• Title/Summary/Keyword: Ubiquitous Protect

Search Result 81, Processing Time 0.02 seconds

Patient Authentication System for Medical Information Security using RFID (의료정보보호를 위한 RFID를 이용한 환자 인증 시스템)

  • Yoon, Eun-Jun;Yoo, Kee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.962-969
    • /
    • 2010
  • Recently, RFID technology can successfully be used to reduce medical errors. This technology can aid in the accurate matching of patients with their medications and treatments. The enthusiasm for using RFID technology in medical settings has been tempered by privacy concerns. In this paper, we propose a secure and efficient RFID authentication system to not only authenticate patients' authenticity but also protect patients' personal medical informations. The proposed system consists of RFID-based patient authentication protocol and database security protocol. As a result, since the proposed RFID authentication system provides strong security and efficiency, it can be used practically for patient authentication and personal medical information protection on the high technology medical environments such as u-Hospital and u-Healthcare.

A RFID Privacy protection system using H/W friendly security algorithm Environment (하드웨어 친화적인 암호 알고리즘을 사용한 RFID 프라이버시 보호 시스템)

  • Kim, Jin-mook;Ryou, Hwang-Bin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.280-284
    • /
    • 2005
  • In ubiquitous computing environment, An RFID system will be the important way that recognizing an object instead of Bar-code system. But a privacy infringement problem is predicted between a tag and leader to be serious. There is many difficulty that just uses an existing research method because it has an Hardware restriction. Therefore we will suggest that A RFID Privacy Protect system using Hareware friendly security algorithm. we will use RC5 and CBC_MAC because the tag has hardware restriction .To implement, We will simulate and test on One chip microprcessor environment. In the result of the experiment, We will know that a suggested system solves privacy problem on RFID system that it was using CBC-MAC and RC5 security algorithm.

  • PDF

Development of an Information Security Standard for Protecting Health Information in u-Health Environment (u-Health 환경에서의 정보보호 수준제고를 위한 보안 표준 개발)

  • Kim, Dong-Soo;Kim, Min-Soo
    • IE interfaces
    • /
    • v.20 no.2
    • /
    • pp.177-185
    • /
    • 2007
  • e-Business in healthcare sector has been called e-Health, which is evolving into u-Health with advances of ubiquitous technologies. Seamless information sharing among health organizations is being discussed in many nations including USA, UK, Australia and Korea. Efforts for establishing the electronic health record (EHR) system and a nation-wide information sharing environment are called NHII (National Health Information Infrastructure) initiatives. With the advent of u-Health and progress of health information systems, information security issues in healthcare sector have become a very significant problem. In this paper, we analyze several issues on health information security occurring in u-Health environment and develop an information security standard for protecting health information. It is expected that the standard proposed in this work could be established as a national standard after sufficient reviews by information security experts, stakeholders in healthcare sector, and health professionals. Health organizations can establish comprehensive information security systems and protect health information more effectively using the standard. The result of this paper also contributes to relieving worries about privacy and security of individually identifiable health information brought by NHII implementation and u-Health systems.

A Rule Protecting Scheme with Symmetric Cryptosystem for Intrusion Detection System (암호화 기법을 적용한 침입 탐지 시스템의 룰 보호 기법)

  • Son Hyung-Seo;Kim Hyun-Sung;Bu Ki-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.3-13
    • /
    • 2004
  • Kvarnstrom et al. ${in}^{[10]}$ proposed a rule protection scheme by using one-way hash function to protect rules in security systems over ubiquitous environment. Son et at. ${in}^{[5-6]}$ also prooposed a rule protection scheme for Snort, which is one of the most common IDS. These schemes provide security only for the header information but not for its contents. To solve this problem, this paper presents a scheme based on the symmetric cryptosystem over Snort not only for the header information but also contents. This paper uses the key management based on PCMCIA security module proposed ${by}^{[12]}$ for the symmetric cryptosystem. Our scheme could be adjusted to other security systems, which use the rule based detection.

3D Cadastre Data Model in Korea ; based on case studies in Seoul

  • Park, So-Young;Lee, Ji-Yeong;Li, Hyo-Sang
    • Spatial Information Research
    • /
    • v.17 no.4
    • /
    • pp.469-481
    • /
    • 2009
  • Due to the increasing demands on the efficient use of land and the fast growth of construction technologies, human living space is expanded from on the surface to above and under the surface. By recognizing that the current cadastre system based on 2D was not appropriate to reflect the trend, the researchers are interested in a 3D cadastre. This paper proposed the 3D cadastre data model that is appropriate to protect ownership effectively in Korea. The 3D cadastre data model consists of a 3D cadastre feature model and a 3D cadastre geometry model, and the data are produced by a 3D cadastre data structure. A 3D cadastre feature model is based on 3D rights and features derived from case studies. A 3D cadastre geometry model based on ISO19107 Spatial Schema is modified to be good for 3D cadastre in Korea. A 3D cadastre data structure consists of point, line, polygon and solid primitives. This study finally purposes 1) serving and managing land information effectively, 2) creating rights and displaying ranges about infrastructures above and under surface, 3) serving ubiquitous-based geoinformation, 4) adapting ubiquitous-based GIS to urban development, and 5) regulating relationships between rights of land and registration and management systems.

  • PDF

Regulation of Cinnamyl Alcohol Dehydrogenase (CAD) Gene Family in Lignin Biosynthesis (리그닌 생합성에서 cinnamyl alcohol dehydrogenase (CAD) 유전자 family의 조절)

  • Kim, Young-Hwa;Huh, Gyung-Hye
    • Journal of Life Science
    • /
    • v.31 no.10
    • /
    • pp.944-953
    • /
    • 2021
  • Lignin is a complex phenylpropanoid polymer abundant in the cell walls of vascular plants. It is mainly presented in conducting and supporting tissues, assisting in water transport and mechanical strength. Lignification is also utilized as a defense mechanism against pathogen infection or wounding to protect plant tissues. The monolignol precursors of lignin are synthesized by cinnamyl alcohol dehydrogenase (CAD). CAD catalyzes cinnamaldehydes to cinnamyl alcohols, such as p-coumaryl, coniferyl, and sinapyl alcohols. CAD exists as a multigenic family in angiosperms, and CAD isoforms with different functions have been identified in different plant species. Multiple isoforms of CAD genes are differentially expressed during development and upon environmental cues. CAD enzymes having different functions have been found so far, showing that one of its isoforms may be involved in developmental lignification, whereas others may affect the composition of defensive lignins and other wall-bound phenolics. Substrate specificity appears differently depending on the CAD isoform, which contributes to revealing the biochemical properties of CAD proteins that regulate lignin synthesis. In this review, details regarding the expression and regulation of the CAD family in lignin biosynthesis are discussed. The isoforms of the CAD multigenic family have complex genetic regulation, and the signaling pathway and stress responses of plant development are closely linked. The synthesis of monolignol by CAD genes is likely to be regulated by development and environmental cues as well.

A Study on the Development Site Security for Embedded Software (임베디드 소프트웨어 개발현장보안에 관한 연구)

  • Yeo, Sang-Soo;Kim, Tai-Hoon;Cho, Sung-Eon;Kouich, Sakurai
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.3
    • /
    • pp.259-265
    • /
    • 2007
  • Systematic components for implementing ubiquitous computing, for example, electronic devices, electric home appliances, and controllers, etc, are consist of not only circuits but also softwares expected to do some special system-controlling functions, and these softwares used to be called like as embedded software. Because embedded software is a core component controlling systems, the codes or control flows should be protected from being opened to the public or modified. Embedded software security can be divided into 2 parts: first is the unauthorized access to development site and embedded software, second is the unauthorized disclosure or modification. And this research is related to the first aspect of them.This paper proposes some security check requirements related to embedded software development site by analyzing the ALC_DVS.1 of the ISO/IEC 15408 and Base Practices (BPs) of the ISO/IEC 21827. By applying this research, we expect to protect unauthorized modification of embedded software indirectly.

  • PDF

A Study of Java Card File System with File Cache and Direct Access function (File Cache 및 Direct Access기능을 추가한 Java Card File System에 관한 연구)

  • Lee, Yun-Seok;Jun, Ha-Yong;Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.3
    • /
    • pp.404-413
    • /
    • 2008
  • As toward a ubiquitous society, a lot of methods have been proposed to protect personal privacy. Smart Cards with CPU and Memory are widely being used to implement the methods. The use of Java Card is also gradually getting expanded into more various applications. Because there is no standards in Java Card File System, Generally, Java Card File System follows the standards of Smart Card File System. However, one of disadvantages of the Java Card File System using a standard of Smart Card File System is that inefficient memory use and increasing processing time are caused by redundancy of data and program codes. In this paper, a File Cache method and a Direct Access method are proposed to solve the problems. The proposed methods are providing efficient memory use and reduced processing time by reduce a program codes.

  • PDF

A Study of Automatic Fire Detection Installation based CAN Comunnication (CAN 통신기반 자동화재탐지설비에 관한 연구)

  • Kim, Young-Dong;Oh, Guem-Kon;Kang, Won-Chan
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.20 no.2
    • /
    • pp.50-59
    • /
    • 2006
  • In this paper, We are going to propose the fire protection system using CAN(Controller Area Network). The larger, higher and deeper buildings an, the more dangerous people are when fire happens. We should be aware of the problems of prior fire protection system. Therefore, we construct the embedded system based on CAN communication that is capable of N to N communication, and build independent fire protection system. If the fire is occurred on the building, the problem is that how fast we can detect the fire and put it on by using available system, this is major factor that reduces damage of our wealth. Therefore in this studies, We would like to design more stable system than current system. This system is based on CAN communication which is available N to N communication constructs and designed to compensate for each fault, so that our aim is to reduce the wires of system, cost of installation and to suppose future type fire protection system.

Position Recognition and User Identification System Using Signal Strength Map in Home Healthcare Based on Wireless Sensor Networks (WSNs) (무선 센서네트워크 기반 신호강도 맵을 이용한 재택형 위치인식 및 사용자 식별 시스템)

  • Yang, Yong-Ju;Lee, Jung-Hoon;Song, Sang-Ha;Yoon, Young-Ro
    • Journal of Biomedical Engineering Research
    • /
    • v.28 no.4
    • /
    • pp.494-502
    • /
    • 2007
  • Ubiquitous location based services (u-LBS) will be interested to an important services. They can easily recognize object position at anytime, anywhere. At present, many researchers are making a study of the position recognition and tracking. This paper consists of postion recognition and user identification system. The position recognition is based on location under services (LBS) using a signal strength map, a database is previously made use of empirical measured received signal strength indicator (RSSI). The user identification system automatically controls instruments which is located in home. Moreover users are able to measures body signal freely. We implemented the multi-hop routing method using the Star-Mesh networks. Also, we use the sensor devices which are satisfied with the IEEE 802.15.4 specification. The used devices are the Nano-24 modules in Octacomm Co. Ltd. A RSSI is very important factor in position recognition analysis. It makes use of the way that decides position recognition and user identification in narrow indoor space. In experiments, we can analyze properties of the RSSI, draw the parameter about position recognition. The experimental result is that RSSI value is attenuated according to increasing distances. It also derives property of the radio frequency (RF) signal. Moreover, we express the monitoring program using the Microsoft C#. Finally, the proposed methods are expected to protect a sudden death and an accident in home.