• Title/Summary/Keyword: Single Token

Search Result 32, Processing Time 0.022 seconds

Single Sign-On based Authentication System combined with Blockchain (블록체인을 활용한 Single Sign-On 기반 인증 시스템)

  • Im, Jihyeok;Lee, Myeongha;Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.4 no.2
    • /
    • pp.13-20
    • /
    • 2018
  • In this paper, we propose an authentication system that combines 'Single-Sign-On' and 'Token-based authentication' based on 'Block Chain' technology. We provide 'access control' function and 'integrity' by combining block-chain technology with single-sign-on authentication method and provided stateless self-contained authentication function using Token based authentication method. It was able to enhance the security by performing the encryption based Token issuance and authentication process and provided convenience of authentication to Web Server. As a result, we can provide token-based SSO authentication service efficiently by providing a convenient way to improve the cumbersome authentication process.

Design of Single Rate Three Color Marker using FPGA (EPGA를 이용한 Single Rate Three Color Marker 설계)

  • Park, Chung-Kwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.12
    • /
    • pp.141-148
    • /
    • 2005
  • This paper addresses the design of srTCM (single rate Three Color Marker) described in RFC2697. It has proposed for srTCM to be used at the ingress of Differentiated Service network that provides AF PHB (Assured Forwarding Per Hop Behavior). srTCM is the marker with the metering function, and consists of the token updating function and the marking function. The token updating function uses the dual token bucket. The marking function compares the token values with the length of input packet, and then marks the result into IP QoS field (ToS field). This paper designs srTCM function and then implements it in one chip using VHDL and FPGA technology.

Analytic performance evaluation of the IEEE 802.4 token bus network with finite buffer capacity (제한된 버퍼를 가진 IEEE 802.4 토큰 버스 네트워크의 성능 해석)

  • 문상용;박홍성;권욱현
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.407-410
    • /
    • 1997
  • This paper analytically derives the variance of service time of a station in the symmetric IEEE 802.4 token bus network with single access class and finite buffer capacity. This performance measure is represented in terms of the total number of stations, the token hold time, the arrival rate of frames, the service rate, and other parameters. Using computer simulations, presented performance measure is validated.

  • PDF

A Token Based Protocol for Mutual Exclusion in Mobile Ad Hoc Networks

  • Sharma, Bharti;Bhatia, Ravinder Singh;Singh, Awadhesh Kumar
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.36-54
    • /
    • 2014
  • Resource sharing is a major advantage of distributed computing. However, a distributed computing system may have some physical or virtual resource that may be accessible by a single process at a time. The mutual exclusion issue is to ensure that no more than one process at a time is allowed to access some shared resource. The article proposes a token-based mutual exclusion algorithm for the clustered mobile ad hoc networks (MANETs). The mechanism that is adapted to handle token passing at the inter-cluster level is different from that at the intra-cluster level. It makes our algorithm message efficient and thus suitable for MANETs. In the interest of efficiency, we implemented a centralized token passing scheme at the intra-cluster level. The centralized schemes are inherently failure prone. Thus, we have presented an intra-cluster token passing scheme that is able to tolerate a failure. In order to enhance reliability, we applied a distributed token circulation scheme at the inter-cluster level. More importantly, the message complexity of the proposed algorithm is independent of N, which is the total number of nodes in the system. Also, under a heavy load, it turns out to be inversely proportional to n, which is the (average) number of nodes per each cluster. We substantiated our claim with the correctness proof, complexity analysis, and simulation results. In the end, we present a simple approach to make our protocol fault tolerant.

A Study on Interconnectioned LAN of Token Ring Network (토큰링 네트워크가 상호 연결된 근거리 통신망에 관한 연구)

  • 이상훈;김경식;강준길
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.11
    • /
    • pp.1206-1218
    • /
    • 1992
  • Token ring systems which control to switch the data stream of networks by passing the token have been widely used to medium access controls in many ring or bus topology LANs. The system could be modeled for analysis as single-server-multi-queue system of the cyclic service method. These concepts could be expanded to multi-token ring systems interconnected with single ring consisting of bridges implemented simply to be stored and transmitted. In the proposal for the performance analysis of the interconnected token ring system, in has been assumed M/G/1 queueing model that frame arrivals are the Poisson process at each station queue and frame sizes are independently and identically distributed. And the average time delays were analyzed mathematically for arbitrary frame transferred from source station to destination area. The time delay of the frame transmission could be explained as the sum of the average time which the token passed from arbitrary position to source station, such as the waiting time in the source station transferring the previous arrival frames, and the propagation time from source station to interdestinated point. These delays were given as the sum of the duration from inner and outer bridge queues, the time delays from inner and outer bridge queues, and the time from outer bridge queue to destination station. These results were investigated by varing parameters effected to total time delays. In the results, those factors to be effected to dominant the total time delays were increased were in the cases of the high arrival rates and the high ration of destination of the other outerring. The system were shown the time delays increased exponentially in spite of the priority service policy. In order to decreasing the number of outerrings and increasing the number of nodes in backbone relatively, so the systems could be decreased the total delay in the interconnected token ring system.

  • PDF

Web 3.0 Business Model Canvas of Metaverse Gaming Platform, The Sandbox

  • Song, Minzheong
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.119-129
    • /
    • 2024
  • We look at Web 3.0 business model canvas (BMC) of metaverse gaming platform, The Sandbox (TS). As results, the decentralized, blockchain-based platform, TS benefits its creators and players by providing true ownership, tradability of decentralized assets, and interoperability. First, in terms of the governance and ownership, The SAND functions a governance token allowing holders to participate in decision and SAND owners can vote themselves or delegate voting rights to other players of their choice. Second, in terms of decentralized assets and activities, TS offers three products as assets like Vox Edit as a 3D tool for voxel ASSETS, Marketplace as NFT market, and Game Maker as a visual scripting toolbox. The ASSETS made in Vox Edit, sold on the Marketplace, can be also utilized with Game Maker. Third, in terms of the network technology, in-game items are no longer be confined to a narrow ecosystem. The ASSETS on the InterPlanetary File System (IPFS) are not changed without the owner's permission. LAND and SAND are supported on Polygon, so that users interact with their tokens in a single place. Last, in terms of the token economics, users can acquire in-game assets, upload these assets to the marketplace, use for paying transaction fees, and use these as governance token for supporting the foundation.

A Study on the Factors Influencing the Intention to Use Bio Pass at Airports through Innovation Resistance (혁신저항을 매개로 공항에서 바이오 패스의 사용의도에 영향을 미치는 요인분석)

  • Sung-Hoon Park;Jin-Woo Park
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.31 no.2
    • /
    • pp.7-17
    • /
    • 2023
  • In the era of the 4th industrial revolution, airports around the world are rapidly pushing for smart airports. One ID service based on biometric technology to eliminate congestion and improve airport operation efficiency is one of them. In particular, biopass, which allows you to use the entire journey with one single token without an ID card or boarding pass from arrival at the airport to boarding an aircraft, is emerging as an important technology for smart airports. This study conducted an empirical analysis to identify factors that affect the intention to use in two aspects: the acceptance, and rejection of bio-pass by combining UTAUT and the innovative resistance model. As a result of the study, it was found that the relative advantages and compatibility had a positive effect on the intention to use, and the perceived risk had a negative effect on the intention to use through innovation resistance. This suggests that infrastructure expansion and usage expansion are needed to use time more efficiently at airports, and that the government, airlines, and airport operators need to cooperate to strengthen the security system to relieve users' psychological anxiety.

nhancing Anonymity Protection in RWA Token Trading Using Blockchain Exchange Platforms (블록체인 거래소 플랫폼을 활용한 RWA 토큰 거래에서의 개인정보보호 개선 방안)

  • Jaeseong Lee;Junghee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.641-649
    • /
    • 2024
  • This paper addresses the issue of anonymity protection in the trading of Real-World Asset (RWA) tokens, a prominent topic in the cryptocurrency market in recent years. The principle of transparency inherent in blockchain technology makes it challenging to ensure the anonymity of traders. Although there have been instances in existing blockchain research where mixer services have been utilized to protect the privacy of Fungible Tokens (FTs), and prior studies have explored the privacy protection for Non-Fungible Tokens (NFTs), RWA tokens, which can embody characteristics of both FTs and NFTs and are tied to physical assets, present a complex challenge in achieving the goal of anonymity protection through any single method. This paper proposes a hypothetical token trading platform, ARTeX, and describes the trading process to analyze measures for protecting the anonymity of RWA token transactions.

The Impact of Coping Resources on Positive Changes of Single Mothers and their Children (편모가족의 어머니와 자녀의 긍정적 변화에 미치는 자원의 영향)

  • 조병은
    • Journal of the Korean Home Economics Association
    • /
    • v.36 no.1
    • /
    • pp.13-21
    • /
    • 1998
  • Coping resources may be a crucial aspect in single mothers' and their childrens' adjustment. Using a survey data collected from 275 pairs of single mothers and their children, this study investigated the perceived effects of economic resoures, family relational resources, and social support on positive changes of both mothers and their children. Results revealed that both mothers and their children perceived positive changes of themselves and their children(mothers) relatively high. The degrees of positive changes of mothers were influenced mostly by family relational resources. In the same token, the degrees of positive changes of children were also affected by family relational resources. Overall, the findings suggested the importance of relational resources in explaining the positive changes of single mothers and their children.

  • PDF

A Study on the Implementation of KH LAN(I) (KH LAN(I) 구현에 관한 연구)

  • 유황빈;이대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.12 no.6
    • /
    • pp.621-633
    • /
    • 1987
  • In this paper, for the purpose of constructing LAN(Local Area Network) with Token ring type Star-wired ring method, we implemented an in board network adapter and a concentrator using microprocessor. Using cconcentrato's communication controlling function, the concentator prevents a break of communication by by-passing the fault network adapter. Because, in the data transfer period, a concentrator recognized the network adapter at transmit and receiving side to construct single by -pass line and reduces ring latency time at both sides, this method can keep a high throughput in high and low load. Being considered the result of performance evaluation for the method our study employed, high throughput can be obtained.

  • PDF