• Title/Summary/Keyword: device-to-device verification

Search Result 478, Processing Time 0.025 seconds

Investigation of an Infrared Temperature Measurement System for Thermal Safety Verification of Plasma Skin Treatment Devices

  • Choi, Jong-ryul;Kim, Wookeun;Kang, Bongkeun;Song, Tae-Ha;Baek, Hee Gyu;Han, Yeong Gil;Park, Jungmoon;Seo, Soowon
    • Current Optics and Photonics
    • /
    • v.1 no.5
    • /
    • pp.500-504
    • /
    • 2017
  • In this paper, we developed a temperature measurement system based on an infrared temperature imaging module for thermal safety verification of a plasma skin treatment device (PSTD). We tested a pilot product of the low-temperature PSTD using the system, and the temperature increase of each plasma torch was well-monitored in real-time. Additionally, through the approximation of the temperature increase of the plasma torches, a certain limitation of the plasma treatment time on skin was established with the International Electrotechnical Commission (IEC) guideline. We determined an appropriate plasma treatment time ($T_{Safe}$ < 24 minutes) using the configured temperature measurement system. We believe that the temperature measurement system has a potential to be employed for testing thermal safety and suitability of various medical devices and industrial instruments.

Scheme for Verification Between Mobile Devices in a Service with Expiration Time by Using Zero-knowledge Proof (영지식 증명을 이용한 가입기간이 정해진 서비스에서 이동 통신 기기간 인증 기법)

  • Park, Young-Hoon;Seo, Seung-Woo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.3
    • /
    • pp.23-32
    • /
    • 2013
  • As the mobile communication technology is developed, the services for communication between the mobile devices are provided, and the amount of usage is increasing tremendously. For the device-to-device communication, the device should be verified if it is a service member. The existing verification schemes include interactions with the third party, while this may cause the problems that the bandwidth is dissipated and the devices which are out of the communication range of the base station cannot communicate with other devices. To solve such problems, we propose a new scheme for verification between mobile devices without interaction of third party. For the proposed scheme, we develop and employ a new zero-knowledge proof protocol, which verifies the device's membership and its expiration time. Furthermore, the scheme guarantees privacy of the mobile device since it checks the encrypted verification message without decrypting, and protects replaying attack since it uses challenge-response method.

Development of a PCI-Express Device Verification Model

  • Kim Youngwoo;Kim Sungnam;Park Kyoung;Kim Myungjoon
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.281-284
    • /
    • 2004
  • In this paper, a verification method and model for a PCI-Express device are described. PCI-Express technology is one of new I/O interconnection technologies which is intended to replace conventional PCI based technology, and is introduced by PCI-SIG in 2002. For a fast prototyping, a verification suite which includes a behavioral model and stimuli is needed before actual design is finished. And also it should be simple in structure and accurate enough to verify the design. In this paper, an Early Verification Suite (EVS) which complies with PCI-Express protocol is developed and tested.

  • PDF

A Design of Device Management System for Factories using Wireless Sensor Network (무선 센서 망을 이용한 공장 내 장치 관리 시스템 설계)

  • Moon, Sung-Nam;Kim, Young-Han
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3C
    • /
    • pp.233-240
    • /
    • 2012
  • Unlike traditional factory environment, in an industrial factory network applied wireless sensor network technologies, all procedures of discovery, identification and verification of devices should be performed in an automatic fashion. To address these challenges, we design a management system using the device registry server that we propose in this paper. In the phase of device discovery, the proposed system utilizes properties of routing protocol running in factories. Also, in the phase of identification and verification, the system uses unique and general information of a device stored within the device registration server. Such a way allows management system to reduce implementation complexity and to easily manage devices in a factory applied with a wireless network consisting of heterogeneous devices.

Verification for the design limit margin of the power device using the HALT reliability test

  • Chang, YuShin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.67-74
    • /
    • 2018
  • The verification for the design limit margin of the power device for the information communication and surveillance systems using HALT(Highly Accelerated Life Test) reliability test is described. The HALT reliability test performs with a step stress method which change condition until the marginal step in a design and development phase. The HALT test methods are the low temperature(cold) step stress test, the high temperature(hot) step stress test, the thermal shock cyclic stess test, and the high temperature destruct limit(hot DL) step stress test. The power device is checked the operating performance during the test. In this paper, the HALT was performed to find out the design limit margin of the power device.

Shuffling of Elliptic Curve Cryptography Key on Device Payment

  • Kennedy, Chinyere Grace;Cho, Dongsub
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.4
    • /
    • pp.463-471
    • /
    • 2019
  • The growth of mobile technology particularly smartphone applications such as ticketing, access control, and making payments are on the increase. Elliptic Curve Cryptography (ECC)-based systems have also become widely available in the market offering various convenient services by bringing smartphones in proximity to ECC-enabled objects. When a system user attempts to establish a connection, the AIK sends hashes to a server that then verifies the values. ECC can be used with various operating systems in conjunction with other technologies such as biometric verification systems, smart cards, anti-virus programs, and firewalls. The use of Elliptic-curve cryptography ensures efficient verification and signing of security status verification reports which allows the system to take advantage of Trusted Computing Technologies. This paper proposes a device payment method based on ECC and Shuffling based on distributed key exchange. Our study focuses on the secure and efficient implementation of ECC in payment device. This novel approach is well secure against intruders and will prevent the unauthorized extraction of information from communication. It converts plaintext into ASCII value that leads to the point of curve, then after, it performs shuffling to encrypt and decrypt the data to generate secret shared key used by both sender and receiver.

Development of ESAD with Flight Environment Sensing Function and Sled Test Method for Function Verification (비행환경 감지 기능을 보유한 ESAD 개발 및 기능 확인을 위한 슬레드 시험 방안)

  • Hanseong Jo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.3
    • /
    • pp.273-280
    • /
    • 2023
  • Recently electronic safety and arming device(ESAD) has attracted increasing attention due to its design flexibility. However, ESAD can be armed unintentionally due to a malfunction of an external device or interface. Thus ESAD needs an internally generated arming signal independent from the external device. In this paper, a new sensor-hybrid ESAD(SHESAD) with a flight environment sensing function for generating arming signal internally is proposed and a sled test based method is also suggested for evaluating its functions. Through the test results, the operability of the flight environment sensing function was confirmed. Also, it is shown that the proposed test method is suitable for verification of ESAD with the flight environment sensing function.

Design and Verification of PCI 2.2 Target Controller to support Prefetch Request (프리페치 요구를 지원하는 PCI 2.2 타겟 컨트롤러 설계 및 검증)

  • Hyun Eugin;Seong Kwang-Su
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.523-530
    • /
    • 2005
  • When a PCI 2.2 bus master requests data using Memory Read command, a target device may hold PCI bus without data to be transferred for long time because a target device needs time to prepare data infernally. Because the usage efficiency of the PCI bus and the data transfer efficiency are decreased due to this situation, the PCI specification recommends to use the Delayed Transaction mechanism to improve the system performance. But the mechanism cann't fully improve performance because a target device doesn't know the exact size of prefetched data. In the previous work, we propose a new method called Prefetch Request when a bus master intends to read data from the target device. In this paper, we design PCI 2.2 controller and local device that support the proposed method. The designed PCI 2.2 controller has simple local interface and it is used to convert the PCI protocol into the local protocol. So the typical users, who don't know the PCI protocol, can easily design the PCI target device using the proposed PCI controller. We propose the basic behavioral verification, hardware design verification, and random test verification to verify the designed hardware. We also build the test bench and define assembler instructions. And we propose random testing environment, which consist of reference model, random generator ,and compare engine, to efficiently verify corner case. This verification environment is excellent to find error which is not detected by general test vector. Also, the simulation under the proposed test environment shows that the proposed method has the higher data transfer efficiency than the Delayed Transaction about $9\%$.

A Study on the Performance Prediction and Evaluation of Scale Down Noise Reducing Device on the Top of Noise Barrier (축소모형 방음벽 상단장치의 성능예측 및 평가에 관한 연구)

  • Yoon, Je-Won;Kim, Young-Chan;Jang, Kang-Seok;Hong, Byung-Kook
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.2844-2851
    • /
    • 2011
  • The purpose of this study is to set up an acoustic prediction technique and to perform the IL test of scale down noise reducing device for the development of the noise reducing device as the development of 400km/h class high speed train. First of all, the IL prediction of noise reducing device was performed with the 2D BEM method. And the noise test of scale down noise reducing device in anechoic chamber was performed for the verification of acoustic prediction technique and IL performance evaluation. As the results, the acoustic prediction technique for the development of noise reducing device was verified because the averaged IL difference between prediction and test is in 2dB(A). And the measured IL value of noise reducing device is less than 2dB(A), and additional IL with polyester absorption material is increased about 0.5dB(A).

  • PDF

Development of Communication Device for Sound Signal Receiving and Controlling of Sonobuoy (소노부이의 음향신호 수신 및 제어를 위한 통신장치 개발)

  • Lee, Jaeeun;Han, Sangkyu;Kwon, Bumsoo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.3
    • /
    • pp.317-327
    • /
    • 2021
  • Low Frequency Active Sonobuoy(hereinafter referred to as LFAS) are being developed in Korea in consideration of compatibility with existing overseas sonobuoys, and a communication device for acoustic signals receiving and operating control of LFAS has been developed. The communication device needs to verify compatibility with the existing Sonobuoy, and for this purpose, the standardized Sonobuoy communication protocol was applied. The communication device is designed/manufactured to transmit the acoustic signal received in real time from the Sonobuoy through VHF band RF communication to the data processing device, and transmit CFS/CSG commands for operation control to the Sonobuoy through UHF band RF communication. In order to verify the manufactured communication device, the communication status and performance were verified by interlocking test through Ultra Electronics' PASS-II equipment and domestically developed electronic device of Sonobuoy. In addition, operability was verified through environmental tests, water tanks, and marine operations. In the future, the communication device of sonobuoy can be used for verification of the Sonobuoy developed in Korea.