• Title/Summary/Keyword: USB Media

Search Result 62, Processing Time 0.025 seconds

Enhanced Password Based User Authentication Mechanism Using Mobile Storage Medium/Channel (이동 저장매체를 활용한 패스워드 기반 사용자 인증 강화 방안)

  • Kim, Seon-Young;Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.533-540
    • /
    • 2014
  • As for the application system or the user authentication scheme that is used in the system, various technologies including simple ID/PW, certificate, fingerprint/iris, phone, security card, and OTP are being used. But simple ID/PW and phone certification lack security features. As for the certificate, fingerprint/iris, and security card/OTP, the weakness in security has been quite strengthened, but there are costs and complexity involved to use these. This paper proposes a new measure of much safer and low-cost user authentication that improves the security level and uses mobile external storage media such as USB that people commonly have.

Detection of Face-element for Facial Analysis (표정분석을 위한 얼굴 구성 요소 검출)

  • 이철희;문성룡
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.2
    • /
    • pp.131-136
    • /
    • 2004
  • According to development of media, various information is recorded in media, expression is one during interesting information. Because expression includes of relationship of human inside. Intention of inside is expressed by gesture, but expression has more information. And, expression can manufacture voluntarily, include plan of inside on the man. Also, expression has unique character in a person, have alliance that do division possibility. In this paper, to analyze expression of USB camera animation, wish to detect facial building block. Because characteristic point by person's expression change exists on face component. For component detection, in animation one frame with Capture, grasp facial position, and separate face area, and detect characteristic points of face component.

Broadband Active RF Attenuator with Maximun Attenuation of -110dBm (최대 -110dBm 감쇄기능을 제공하는 능동형 광대역 RF 감쇄기)

  • Paik, Junghoon
    • Journal of Broadcast Engineering
    • /
    • v.22 no.5
    • /
    • pp.665-670
    • /
    • 2017
  • In this paper, we propose an implementation technology for an active attenuator with the maximum attenuation of -110dBm in the frequency band of 50MHz to 2,15GHz. It provides USB interface to connect to PC providing GUI that sets signal frequency and attenuation step of minimum 1dB. As it attenuates the input signal level down to -110dBm, circuit and equipment design technologies are applied to control both internal and external electro-magnetic noises.. Through the performance test, it is assured that it attenuates input signal level down to -110dBm for the input signal levels of -10 to -30dBm.

A Hierarchical MAC Protocol for QoS Support in Wireless Wearable Computer Systems

  • Hur, Kyeong
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.1
    • /
    • pp.14-18
    • /
    • 2014
  • A recent major development in computer technology is the advent of wearable computer systems. Wearable computer systems employ a wireless universal serial bus (WUSB), which refers to a combination of USB with the WiMedia wireless technical specifications. In this study, we focus on an integrated system of WUSB over wireless body area networks (WBANs) for wireless wearable computer systems. However, current WBAN MACs do not have well-defined quality of service (QoS) mapping and resource allocation mechanisms to support multimedia streams with the requested QoS parameters. To solve this problem, we propose a novel QoS-aware time slot allocation method. The proposed method provides fair and adaptive QoS provisioning to isochronous streams according to current traffic loads and their requested QoS parameters by executing a QoS satisfaction algorithm at the WUSB/WBAN host. The simulation results show that the proposed method improves the efficiency of time slot utilization while maximizing QoS provisioning.

A Stable Evidence Collection Procedure of a Volatile Data in Research (휘발성 증거자료의 무결한 증거확보 절차에 관한 연구)

  • Kim, Yong-Ho;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.13-19
    • /
    • 2006
  • I would like to explain a method how to get important data from a volatile data securely, when we are not available to use network in computer system by incident. The main idea is that the first investigator who collects a volatile data by applying scripts built in USB media should be in crime scene at the time. In according to volatile data, he generates hash value, and gets witness signature. After that, he analyses the volatile data with authentication in forensics system.

  • PDF

Classification of terminal using YOLO network (YOLO 네트워크를 이용한 단자 구분)

  • Daun Jeong;Jeong Seong-Hun;Jaeyun Gim;jihoon Jung;Kyeongbo Kong
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2022.11a
    • /
    • pp.183-186
    • /
    • 2022
  • 최근 인공지능 기반 객체 탐지 기술이 발전함에 따라 영상 감시, 얼굴 인식, 로봇 제어, IoT, 자율주행, 제조업, 보안 등 다양한 분야에 활용되고 있다. 이에 본 논문은 발전된 객체 탐지 알고리즘을 이용하여 비전문가에겐 생소한 컴퓨터나 전기 장치 등의 '단자(terminal)' 모양을 구별하는 방법을 제안한다. 이를 위해 객체 탐지 프로그램인 You Only Look Once (YOLO) 알고리즘을 이용하여 입력한 단자들의 모양을 검출하는 알고리즘을 구성하였다. 일상에서 쉽게 볼 수 있는 단자들의 이미지(VGA, DVI, HDMI, DP, USB-A, USB-C)를 라벨링하여 데이터셋을 구축하였고, YOLOv4와 YOLOv5 두 버전의 알고리즘을 사용하여 성능을 검증하였다. 실험 결과 mean Average Precision(mAP) 기준 최대 92.9%의 정확도를 얻을 수 있었다. 전기 장치에 따라 단자의 모양이 다양하고, 그 종류 또한 많기 때문에 본 연구가 방송 기술 등의 여러 분야에 응용될 것으로 기대된다.

  • PDF

A Study of Acquisition and Analysis on the Bios Firmware Image File in the Digital Forensics (디지털 포렌식 관점에서 BIOS 펌웨어 이미지 파일 수집 및 분석에 관한 연구)

  • Jeong, Seung Hoon;Lee, Yun Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.491-498
    • /
    • 2016
  • Recently leakages of confidential information and internal date have been steadily increasing by using booting technique on portable OS such as Windows PE stored in portable storage devices (USB or CD/DVD etc). This method allows to bypass security software such as USB security or media control solution installed in the target PC, to extract data or insert malicious code by mounting the PC's storage devices after booting up the portable OS. Also this booting method doesn't record a log file such as traces of removable storage devices. Thus it is difficult to identify whether the data are leaked and use trace-back technique. In this paper is to propose method to help facilitate the process of digital forensic investigation or audit of a company by collecting and analyzing BIOS firmware images that record data relating to BIOS settings in flash memory and finding traces of portable storage devices that can be regarded as abnormal events.

UWB 기술동향

  • Nam, Yun-Seok;Heo, Jae-Du
    • Information and Communications Magazine
    • /
    • v.24 no.6
    • /
    • pp.41-49
    • /
    • 2007
  • UWB는 저속 UWB와 고속 UWB로 구분할 수 있다. 저속 UWB는 IEEE802.15.4a에서 Sensor Network 용도로 표준화 되고 있으며, 고속 UWB는 IEEE802.15.3a에서 중단된 표준화가 UWB Forum과 WiMedia Alliance에서 각각 진행되고 있다. 고속 UWB는 Certified Wireless USB를 시작으로 무선 1394, 고속 Bluetooth 및 IP 패킷을 전송하기 위한 프로토콜 등 다양한 응용에 적합한 표준이 진행되고 있다. UWB 규격 및 상용화에 있어서 2006년도에는 WiNet기술, PHY 및 Platform C/I 규격 및 시험이 규격의 흐름이었다면 2007년도에는 각 국의 주파수 규정을 반영하고 DAA 기능을 추가한 물리계층 및 MAC 계층 규격이 기술흐름의 중심에 있다. 본 고에서는 WiMedia Alliance의 고속 UWB를 중심으로 최근 표준 활동과 WiMedia 규격을 활용한 국내외 기술동향에 대하여 살펴보고자 한다.

Implementation of Digital Audio Player using AAC/MP3 Decoder (AAC/MP3 복합 복호화기를 이용한 오디오 플레이어의 구현)

  • SEO JEONG-IL;JANG DAE-YOUNG;HONG JIN-WOO
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • autumn
    • /
    • pp.251-254
    • /
    • 2001
  • 본 논문에서는 ETRI와 연세대가 공동 개발한 AAC/MP3 복합 복호화기 ASIC 칩을 이용한 AAC/MP3 오디오 플레이어의 설계 및 구현에 대해 기술한다. 본 논문에서 사용한 AAC/MP3 복합 복호화 ASIC Chip은 20비트 고정소수점 DSP 코어를 이용하여 MP3와 MPEG-2 AAC LC 프로파일을 복호화하며, MPEG-2 AAC 메인 프로파일을 실시간으로 복호화하기 위하여 허프만 복호화 과정과 예측 과정은 전용 하드웨어 모듈을 이용하였다 이를 이용한 오디오 플레이어는 AAC/MP3 파일 재생 기능, USB를 이용한 호스트 PC와의 인터페이스 기능, Flash 메모리와의 인터페이스 기능 등의 특성을 갖는다.

  • PDF

Study on the Digital File Management Behavior of Undergraduate Students according to the Life Cycle of Digital Object (디지털 객체 생애주기에 따른 대학생의 파일관리 행태 연구)

  • Jee, Yoon-Jae;Lee, Hye-Eun
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.321-343
    • /
    • 2022
  • This study presents the direction of services and policies for digital file management in universities by identifying undergraduate students' digital file management behavior. The research defined the Life Cycle of Digital Objects. In addition, This research collected data from 154 undergraduate students using an online survey on their file Creation, Storing, Naming, Organizing, and Backup based on the Digital File Management Workflow. Also, an in-depth interview was conducted for 8 students, two for each major in engineering, arts, social science, and humanities. The result showed that students mostly used personal computers as storage media and USB drive as backup media and had their own file Naming and Organizing methods. Furthermore, students' satisfaction with digital file management was high when universities supported software and cloud storage. Therefore, this study suggests that universities need to provide services reflecting the students' digital file management behavior.