• Title/Summary/Keyword: Key Technology Protection

Search Result 331, Processing Time 0.029 seconds

Design of Ubiquitous Payment Process for Enhancing Seamlessness and Privacy (연결완전성 제고와 프라이버시 보호를 위한 유비쿼터스 지불 프로세스의 설계)

  • Lee, Kyoung Jun;Jeong, Mu Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.3
    • /
    • pp.1-13
    • /
    • 2006
  • Ubiquitous computing is a study area explained in a myriad of contexts and technological terms. Payment, however, refers in nature to an act of money transfer from one entity to another, and it is obvious that a payment method will be valued as long as the transaction can be completed with safety no matter what technology was used. The key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme by looking at the characteristics of seamlessness under the ubiquitous environments, strong personal device, and peer-based information transactions. We also propose U-SDT Protocol integrating technologies such as Radio Frequency Identification (RFID), Bluetooth, Personal Payment Device, Account Managing Application and Transaction ID as a way to make transactions between users seamless and secure better privacy protection.

  • PDF

An Improved High-Performance Protocol for Security Vulnerability of GSM based on SIM Card (SIM 카드 기반 보안 취약성을 개선한 고성능 GSM 보안 프로토콜)

  • Kim, Hee-Jung;Jeon, Ha-Yong;Lee, Ju-Hwa;Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.7
    • /
    • pp.902-911
    • /
    • 2007
  • GSM platform is a hugely successful wireless technology and an unprecedented story of global achievement. In less than ten years since the first GSM network was commercially launched, it became the world's leading and fastest growing mobile standard, using over 1 billion GSM subscribers across more than 200 countries of the world. GSM platform evolved into 3th generation mobile communication which includes not only voice call services but also the international roaming and various kinds of the multimedia services. GSM is an essential element techniques a safe data transmission and a personal private protection while support services. However, a crypto algorithm and a secure protocol for a safe data communication using GSM are indicating various kinds of problems. In this paper, we propose a more safer and more efficient authentication protocol in 3th generation network through analysis of GSM security mechanism of 2th/2.5th generation. This security protocol offers enforced security efficiency by using user verification between SIM/ME and reduction of authentication and key agreement step between SIM/ME/AuC.

  • PDF

A study on smart fashion product development trends (스마트패션제품 개발 동향에 관한 연구)

  • Suh, Sung-Eun;Roh, Jung-Sim
    • The Research Journal of the Costume Culture
    • /
    • v.23 no.6
    • /
    • pp.1097-1115
    • /
    • 2015
  • ICT in the IOT era is the core basis of modern society. This study investigated and analyzed the recent commercialization trends of smart fashion products internationally and domestically, to utilize them as the basis of data for developing user-friendly smart fashion products that can meet the needs of consumers. Keyword research using the most representative search engines, Google and Naver was conducted for searching for various wearable items commercialized actively since 2010. The final 78 products were classified by the physical area, and the key features and benefits were analyzed. Smart fashion products were classified as four physical types for the head and face, torso, arms and hands, and ankles and feet. Smart fashion products for each body part were developed in various ways, such as hats, glasses, lenses, virtual screens, earphones, headsets, clothing, watches, wrist bands, gloves, rings, wallets, bags, anklets, shoes, socks, and insoles. The main features were music playback, bluetooth, a camera based on NFC, virtual effects, health and safety protection through measuring heartbeat and momentum, and social network sharing of all kinds of information, based on inter-working with a smartphone. These functions represent the physical, social, and emotional interactions among users and their surroundings, as well as the users, themselves. The research results are expected to be used in future studies on planning user-friendly and marketable products through in-depth analysis of the design characteristics of smart fashion products as well as consumer responses.

Examination about Recycling of Korean Cabbage Wastes (배추 쓰레기의 자원화 방안)

  • Ju, H.S.;Chung, Kiomin;Whang, Key;Lee, S.T.
    • Journal of the Korea Organic Resources Recycling Association
    • /
    • v.4 no.2
    • /
    • pp.63-69
    • /
    • 1996
  • Korean cabbage waste is produced in huge amounts in the process of dealing, and most of them are discarded imposing burden on our environment. In case of Garakdong agricultural and marine market in Seoul, the daily average amount of Korean cabbage waste is estimated more than 355ton(64.1% of the overall amount in waste occurrence). Recycling the cabbage waste is important for the protection of environment and reuse of waste materials. We examined the present situation of occurrence of the cabbage wastes, normal properties of the dietary fiber, and the conversion of high value-added dietary fiber from the cabbage wastes. As a result of examination of the content of dietary fiber in Korean cabbage waste, we found that the dietary fiber content(2.5%) was higher than the known value(0.7%), and that in the process of extraction of dietary fiber, there was no significant difference between the samples added with amylase and protease compared to control.

  • PDF

A Study on the Design of Key Scheduler Block Cryptosystem using PRN (PRN을 이용한 키 스케줄러 블록암호시스템 설계에 관한 연구)

  • 김종협;김환용
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.2
    • /
    • pp.112-121
    • /
    • 2003
  • Information Protection and cryptography technology is developed with if but solved problem of real time processing and secret maintain. Therefore this paper is Proposed new PRN-SEED(Pseudo-Random Number-SEED) for the increasing secret rate and processing rate perform performance analysis with existed other cryptography algorithms. Proposed new PRN-SEED crypto-algorithm increase in the processing rate than existed algorithms use bit and byte mixed operation with RNG(Random Number Generator). PRN-SEED that performs simultaneous operations have higher 1.03 in the processing rate and 2 in the cryptosystem performance than existed cryptosystems. Implementation for PRN-SEED use Synopsys Design Analyser Ver. 1999.10, samsung KG75 library and Synopsys VHDL Debegger. As a simulation result, symmetric cryptosystem DES operate 416Mbps at the 40MHz and Rijndael operate 612Mbps at the 50MHz. PRN-SEED cryptosystem have gate counting 10K and operate 430Mbps at the 40MHz and 630Mbps at the 50MHz.

  • PDF

3D Medical Image Data Watermarking Applied to Healthcare Information Management System (헬스케어 정보 관리 시스템의 3D 의료영상 데이터 다중 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11A
    • /
    • pp.870-881
    • /
    • 2009
  • The rapid development of healthcare information management for 3D medical digital library, 3D PACS and 3D medical diagnosis has addressed security issues with medical IT technology. This paper presents multiple 3D medical image data for protection, authentication, indexing and diagnosis information hiding applied to healthcare information management. The proposed scheme based on POCS watermarking embeds the robust watermark for doctor's digital signature and information retrieval indexing key to the distribution of vertex curvedness and embeds the fragile watermark for diagnosis information and authentication reference message to the distance difference of vertex. The multiple embedding process designs three convex sets for robustness, fragileness and invisibility and projects 3D medical image data onto three convex sets alternatively and iteratively. Experimental results confirmed that the proposed scheme has the robustness and fragileness to various 3D geometric and mesh modifiers at once.

Pyrolysis Treatment for TBT Paint Waste from Ship (선박용 TBT 방오페인트 폐기물의 열분해 처리)

  • Park, Sang-Ho;Kim, In-Soo;Song, Young-Chae;Woo, Jung-Hui;Kim, Dong-Geun
    • Journal of Navigation and Port Research
    • /
    • v.27 no.4
    • /
    • pp.449-454
    • /
    • 2003
  • Bans on TBT based antifouling paints have been drafted since 1998 by meetings 42, 43, 45 and 46 for the MEPC(Marine Environmental Protection Committee) of the international Maritime Organization, and decided finally at a Diplomatic Conference of the IMO in October 2001. It was a key issue that there should be a global prohibition on the presence of organo-tin compounds in ships by 1 Jan. 2008. TBT Paint Wastes from ship have been produced by vast quantity since 2003. This paper suggests a method to design Treatment System for TBT Paint Waste from Ship. The organotion compound was dissolved by heating, and the organic matters was oxidized and turned into inorganotins, then they were stabilized in the end. At 500^{\circ}C$, the organotin compound which heated for one hour was removed by 58%, and in 1000^{\circ}C$ the organotin compound was treated by 99.9% after and hour of heating treatment.

A Study on Encryption Module for Remote Terminal Security of Smart Water-Grid Network (스마트 워터그리드 네트워크의 원격 단말기 보안을 위한 암호화 모듈에 관한 연구)

  • Park, Seung-Hwan;Park, Hyung-Mo;Kim, Chang-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.712-719
    • /
    • 2013
  • This paper studies the security module for the reliable transmission of the meter reading and the control data between the remote terminals and the upper server-side in smart water grid. The proposed security module was implemented to make it attachable to the remote terminal without security function. In particular, unlike the smart grid of electric field, the low power is considered due to the use of battery power in the smart water grid, and the ARIA-GCM-128 symmetric key method is adopted taking into the account that the damp and constrictive environments by the installed meter location in the underground occur a communication obstacle on building of the large-scale network system. The encryption module of this paper was devised to ensure the safety between the reading data on the terminal and the control data from the upper server, and secure the stability of the remote meter reading system by taking protection against an arbitrary alteration or modification.

Three-dimensional Numerical Simulation of Driftwood Accumulation and Behavior Around Bridge Piers (교각 주변 유목 집적 및 거동 특성 3차원 수치모의)

  • Park, Moonhyeong;Kim, Hyung Suk
    • Ecology and Resilient Infrastructure
    • /
    • v.7 no.4
    • /
    • pp.336-344
    • /
    • 2020
  • The prediction and evaluation of driftwood accumulation around river-crossing structures are essential because driftwood accumulation increases during flood disasters. In this study, the driftwood accumulation and behavior around bridge piers were evaluated via a numerical model that could be employed to analyze three-dimensional turbulent flow and driftwood motion. The moving particle semi-implicit-based model for driftwood motion was sensitive to the number of spheres. The numerical results showed that the approach velocity and the ratio of driftwood length to pier width were the key factors influencing driftwood accumulation, whereas the driftwood density had only a minor influence. Overall, it is expected that this study will contribute to the development of improved risk evaluation indexes for assessing driftwood accumulation around river-crossing structures.

A Secure Maintenance Scheme of Secret Data on Trusted Mobile Platform Environment (Trusted Mobile Platform 환경에서의 안전한 비밀 데이터 유지(이전) 방안)

  • Kang, Dong-Wan;Lee, Im-Yeong;Han, Jin-Hee;Jun, Sung-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.79-91
    • /
    • 2008
  • Modern society as an information society, a lot of information is communicated in on-line. Specially, mobile environment based on radio communication has a characteristic of flexibility compared with wire communication and is developed rapidly. However, the more mobile technology is developed the more security for sensitive information is needed. Therefore, MTM(Mobile Trusted Module) is developed and promoted by TCG(Trusted Computing Group), which is an industry standard body to enhance the security level in the mobile computing environment. MTM, hardware security module for mobile environment, offers user's privacy protection, platform integrity verification, and individual platform attestation. On the other hand, secure migration scheme is required in case secret data or key is transferred from one platform to the other platform. In this paper, we analyze migration schemes which were described in TCG standard and other papers and then propose security maintenance scheme for secret data using USIM(Universal Subscriber Identity Module).