• Title/Summary/Keyword: Defense Technology Protection

Search Result 114, Processing Time 0.022 seconds

Analysis of Security System Priority for the Systematic Defense Technology Security (체계적인 방위산업기술보호를 위한 보호체계 우선순위 분석 연구)

  • Park, Heungsoon;Kim, Seyong;Kim, Yonghwan
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.3-12
    • /
    • 2019
  • The outflow of defense technology can cause serious damage not only in terms of business losses, but also in terms of national security and national interests. Recently, the government has enacted the Defense Technology Security Act, recognizing the importance of technology in the defense industry, and prepared guidelines for the defense technology security accordingly. According to the law, institutions and companies with defense technologies should establish a defense technology protection system, and the government should implement various technology protection policies to improve their level of technology protection. In this study, the implications were derived by comparing existing technology protection guidelines and priority analysis was performed on the protection system details through AHP for self-diagnosis items in the defense technology security guidelines. As a result, it is expected that it will enable efficient diagnosis of the level of protection and policy support for the systematic establishment of the protection system for the target institutions.

A Trend Analysis and Technology Application of Defense Technology Protection (방위산업 기술보호 동향분석 및 기법적용)

  • Lee, Hyo Keun;Lee, Woon Soon;Oh, Yoo Jin;Park, ShinSuk
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.4
    • /
    • pp.579-586
    • /
    • 2017
  • The defense industry has become a global industry, and military technology is actively being traded between countries to increase their military capabilities. The Republic of Korea has been ranked one of the top 10 countries for exports of military technology. To maintain competitive advantages in the global defense industry, it is essential to protect key technologies employed by exported weapon systems. Various techniques have been developed for protection of confidential technologies in weapon systems, and the U.S. DoD has been leading the development of the protection techniques. This paper reviews current anti-tampering techniques that prevent leakage of key technology from weapon exportation or pillage. Based on the protection techniques employed by the U.S. DoD Anti-Tamper Executive Agent, this paper suggests novel design methods for protection of confidential technologies. The proposed design methods were tested on an actual weapon system.

Developments on Low Cost Protection Circuit of Discharge for D-type Non-rechargeable Lithium Batteries(Li/SOCl2) (D형 리튬 1차 단위전지(Li/SOCl2)용 저가형 과방전 차단회로 개발)

  • Ahn, Mahn-Ki;Jung, Yeong-Tak;Lim, Jae-Sung;Roh, Tae-Joo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.5
    • /
    • pp.665-674
    • /
    • 2018
  • In this paper, we propose a development results of a D-type non-rechargeable lithium battery($Li/SOCl_2$) on improvement in a low cost protection circuit of discharge for domestic military power source. According to this study, we describe a new design and product with 8-bit microcontroller in the protection circuit which can estimate state of health of the battery regardless of occurring an initial voltage delay. Also this paper discuss and facilitate development as solution to a safety about the non-rechargeable lithium batteries. As a result, we verified a quality of the protection circuit by a development test and evaluation(DT&E) process.

UTrustDisk: An Efficient Data Protection Scheme for Building Trusted USB Flash Disk

  • Cheng, Yong;Ma, Jun;Ren, Jiangchun;Mei, Songzhu;Wang, Zhiying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2276-2291
    • /
    • 2017
  • Data protection of removable storage devices is an important issue in information security. Unfortunately, most existing data protection mechanisms are aimed at protecting computer platform which is not suitable for ultra-low-power devices. To protect the flash disk appropriately and efficiently, we propose a trust based USB flash disk, named UTrustDisk. The data protection technologies in UTrustDisk include data authentication protocol, data confidentiality protection and data leakage prevention. Usually, the data integrity protection scheme is the bottleneck in the whole system and we accelerate it by WH universal hash function and speculative caching. The speculative caching will cache the potential hot chunks for reducing the memory bandwidth pollution. We adopt the symmetric encryption algorithm to protect data confidentiality. Before mounting the UTrustDisk, we will run a trusted virtual domain based lightweight virtual machine for preventing information leakage. Besides, we prove formally that UTrustDisk can prevent sensitive data from leaking out. Experimental results show that our scheme's average writing throughput is 44.8% higher than that of NH scheme, and 316% higher than that of SHA-1 scheme. And the success rate of speculative caching mechanism is up to 94.5% since the access pattern is usually sequential.

A Study on the Implementation of Defense Technology Master Data Management System for Defense Technology Security (방산기술보호를 위한 방산기술 마스터 데이터 관리 체계 구현 방안)

  • Park, Heungsoon;Kim, Seyong;Kwon, Hyukjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.111-122
    • /
    • 2021
  • With the spread of technology in the 4th Industrial Revolution, the defense industry in South Korea is getting developed into an industrial structure in which high-tech technologies are concentrated. As the importance of defense technology has gradually increased, the government has enacted the Defense Technology Security Act and required to build a protection system for institutions that possess or manage defense technology. In order for the target institution to introduce a protection system, it is necessary to identify the defense technologies that are protected and to ensure systematic data management. In order to cope with this, we derived master data items for data management and analyzed the implementation types of defense technology master data system suitable for the defense industry environments. The derived method identified the defense technology master data, such as primary and secondary master data, and through AHP analysis, Co-existence type was suitable as the target model for the master data management system. We expect that stronger defense technology security policy will be implemented through the defense technology MDM system.

South Korea's Defense Industry Development Strategy - Focusing on Technology Protection Policy - (한국의 방위산업 발전전략 연구 - 기술보호정책을 중심으로 -)

  • Geum-Ryul Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.83-93
    • /
    • 2024
  • As the paradigm of the global defense industry changes due to the Russia-Ukraine war, Korea's cutting-edge conventional weapons systems are attracting attention from around the world. In 2023, Korea ranked 9th in world arms exports, and is pursuing innovation in the defense industry with the goal of becoming the world's 4th largest defense exporter by 2027. The defense industry is a national strategic industry that requires a long period of time and a large budget, and defense technology is a core technology that has a great impact on the advancement of defense and the national economy. Over the past five years, Korea has suffered economic losses worth approximately 25 trillion won due to the outflow of cutting-edge technology overseas, and there is an urgent need for institutional improvement to prevent the outflow of defense technology. Therefore, this study presented Korea's defense industry development strategy by examining the laws and systems that the three key players in the Indo-Pacific region, the United States, China, and Japan, are promoting to protect defense industry technology. To foster the defense industry as a promising future industry in Korea, it is necessary to respond to the fast-evolving pace of development of advanced science and technology in connection with securing technological sovereignty and protect defense technology, which is a key technology of the country, by improving related laws and systems.

A Study on Development of Technology Protection Rating Methodology using Statistics (통계기법을 적용한 기술보호 등급분류 방법론 개발 연구)

  • Yang, Jeong-Eun;Yang, Younggyu;Cho, YunGyeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.671-678
    • /
    • 2021
  • In a previous study, technology protection levels were set on a qualitative basis. That study lacked quantitative standards, so here, we conduct a study to complement the previous study and to present an objective standard. This paper provides a method of setting a technical protection level that applies statistical analysis. To set the technology protection level, statistical analysis of six technical survey items is performed first. Second, the technical survey items are analyzed by AHP to quantify the opinions of experts in order to derive weights for each technical survey item. Finally, by using the normal distribution scatter map and median calculation method, the technology protection level is selected in three stages using the final detailed factor technology score reflecting the weight. The technology protection level methodology developed through this study is the first methodology with objectivity that can evaluate defense technology by level. If this methodology is applied in practice, it is believed that it will provide a scientific and quantitative technology value judgment criterion when setting the technology protection level in the future.

A Study on Establishment of Criteria to Identify the Defense Industrial Technology of Diesel Engine for Military Vehicle (군용차량을 위한 디젤기관의 방산기술 식별기준 정립에 관한 연구)

  • Yoon, Heung-Soo;Ryu, Yeon-Seung
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.177-184
    • /
    • 2019
  • The Defense Technology Security Act was enacted in 2015 to protect the defense industrial technology from being duplicated or interfering technologies being developed, which prevents its value and utility from deterioration and prevents inappropriate export. Defense industrial technology refers to technology that should be protected for national security among the national defense science and technology related to the defense industry. However, technical identification criteria of identification and management system of protection technology are not regulated. Therefore, in this study, through the Delphi survey, diesel engine core technology identification criteria related to the high efficiency internal combustion engine propulsion technology among the 141 defense industrial technologies is established to improve the identification and management system of the technology to be protected among the defense industrial technology protection system. As a result of the study, operational operability, durability, safety, sequencing and modularization were established as diesel engine core technology identification criteria.

A Study on Improvement of Ballistic Testing Method for Combat Helmet (방탄헬멧의 방탄시험방법 개선에 관한 연구)

  • Gu, Seung Hwan;Kim, Kyung Min;Park, Jung Hwa;Song, Seung Hwan
    • Journal of Korean Society for Quality Management
    • /
    • v.47 no.2
    • /
    • pp.283-294
    • /
    • 2019
  • Purpose: Although the development of bulletproof helmets continues to be carried out, little has been improved in testing methods. Therefore, in this study, we studied the improvement of the test method of the domestic bulletproof helmet. Methods: The causes of head damage in the battlefield and the trends of bulletproof helmet development in developed countries were analyzed. In addition, improvements were derived by comparing the test methods of bulletproof helmet in Korea and the United States. Results: The results of the improvement by comparing the test methods of bulletproof helmet in Korea and the United States are as follows First, it is an addition to the scope of environmental treatment. Second, it is an addition to the level of protection. Third, the addition of the level of protection by impact. Conclusion: This study considered testing methods to prevent head injuries to shocks that cannot be identified by conventional methods. In addition, it considered testing methods for various threats by improving protection performance to advanced countries' levels.

Protection Design and Lightning Zone Analysis for Unmanned Aerial Vehicle with Composite Wings (복합재 주익 무인항공기의 낙뢰보호 설계와 피격영역 해석)

  • Hee-chae Woo;Yong-Tae Kim
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.3
    • /
    • pp.302-312
    • /
    • 2023
  • This paper describes the analysis of lightning strike zoning, the indirect lightning data simulation and the protection design for lightning indirect effects of equipment by lightning strike for unmanned aircraft consisting of composite wings. Through the analysis of lightning strike zoning according to the external shape of unmanned aerial vehicles, the structure areas that should be protected during lightning strike is derived, and the protection requirements of lightning indirect effects for flight critical equipments and equipment that must be operated upon lightning strike was derived. Lightning protection levels according to the location of mounting equipment and surrounding structure materials for each equipment was derived, and the protection design of the unmanned aerial vehicle with composite structures was also proposed from direct effect of lightning. Later, the lightning protection technology will be verified by the ground test of lightning direct and indirect effects.