• Title/Summary/Keyword: Service providing system

Search Result 1,310, Processing Time 0.023 seconds

A Study on Security Technology using Mobile Virtualization TYPE-I (모바일 가상화 TYPE-I을 이용한 보안 기술 연구)

  • Kang, Yong-Ho;Jang, Chang-Bok;Kim, Joo-Man
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.1-9
    • /
    • 2015
  • Recently, with smart device proliferation and providing the various services using this, they have interested in mobile and Smart TV security. Smartphone users are enjoying various service, such as cloud, game, banking. But today's mobile security solutions and Study of Smart TV Security simply stays at the level of malicious code detection, mobile device management, security system itself. Accordingly, there is a need for technology for preventing hacking and leakage of sensitive information, such as certificates, legal documents, individual credit card number. To solve this problem, a variety of security technologies(mobile virtualization, ARM TrustZone, GlobalPlatform, MDM) in mobile devices have been studied. In this paper, we propose an efficient method to implement security technology based on TYPE-I virtualization using ARM TrustZone technology.

Technical Suggestions for Smart Airport Realization - Viewpoint of Passenger Convenience (스마트공항 실현을 위한 기술적 제언 - 여객 편의성 관점)

  • Hong, Jin Woo;Oh, Jeong Hoon;Lee, Han Kyu;Kim, Moon Ku;Song, Ho Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.268-271
    • /
    • 2018
  • Smart Airport which applies the new ICT technologies to the airport is a future airport to provide convenient and safe services for passengers who are airport users, and promote the efficient management of the airport system in point of airport operator's view. The ranges of smart airport include the overall area of the airport like land side, terminal, and air side. In this paper, we propose a technical solution for airport process of terminal providing passenger convenience in various ranges for smart airport realization. Self-service such as web or mobile check-in, self check-in/tagging/back drop/boarding etc. should be strengthened to smartize the airport process and technologies such as automatic immigration, smart security search and automatic AI-based baggage search should be applied. In this paper, we explain the concept of smart airport and smart process, and then propose technical considerations.

  • PDF

A Study on Computer Center Maintenance Savings through NT Server Consolidate Virtualization (NT 서버 통합 가상화를 통한 전산센터 유지보수 절감에 대한 연구)

  • Lee, Yong-Hui;Kim, Hwan-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.2
    • /
    • pp.11-19
    • /
    • 2014
  • In this paper, we build server consolidate virtualization focusing on NT server dilapidated and through analysis of the effect of this, has been presented the following results. First, it was possible to obtain an increase in the constant temperature constant humidity chamber efficiency by securing the upper surface space for computing data center mounted virtualization integration server servers multiple physical. Second, by the deployment of virtualization of a large server dilapidated, the introduction of new resources and the cost of maintaining computerized data center and reduce power consumption, the reduction of hardware introduction of additional due to the new server deployment it was possible to derive a cost reduction effect. We obtain the reduction of 89% and 79% compared with conventional consumption of cooling and power savings of the top surface, respectively. Integration of NT servers are virtualized can be expected to change in the Green-IT to contribute to providing the maintenance costs of computing centers in the future as well as current. Building a virtualization server integration applied in this paper can be similarly applied to the UNIX system and to integrate the server group other.

A Study on the Policy for Free Child Care for 0-2 Year old Children (영아 무상보육 정책 분석)

  • Hwang, Ock Kyeung
    • Korean Journal of Childcare and Education
    • /
    • v.9 no.1
    • /
    • pp.81-100
    • /
    • 2013
  • This study has attempted to suggest the direction for child care policy for 0-2 year old children in Korea from analysis on the issues included in the policy for free child care services of the Korean Government. For the analysis, such materials as governmental statistical reports of child care and policy and articles regarding free child care service in daily news papers during 2012 have been collected. From this study, it has been suggested that the policy for free child care for 0-2 year old children, in future, should take into account reliably carrying out matemity leave and parental leave arrangements, equity childcare support for working couples, realization of parental subsidies, expand parental choice, introduction of a small family day care system, providing information and knowledge on the development of infants and parenting. The suggestions of this study will contribute to the development and practice of an effective child care policy for 0-2 year children, which consider the needs and requirements of young children and their parents.

Qualitative Study on Improvement of Operating System and Tailored Nutrition Education Program for Marriage Immigrants to Korea: Program Providers' Perspective (다문화가정 맞춤형 영양교육 프로그램과 운영시스템 개선을 위한 질적 연구 : 프로그램 제공자 측면)

  • Joe, Mee-Young;Hwang, Ji-Yun
    • Korean Journal of Community Nutrition
    • /
    • v.22 no.4
    • /
    • pp.323-335
    • /
    • 2017
  • Objectives: The purpose of this study is to analyze the current status of nutrition education programs for multicultural families and to provide policy suggestions for improvement. Methods: In-depth interviews of a total of 21 multicultural experts were conducted; 15 people were interviewed individually, while 6 people were interviewed in groups of three. Results: In-depth interviews revealed various problems related to the operation of nutrition education programs. The causes of problems were analyzed and categorized as four factors: systemic, practical, environmental and cultural. As for the systematic factors, insufficient linkage between related organizations and duplicate performance of several projects were identified as concerns Establishment of a control tower and strengthening the linkage among the related organizations may be needed to address this concern. With regard to practical factors, the study identified that language barriers, and lack of nutritional education media and tools translated into multicultural languages were limiting factors. These limitations the development of nutrition education materials that aretranslated into multiple languages, implementation of education programs that are different from the Korean education, and by providing interpreters. As for the environmental factors, low educational level and poor nutritional knowledge of multicultural women made it difficult for them to understand the contents of the education. Demonstration, practical training and urgent education on pregnancy and childbirth nutrition were identified as needs to address these concerns. Withregard to cultural factors, food culture conflict with Korean families, and difficulties in home practices were detected as concerns. Participants in the study suggested that getting education with family and facilitation of weekend and nighttime programs health of this community. Conclusions: Further studies are needed to adopt more effective and efficient nutrition intervention to promote the healthy eating of the married immigrant women based on the study results.

Privacy Preserving and Relay Attack Preventing Multi-Context RFID Mutual Authentication Protocol (프라이버시를 제공하고 중계 공격에 안전한 다중-컨텍스트 RFID 상호 인증 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.1028-1037
    • /
    • 2011
  • Recently, Selim et al proposed public key cryptography based privacy preserving multi-context RFID authentication protocol. However Selim et al's proposed protocol not only doesn't fit into passive tag based RFID system because it uses public key based encryption algorithm to perform authentication between reader and tag, but also is insecure to an impersonation attack because it doesn't provide mutual authentication. In order to eliminate the above described efficiency problem and security vulnerabilities, this paper proposes a new multi-context RFID mutual authentication protocol that can prevent privacy invasion and tag impersonation attack through providing mutual authentication between single passive tag which is located different application space and readers which provide multi-context purposes and can secure against relay attack and denial-of-service attack. As a result, the proposed protocol performs secure mutual authentication based on the collected space and time information from the RFID reader and provides strong security and high computation efficiency because if performs secure one-way hash function and symmetric encryption operations suitable to the environments of passive RFID tags.

Design of a User Location Prediction Algorithm Using the Flexible Window Scheme (Flexible Window 기법을 이용한 위치 예측 알고리즘 설계)

  • Son, Byoung-Hee;Kim, Yong-Hoon;Nahm, Eui-Seok;Kim, Hag-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.6A
    • /
    • pp.550-557
    • /
    • 2007
  • We predict a context of various structures by using Bayesian Networks Algorithms, Three-Dimensional Structures Algorithms and Genetic Algorithms. However, these algorithms have unavoidable problems when providing a context-aware service in reality due to a lack of practicality and the delay of process time in real-time environment. As far as context-aware system for specific purpose is concerned, it is very hard to be sure about the accuracy and reliability of prediction. This paper focuses on reasoning and prediction technology which provides a stochastic mechanism for context information by incorporating various context information data. The objective of this paper is to provide optimum services to users by suggesting an intellectual reasoning and prediction based on hierarchical context information. Thus, we propose a design of user location prediction algorithm using sequential matching with n-size flexible window scheme by taking user's habit or behavior into consideration. This algorithm improves average 5.10% than traditional algorithms in the accuracy and reliability of prediction using the Flexible Window Scheme.

A Blockchain-Based Content Authentication Scheme for CCN (블록체인 기반 CCN 콘텐츠 인증 기술)

  • Kim, DaeYoub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.975-985
    • /
    • 2018
  • ICN architecture, one of future Internet technologies, proposes that content request packets toward a content source can be responded by several distributed nodes. So, ICN can solve network congestion which is happened around content sources and provide a seamless content distribution service regardless of the network and system statuses of content sources. Especially, CCN implements content caching functionality in network nodes so that such intermediated network nodes can themselves respond to content requests. However, when receiving content from distributed nodes, users receiving content cannot authenticate the nodes providing the content. So CCN is vulnerable to various attacks such as an impersonation attack, a data pollution attack, and so on. This paper first describes CCN content authentication and its weakness. Then it proposes an improved content authentication scheme based on a blockchain and evaluates the performance of the proposed scheme.

The Evaluation about the Information Fidelity in the External Image Information Input - Using DICOM Validation Tool - (외부영상정보 입력 시 DICOM정보 충실성에 대한 평가 - DICOM Validation Tool 이용 -)

  • Lee, Song-Woo;Lee, Ho-Yeon;Do, Ji-Hoon;Jang, Hye-Won
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.13 no.1
    • /
    • pp.33-38
    • /
    • 2011
  • Now a days, there's many change over for PACS among the most of hospital and it standard for DICOM 3.0. These kind of using of DICOM 3.0 improves increasing of medical imaging exchange and service for patient. However, there's some problems of compatibility caused during carry out CD and DVD from hospital. For this reason, this thesis analyzed patients image targeting those storages requested to hospitals in Seoul by using Validation Toolkit which is recommended from KFDA. The analyze type is like this. Make 100 data, total 500, each of MRI CT Plain x-ray Ultrasound PET-CT images and analyzed type of error occurred and loyalty of information. If express percentage of error occurred statistically, we can get a result as follows MRI 5%, Plain x-ray 11%, CT 18%, US 25%, PET-CT 30%. The reson why percentage of error occurred in PET-CT is because of imperfective support and we could notice that we weren't devoted to information. Even though, PET-CT showed highest percentage of error occurred, currently DICOM data improved a lot compare to past. Moreover, it should be devoted to rule of IHE TOOL or DICOM. In conclusion, we can help radiographer to analyze information of image by providing clues for solving primary problem and further more, each of PACS company or equipment company can enhance fidelity for following standard of image information through realizing the actual problem during transfer of image information.

  • PDF

How to Cope with Ransomware in the Healthcare Industry (의료산업에서의 랜섬웨어 대응 방법)

  • Jeon, In-seok;Kim, Dong-won;Han, Keun-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.155-165
    • /
    • 2018
  • As medical healthcare industry is growing up rapidly these days, providing various new healthcare service is considered carefully. Health information is considered to be more important than financial information; therefore, protecting health information becomes a very significant task. Ransomware is now targeting industry groups that have high information value. Especially, ransomware has grown in various ways since entering maturity in 2017. Healthcare industry is highly vulnerable to ransomeware since most healthcare organizations are configured in closed network with lack of malware protection. Only meeting the security criteria is not the solution. In the case of a successful attack, restoration process must be prepared to minimize damages as soon as possible. Ransomware is growing rapidly and becoming more complex that protection must be improved much faster. Based on ISO 27799 and 27002 standard, we extract and present security measures against advanced ransomware to maintain and manage healthcare system more effectively.