• Title/Summary/Keyword: IPTV security

Search Result 80, Processing Time 0.032 seconds

IPTV and User Scenario-Based Interface in Home Network Service (홈 네트워크 환경에서 사용자 중심 시나리오를 활용한 IPTV 인터페이스 분석)

  • Lee, Jee-Hee;Kim, So-Hyun;Kim, Hyun-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.92-100
    • /
    • 2010
  • Due to the development of digital appliance, role of TV causes both-way by introducing IPTV, and SNS service causes big change of watching environment and residence environment. There are good conditions on the role of integrated control because it is arranged in the living room which secures movement most effectively and because family members can easily use, and the degree of use is high. Therefore, we infer user's needs by analyzing user scenario and current role of TV in home network environment. Primarily, we collect surveys of development scenario and technology which companies suggest TV applied by home network service, and secondly, we comparatively study scenario which the companies mentioned above suggest through observing user scenario, and study the role of IPTV in the future through actual scenario-based experiment by ethnography. After analyzing user scenario through case study and experiment, there are integrated device studies mainly in company study because it can be made up inside home, security and entertainment. On the other hand, there are patterns of user behavior by scenario experiment mainly in auto-tainment, security, and it showed that it is insufficient for interaction between TV and home media peripheral. Through this paper, we analyze context of home user, and based on this, we could suggest effective use of service development. Also after analyzing user form, we could know it also should be considered of ratio between activity inside home and activity outside home.

Infant nurture management guide service widget based on Smart-TV (스마트TV 기반 유아 양육 도우미 서비스 위젯)

  • Jo, Hui-Joon;Choi, Jong-Hyuk;Jung, Jai-Jin
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.93-99
    • /
    • 2010
  • Smart TV, Internet content and interactive services are available, the operating system to mount the Web, App Store, you can enjoy a variety of content. Smart TV market, TV replacement cycle is long, watching for changes in the way copyright issues such as adaptation period and, unlike the case of a smart phone TV market in the short term are expected to occupy will not find, if IPTV, satellite, cable and real-time TV platform for broadcasters to adopt a smart, smart TV market could spread more quickly than expected. Long term, Google, Apple, TV gajeonsa and broadcasters to compete with various companies through the process of expanding the TV market is smart, the media are expected to dominate the market. Smart TV with the latest technology-related research and to investigate the Smart TV, Smart TV is designed based widgets. Widgets on the desktop, mobile, IPTV, etc. can be implemented in various environments and various features and types of users already are using the widget. In particular the advantages of the widget can be implemented to meet the needs of the users, because users to more efficiently and meet their desired widget. In this paper, propose Smart-TV-based Baby management widget.

Analysis of Smart TV Trends and Security Vulnerabilities to Use in the Smartwork (스마트워크환경에서 활용가능한 스마트 TV 기술 동향 및 보안 취약점 분석)

  • Wi, Yu-Kyeong;Kwak, Jin
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.76-79
    • /
    • 2012
  • 실시간 방송과 웹 어플리케이션, 양방향 서비스 등 방송과 통신의 융합인 스마트 TV의 보급률이 점차 증가하고 있다. 하지만 발전하고 있는 스마트 TV 서비스에서 기존의 IPTV와는 다르게 악성 어플리케이션 등 다양한 보안 취약점이 발생하고 있다. 따라서 본 논문에서는 스마트워크환경에서 활용가능한 스마트 TV의 기술 동향과 보안 취약점에 대해 분석하고자 한다.

  • PDF

SVC and CAS Combining Scheme for Support Multi-Device Watching Environment (다중기기 시청환경을 지원하기 위한 SVC와 CAS 결합 기법)

  • Son, Junggab;Oh, Heekuck;Kim, SangJin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1111-1120
    • /
    • 2013
  • CAS used in IPTV or DTV has an environment of sending single type of contents through single streaming. But it can be improved to support users' various video applications through single streaming by combining with SVC. For such an environment, efficiency should be firstly considered, and hierarchical key management methods for billing policy by service levels should be applied. This study aims to look into considerations to apply SVC to CAS and propose SVC encryption in CAS environment. The security of the proposed scheme is based on the safety of CAS and oneway hash function. If the proposed scheme is applied, scalability can be efficiently provided even in the encrypted contents and it is possible to bill users according to picture quality. In addition, the test results show that SVC contents given by streaming service with the average less than 10%overhead can be safely protected against illegal uses.

A Study on Each Generation of Mobile Cloud (모바일 클라우드의 각 세대에 관한 연구)

  • Lee, Jung-Hoon;Sin, Yeong-Rok;Hassan, Mohammad Mehedi;Aldana, Maria Elizabeth;Huh, Eui-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.238-240
    • /
    • 2010
  • 본 논문은 최근 IT 분야에서 각광받는 모바일 클라우드를 모바일 노드와 클라우드의 역할에 따라 3 가지 세대로 분류하고, 각 세대별 특장과 활용 및 고려사항에 대해 고찰하였다. 1 세대는 웹 어플리케이션, 2 세대는 실시간 사진전송 시스템, 3 세대는 IPTV UCC 전송 시스템을 각 세대별 예로 들어 그 특징을 논의하였다.

Introduction of a VOD Mobile App for Promoting VOD Service of a Domestic Digital Cable Broadcasting (국내 디지털케이블 방송사의 VOD 서비스 활성화를 위한 VOD 모바일 앱 개발 사례)

  • Ko, Kwangil
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.3-9
    • /
    • 2014
  • As the subscribers of the digital cable and IPTV broadcasting are increasing, the VOD service has established a solid foothold as a profit model of the broadcasting industries. And what's more, the VOD service is emerging as a key application of the N-screen technologies. In the circumstance, broadcasting companies are trying to provide mobile services to improve the satisfaction of their VOD services usage. The paper introduces a VOD mobile app (of a domestic digital cable broadcasting), which includes the functions of promoting the VOD programs printed on a VOD guide book, directly transmitting the information (e.g., book-marking, remote-control signals) generated by the VOD mobile app to a set-top box, and watching the video contents stored in the mobile device on TV.

Survey of Overseas Internet Banking Authentication Mechnisms (해외 온라인뱅킹 인증현황 및 향후 전망)

  • Byun, Jeung-Ho;Lee, Chae-Chang;Lee, Dong-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.718-721
    • /
    • 2012
  • 1995년 세계 최초로 미국의 SFNB(Security First Network Bank)가 온라인뱅킹 서비스를 시작한 이래, 온라인뱅킹의 보급률은 전 세계적으로 급격한 성장세를 보이고 있으며, 이러한 성장세는 스마트폰, IPTV 등 새로운 전자금융 환경이 형성되면서 앞으로도 지속 될 것으로 판단된다. 온라인뱅킹이 이렇게 성장할 수 있었던 이면에는 보안성이 확보된 인증기술의 지속적인 개발이 큰 역할을 했다. 최근 우리나라는 인증기술의 보안성, 편의성, 다양성을 높이기 위한 다양한 노력들이 일어나고 있다. 특히 인터넷 익스플로러 기반의 공인인증서를 대체하기 위해 적극적인 연구가 진행 중에 있다. 본 논문에서는 금융 선진국이라고 할 수 있는 해외 주요 선진국들의 온라인뱅킹에서의 인증기술들을 살펴보고, 이러한 인증기술들의 비교, 분석을 통해 앞으로 등장 가능한 인증기술을 전망하며 향후 온라인뱅킹 인증기술과 관련된 연구에 기반이 되고자 한자.

Secure and Efficient Access Control Protocol in Digital Broadcasting System (디지털 방송에서 안전하고 효율적인 접근 제어 프로토콜)

  • Lee, Ji-Seon;Kim, Hyo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.32-43
    • /
    • 2010
  • IPTV is an emerging technology that combines both broadcasting and tele-communication technologies, and provides various multi-media contents to the service subscribers. In general, IPTV broadcasters transmit scrambled signals (multi-media contents) to the paying subscribers, and the users within the acknowledged network descramble the signals using the smart-card. That is, users are verified through communication between STB (Set-Top Box) and smart-card. In 2004, Jiang et al. proposed a secure protocol regarding the verification process. The method has been modified and enhanced by several following research works. However, all the methods that have been proposed so far required modular exponentiation operations which may raise the smart-card costs. In this paper, we propose a new efficient mutual authentication and session-key establishment protocol using only hash functions and exclusive-or operations, and show that the proposed protocol is still secure under various security attacks.

Designing Reliable P2P Transmission Mechanism Against MITM Attack (MITM 공격에 안전한 P2P 신뢰전송 메커니즘의 설계)

  • Kim, Sang-Choon;Kwon, Hyeonk-Chan;Nah, Jae-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.103-109
    • /
    • 2008
  • Many Internet application provide the PKI(public key infrastructure)-based service to provide authentication and message integrity. Several researchers proposed PKI-based p2p network framework. However, in the real world, the use of PKI is not suitable for peer to peer network, because the peer-to-peer network is an open and dynamic network. Moreover, currently there is no nation-to-nation interoperable certificate. In this paper, we designed reliable p2p file sharing application without public key infrastructure. To do this we propose reliable public key distribution mechanism to distribute public key safely without PKI infrastructure for two-tier super-peer architecture. In our system, each peer generates and distributes its public/private key pairs, and the public key is securely distributed without PKI. The proposed mechanism is safe against MITM attack. This mechanism can be applied various P2P applications such as file sharing, IPTV, distributed resource sharing and so on

Analysis of Security Vulnerability in Convergence Environments (융합서비스 환경에서의 보안 취약점 분석)

  • Yun, Sung-Yeol;Park, Seok-Cheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1354-1356
    • /
    • 2010
  • 시스템 또는 네트워크 자원을 공격 대상으로 하는 서비스 거부 공격 및 분산 서비스 거부 공격의 문제가 심화됨에 따라 이런 DDoS 공격이 일반 인터넷상에서의 공격보다 VoIP 서비스, IPTV 서비스, 스마트폰 등 융합서비스를 대상으로 시도 될 수 있다. 본 논문에서는 DDoS 공격이 융합서비스를 대상으로 하는 경우를 고려하여 각각의 플랫폼의 보안 취약점을 분석하였다.