-TLB structure supporting multiple page sizes for high performance and low power consumption without any operating system support. The proposed TLB is organised as two parts of a S-TLB(Small TLB) with a small page size and a L-TLB(Large TLB) with a large page size. Both are designed as fully associative bank structures. The S-TLB stores small pages are evicted from the L-TLB, and the L-TLB stores large pages including a small page generated by the CPU. Each one bank module of S-TLB and L-TLB can be selectively accessed base on particular one and two bits of the virtual address generated from CPU, respectively. Energy savings are achieved by reducing the number of entries accessed at a time. Also, this paper proposed the simple 1-bit LRU policy to improve the performance. The proposed LRU policy can present recently referenced block by using an additional one bit of each entry on TLBs. This method can simply select a least recently used page from the L-TLB. According to the simulation results, the proposed TLB can reduce Energy * Delay by about 76%, 57%, and 6% compared with a fully associative TLB, a ARM TLB, and a Dual TLB, respectively.

The Design and Implementation of Web Agents for vCard Service in Mobile Enviromnent (모바일 환경에서 vCard 서비스를 위한 웹 에이전트의 설계 및 구현)

  • Yun, Se-Mi;Jo, Ik-Seong
    • The KIPS Transactions:PartD
    • /
    • v.9D no.3
    • /
    • pp.477-486
    • /
    • 2002
  • vCard that is the electronic business card automates the exchange of personal information typically found on a traditional business card. vCard information contains not only simple text, but also graphics and multimedia data like pictures, company logos, Web addresses, and so on. This paper describes the design and implementation of Web-based vCard agent system for exchanging vCard, an electronic business card and searching another user's vCard in mobile phone environment. In today's business environment, such as that this information is typically exchanged on business cards. Our web agent system in this paper connect web server which provide vCard service and search, edit vCard information displayed by web browser of mobile phone and exchange vCard with another user through internet. Considering characteristics of wireless devices that have limited storage space, It also saves constructed XML documents that include user's informations in a web server and solves the security problem by exchanging not personal data or XML but encrypted directory name where XML document exits as exchanging vcard.

Web-based Medical Information System supporting DICOM Specification (DICOM 표준을 지원하는 웹 기반 의료 정보 시스템)

  • Kwon, Gi-Beom;Kim, Il-Kon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.4
    • /
    • pp.317-323
    • /
    • 2001
  • DICOM(Digital Imaging and Communications in MediCine), standard of medical image operation, present the methods for communications and Storage of Medical Image. medical image acquired from patient in hospital made DICOM files. this paper purposes design and implementation methodologies of a web-based medical information system that consists of DICOM (Digital Imaging and Communications in Medicine) databases and functional components of a web server in order to support the access of medical information with Intemet web browser. we store the patient and image information to database using reading the group and element oJ DICOM file. we made file transfer module by implementing DICOM Store service, in result, we can transfer DICOM file to IF based host or computer. We compose web component of communications and Storage service, user be used DICOM Service by web Browser.

  • PDF

The Analyst of Inavi Navigation user Information by Digital Forensic (디지털 포렌식 관점에서의 아이나비 내비게이션 사용정보 분석)

  • Choi, Yong-Seok;Seo, Ki-Min;Lim, Kyung-Soo;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.327-334
    • /
    • 2010
  • The operated type of navigation is composed of hardware or software. The navigation based on software is stored and ran in the external storage(e.g. SD card). For the convenience of users, Many car navigation systems store user information such as frequently visited place, route, and so on. Those can be used to proving the alibi of users as well as their relationship between the actual owner of the vehicle through data and time information analysis. Therefore, if it is analyzed datas of navigation, we can get a lot of information such as user's movement, route of car. There are important implications in the digital forensics because it's available for investigating the various crimes. This paper demonstrates the necessary information in the digital investigation through the analysis of stored data in the navigation.

Real-Time User Login Account Access Management Using Mobile App (모바일 앱을 이용한 실시간 사용자 계정 접근 관리)

  • Choi, Seokhwan;Kwon, Junho;Choi, Yoon-Ho
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.6
    • /
    • pp.350-358
    • /
    • 2017
  • Spill of personal information using a stolen ID and password that recently occurred in large enterprises and portal web site such as Nate, Auction, National Agricultural Cooperative Federation, suggesting the importance of protecting personal information. By managing access to user accounts in real time, users will be able to block access before personal information is leaked. Therefore, In this paper, we propose a method to prevent spill of personal information that may occur when connected to others by using an authorized ID and password from portals. Specifically, we offer a mobile status control app that controls the logged status of user account in real time to view login status information to user by visualization and information about specific time and IP address. Also, we propose a method for detecting and blocking duplicated login that connect via IP address change.