• Title/Summary/Keyword: Proprietary Information

Search Result 123, Processing Time 0.024 seconds

Information Right Management System using Secret Splitting of Hardware Dependent Encryption Keys (하드웨어에 종속된 암호키 비밀 분할을 이용한 정보권한관리 시스템)

  • Doo, So-Young;Kong, Eun-Bae
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.3
    • /
    • pp.345-351
    • /
    • 2000
  • This paper presents a right management scheme using secret splitting protocol. Right management schemes combat piracy of proprietary data (such as digital music). In these schemes, encryption has been used and it is essential to protect the keys used in encryption. We introduce a new key protection method in which a secret encryption key is generated using both user's hardware-dependent unique information (such as MAC address) and cryptographically secure random bit strings provided by data owner. This scheme prevents piracy by checking hardware-dependent information during rendering and improves the secrecy of the data by individualizing the encryption key for each data.

  • PDF

Real-time hacking, detection and tracking ICT Convergence Security Solutions Test and Evaluation (실시간 해킹, 탐지 및 추적관리 ICT 융합 보안 솔루션 시험평가)

  • Kim, Seung-Bum;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.235-246
    • /
    • 2015
  • Understanding the various unspecified hacking and repeated cyber DDoS attacks, finally was able to find a solution in the methods of attacks. Freely researching approach that combines the attacker and defender, offensive and defensive techniques can be called a challenge to discover the potential in whimsy. In this paper we test and evaluate "KWON-GA", global white hackers team has made by many years of experiences in infiltration and diagnosis under guise of offence is the best defence. And it is knowledge information ICT Convergence security solution which is developed for the purpose of defence, it provide customization policy that can be fit to customer's system environment with needed techniques and it is processed with unique proprietary technology so that it's not possible to scan. And even if it has leaked internally it's impossible to analyze so hackers can't analyze vulnerability, also it can't be abused as hacking tools.

Support of Third Party Logistics Operation based on Business Rules (비즈니스 규칙 기반의 3자 물류 운영 지원)

  • Park, Chulsoon;Bang, Yanghee;Sung, Hongsuk
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.2
    • /
    • pp.137-144
    • /
    • 2017
  • The business process of global third party logistics company is defined as a network of logistics activities which involves the products that are manufactured in the developing countries, such as Vietnam, China and so on, and delivered to North or South American countries via intermediate stopover sites. The third party logistics company usually uses proprietary logistics information system to support the related logistics activities. However, each consignor sometimes may require different business process based on the customer type or characteristics of their products. Therefore, the third party logistics company need to modify their business process to reflect customer's requirements, resulting in the modification of logistic information systems and additional costs. Therefore, a flexible mechanism is required to efficiently support the various types of requirements by the owners of the products. In this paper, first, we figured out various business rules related to third party global logistics activities. Second, we grouped the identified business rules into business processes, objects, relations, dependency, policy, representations, execution, and resources and further into precondition, postcondition, and invariant based on checking point in time. Furthermore, the categorized rules are classified into inter-activity and intra-activity rules based on the execution range. Third, we proposed a rule syntax to describe the defined rules into scripts which are understood by user and information system together. When each activity is executed, the rule manager checks whether there are rules related with the activity execution. Finally, we developed a prototype rule management system to show the feasibility of our proposed methodology and to validate it with an example.

A Systematic Literature Survey of Software Metrics, Code Smells and Refactoring Techniques

  • Agnihotri, Mansi;Chug, Anuradha
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.915-934
    • /
    • 2020
  • Software refactoring is a process to restructure an existing software code while keeping its external behavior the same. Currently, various refactoring techniques are being used to develop more readable and less complex codes by improving the non-functional attributes of software. Refactoring can further improve code maintainability by applying various techniques to the source code, which in turn preserves the behavior of code. Refactoring facilitates bug removal and extends the capabilities of the program. In this paper, an exhaustive review is conducted regarding bad smells present in source code, applications of specific refactoring methods to remove that bad smell and its effect on software quality. A total of 68 studies belonging to 32 journals, 31 conferences, and 5 other sources that were published between the years 2001 and 2019 were shortlisted. The studies were analyzed based on of bad smells identified, refactoring techniques used, and their effects on software metrics. We found that "long method", "feature envy", and "data class" bad smells were identified or corrected in the majority of studies. "Feature envy" smell was detected in 36.66% of the total shortlisted studies. Extract class refactoring approach was used in 38.77% of the total studies, followed by the move method and extract method techniques that were used in 34.69% and 30.61% of the total studies, respectively. The effects of refactoring on complexity and coupling metrics of software were also analyzed in the majority of studies, i.e., 29 studies each. Interestingly, the majority of selected studies (41%) used large open source datasets written in Java language instead of proprietary software. At the end, this study provides future guidelines for conducting research in the field of code refactoring.

A Study on the Adoption Factors of Potential Users of the Digital Radio Broadcasting (디지털 라디오방송의 수용자 특성에 관한 연구)

  • Kwon, Jung-A.;Park, Gwang-Man
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.620-629
    • /
    • 2010
  • The analogue radio broadcasting was proven to be a successful and efficient media of delivering information because of free content and wide availability of cheap receivers. But the competition was more dropped than any other media due to the limited amount of radio spectrum that is available. The risk of doing nothing is to miss the opportunity and to loss existing audiences in the long term, or to be locked into inefficient proprietary systems. That is the reason why it is important to act now. It is time for regulators and market participants to hone their strategies, by clearly establishing factors to adopt the digital radio and to facilitate its diffusion. The purpose of this study is to find adoption factors that affected to potential users of digital radio broadcasting. Former research based on diffusion of innovation theory showed that adoption of innovation is affected by demographic variables, media usage and consumer's attitude of innovation. In this study based on a consumer survey, we examined those factors and characteristics of each steps that suggested in diffusion of innovation theory. The findings of this study have implications to explore the suitable technologies and services of digital radio broadcasting.

Digital Rights Management and Rights Language (디지털 저작권관리와 Rights Language)

  • 박정희;성평식;이기동
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.2
    • /
    • pp.7-13
    • /
    • 2003
  • The Internet presents a unique platform for disseminating digital content such as music, video, games, software, text, business and proprietary corporate information. It promises ubiquitous access, while at the same time fundamentally challenging the traditional rules of ownership and distribution of content. In such environment, safe protection and proper delivery of digital content would be a crucial requirement toward a new e-business model. Research on the Digital Rights Management (DRM) focuses on filling this functional vacancy of the market transition by providing a more viable business model based. XrML(eXtensible Rights Markup Language) provides a universal tool for specification of rights, fees, and issuing conditions(licenses) associated with the use and protection of digital content. ContentGuard has developed XrML to unify the Digital Rights Management(DRM) specifications and encourage interoperability. It seems that all working groups of DRM agree to use XrMl for their right description language.

  • PDF

A Study of Privacy Protection Awareness of Mobile Phone Users (휴대폰 사용자의 개인정보 보호 의식 연구)

  • Rhee, Hae-Kyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.386-394
    • /
    • 2008
  • Adoption of wireless communication facilities in mobile devices leads to increased vulnerability in individual privacy. One of such cases was discovered when a smart mobile phone of Paris Hilton at Oscar Award Ceremony was hacked a Swedish group of hackers. In this study, I wondered what sort of personal information could be exposed to hackers in such cases. In the course of survey, it was recognized that technical analysis of flash memory in mobile devices to check what kinds of data are stored there is technically almost impossible, since they are usually built in a proprietary manner. No generic tools could apply to discover their contents. Having recognized technical difficulties, it was inevitable to resort to a questionnaire survey to see awareness level with regard to personal privacy. We collected response from three hundred respondents by posting the questionnaire at World Survey on-line research site. What we have discovered was quite astonishing that even personal residence registration numbers have been found from nine of every ten respondents. Other data revealed include phone numbers, names, and personal bank accounts.

Method for Inferring Format Information of Data Field from CAN Trace (CAN 트레이스 분석을 통한 데이터 필드 형식 추론 방법 연구)

  • Ji, Cheongmin;Kim, Jimin;Hong, Manpyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.167-177
    • /
    • 2018
  • As the number of attacks on vehicles has increased, studies on CAN-based security technologies are actively being carried out. However, since the upper layer protocol of CAN differs for each vehicle manufacturer and model, there is a great difficulty in researches such as developing anomaly detection for CAN or finding vulnerabilities of ECUs. In this paper, we propose a method to infer the detailed structure of the data field of CAN frame by analyzing CAN trace to mitigate this problem. In the existing Internet environment, many researches for reverse engineering proprietary protocols have already been carried out. However, CAN bus has a structure difficult to apply the existing protocol reverse engineering technology as it is. In this paper, we propose new field classification methods with low computation-cost based on the characteristics of data in CAN frame and existing field classification method. The proposed methods are verified through implementation that analyze CAN traces generated by simulations of CAN communication and actual vehicles. They show higher accuracy of field classification with lower computational cost compared to the existing method.

Challenges in Construction of Omics data integration, and its standardization (농생명 오믹스데이터 통합 및 표준화)

  • Kim, Do-Wan;Lee, Tae-Ho;Kim, Chang-Kug;Seol, Young-Joo;Lee, Dong-Jun;Oh, Jae-Hyeon;Beak, Jung-Ho;Kim, Juna;Lee, Hong-Ro
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.768-770
    • /
    • 2015
  • We performed integration and standardization of the omics data related agriculture. To do this, we requires progressed computational methods and bioinformatics infrastructures for integration, standardization, mining, and analysis. It makes easier biological knowledge to find. we potentialize registration a row and processed data in NABIC (National Agricultural Biotechnology Information Center) and its processed analysis results were offered related researchers. And we also provided various analysis pipelines, NGS analysis (Reference assembly, RNA-seq), GWAS, Microbial community analysis. In addition, the our system was carried out based on the design and build the quality assurance in management omics information system and constructed the infrastructure for utilization of omics analyze system. We carried out major improvement quality of omics information system. First is Improvement quality of registration category for omics based information. Second is data processing and development platform for web UI about related omics data. Third is development of proprietary management information for omics registration database. Forth is management and development of the statistics module producers about omics data. Last is Improvement the standard upload/ download module for Large omics Registration information.

  • PDF

Cloud-Oriented XML Metadata Generation between Heterogeneous Navigation Systems for Unknown Roads (클라우드 환경에서 이기종 네비게이션간의 새로운 도로 정보 업데이트를 위한 XML 메타 데이터 생성)

  • Lee, Seung-Gwan;Choi, Jin-Hyuk
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.83-91
    • /
    • 2011
  • The roadmap DB update for unknown roads is a very important factor for car navigation systems. In this paper, we propose a cloud computing based roadmap generation method for use between heterogeneous navigation system for unknown roads. While the drivers drive on unknown roads, the proposed method extracts the road attribute information, and then generates the metadata in an XML format that is available for the heterogeneous navigation systems in a cloud environment. The metadata is proposed to be used as a replacement for conventional proprietary roadmap formats which used by roadmap providers, which is efficient for heterogeneous navigation system providers in a cloud computing environment. Then, this metadata is provided to the roadmap DB providers through the cloud computing interfaces. With the proposed method, the roadmap DB providers update the own roadmap DB for navigation systems in real time. Therefore, the proposed method can reduce the costs of an actual traveling test and the maintenance for the roadmap DB provides. Thus, the cloud-oriented road map generation method can more efficiently update the unknown road information.