• Title/Summary/Keyword: Counter Offer

Search Result 31, Processing Time 0.022 seconds

Design and Implementation of the Authentication System for In-app Billing in Mobile Environments

  • Seok, Ho-Jun;Kim, Seog-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.2
    • /
    • pp.61-69
    • /
    • 2016
  • In this paper, we propose the authentication server system that prevent hacking in In-app billing applications. And we also propose the methods to verify electronic receipt for the payment of internal app payments and to check the integrity of the applications. Then we designed the payment metabolic system that checks between products-offer list and paid subscription if payment system is hacked with new hacking technologies different from existing ones. And then we implemented proposed authentication system and experimented with about 10,000 average internal application payments per an hour. It shows that proposed system has defensive techniques that counter attacks against in-app billing but it takes more than 0.8916 seconds than no-certification system that is considered as relatively short time.

A Conceptual Design of Knowledge-based Real-time Cyber-threat Early Warning System (지식기반 실시간 사이버위협 조기 예.경보시스템)

  • Lee, Dong-Hwi;Lee, Sang-Ho;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.1-11
    • /
    • 2006
  • The exponential increase of malicious and criminal activities in cyber space is posing serious threat which could destabilize the foundation of modem information society. In particular, unexpected network paralysis or break-down created by the spread of malicious traffic could cause confusion and disorder in a nationwide scale, and unless effective countermeasures against such unexpected attacks are formulated in time, this could develop into a catastrophic condition. As a result, there has been vigorous effort and search to develop a functional state-level cyber-threat early-warning system however, the efforts have not yielded satisfying results or created plausible alternatives to date, due to the insufficiency of the existing system and technical difficulties. The existing cyber-threat forecasting and early-warning depend on the individual experience and ability of security manager whose decision is based on the limited security data collected from ESM (Enterprise Security Management) and TMS (Threat Management System). Consequently, this could result in a disastrous warning failure against a variety of unknown and unpredictable attacks. It is, therefore, the aim of this research to offer a conceptual design for "Knowledge-based Real-Time Cyber-Threat Early-Warning System" in order to counter increasinf threat of malicious and criminal activities in cyber suace, and promote further academic researches into developing a comprehensive real-time cyber-threat early-warning system to counter a variety of potential present and future cyber-attacks.

  • PDF

Analysis of Cybercrime Investigation Problems in the Cloud Environment

  • Khachatryan, Grigor
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.315-319
    • /
    • 2022
  • Cloud computing has emerged to be the most effective headway for investigating crime especially cybercrime in this modern world. Even as we move towards an information technology-controlled world, it is important to note that when innovations are made, some negative implications also come with it, and an example of this is these criminal activities that involve technology, network devices, and networking that have emerged as a result of web improvements. These criminal activities are the ones that have been termed cybercrime. It is because of these increased criminal activities that organizations have come up with different strategies that they use to counter these crimes, and one of them is carrying out investigations using the cloud environment. A cloud environment has been defined as the use of web-based applications that are used for software installation and data stored in computers. This paper examines problems that are a result of cybercrime investigation in the cloud environment. Through analysis of the two components in play; cybercrime and cloud environment, we will be able to understand what are the problems that are encountered when carrying out investigations in cloud forensics. Through the use of secondary research, this paper found out that most problems are associated with technical and legal channels that are involved in carrying out these investigations. Investigator's mistakes when extracting pieces of evidence form the most crucial problems that take a lead when it comes to cybercrime investigation in the cloud environment. This paper not only flags out the challenges that are associated with cybercrime investigation in cloud environments but also offer recommendations and suggested solutions that can be used to counter the problems in question here. Through a proposed model to perform forensics investigations, this paper discusses new methodologies solutions, and developments for performing cybercrime investigations in the cloud environment.

A Design and Implementation of Local Festivals and Travel Information Service Application

  • Jae Hyun Ahn;Hang Ju Lee;Se Yeon Lee;Ji Won Han;Won Joo Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.11
    • /
    • pp.65-71
    • /
    • 2023
  • In this paper, we design and implement the Walking Life Festival application, which is based on the Android platform and provides information about domestic travel destinations and regional festivals in South Korea. This application utilizes various sensors found in smartphones, including the Step Counter sensor, Step Detector sensor, Acceleration sensor, and GPS sensor. Additionally, it makes use of Google Map API and Public Open API to offer information about domestic travel destinations and local festivals. The application also incorporates an automatic login feature using the Shared Preference API. When storing login information in the database, it encrypts the input plaintext data using a hash algorithm. For Google Maps integration, it creates objects using the Google.maps.LatLngBounds() method and extends the location information through the extends method. Furthermore, this application contributes to the activation of the domestic tourism industry by notifying users about the timing of local festivals related to domestic travel destinations, thus increasing their opportunities to participate in these festivals.

Effects, and Problems of Acceptance with Modifications in CISG Art.19 ("청약(請約)을 변경하는 승낙(承諾)"(acceptance with modifications)의 효과(效果)와 문제점(問題點) - CISG 제19조를 중심으로 -)

  • Oh, Won-Suk
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.23
    • /
    • pp.71-91
    • /
    • 2004
  • The purpose of this paper is to examine the effects and problems of acceptance with modifications according to CISG Art. 19, comparing with UCC ${\S}2-207$. First of all this author raised two legal issues encountered when there is an acceptance with modifications. Scenario one is as follows : "Before either party has taken further action, there is a rise or a fall in the price of goods, was there a binding contract ?" The UCC rules provide for a contract if a purchaser sends out a purchase order and the seller sends back a sales acknowledgement form, and the items on the front(the price, description, and quantity) match up. The CISG on the other hand, is that most of the terms and conditions on the backs of the forms are important. Therefore, if they are different, there should not be a contract. Scenario two is as follows : "There has been performance, A disputes arises. What terms and conditions apply ?" The CISG and the UCC will probably lead to different results in the event the parties exchange conflicting forms and subsequently perform. Assuming that the offeree's reply contains terms that are materially different from the offer, the UCC provides that the resulting contract will include only those terms on which the writings of the parties agree, excluding conflicting terms. The CISG treats the material additions as a counter-offer and, in accordance with Art. 18, the offeree's performance may be regarded as an acceptance of a contract containing all of the offeror's terms ; or the offeror's performance may be regarded as an acceptance of a contract containing all of the offeree's terms. Second, this author raised three problems in the Art. 19 as follows ; 1) It is very difficult in practical application to decide what is material alterations even if the CISG lists material terms as an example. 2) There is a possibility for the offeror to speculate in the circumstance of market fluctuation as he has a change to object to the discrepancy in the offeree's reply. 3) There is also a possibility of inducement for the offeror or the offeree to send its own reply as a last shot.

  • PDF

A study on Flow Characteristics of the Semi-Circular inlet S-Shaped Intake at Various Angle of Incidence (입사각에 따른 반원형 입구형상 S-Shaped Intake에 대한 유동특성 연구)

  • Lee, Jihyeong;Cho, Jinsoo
    • Journal of Institute of Convergence Technology
    • /
    • v.5 no.2
    • /
    • pp.27-32
    • /
    • 2015
  • Air intakes are an essential component of aircraft engines. They are mainly used to offer uniform airflows to engine faces. Fighter aircraft have to mask the engine face inside the fuselage in order to reduce the Radar Cross Section(RCS). Therefore, offset intakes like a S-Duct are one of promising components for this purpose. During a fight, it is unavoidable that the flow will enter the intakes at some face angles other than zero. In this case, the performance of the aircraft engine will be influenced to the angle of incidence. In this study, the CFD analysis of the semi-circular S-Duct with AR(0.5,0) is performed to investigate the influence of the angle of incidence on the performance of the S-Duct using a distortion coefficient. To consider the adverse pressure gradient, a $k-{\omega}$ SST turbulence model is employed. The secondary flow and flow separation are observed for all computational cases. It is found that the positive incidence angle produces the best performances.

The Study about Improvement of Service Quality in Engineering Company (설계용역사의 서비스 품질 향상을 위한 연구)

  • Seok, Seong-Jae;Yoo, Yoong-Seok;Yun, Deok-Kyun
    • IE interfaces
    • /
    • v.17 no.1
    • /
    • pp.93-103
    • /
    • 2004
  • Service importance has been growing increasingly as competition element of enterprises according to going on rapid softness, information and knowledge of industrial infrastructure recently. Quality management system that implemented in manufacturing sector have been spreading rapidly to service company, but the company performing pure engineering service only in construction fields performed mainly the evaluation on the operational aspect such as degree of implementation of the established system because it is difficult to objective evaluation on the activity of the established quality management system or quality assurance system. This study would like to make on offer the improvement points based on the evaluation of service quality and the itself evaluation result through the questionnaire on the service offerers and customers using the pre-qualified SERVQUAL model in establishment of the improvement goal of the company. According to the result of this study, it is analyzed a gap and required to establish a counter-plan to correct many gaps discovered between the real offered level and the expect level of custom.

Development of a system for sustainable fashion from recycled clothes - Based on U.S. fashion brands -

  • Song, Hwa Kyung;Lewis, Van Dyke
    • The Research Journal of the Costume Culture
    • /
    • v.21 no.1
    • /
    • pp.139-150
    • /
    • 2013
  • Fast fashion companies have generated enormous amounts of clothing and large quantities of unsold or short-lived clothing end up in the landfill. As if to counter fast fashion, sustainable fashion has arisen for environmentally friendly garments at different levels from the fiber stage to production stage. However it is still fraught with uncertainty of systems in the industry. Therefore, this study proposed a system to create re-valued clothing from recycled garments for retailers. The target companies are large-sized retailers like Levi's, Polo, Gap, or J-Crew which are consistently producing basic items such as Levi's 501 or Classic Polo shirts with middle-prices. At the material stage, this study recommended additional requirements of designing a garment with a long life cycle based on criteria of an ideal garment developed by Patagonia clothing company. Then, this study explored innovative ways that retailers might connect with consumers to allow direct interaction between them in terms of the process of collecting used clothes. Using recycled clothing as a source material, this study strove to offer a process of redesign where the concept of 'waste to fashion' is developed as reconstructions where old forms are transformed into new ones.

Physiological Signal Analyses of Frictional Sound by Structural Parameters of Warp Knitted Fabrics

  • Cho Gilsoo;Kim Chunjeong;Cho Jayoung;Ha Jiyoung
    • Fibers and Polymers
    • /
    • v.6 no.1
    • /
    • pp.89-94
    • /
    • 2005
  • The purpose of this study is to offer acoustical database of warp knitted fabrics by investigating frictional sound properties and physiological responses according to structural parameters such as construction, lap form, and direction of mutual guide bar movement. Fabric sounds of seven warp knitted fabrics are recorded, and Zwicker's psychoacoustic param­eters - loudness(Z), sharpness(Z), roughness(Z), and fluctuation strength(Z) - are calculated. Also, physiological responses evoked by frictional sounds of warp knitted fabrics are measured such as electroencephalogram (EEG), the ratio of high fre­quency to low frequency (HF/LF), respiration rate (RESP), skin conductance level (SCL), and photoplethysmograph (PPG). In case of constructions, frictional sound of sharkskin having higher loudness(Z) and fluctuation strength(Z) increases RESP. By lap form, open lap has louder and larger fluctuating sound than closed lap, but there aren't significant difference of physi­ological responses between open lap and closed lap. In direction of mutual guide bar movement, parallel direction evokes bigger changes of beta wave than counter direction because of its loud, rough, and fluctuating sound. Fluctuation strength(Z) and roughness(Z) are defined as important factors for predicting physiological responses in construction and mutual guide bar movement, respectively.

A study on design of apartment modelhouse using virtual reality technic. (가상현실기법을 이용한 아파트 모델하우스 디자인활용에 관한 연구)

  • 윤재은;이준규;강신영
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2001.05a
    • /
    • pp.106-111
    • /
    • 2001
  • Model house play an important role in the sale of apartments. However, model house can create social and environmental problems. Virtual reality's (VR) use for the creation of model house has been studied as a possible counter measure to these problems. Existing models don't satisfy consumers' queries. A virtual model house can give the experience of seeing a real home through simulation. Also, a virtual model house can allow a home buyer to change the furniture on display or the color of the walls to reflect the consumer's taste in the construction. The internal present condition system using absorption style virtual reality and open style virtual reality are the indispensable tools that are going to take the place of the current model home. A virtual model house is more profitable than a physical model house because of reduced costs and time savings. In addition, a virtual model house can offer new kinds of information that a physical model home can not. This study's purpose is to discuss the desired direction of the virtual model house in this crucial and dynamic period of development.

  • PDF