• Title/Summary/Keyword: Industrial Security Management

Search Result 582, Processing Time 0.022 seconds

Design of DID-based Verification Protocol for Strengthening Copyright Holders' Sovereignty (저작권자의 주권 강화를 위한 DID 기반 검증 프로토콜 설계)

  • Kim, Ho-Yoon;Shin, Seung-Soo
    • Journal of Industrial Convergence
    • /
    • v.20 no.9
    • /
    • pp.47-58
    • /
    • 2022
  • Digital content is difficult to distinguish between the original and the replica due to its nature. For this reason, NFT technology using blockchain technology is attracting attention because it can guarantee the proof and scarcity of the original digital content. However, the NFT buyer does not own the copyright to the digital content, but the ownership. In particular, since the minting process of issuing NFTs is possible for anyone, there is a copyright threat to the copyright holder. In this study, we propose a verification protocol based on DID for the process of issuing and transacting NFTs for copyright protection of copyright holders' digital contents. As a research method, the problems of research cases related to digital contents were analyzed and the safety was comparatively analyzed. NFT issuance can only be issued by copyright holders whose identity has been verified through DID, and only users who have completed authentication can participate in the transaction to prevent indiscriminate theft and use of digital content and form a safe and transparent transaction market.

Blockchain (A-PBFT) Based Authentication Method for Secure Lora Network (안전한 Lora 네트워크를 위한 블록체인(A-PBFT) 기반 인증 기법)

  • Kim, Sang-Geun
    • Journal of Industrial Convergence
    • /
    • v.20 no.10
    • /
    • pp.17-24
    • /
    • 2022
  • Lora, a non-band network technology of the long-distance wireless standard LPWAN standard, uses ABP and OTTA methods and AES-128-based encryption algorithm (shared key) for internal terminal authentication and integrity verification. Lora's recent firmware tampering vulnerability and shared-key encryption algorithm structure make it difficult to defend against MITM attacks. In this study, the consensus algorithm(PBFT) is applied to the Lora network to enhance safety. It performs authentication and PBFT block chain creation by searching for node groups using the GPS module. As a result of the performance analysis, we established a new Lora trust network and proved that the latency of the consensus algorithm was improved. This study is a 4th industry convergence study and is intended to help improve the security technology of Lora devices in the future.

Design of a Secure Keypads to prevent Smudge Attack using Fingerprint Erasing in Mobile Devices (모바일 단말기에서 지문 지우기를 활용한 스머지 공격 방지를 위한 보안 키패드 설계)

  • Hyung-Jin, Mun
    • Journal of Industrial Convergence
    • /
    • v.21 no.2
    • /
    • pp.117-123
    • /
    • 2023
  • In the fintech environment, Smart phones are mainly used for various service. User authentication technology is required to use safe services. Authentication is performed by transmitting authentication information to the server when the PIN or password is entered and touch the button completing authentication. But A post-attack is possible because the smudge which is the trace of using screen remains instead of recording attack with a camera or SSA(Shoulder Surfing Attack). To prevent smudge attacks, users must erase their fingerprints after authentication. In this study, we proposed a technique to determine whether to erase fingerprints. The proposed method performed erasing fingerprint which is the trace of touching after entering PIN and designed the security keypads that processes instead of entering completion button automatically when determined whether the fingerprint has been erased or not. This method suggests action that must erase the fingerprint when entering password. By this method, A user must erase the fingerprint to complete service request and can block smudge attack.

Time Series Analysis of the Correlation Between the Number of Drug Crime Arrests and Media Coverage for Enhancing Police Response to Drug Crimes (경찰 대응 능력 강화를 위한 마약 범죄 검거 수와 언론보도량의 시계열 분석)

  • Jeong-Woo Lee;Seungkook Roh
    • Journal of Industrial Convergence
    • /
    • v.21 no.6
    • /
    • pp.13-21
    • /
    • 2023
  • The purpose of this study is to investigate the relationship between the amount of media coverage related to drug crimes and the actual number of drug-related arrests. It aims to determine the implications of this relationship for the formulation of police policies in response to drug crimes. To achieve this, we collected and analyzed 50,355 domestic online media coverage data from 2001 to 2022 and drug crime arrest data compiled by the National Police Agency. The analysis confirmed a significant causal relationship between the amount of online media coverage of drug crimes and the actual number of drug crime arrests. This relationship was found to be influenced by the existence of dominant issues and the relevance of famous incidents. It was determined that media coverage was also influenced by public interest beyond drug crime arrest numbers. Based on these research findings, the police have proposed the need to monitor the amount of crime-related media coverage and enhance security capabilities for crimes that receive public attention in order to gain the trust of the citizens.

Technology Commercialization and Management Performance Analysis of Smart farm Venture companies (스마트팜 벤처기업의 기술사업화와 경영성과 분석)

  • Dae-Yu, Kim;Taiheoun Park;Won-Shik Na
    • Advanced Industrial SCIence
    • /
    • v.2 no.2
    • /
    • pp.25-30
    • /
    • 2023
  • The purpose of this study is to empirically analyze the impact of corporate innovation activities on corporate innovation performance using data from companies participating in the smart farm project. A company's innovation activities were divided into planning capacity, R&D capacity, and commercialization capacity, and the impact of each innovation activity on the company's sales and patent creation was estimated. The moderating effect was also analyzed. Regression analysis was conducted as a research method, and as a result of the analysis, it was found that planning capacity, R&D capacity, and commercialization capacity related to innovation within a company have an impact on corporate performance creation. appeared to be In order to increase the business performance of technology commercialization, it was confirmed that planning and R&D capabilities as well as governmental technology policy support are needed.

Design and Implement a Forgery-safe Blockchain-based Academic Credential Verification System (위변조에 안전한 블록체인 기반 학력 검증 시스템 설계 및 구현)

  • Jung-oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.7
    • /
    • pp.41-49
    • /
    • 2023
  • In recent years, various educational institutions have used online certificate services to verify academic achievement related to graduation and grades. However, the certificate of the existing system has limitations in verifying and tracking whether it is true or not and detailed academic background. In this regard, cases of forgery/falsification of online/offline certificates continue to occur. This study proposes a blockchain-based verification method that is safe from forgery and alteration, focusing on university institutions. Necessary information such as detailed class categories for each department, attendance, and detailed grades was collected/analyzed to create a linkage relationship through blockchain. In addition, the system/network environment required for blockchain sharing was considered, and it was implemented as an extension module in the form of an independent web application. As a result of the block chain verification, it was proved that the safe trust verification of educational information and the relationship between detailed information can be traced. This study aims to contribute to the improvement of academic credential verification services and information security for Korean educational institutions in the future.

Nursing Students' Experiences of Participating in Habruta Teaching Method: A Phenomenological Study (간호대학생의 하브루타 수업 참여 경험: 현상학적 연구)

  • Jeongha Yang;Yunju Lee
    • Journal of Industrial Convergence
    • /
    • v.21 no.10
    • /
    • pp.91-101
    • /
    • 2023
  • This study was attempted to identify the essence by confirming the experiences of students who participated in Habuta classes in their major subjects. From November 22, 2022 to December 6, 2022, eight nursing students were individually interviewed to collect data, and the data were analyzed by applying Colaizzi's phenomenological analysis methodology. The study's finding derived 6 categories. The specific categories were 'Coexistence of anxiety and expectation', 'Process of understanding and acquisition', 'Constant burden and discomfort', 'Progress and regression under pressure', 'Sense of security that is being recognized', 'Shift of thought to positivity'. In order for nursing students to participate in Havruta classes positively in the future, appropriate class design, active communication channels between professors and students, and strengthening of instructors' competence are required.

Experiences of Public Visiting Nurses on the Linkage Cooperation of public case management: Focus Group Interview (방문건강관리사업 담당자의 공공부문 사례관리 연계협력 경험: 포커스 그룹 인터뷰)

  • Kim, Hyung-Seon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.160-169
    • /
    • 2020
  • This study was conducted to identify the linkage and cooperation experiences in public case-management services of visiting health care practitioners. Focus group interviews were conducted with three people in charge of providing visiting healthcare services in public health centers. A semi-structured interview questionnaire was developed in advance through discussions among researchers In response to the interview questions, study participants described in detail the success and failure factors associated with linkage and cooperation that they experienced while providing visiting healthcare services. The interview data were analyzed qualitatively to identify the main themes and sub-themes reflecting visiting nurses' experiences with linkage and cooperation. The three main themes were: 'Guidelines act as positive performance factors for community-based linkage and cooperation', 'Unstable employment and lack of an integrated system act as barriers to linkage and cooperation', and 'Necessary for multidimensional approach to promoting linkage and cooperation'. Based on these results, the authors propose the development of clear linkage and cooperation standards and procedures, thereby ensuring job security for visiting nurses. Moreover, an integrated information system should be developed and implemented.

Study on Potential Water Resources of Andong-Imha Dam by Diversion Tunnel (안동-임하 연결도수로 설치에 따른 가용 수자원량에 관한 연구)

  • Choo, Yeon Moon;Jee, Hong Kee;Kwon, Ki Dae;Kim, Chul Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.2
    • /
    • pp.1126-1139
    • /
    • 2014
  • World is experiencing abnormal weather caused by urbanization and industrialization increasing greenhouse gas and one of these phenomenon domestically happening is flood and drought. The increase of green-house gases is due to urbanization and industrialization acceleration which are causing abnormal climate changes such as the El Nino and a La Nina phenomenon. It is expected that there will be many difficulties in water management, especially considering the topography and seasonal circumstances in Korea. Unlike in the past, a variety of water conservation initiatives have been undertaken like the river-management flow and water capacity expansion projects. To meet the increasing demand for water resources, new environmentally-friendly small and medium-sized dams have been built. Therefore, the development of a new paradigm for water resources management is essential. This study shows that additional security is needed for potential water resources through diversion tunnels and is very important to consider for future water supplies and situations. Using RCP 6.0 and RCP 8.5 in representative concentration pathway climate change scenario, specific hydrologic data of study basin was produced to analyze past observed basin rainfall tendency which showed both scenario 5%~9% range increase in rainfall. Through sensitivity analysis using objective function, population in highest goodness was 1000 and cross rate was 80%. In conclusion, it is expected that the results from this study will help to make long-term and stable water supply plans by using the potential water resource evaluation model which was applied in this study.

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.