• Title/Summary/Keyword: Interworking Service

Search Result 151, Processing Time 0.024 seconds

A Study on Cooperation between Kerberos system and Credit-Control Server

  • Choi, Bae-Young;Lim, Hyung-Jin;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.281-284
    • /
    • 2005
  • Kerberos is system that offer authorization in internet and authentication service. Can speak that put each server between client and user in distributed environment and is security system of symmetry height encryption base that offer authentication base mutually. Kerberos authentication is based entirely on the knowledge of passwords that are stored on the Kerberos Server. A user proves her identity to the Kerberos Server by demonstrating Knowledge of the key. The fact that the Kerberos Server has access to the user's decrypted password is a rwsult of the fact that Kerberos does not use public key cryptogrphy. It is a serious disadvantage of the Kerbercs System. The Server must be physically secure to prevent an attacker from stealing the Kerberos Server and learning all of the user passwords. Kerberos was designend so that the server can be stateless. The Kerberos Server simply answers requests from users and issues tickets. This study focused on designing a SIP procy for interworking with AAA server with respect to user authentication and Kerberos System. Kerberos is security system of encryption base that offer certification function mutually between client application element and server application element in distributed network environment. Kerberos provides service necessary to control whether is going to approve also so that certain client may access to certain server. This paper does Credit-Control Server's function in AAA system of Diameter base so that can include Accounting information that is connected to Rating inside certification information message in Rating process with Kerberos system.

  • PDF

Study on the Security Threat Factors of Social Network Services (소셜 네트워크 서비스의 보안 위협요인에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.115-121
    • /
    • 2019
  • Recently, as the use of smart devices is becoming more common, various and convenient services are being developed. Among these services, the Social Network Service(SNS) is easily accessible anywhere, anytime. In particular, as well as sharing information, it forms a social relationship in cyberspace to expand new connections, and the SNS account is used as an authentication means of other services to provide users with speed and convenience at all times. However, despite the many advantages of SNS, due to security vulnerabilities occurring in the interworking process with various services, accidents of personal information are constantly occurring, and it is urgent to prepare countermeasures against potential risk factors. It is a necessary situation. Therefore, in this paper, the use of SNS is expected to increase rapidly in the future, and it is expected that it will be used as the basic data for developing the countermeasures by learning the countermeasures according to the security threats of the SNS.

A New Multicast Routing Protocol for Multicast Delivery Agent-based Mobile-IPv6 in 3GPP2 IMT-2000 System (3GPP2 IMT-2000 시스템에서 멀티캐스트 전달 대리자 기반의 새로운 Mobile-IPv6 멀티캐스트 라우팅 프로토콜)

  • Park, Byeong-Seob;Kim, Sung-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.1
    • /
    • pp.15-23
    • /
    • 2002
  • We present a new MDA-based Mobile-IPv6 multicast routing algorithm for wirelese service operators to offer Mobile-IP over IMT-2000 service under IMT-2000 network by taking advantage of the existing infrastructure for IMT-2000 multimedia application services. The extended IMT-2000 system architectures use an PDSNs (i.e. IWFs), and the home network (i.e. Internet) backbone and intermediate network are composed of ATM entities. A key feature of the new protocol is the use of MDA(Multicast Delivery Agent) to reduce delivery path length of the multicast datagram. We show that proposed protocol is efficient in terms of various performance measures such as multicast traffic load, multicast related handoff, and average routing length when we implement it using the Mobile-IPv6. Particularly, the number of tunneling and average routing length of datagram are reduced relatively, the multicast traffic load is also decreased.

BuddyMirror: A Smart Mirror Supporting Image-Making Service (BuddyMirror: 이미지 메이킹 서비스를 지원하는 스마트 미러)

  • Jo, Yeon-Jeong;Sim, Chae-Lin;Jang, Hyo-Won;Jin, Jae-Hwan;Lee, Myung-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.5
    • /
    • pp.811-821
    • /
    • 2019
  • Image making for a person is a way to improve various factors that can express oneself, such as appearance, impression, and confidence. In general, people use mirror or camera as a traditional method to make their own image or perform presentation exercises. Recently, as smart mirrors are widely used in various fields, attempts to use smart mirrors as image making tools instead of mirrors have been frequently made. Smart Mirror is considered as a suitable tool to provide image making service because it can attach various devices such as a camera and a microphone in addition to the main advantage of a mirror that it is easily accessible. In this paper, we present BuddyMirror - a smart mirror software that provides image-making service to users, and a dedicated mobile app for flexibly running the mirror software. BuddyMirror provides functions for presentation, mock interview, and styling service at the request of users, interworking with the dedicated mobile app. We also describe the techniques developed for implementing and activating each of the new services as a module of MagicMirror, a widely used smart mirror development platform. The developed mobile app enables users to deliver presentations to BuddyMirror or to download the recorded video for image-making services.

A Study on the Quality Monitoring and Prediction of OTT Traffic in ISP (ISP의 OTT 트래픽 품질모니터링과 예측에 관한 연구)

  • Nam, Chang-Sup
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.115-121
    • /
    • 2021
  • This paper used big data and artificial intelligence technology to predict the rapidly increasing internet traffic. There have been various studies on traffic prediction in the past, but they have not been able to reflect the increasing factors that induce huge Internet traffic such as smartphones and streaming in recent years. In addition, event-like factors such as the release of large-capacity popular games or the provision of new contents by OTT (Over the Top) operators are more difficult to predict in advance. Due to these characteristics, it was impossible for an ISP (Internet Service Provider) to reflect real-time service quality management or traffic forecasts in the network business environment with the existing method. Therefore, in this study, in order to solve this problem, an Internet traffic collection system was constructed that searches, discriminates and collects traffic data in real time, separate from the existing NMS. Through this, the flexibility and elasticity to automatically register the data of the collection target are secured, and real-time network quality monitoring is possible. In addition, a large amount of traffic data collected from the system was analyzed by machine learning (AI) to predict future traffic of OTT operators. Through this, more scientific and systematic prediction was possible, and in addition, it was possible to optimize the interworking between ISP operators and to secure the quality of large-scale OTT services.

End-to-End QoS Enhancement in Mobile WiMAX Systems (모바일 와이맥스 시스템에서의 종단간 서비스 품질 향상)

  • Choo, Sang-Min;Oh, Sung-Min;Cho, Sung-Hyun;Kim, Jae-Hyun
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.5
    • /
    • pp.415-424
    • /
    • 2008
  • In this paper, we compare the QoS performance enhancement schemes according to the network architecture of mobile WiMAX system in order to improve the end-to-end QoS performance and propose QoS parameter mapping method and IP packet scheduling algorithm. To evaluate the end-to-end QoS performance, we implemented an end-to-end simulator of mobile WiMAX system using OPNET. Simulation results show that the proposed QoS parameter mapping scheme reduces the average delay of VoIP packet and improves uplink resource efficiency. And also, when the proposed IP packet scheduling algorithm is applied to the system, the end-to-end packet transmission delay of VoIP service can be reduced by 44-67 percent compared to FIFO and WRR scheduler.

Design of Embedded Based Distributed RFID Gateway Using Open Source Hardware (오픈 소스 하드웨어를 이용한 임베디드 기반의 분산형 RFID 게이트웨이의 설계)

  • Jeon, Jun-Cheol
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.6
    • /
    • pp.581-586
    • /
    • 2015
  • In this paper, we configure a Radio Frequency IDentification (RFID) gateway using an arduino and raspberry pi which are recent issues with a representative open source hardware. RFID technology is emerging as a key technology in a variety of environments as a technique to automatically identify objects using a radio frequency signal. In this paper, we propose a distributed RFID gateway for providing various communication methods and processing a large amount of RFID tag information efficiently, and to increase the scalability and middleware communication efficiency of the RFID reader. Existing RFID middleware systems have the problems that they should adhere the web service for interworking with a reader and the communication standard. Therefore, in this paper, we comprise our RFID gate to satisfy not only the serial communication configuration but also various digital signal processing standard so that it increases the communication efficiency of the middleware system.

Bandwidth Ratio Considerations for Traffic Parameter Mapping on the Frame Relay/ATM Interworking (FR/ATM 연동에서 트래픽 파라메타를 사상하기 위한 대역 비율)

  • Nam, Yun-Seok;Kim, Jeong-Sik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.175-181
    • /
    • 1999
  • There are issues regarding how some of traffic parameters should be set so that ATM and non-ATM service parameters can be compatible. For example, policing method used by frame relay based on CIR(committed information rate) will not exactly match the ATM UPC(Usage Parameter Control) method. ATM and the frame relay have different transfer modes and traffic parameters. The cells and frames are police by their own traffic control schemes. For the same information, the real traffic of the ATM side takes greater bandwidth than that of the frame relay side caused by ATM cell format and AAL5 format. IN both networks this bandwidth than that of the frame relay side caused by ATM cell format and AAL5 format. In both networks this bandwidth ratio should be considered on traffic parameter mapping to maintain their QoS and to perform efficient network resource management. In this paper we describe traffic parameter mapping schemes between frame relay and ATM in ATM network and how to expect the bandwidth ratio to maintain FR QoS in ATM network. We assumed frame length distribution to Erlang or Exponential probability density function.

  • PDF

Multiplex Certification System Using XML For WBI (WBI에서의 XML 다중인증 시스템)

  • 신영준;이동휘;김정재;김귀남
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.297-302
    • /
    • 2004
  • Internet becomes absolutely necessary tools due to rapid progress of information technology. Educational correspondence abount an age of information demand is a education focused on a learner and remote education based on information technology. WBI(Web Based Instruction) is a formation that remotly educate a learner using web, possible mutual reaction between instructor and learner, submint various studying material, has a good point to overcome spatial restriction. Internal and external standardization working is accelerated and recently XML security studies are activated using XML which is next generation web standard document format. And XML electronic signature raise interworking between digital signature systems used by various field of using XML document. Using these merit and complementing defect are main contents that users have to pay about Certification service to get CA certificate from 2004 june. This paper propose multiplex Certification remote education agent system using XML digital signature to satisfy security requirement.

  • PDF

Collaborative security response by interworking between multiple security solutions (보안 솔루션의 상호 연동을 통한 실시간 협력 대응 방안 연구)

  • Kim, JiHoon;Lim, Jong In;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.69-79
    • /
    • 2013
  • Recently, many enterprises are suffering from advanced types of malware and their variants including intelligent malware that can evade the current security systems. This addresses the fact that current security systems have limits on protecting advanced and intelligent security threats. To enhance the overall level of security, first of all, it needs to increase detection ratio of each security solution within a security system. In addition, it is also necessary to implement internetworking between multiple security solutions to increase detection ratio and response speed. In this paper, we suggest a collaborative security response method to overcome the limitations of the previous Internet service security solutions. The proposed method can show an enhanced result to respond to intelligent security threats.