• Title/Summary/Keyword: Protection function

Search Result 1,148, Processing Time 0.033 seconds

A Classification of the Fire Law related by Building Occupancy for the Comparative System of Fire Protection Performance (방재 성능 비교 시스템 구축을 위한 화재관련 법규의 건축 용도별 분류)

  • Shin, Ho-Sub;Suk, Chang-Mok;Cha, Chung-Sook;Han, Ju-Hyung;Kim, Young-Yeon
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 2008.04a
    • /
    • pp.25-28
    • /
    • 2008
  • Korean city had been rapid developed through high industrialization and rapid economic growth after the 1970's. The city development process was guaranteed the fulfillment of city function through the city expansion based on New Towns and satellite cities rather than the reformation of existing city. This city expansion caused by degrading of city, being backward and producing many problems. To solve this problems, it was considered the rehabilitation of retarded function with rejuvenation such as a special law accelerating urban renaissance and reorganization project. Also a fire protection performance did not satisfied the required conditions of modern FPP system, such as the function deterioration of building facilities, the technological development with FPP facilities, changed fire laws and building occupancy for social needs. Insufficiency of requirements depreciated the building value and intimidated a safety of residents. To solve this problem, the improvement of FPP was essentially required and also strongly recommended an analysis and a comparative study between the required FPP of existing building and it improving effective FPP. Therefore, purpose of this study is that establish the basic data to construct a system to analyze and compare the building FPP.

  • PDF

A study on the Development Plan of Personal Information Protection System (개인정보보호 체계 발전 방안에 대한 연구)

  • Sang-Hyun Joo;Byoung-Hoon Choi;Jin-Yong Lee;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.4
    • /
    • pp.167-176
    • /
    • 2024
  • The Personal Information Protection Commission was launched in August 2020 as an integrated control tower for personal information protection, but several problems have been pointed out in the personal information protection operation system. First, despite the fact that Korea's personal information protection system has an integrated legal system that regulates both the public and private sectors, it has been pointed out that it is difficult to carry out smooth personal information protection functions due to incomplete integration of protection functions, such as the Financial Services Commission being in charge of personal credit information protection and the Korea Communications Commission being in charge of personal location information protection. Next, despite the increasing number of public sector personal information leakage incidents, there is a lack of personnel with expertise and specialized support organizations to efficiently investigate them, and there is a concern that the lack of an efficient response system to personal information infringement by global IT companies in Korea in the era of digital commerce may weaken the protection of citizens' personal information. In order to solve these problems, I reviewed overseas cases and literature and proposed the following measures. First, it is necessary to centralize the personal information protection supervision function for credit information and location information to the Personal Information Protection Commission. Second, it is necessary to secure expertise by securing specialized personnel and establishing specialized institutions to respond to public sector personal information leakage incidents. Third, it is necessary to revitalize the domestic agency designation system and establish an international cooperation system to protect people's personal information in the digital commerce era. I believe that these measures to develop the personal information protection system will lead to more systematic personal information protection.

Realization of Protection IED for Distributed Power System (분산 전원 계통 연계용 보호 IED의 설계 및 구현)

  • Han, Chul-Wan;Oh, Sung-Nam;Kim, Kab-Il;Son, Young-Ik
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.517-519
    • /
    • 2005
  • In this paper, we consider a digital protection IED(Intelligent Electric Device) for a distributed power system. The IED can measure various elements for protection and communicate with another devices through network. The protection IED is composed of specific function modules: signal process module which converts analog signal from PT and CT handle algorithm to digital one; communication module for connection with another IEDs; input/output module for user-interfaces. A general purpose DSP board with TMS320C2812 is used in the IED. In order to verify the proposed IED, experimental researches with the power system simulator DOBLE has been carried out for a phase earth fault. The results show an under-voltage relaying algorithm has been realized sucessfully in the hardware system.

  • PDF

A Study on Chaining Threat Analysis of Cybersecurity against Reactor Protection Systems (원자로보호계통 사이버보안 연계 위협 분석 연구)

  • Jung, Sungmin;Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.2
    • /
    • pp.39-48
    • /
    • 2022
  • The application of digital technology to instrumentation and control systems in nuclear power plants has overcome many shortcomings of analog technology, but the threat of cybersecurity has increased. Along with other systems, the reactor protection system also uses digital-based equipment, so responding to cybersecurity threats is essential. We generally determine cybersecurity threats according to the role and function of the system. However, since the instrumentation and control system has various systems linked to each other, it is essential to analyze cybersecurity threats together between the connected systems. In this paper, we analyze the cybersecurity threat of the reactor protection system with the associated facilities. To this end, we quantitatively identified the risk of the reactor protection system by considering safety functions, a communication type, the use of analog or digital-based equipment of the associated systems, and the software vulnerability of the configuration module of the reactor protection system.

The Development and the Performance Test of Bay Controller for the High-Voltage Gas Insulated Switchgear (초고압 가스절연개폐기의 베이 컨트롤러 개발 및 성능시험)

  • Woo, Chun-Hee;Lee, Bo-In
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.59 no.2
    • /
    • pp.179-184
    • /
    • 2010
  • The digital substation automation system has contributed hugely to increasing the stability of power systems by providing not only protection and control of power systems but diagnostic features alongside them. Digital substation automation systems in the scale of substations consist of integrated operation systems and intelligent electronic devices. The main intelligent electronic devices currently in use are digital protection relays and the bay controllers in Gas insulated switchgears. Proficiently accomplishing the coordination of protection within the power system as a means of ensuring reliability and contriving for the stability of power supply through connection of function, the application of bay controllers is crucial, which collectively manage the protection relay at the bay level in order to achieve both. In this research, the bay controllers to be used in high-voltage Gas insulated switchgear has been localized, and in particular, the logic function and editor required in order to minimize the complicated hardware-like cable connections in the local panel have been developed. In addition, to ensure the strength and reliability of the bay controller hardware developed herein, the type tests from KERI have been successfully completed.

A study of analysis and improvement of security vulnerability in Bluetooth for data transfer (블루투스 환경에서 데이터 전송 시 보안 취약점 분석 및 개선 방안 관련 연구)

  • Baek, Jong-Kyung;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.6
    • /
    • pp.2801-2806
    • /
    • 2011
  • During data transmissions via Bluetooth networks, data to be encrypted, or plain text between the application layer and the device layer, can be hacked similar to a key-logger by the major function hooking technique of Windows Kernel Driver. In this paper, we introduce an improved protection module which provides data encryption transmission by modifying the data transmission driver of the Bluetooth device layer, and also suggest a self-protecting scheme which prevents data exposure by various hacking tools. We implement the protection module to verify the confidentiality guarantee. Our protection module which provides data encryption with minimal latency can be expected the widespread utilization in Bluetooth data transmission.

Development of Current-based Compact Digital Protective Relay for Induction Motor Protection (중용량 전동기보호를 위한 전류형 디지털 보호계전기 개발)

  • Jung, Jong-Jin;Kim, Joong-Pyo;Shin, Jong-Han;Park, Jang-Soo
    • Proceedings of the KIEE Conference
    • /
    • 2005.07a
    • /
    • pp.140-142
    • /
    • 2005
  • This paper describes the current- based compact digital motor protective relay for low and high voltage induction motors, which are widely used in industrial and commercial power systems. The existing protective relays for motor protection had only overload, short circuit, reverse phase, open circuit and grounding protective elements, and measurement, start/stop control function. But in present day, for automation system, various functions are required, especially motor management and sequence control function and more. To meet these requirements, we developed an economic current-based compact digital motor protective relay which had various function to control, manage and monitor the induction motor.

  • PDF

Authentication Template Protection Using Function Encryption (함수암호를 이용한 인증정보 Template 보호 기술)

  • Park, Dong Hee;Park, Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1319-1326
    • /
    • 2019
  • Recently, biometrics and location information are being used for authentication in many devices. However, these information are stored as plaintext in safe device or, stored as ciphertext in authentication server it is used for authentication in plaintext by decrypting. Therefore, the leakage of authentication information as well as hacking can cause fatal privacy problems. In this paper, we propose a technique that can be authenticated without exposing authentication information to ciphertext using function encryption.

A Study on Next-Generation Data Protection Based on Non File System for Spreading Smart Factory (스마트팩토리 확산을 위한 비파일시스템(None File System) 기반의 차세대 데이터보호에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.176-183
    • /
    • 2021
  • Purpose: The introduction of smart factories that reflect the 4th industrial revolution technologies such as AI, IoT, and VR, has been actively promoted in Korea. However, in order to solve various problems arising from existing file-based operating systems, this research will focus on identifying and verifying non-file system-based data protection technology. Method: The research will measure security storage that cannot be identified or controlled by the operating system. How to activate secure storage based on the input of digital key values. Establish a control unit that provides input and output information based on BIOS activation. Observe non-file-type structure so that mapping behavior using second meta-data can be performed according to the activation of the secure storage. Result: First, the creation of non-file system-based secure storage's data input/output were found to match the hash function value of the sample data with the hash function value of the normal storage and data. Second, the data protection performance experiments in secure storage were compared to the hash function value of the original file with the hash function value of the secure storage after ransomware activity to verify data protection performance against malicious ransomware. Conclusion: Smart factory technology is a nationally promoted technology that is being introduced to the public and this research implemented and experimented on a new concept of data protection technology to protect crucial data within the information system. In order to protect sensitive data, implementation of non-file-type secure storage technology that is non-dependent on file system is highly recommended. This research has proven the security and safety of such technology and verified its purpose.

Development of a Numerical Model for the Rapidly Increasing Heat Release Rate Period During Fires (Logistic function Curve, Inversed Logistic Function Curve) (화재시 열방출 급상승 구간의 수치모형 개발에 관한 연구 (로지스틱 함수 및 역함수 곡선))

  • Kim, Jong-Hee;Song, Jun-Ho;Kim, Gun-Woo;Kweon, Oh-Sang;Yoon, Myong-O
    • Fire Science and Engineering
    • /
    • v.33 no.6
    • /
    • pp.20-27
    • /
    • 2019
  • In this study, a new function with higher accuracy for fire heat release rate prediction was developed. The 'αt2' curve, which is the major exponential function currently used for fire engineering calculations, must be improved to minimize the prediction gap that causes fire system engineering inefficiency and lower cost-effectiveness. The newly developed prediction function was designed to cover the initial fire stage that features rapid growth based on logistic function theory, which has a more logical background and graphical similarity compared to conventional exponential function methods for 'αt2'. The new function developed in this study showed apparently higher prediction accuracy over wider range of fire growth durations. With the progress of fire growth pattern studies, the results presented herein will contribute towards more effective fire protection engineering.