• Title/Summary/Keyword: illegal

Search Result 1,451, Processing Time 0.03 seconds

RSA Algorithm for User Authentication System

  • Song, Byung-Ho;Bae, Sang-Hyun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.207-210
    • /
    • 2003
  • For the effective use of information in the information society, information should be protected and outflow of information by illegal users should be prevented. This study sets up user authentication policy, user authentication regulations and procedures for information protection and builds information protection key distribution center and encryption user Authentication system, which can protect information from illegal users.

  • PDF

Digital Contents Application using Intelligence (지능을 이용한 디지털 콘텐츠 응용)

  • Kim, Man-Ki;Hong, You-Sik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.2
    • /
    • pp.65-71
    • /
    • 2009
  • The end of the 1990s due to the rapid development of Internet communications and two-way communication advertising, public relations, online music, video, movies, e-Book, and distribution of digital content is actively underway. The combination of Internet and TV, as well as born of IPTV and interactive digital content industry's future has become a key industry. However, these two-way communication that illegal adult sites, illegal Bulletin, illegal Ads, PR, shopping mall, illegal music copying, video replication, such as negative due to the emergence of IPTV and is always around us and should be recognized. For example, on the Internet, which has been operating in the ocean sounds from the music copyright issue, the prosecution decided to prosecute because of the digital cultural content, copyright issues has become an important issue. Status and issues of this paper to learn the digital content, using intelligence to solve these problems, two-way communication advertising, public relations and practice of digital content, practices and courses of students vulnerable to offers for the analysis simulation.

  • PDF

Illegal and Harmful Information Detection Technique Using Combination of Search Words (단어 조합 검색을 이용한 불법·유해정보 탐지 기법)

  • Han, Byeong Woo;Yoon, Ji Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.397-404
    • /
    • 2016
  • Illegal and harmful contents on the Internet has been an issue and been increased in Korea. They are often posted on the billboard and website of small enterprise and government office. Those illegal and harmful contents can relate to crime and suspicious activity, so, we need a detection system. However, to date the detection itself has been conducted manually by a person. In this paper, we develop an automated URL detection scheme for detecting a drug trafficking by using Google. This system works by analyzing the frequently used keywords in a drug trafficking and generate a keyword dictionary to store words for future search. The suspected drug trafficking URL are automatically collected based on the keyword dictionary by using Google search engine. The suspicious URL can be detected by classifying and numbering each domain from the collection of the suspected URL. This proposed automated URL detection can be an effective solution for detecting a drug trafficking, also reducing time and effort consumed by human-based URL detection.

An Anonymous Fingerprinting Scheme with a Robust Asymmetry

  • Park, Jae-Gwi;Park, Ji-Hwan;Kouichi Sakurai
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.4
    • /
    • pp.620-629
    • /
    • 2003
  • Fingerprinting schemes are techniques applied to protect the copyright on digital goods. These enable the merchants to identify the source of illegal redistribution. Let us assume the following situations connectedly happen: As a beginning, buyer who bought digital goods illegally distributed it, next the merchant who found it revealed identity of the buyer/traitor, then the goods is illegally distributed again. After this, we describe it as“The second illegal redistribution”. In most of anonymous fingerprinting, upon finding a redistributed copy, a merchant extracts the buyer's secret information from the copy and identifies a traitor using it. Thus the merchant can know the traitor's secret information (digital fingerprints) after identification step. The problem of the second illegal distribution is that there is a possibility of the merchant's fraud and the buyer's abuse: that is a dishonest employee of the merchant might just as well have redistributed the copy as by the buyer, or the merchant as such may want to gain money by wrongly claiming that the buyer illegally distributed it once more. The buyer also can illegally redistribute the copy again. Thus if the copy turns up, one cannot really assign responsibility to one of them. In this paper, we suggest solution of this problem using two-level fingerprinting. As a result, our scheme protects the buyer and the merchant under any conditions in sense that (1) the merchant can obtain means to prove to a third party that the buyer redistributed the copy. (2) the buyer cannot worry about being branded with infamy as a traitor again later if he never distribute it.

  • PDF

Level of User Awareness for Illegal Downloading of Movie Content (영상 컨텐츠 불법 복제에 관한 사용자 의식 수준)

  • Rhee, Hae-Kyung;Kim, Hee-Wan
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.11
    • /
    • pp.212-224
    • /
    • 2009
  • Proliferation of high performance internet infrastructures finally allows their users download a single copy of regular movie just within in a couple of seconds. Ease of accesses to the software for downloading consequently leads them insensitive to the ethics or legitimacy of their conduct. Thus, strong legal action is enforced for piracy over nationally through strengthen the copyright law. We in this paper conducted a survey to see whether netizens prefer to download just for the matter of their convenience. Whilst the level of awareness is addressed even in a far-fetched manner in the area of music piracy and computer software piracy, the case of movie is much different in that we even fail to find any survey that has been made for movie piracy. The survey has been made by devising questionnaires for netizens and it was posted web WorldSurvey, which is the most prominent online survey site in Korea. To our surprise, 9 out of 10 respondents expressed they actually resort to illegal downloading for the reason of convenience. We realized one more surprise. More than 95% of netizens conspicuously aware of their downloading behaviors are mischievous and illegal without reservation.

The Protection System of Digital Contents using a Frame Filter Information based on Public Key (공개키 기반의 프레임 필터 정보를 이용한 디지털 콘텐츠 보호 시스템)

  • Koh Byoung-Soo;Jang Jae-Hyuk;Kang Seok-Jue;Choi Yong-Rak
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.1-9
    • /
    • 2004
  • The growth of Internet is the main factor that activates the Digital Contents Market and gives the convenience, efficiency and usefulness to the users. However the Digital Contents Market could be shrunk by an illegal reprinting and imprudent using. As a result, recently we can see that using the contents illegally through Internet makes the troubles between providers and customers and finally they are at law. Therefore we urgently need a new technology which can prevent the contents from illegal using, illegal reprinting and imprudent using, We developed the system prohibits a imprudent using in order to activate the Digital Contents Market, We developed the system protects the contents safely by removing the dangerous for the illegal reprinting with providing the encoded contents and the system removes the contents according to the number of usage and the user authentication through network.

  • PDF

Drug use and Reuse Relating Characteristics in Illegal Drug Users (불법약물 사용자의 약물사용 및 재사용 관련특성)

  • Lee So Young
    • Journal of Korean Public Health Nursing
    • /
    • v.16 no.2
    • /
    • pp.400-411
    • /
    • 2002
  • This study was performed to identify the drug use and reuse relating characteristics and reuse relating factors in illegal drug users. Subjects consisted of 88 illegal drug users. Some of them were confined in a mental hospital or National Forensic Psychiatric Hospital located in Chung-nam province, others on attending a drug abuse prevention program in Seoul Probational Institute. Data were collected during the period from February 1, 2002 to February 25, 2002, and analyzed by SAS program. version 6.12. for Wilcoxon rank sum test, Pearson Correlation, Multiple regression. Results were as follows; 1. Drug use characteristics were as follows. $19.3\%$ was has drug family history and $20.7\%$ was has alcohol family history. Main drug was Phillopon$44.3\%$, inhalants $35.2\%$, LSD et al $22.7\%$. Drug use rate of months was everyday $31.2\%$, every other day $24.4\%$. 2. $100\%$ has experienced abstinence and reuse. Abstinence period was less than 12 months in $49.4\%$ and reuse period was less than 6 months in $58.6\%$. 3. Drug use and reuse characteristics related to general characteristics was identified as below. Abstinence period of male was longer than that of female. Person who have drug family history experienced more drugs and person who have family alcohol history started earlier. 4. Reuse periods was correlated with abstinence periods, age. And abstinence period was correlated with age and outcome that following reuse. 5. The multiple regression was used to identify the relating factors that influence reuse period and abstinence period. At the state of controlling abstinence period. inhalants users have 10.07 days shorter reuse period than others. And abstinence period had lengthened age, bad health status, early initiate age, and long reuse period.

  • PDF

Distributed Intrusion Detection System for Safe E-Business Model (안전한 E-Business 모델을 위한 분산 침입 탐지 시스템)

  • 이기준;정채영
    • Journal of Internet Computing and Services
    • /
    • v.2 no.4
    • /
    • pp.41-53
    • /
    • 2001
  • Multi-distributed web cluster model built for high availability E-Business model exposes internal system nodes on its structural characteristics and has a potential that normal job performance is impossible due to the intentional prevention and attack by an illegal third party. Therefore, the security system which protects the structured system nodes and can correspond to the outflow of information from illegal users and unfair service requirements effectively is needed. Therefore the suggested distributed invasion detection system is the technology which detects the illegal requirement or resource access of system node distributed on open network through organic control between SC-Agents based on the shared memory of SC-Server. Distributed invasion detection system performs the examination of job requirement packet using Detection Agent primarily for detecting illegal invasion, observes the job process through monitoring agent when job is progressed and then judges the invasion through close cooperative works with other system nodes when there is access or demand of resource not permitted.

  • PDF

Maritime Interdiction against the DPRK's Illicit Maritime Practices (북한의 불법 해상활동에 대한 해양차단에 관한 연구)

  • Kim, Jeong-Soo
    • Strategy21
    • /
    • s.46
    • /
    • pp.29-56
    • /
    • 2020
  • Despite the deep concerns against the DPRK and the harsh sanctions imposed on it, the country renders the sanctions futile by facilitating various illegal trades such as the ship-to-ship transfers of petroleum or coal. Recently, the international community went into paying attention to solve this matter. Among the measures the community can take, "reinforcing the search and inspection of the DPRK related vessels transiting in the high and territorial seas" is the best policy approach to reduce the sanction evasion and provide the international community with considerable bargaining advantages. This measure requires the forceful action by legal enforcement agencies, also known as VBSS. (Visit, Board, Search, and Seizure) It would make the deals prohibited by the UNSCRs (United Nation Security Council Resolutions) less profitable by reducing the expected return on the deals and increasing the cost for them. So, it would make the illegal deals under the table less attractive. The DPRK has been able to render the sanctions futile by exploiting the limitations of the current maritime sanctions. The resolutions are short of being specific about law enforcement, and the PSI (Proliferation Security Initiative) is legally nonbinding. However, if the UNSCRs and the PSI are combined, they can generate a new source of power and exploit the weakness of the DPRK. Noting that the recent UNSCRs stipulated all the legal discussions in the resolutions are confined and applied only to the DPRK, the PSI can target the commercial trade as well as the WMD-related materials in the case of the DPRK's illegal maritime practices. Therefore, the PSI endorsing partners should go beyond mere commitments. They should discuss action plans to implement the maritime interdictions to the extent that they discourage the DPRK and its business partners continuing the illegal activities.

A case study on illegal dumping of industrial wastes (산업폐기물(産業廢棄物)의 불법투기(不法投棄)와 재처리(再處理)에 대한 사례조사(事例調査))

  • Lee, Hyun-Yong;Lee, Seung-Woo;Ryoo, Byung-Soon
    • Resources Recycling
    • /
    • v.16 no.6
    • /
    • pp.61-67
    • /
    • 2007
  • Teshima is a quiet and beautiful island, but started to be imaged as an "island of wastes" because of the 600,000 tons of industrial wastes thrown there illegally. Now it symbolizes the problem of industrial wastes in Japan. Teshima development company, an industrial waste disposer, started to dispose industrial wastes illegally in the west side of the island, since the late 1970s. Police Station exposed this illegal act, and arrested 6 persons of the company, including its president, in charge of having violated the Waste Disposal and Public Cleansing Law in 1991. This illegal disposition has continued for 13years until it was exposed by the police. Teshima case of industrial wastes are introduced in this paper.