• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.025 seconds

A Study on the Telelecturing/Conferencing System (원격화상강의/회의 시스템에 관한 연구)

  • Joo, Young-Ju
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.5 no.2
    • /
    • pp.16-29
    • /
    • 1998
  • Bell Laboratory introduced the sound and visual system for the first time in 1927. Since then, the development of telecommunication technology made it possible for people located far away to communicate each other watching through the TV screen. Over the period different types of telelecturing systems have prospered in line with the development of telecommunication technology. Therefore, it is quite natural that telelecturing/conferending system attracts the attention of many people as a new way of educating people located in a long distance. In the industrial sector, telelecturing systems already come into wide use to save time and training and travelling expense. In this study, I examine the concept and characteristics of telelecturing/conferencing system and introduce different types telelecturing system developed in parallel with the development of communication technology. Then, I analyze how those merits of the telelecturing system can be applied to educational purpose. Finally, I propose and design ideal telelectuirng/conference facilities consisting of telelecturing rooms, bilateral movie system, seats, ceilings, color, TV screen, lighting, acoustics, humidities and temperature control, security system, projection system to maximize the educational purpose and effectiveness.

  • PDF

Design of RFID Security System Using SNEP and ECC (SNEP와 ECC를 이용한 RFID 보안 시스템 설계)

  • Park, Sang-Hyun;Han, Soo;Choi, Yong-Sik;John, Young-Jun;Shin, Seoung-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.503-506
    • /
    • 2006
  • IT 기술의 발달로 인간의 편이를 위한 많은 기술들이 생겨나고 21세기 IT분야만이 아닌 사회 전 분야에서 가장 주목을 받는 기술이 유비쿼터스이다. 유비쿼터스는 사용자의 인식없이 컴퓨터와 통신을 하는 기술이다. 주거환경의 개선 부분이나 구매의 편리를 위한 부분에서 가장 많은 적용이 시도 되고 있다. 하지만 무분별한 인식에 의한 개인의 프라이버시와 여러 가지 보안문제가 야기되고 있다. 일반 RFID 분야에서는 보안이 필요 없는 부분도 있지만 RFID가 더 많은 분야에서 시도가 되려면 보안요소가 꼭 필요하다. 본 논문에서는 저 전력과 낮은 메모리에서 사용하기 위해서 무선에서 사용하고 있는 보안 모듈인 SNEP와 ECC알고리즘을 RFID에 적용할 수 있는 시스템을 설계 및 제안한다.

  • PDF

Vulnerability analysis and Design of RFID Security Protocols (RFID 보안 프로토콜 취약성 분석 및 설계)

  • Oh, Jung-Hyun;Kim, Hyun-Suk;Choi, Jin-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.497-502
    • /
    • 2006
  • RFID기술은 RF를 이용하여 자동적으로 사물의 정보를 획득할 수 있는 매우 편리한 기술이다. 하지만 RF라는 매체를 사용하는 무선통신 환경에서 데이터를 주고받기 때문에 악의적인 공격자에 의해 사물의 의도적으로 노출이 될 수 있는 취약점을 지니고 있다. 이러한 RFID 시스템의 보안적 취약점을 보안하기 위해 RFID시스템에서 사용할 수 있는 강력한 보안 프로토콜의 요구가 높아졌다. RFID 시스템에서 사용될 보안 프로토콜을 설계하기 위해서는 비밀성, 익명성 등 반드시 고려해야할 요구사항이 있는데, 기존에 제안되었던 RFID 보안 프로토콜들은 이러한 요구사항들을 모두 완벽하게 만족시키지 못하였다. 본 논문에서는 RFID 시스템 프로토콜 모델을 제시하고, 정형기법을 사용하여 보안적 문제점들을 확인한 후, 문제점들을 보완하여 설계한 효율적인 RFID 보안 프로토콜을 제시하고자 한다. 또한 설계된 보안 프로토콜의 보안성을 정형기법을 통해 신뢰할 수 있는 검증을 실시하였다.

  • PDF

A Design and Implementation of the Easy Payment System by Using Mobile Device (모바일 휴대장치(스마트폰)를 이용한 간편 결제 시스템 설계 및 구현)

  • Kim, Dae-Kyu;Choi, Se-Ill
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.5
    • /
    • pp.607-614
    • /
    • 2015
  • In this paper, we propose about NFC-based mobile Easy Payment System. Already announced about kind of similar payment system by use smart phone NFC function. However this proposition system will uses an encrypted token and user indirect authentication. This feature makes through to simplify payment without other input necessary information. Also my proposition system has easy security certification process. This mean my system does not adequately to use payment of a large amount. But in retail payment will be very useful payment system.

The Maximum Installable DG Capacity According to Operation Methods of Voltage Regulator in Distribution Systems (배전계통의 전압조정기 운영방법에 따른 분산형전원 최대 도입 용량 산출)

  • Kim, Mi-Young
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.7
    • /
    • pp.1263-1269
    • /
    • 2009
  • Stable and sustainable power supply means maintaining a certain level of power quality and service while securing energy resource and resolving environmental issues. Distributed generation (DG) has become an essential and indispensable element from environmental and energy security perspectives. It is known that voltage violation is the most important constraint for load variation and the maximum allowable DG. In distribution system, sending voltage from distribution substation is regulated by ULTC (Under Load Tap Changer) designed to maintain a predetermined voltage level. ULTC is controlled by LDC (Line Drop Compensation) method compensating line voltage drop for a varying load, and the sending voltage of ULTC calls for LDC parameters. The consequence is that the feasible LDC parameters considering variation of load and DG output are necessary. In this paper, we design each LDC parameters determining the sending voltage that can satisfy voltage level, decrease ULTC tap movement numbers, or increase DG introduction. Moreover, the maximum installable DG capacity based on each LDC parameters is estimated.

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering the Age of User Profiles

  • Bae, Ihn-Han
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1726-1732
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal attackers - masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the used pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with the age of the user profile. The performance of the proposed scheme is evaluated by using a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed scheme that considers the age of user profiles.

  • PDF

Affective Computing Among Individuals in Deep Learning

  • Kim, Seong-Kyu (Steve)
    • Journal of Multimedia Information System
    • /
    • v.7 no.2
    • /
    • pp.115-124
    • /
    • 2020
  • This paper is a study of deep learning among artificial intelligence technology which has been developing many technologies recently. Especially, I am talking about emotional computing that has been mentioned a lot recently during deep learning. Emotional computing, in other words, is a passive concept that is dominated by people who scientifically analyze human sensibilities and reflect them in product development or system design, and a more active concept that studies how devices and systems understand humans and communicate with people in different modes. This emotional signal extraction, sensitivity, and psychology recognition technology is defined as a technology to process, analyze, and recognize psycho-sensitivity based on micro-small, hyper-sensor technology, and sensitive signals and information that can be sensed by the active movement of the autonomic nervous system caused by human emotional changes in everyday life. Chapter 1 talks about overview and Chapter 2 shows related research. Chapter 3 shows the problems and models of real emotional computing and Chapter 4 shows this paper as a conclusion.

Illumination Design for Adaptable Operation of Security System (보안시스템의 안정적 동작을 위한 조명설계)

  • Go, Young-Il;Oh, Seong-Bo;Kim, Eel-Hwan;Kim, Se-Ho
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2009.10a
    • /
    • pp.129-132
    • /
    • 2009
  • 공항내 설치된 보안등의 운용실태를 조사하고 인적경비에 맞춘 보안등 설계에서 첨단의 CCTV 카메라 및 주변기기를 이용한 과학화된 경비체제에 맞는 안정된 보안등 설계가 요구되어진다. 본 논문에서는 과학화된 보안시스템에 맞는 조명 설계을 위하여 단방향 투사용 LED 램프를 이용한 등기구와 2.5m 높이의 폴로 현장에 이동 배치하여 적용하였으며, 기존 시설된 고압나트륨과 시범 설치원 LED 광원의 조도 및 눈부심을 비교하여 최상의 CCTV 감시 화면의 특성파악 및 정확한 물체를 식별 할 수 있는 조도을 유지하여 안정된 보안등의 조명설비를 제시하고자 한다.

  • PDF

Towards Developing Formal Verification Tools for Cryptographic Protocols (암호프로토콜 논리성 검증도구 개발에 관한 연구)

  • 권태경;김승주;송보연
    • Review of KIISC
    • /
    • v.12 no.2
    • /
    • pp.62-76
    • /
    • 2002
  • Incautiously designed and informally verified cryptographic protocols are error-prone and can allow an adversary to have the ideal starting point for various kinds of attacks. The flaws resulting from these protocols can be subtle and hard to find. Accordingly we need formal methods for systematic design and verification of cryptographic protocols. This paper surveys the state-of-the-art and proposes a practical developing method that will be implemented in the future study.

SNMP Key Security Mechanism Design using the PKI (SNMP환경에서 공개키 기반구조에 관한 설계)

  • Roh, Jeong-Hee;Moon, Jeong-Hwan;Lee, Chong-Eun;Lee, Jeong-Ki;Lee, Kwang;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.598-601
    • /
    • 2003
  • 초고속 통신망을 이용한 인터넷의 대중화와 더불어 인터넷을 기반으로 하는 SNMP가 활발해 지고 있다. SNMP에 있어서는 민감한 정보의 기밀성과 사용자 인중의 확보가 필수적이며, 이를 위해서는 전자서명 기술을 포함하고 있는 공개키 기반의 인증서 관리 체계의 확립이 선결되어야 한다. 본 논문에서는 인증, 기밀성 및 무결성 문제를 해결하기 위하여 PKI 기반 인증서의 생성, 관리 기능과 인증서를 상호 교환하여 매매 협상을 하는 에이전트 중재에 의한 보안 애플리케이션을 설계하고 이에 대하여 기술한다.

  • PDF