• Title/Summary/Keyword: Protection of Industrial Technology

Search Result 453, Processing Time 0.04 seconds

Comparison of key management systems across different industries (다양한 산업에서의 키 관리 시스템 비교 분석)

  • Woojoo Kwon;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.12 no.3
    • /
    • pp.55-61
    • /
    • 2024
  • As the digital environment becomes more complex and cyber attacks become more sophisticated, the importance of data protection is emerging. As various security threats such as data leakage, system intrusion, and authentication bypass increase, secure key management is emerging. Key Management System (KMS) manages the entire encryption key life cycle procedure and is used in various industries. There is a need for a key management system that considers requirements suitable for the environment of various industries including public and finance. The purpose of this paper is to derive the characteristics of the key management system for each industry by comparing and analyzing key management systems used in representative industries. As for the research method, information was collected through literature and technical document analysis and case analysis, and comparative analysis was conducted by industry sector. The results of this paper will be able to provide a practical guide when introducing or developing a key management system suitable for the industrial environment. The limitations are that the analyzed industrial field was insufficient and experimental verification was insufficient. Therefore, in future studies, we intend to conduct specific performance tests through experiments, including key management systems in various fields.

  • PDF

A Study on the Normative Recognition of Blockchain Smart Contract

  • Song, In-Bang;Kim, Yeon-Jong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.1
    • /
    • pp.187-198
    • /
    • 2020
  • In this paper, We purpose an improvement plan for the settlement of smart contracts into legal norms through the recognition of the norms of blockchain-based smart contracts and the main influence factors on the norms of smart contracts. First, in terms of the normative necessity of smart contracts, legal protection against technical errors, government-level public relations education, and basic laws governing smart contract business are needed. Second, the contract norms will be accepted by the contract norms based on the blockchain designed to make the responsible material clear in terms of smart contract usability. Third, in terms of regulation of smart contracts, it can be seen that smart contracts are subsumed from existing laws or considering new legislation, but the norm of smart contracts cannot be prioritized over ease of use.

Corrosion Resistance of Galvanized Steel by Treating Modified Si Organic/Inorganic Hybrid Coating Solution (Si 변성 유/무기 하이브리드 코팅액에 의한 아연도금강판의 내식특성)

  • Seo, Hyun-Soo;Moon, Hee-Joon;Kim, Jung-Ryang;Kim, Jong-Soon;Ahn, Seok-Hwan;Moon, Chang-Kwon;Nam, Ki-Woo
    • Journal of Ocean Engineering and Technology
    • /
    • v.25 no.1
    • /
    • pp.32-38
    • /
    • 2011
  • Galvanized steel has gone through a chemical process to keep it from corroding. The steel gets coated in layers of zinc because rust will not attack this protective metal. For countless outdoor, marine, or industrial applications, galvanized steel is an essential fabrication component. The reduction of the corrosion rate of zinc is an important topic. In the past, a very popular way to reduce the corrosion rate of zinc was to use chemical conversion layers based on $Cr^{+6}$. However, a significant problem that has arisen is that the use of chromium salts is now restricted because of environmental protection legislation. Therefore, it is very important to develop new zinc surface treatments that are environmentally friendly to improve the corrosion resistance of zinc and adhesion with a final organic protective layer. In this study, a Urethane solution (only Urethane 20 wt.%; S-700) and an organic/inorganic solution with Si (Si polysilicate 10 wt.% + Urethane 10 wt.%; LRO-317) are used. Based on the salt spray test of 72 h, S-700 and LRO-317 had a superior effect for the corrosion resistance on EGI and HDGI, respectively.

A Design of Certificate Management Method for Secure Access Control in IoT-based Cloud Convergence Environment (IoT기반 클라우드 융합환경에서 안전한 접근제어를 위한 인증서 관리기법 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.7-13
    • /
    • 2020
  • IoT which is the core IT of the 4th industrial revolution, is providing various services from users in the conversion with other industries. The IoT convergence technology is leading the communication paradigm of communication environment in accordance with the increase of convenience for users. However, it is urgently needed to establish the security measures for the rapidly-developing IoT convergence technology. As IoT is closely related to digital ethics and personal information protection, other industries should establish the measures for coping with threatening elements in accordance with the introduction of IoT. In case when security incidents occur, there could be diverse problems such as information leakage, damage to image, monetary loss, and casualty. Thus, this paper suggests a certificate management technique for safe control over access in IoT-based Cloud convergence environment. This thesis designed the device/user registration, message communication protocol, and device renewal/management technique. On top of performing the analysis on safety in accordance with attack technique and vulnerability, in the results of conducting the evaluation of efficiency compared to the existing PKI-based certificate management technique, it showed about 32% decreased value.

A User Privacy Protection Scheme based on Password through User Information Virtuality in Cloud Computing (클라우드 컴퓨팅에서 패스워드기반의 사용자 정보 가상화를 통한 사용자 프라이버시 보장 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Convergence Society for SMB
    • /
    • v.1 no.1
    • /
    • pp.29-37
    • /
    • 2011
  • As the area of informatization has been expanding followed by the development of information communication technology, cloud computing which can use infra sources like server, storage, and network in IT area as an efficient service whenever and wherever skyrockets. But users who use cloud computing technology may have some problems like exposure personal data, surveillance on person, and process on commercial purpose on their personal data. This paper proposes a security technique which protect user's privacy by creating imaginary user information not to be used by other people. The proposed technique virtualizes user's information as an anonymity value not to let other people know user's identity by combining PIN code with it and guarantees user's anonymity. Also it can manage and certificate personal information that is important in cloud computing, so that it can solve security problem of cloud computing which centers all informations. Therefore this paper can assist upgrading of the level of information of poor SMBs through safe use of cloud computing.

  • PDF

Building plan research of Smart Ammunition Logistics System based on the 4th industrial technology (4차산업혁명기술 기반 스마트 탄약물류체계 구축 방안 연구)

  • Choi, Jong-Geun;Kim, Byung-Kyoo;Chang, Yoon Seok
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.135-145
    • /
    • 2022
  • This paper presented a method to build a predictable smart ammunition logistics system using the 4th industrial technology for ammunition logistics, which is the core functions in the field of defense and logistics. We have analyzed the current level of ammunition logistics with various perspectives such as domestic and overseas logistics policies, technology trends, ammunition logistics characteristics, the smart logistics certification measures by Ministry of Land, Infrastructure and Transport. As a result it is considered that the current ammunition logistics needs needs improvement. To improve this, we presented a direction based on the implications derived after analyzing various ongoing programs such as wired/wireless-based automation, smart ammunition depots, and logistics innovation of the army, navy, and air force that can be applied to the ammunition logistics. In order to implement a data-based smart ammunition logistics management system that can achieve innovation and efficiency of total life cycle while meeting changes in the battlefield environment, we presented 4 objectives such as "automation and modernization of field work", "3D-based storage management & improvement of issuing at war," and "data management for prediction-oriented ammunition management". it is expected that there will be benefits such as improvement of operational continuity, guarantee of ammunition reliability, budget reduction, improvement of inefficiencies such as delay, waiting, and double work, and reduction of accidents.

A Study on the Countermeasure Algorithm for Power System Disturbance in Large Scale Fuel Cell Generation System (대용량 연료전지발전시스템의 계통외란방지알고리즘에 관한 연구)

  • Kim, Gi-Young;Oh, Yong-Taek;Kim, Byung-Ki;Kang, Min-Kwan;Rho, Dae-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.8
    • /
    • pp.5550-5558
    • /
    • 2015
  • Recently, fuel cell with high energy efficiency and low CO2 emission is energetically interconnected with power system. Especially, FCGS(Fuel Cell Generation System) which usually operates at high temperature, is being developed and installed in the form of large scale system. However, it is reported that power system disturbances related to surge, harmonic and EMI have caused several problems such as malfunction of protection device and damage of control device in the large scale FCGS. In order to solve these problems, this paper presents a modeling of operation characteristics of FCGS by PSCAD/EMTDC, ETAP, P-SIM software. And also, this paper proposes countermeasure algorithms to prevent power system disturbances. From the simulation results, it is confirmed that the proposed algorithm is useful method for the stable operation of large scale FCGS.

Development of Smart Active Layer Sensor (II): Manufacturing and Application (스마트 능동 레이어 센서 개발 (II): 저작 및 적용 연구)

  • Lee, Young-Sup;Lee, Sang-Il;Kwon, Jae-Hwa;Yoon, Dong-Jin
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.24 no.5
    • /
    • pp.476-486
    • /
    • 2004
  • This paper is the second part of the study on the development of a smart active layer (SAL) sensor, which consists of two parts. As mentioned in the first paper, structural health monitoring (SHM) is a new technology that is being increasingly applied at the industrial field as a potential approach to improve cost and convenience of structural inspection. Recently, the development of smart sensor is very active for real application. This study has focused on preparation and application study of SAL sensor which is described with regard to the theory and concept of the SAL sensor in the first paper. In order to detect elastic wave, smart piezoelectric sensor, SAL, is fabricated by using a piezoelectric element, shielding layer and protection layer. This protection layer plays an important role in a patched network of distributed piezoelectric sensor and shielding treatment. Four types of SAL sensor are designed/prepared/tested, and these details will be discussed in the paper In this study, SAL sensor ran be feasibly applied to perform structural health monitoring and to detect damage sources which result in elastic waves.

Analyses of Impact on Business Performance of Information Security Companies: The Perspective of Mediating Effects of Organizational and Innovative Capabilities (정보보호 기업의 경영성과에 미치는 영향 분석: 조직 및 혁신 역량의 매개 효과의 관점에서)

  • Shin, HyunMin;Kim, Injai
    • Knowledge Management Research
    • /
    • v.22 no.4
    • /
    • pp.157-172
    • /
    • 2021
  • Information security companies were established in earnest from the mid-late 1990s to early 2000s, far shorter than other national key industries. Nevertheless, the information security industry has made rapid progress. It is expected that the proportion of the information security industry will increase rapidly with the development of advanced technology along with the 4th industrial revolution. As COVID-19, which occurred at the end of 2019, spreads around the world in 2020, non-face-to-face services and digital transformation are accelerating, and cyber threats to users are also increasing. However, there are limitations in responding to new Cyber Security threats due to the shortage of information protection manpower, insufficient security capabilities of domestic companies, and the narrow domestic information protection market. This study examines the external environmental factors of information security companies such as government information protection system operation, government influence, government support, partnership between information security companies, and internal environmental factors such as top management support, financial status, human resources, organizational capability, This study was conducted using empirical data to analyze whether it affects innovation capability and whether organizational capability and innovation capability affect financial and non-financial performance. The results of this study can be used as basic data to suggest policies and implications for information security, and to strengthen the competitiveness of the information security industry.

De-identifying Unstructured Medical Text and Attribute-based Utility Measurement (의료 비정형 텍스트 비식별화 및 속성기반 유용도 측정 기법)

  • Ro, Gun;Chun, Jonghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.1
    • /
    • pp.121-137
    • /
    • 2019
  • De-identification is a method by which the remaining information can not be referred to a specific individual by removing the personal information from the data set. As a result, de-identification can lower the exposure risk of personal information that may occur in the process of collecting, processing, storing and distributing information. Although there have been many studies in de-identification algorithms, protection models, and etc., most of them are limited to structured data, and there are relatively few considerations on de-identification of unstructured data. Especially, in the medical field where the unstructured text is frequently used, many people simply remove all personally identifiable information in order to lower the exposure risk of personal information, while admitting the fact that the data utility is lowered accordingly. This study proposes a new method to perform de-identification by applying the k-anonymity protection model targeting unstructured text in the medical field in which de-identification is mandatory because privacy protection issues are more critical in comparison to other fields. Also, the goal of this study is to propose a new utility metric so that people can comprehend de-identified data set utility intuitively. Therefore, if the result of this research is applied to various industrial fields where unstructured text is used, we expect that we can increase the utility of the unstructured text which contains personal information.