• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.041 seconds

A Field Survey on Risk from Crime in Pedestrian Environment around Elementary School in Detached Housing Area - Focused on the Pedestrian path around 5 Elementary School in Ilsan New Town- (지속가능한 도시 구현을 위한 초등학교 주변 보행환경의 범죄 위험 실태조사 연구 - 일산 다세대 주택지에 위치하는 5개 초등학교 주변 보행로를 중심으로-)

  • Lee, You-Mi
    • KIEAE Journal
    • /
    • v.14 no.5
    • /
    • pp.89-96
    • /
    • 2014
  • This study provides the basic resource for establishing the environment design policies around elementary school for the students and analyzes the actual pedestrian environment conditions of elementary school in order to improve safety of from crime for them. For this, the field survey are conducted on risk of from crime in 10 sidewalks of 5 elementary schoolin Ilsan new town. The result of this are the followings ;1) There are schools which have difference between the height of road and the height of pedestrian path. 2) There are schools which are insufficient distance for securing front sight because of shape of pedestrian path. 3) In entrance there are facilities interfering with natural surveillance within school boundaries such as stone written school motto, storehouse, wash room, doorpost. 4) In entrance there are schools with no security office, emergency bell and CCTV. 4) The openness in the bottom of fence is lower than that of upper because of shrubs and material of fence. 5) There are concealed places and cars in back gate area interfering with natural surveillance.

An Ultra-Lightweight RFID Authentication Protocol Using Index (인덱스를 사용한 초경량 RFID 인증 프로토콜)

  • Lee, Jae-Kang;Oh, Se-Jin;Yun, Tae-Jin;Chung, Kyung-Ho;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.24-33
    • /
    • 2012
  • Recently, the ultra-lightweight authentication RFID protocol that can actually implement on the RFID Tag is one among authentication protocols getting a concern, but recently many problems were clarified of the feature becase of the protocol which doesn't use the security algorithm. In this paper, we analyzed the problem of the ultra-lightweight authentication protocols and propose the design of ultra-lightweight RFID authentic ation protocols improving the index processing techniques. Because of improving the index processing technique in the method sending the Server authentication message to the authenticated tag, the proposed protocol is strong against the active attack which Li presents. Besides, the proposed protocol has the buffer storage of the keys and index and is strong against the asynchronous attack.

One-Handled The Mobile One-Time Password Scheme (단일 제어 모바일 일회용 패스워드 기법)

  • Choi, Jong-Seok;Kim, Ho-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6C
    • /
    • pp.497-501
    • /
    • 2012
  • While increasing online services with developing e-businesses, finance, game companies and others have employed OTP(One-Time Password) to overcome vulnerabilities of static passwords. Existing OTP technology has inconvenience that customers always possess reserved token since requiring the token to generate OTP. In order to supplement the issue we propose mobile OTP generated by mobile devices such as smart phones. Our mobile OTP scheme generates OTP by using a non-linear function based on pairing to eject the collision problem of S/Key scheme universally used to design OTP schemes. Our scheme based on a non-linear function over pairing can complements the collision problem and widely applied to finance and various services to increase security level of the services.

Design & Implementation of DRM System for End-to-end Content Protection (End-to-end 콘텐츠 보호를 위한 DRM 시스템 설계 및 구현)

  • Jeong Yeon-Jeong;Yoon Ki-Song
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.35-44
    • /
    • 2006
  • Current technologies on digital rights management (DRM) have focused on security and encryption as a means of solving the issue of unauthorized copying, that is, locking the content and limiting its distribution to only purchasers. But, illegal content copy should be protected not only from purchasers but also from other principals such as media distributors and content providers. In this paper, we designed and implemented end-to-end digital lights management system that can cover a content protection on the overall value-chains of content distribution. Proposed system provides content protection and secure management of digital rights in creator, provider, and distributor like in purchaser. Accordingly it can provide an environment protecting each principal's digital rights and prohibiting illegal usage of content.

A Study on the Effects of Quality Characteristics of Online Environment-Friendly Agricultural Products Shopping Malls affecting Customer Trust and Purchase Intention

  • PARK, Duk-Gun;SHIN, Choung-Seob
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.8 no.1
    • /
    • pp.1-19
    • /
    • 2020
  • Purpose - This study is to classify quality characteristics of online environment-friendly agricultural products shopping malls into 6 categories and to empirically test their relationship with customer trust, perceived manageability, perceived utility and purchase intention. Research design, data, and methodology - This study targeted adults who have purchased ecofriendly agricultural production online malls for 4 weeks from September 3 to September 30, 2019. The survey type used was a structuralized self-report survey questionnaire made to meet the research purpose in 2019 as the time range. Out of 800 questionnaires, 500 copies are used after excluding surveys with insincere responses. Results - First, results to hypothesis 1, which was about independent variables and customer trust. Analysis showed that health, familiarity, platform reputation, reviews and product quality were found to have significant effect on customer trust; the hypothesis was adopted. On the other hand, system security did not affect customer trust significantly; it was rejected. Second, customer trust was shown to have significant effect on perceived manageability and perceived utility, so the hypothesis was adopted. Third, the hypothesis that perceived manageability moves onto perceived utility was adopted. Moreover, the hypothesis that perceived manageability moves onto purchase intention and the hypothesis that perceived utility moves onto purchase intention were adopted as well. Conclusions - Furthermore, the results of the study imply that it's imperative for online environment-friendly agricultural products shopping malls to consider their characteristics as the means to increase purchase intention of customers.

The Building for Standard Specification DB of Urban Transit System Infrastructure used by Computer Design Tool (전산지원도구를 이용한 도시철도시설 표준사양 DB 구축 연구)

  • Lee, Woo-Dong;Park, Kee-Jun;Chung, Jong-Duk
    • Proceedings of the KSR Conference
    • /
    • 2006.11b
    • /
    • pp.791-795
    • /
    • 2006
  • Urban transit is one of the most effective ways for efficient operation and construction of an urban transit by composition system which is liked originally such as rolling-stock, power, signal and infrastructure. Urban rail transit system is running in domestic, imports major equipments from advanced countries and setup for maintenance. But it takes long time because it does each organizations and lines. Also, signal, power and track system apply different standard by each construction organizations it causes an increasing construction of cost accordingly it desperately needs a systematic countermeasure. Therefore standard specification of urban transit have been establishing and operatingfor efficient operation of urban transit and base technology security that is populace ride to become a base of state economy. After track, power and signal system will be announced. Standard specification become more, the importance of administrationof standards is emphasized more. Specification administrator’s the importance which use a computing support tool recently in railroad part in embossed and is predicted to be more such forward. Therefore we propose the effective method of management with track, power signal system by constructed data-base system.

  • PDF

Design of Unproved Diffie-Hellman Key Agreement Protocol Based on Distance Bounding for Peer-to-peer Wireless Networks (향상된 경계 결정 기반의 Diffie-Hellman 키 일치 프로토콜)

  • Park, Sern-Young;Kim, Ju-Young;Song, Hong-Yeop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1C
    • /
    • pp.117-123
    • /
    • 2008
  • We propose an improved Diffie-Hellman(DH) key agreement protocol over a radio link in peer-to-peer networks. The proposed protocol ensures a secure establishment of the shared key between two parties through distance bounding(DB). Proposed protocol is much improved in the sense that we now reduce the number of messages exchanged by two, the number of parameters maintained by four, and 2(7682(k/64)-64) of XOR operations, where k is the length of the random sequence used in the protocol. Also, it ensures a secure reusability of DH public parameters. Start after striking space key 2 times.

A Design of Intelligent Surveillance System Based on Mobile Robot and Network Camera (모바일 로봇 및 네트워크 카메라 기반 지능형 감시 시스템 설계)

  • Park, Jung-Hyun;Lee, Min-Young;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.4
    • /
    • pp.476-481
    • /
    • 2008
  • The necessity of intelligent surveillance system is gradually considered seriously from the space where the security is important. From this paper will load Network Camera in Mobile Robot based on embedded Linux and Goal is in the system embodiment will be able to track the intruder. From Network Camera uses Wireless Lan transmits an image with server, grasps direction of the intruder used Block Matching algorithms from server, transmits direction information and tracks an intruder. The robot tracks the intruder according to gets the effective image of an intruder. In compliance with this paper the system which is embodied is linked with a different surveillance system and as intelligent surveillance system there is a possibility of becoming worse a reliability.

Study on Education Content Delivery System in Hybrid P2P based Computing Environment (혼합형 P2P 기반 컴퓨팅환경에서의 교육 컨텐츠 전송 시스템에 대한 연구)

  • Kim, Jin-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.658-661
    • /
    • 2005
  • Internet-based client/server architecture of Contents Delivery System suffers from frequent disconnections and security treats caused by dependency of the server or overload. But, We reached the limit to the increase of the server because a contents quality enhance and Internet user explosively increase. Therefore, a P2P based computing methods are used for sloving these issues. In this paper, We implement and design the Education Content Delivery System for cyber education system using idle Computing Power in P2P computing to share computing resources. We implement not only Internet infrastructure but also satellite infrastructure system, and designed to transfer real-time or non real-time contents.

  • PDF

Design and Development of a PDA mobile banking System (PDA를 활용한 모바일뱅킹 시스템의 설계 및 구현)

  • Choi, Eui-Kwon;Lee, San-Bum
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1530-1536
    • /
    • 2007
  • In this paper, a mobile banking system which can provide banking services is introduced. Since a PDA has excellent features like a small-size computer and provides mobility, it has been widely used by salesmen. Therefore, if general banking services can be provided with PDA by using wireless technology, it will be very useful. In addition, it is easy to develop and maintain the client software of PDA because it uses Windows-based operation systems. In this paper, a PDA banking system is introduced. The system is designed and developed based on the techniques of wireless network, security and PDA programming to be used for mobile banking and a prototype system is developed. Moreover, we used the object-oriented modeling technique, UML and Java Beans for programming.

  • PDF