• Title/Summary/Keyword: information security service

Search Result 2,721, Processing Time 0.035 seconds

A Mobile Payment System Based-on an Automatic Random-Number Generation in the Virtual Machine (VM의 자동 변수 생성 방식 기반 모바일 지급결제 시스템)

  • Kang, Kyoung-Suk;Min, Sang-Won;Shim, Sang-Beom
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.6
    • /
    • pp.367-378
    • /
    • 2006
  • A mobile phone has became as a payment tool in e-commerce and on-line banking areas. This trend of a payment system using various types of mobile devices is rapidly growing, especially in the Internet transaction and small-money payment. Hence, there will be a need to define its standard for secure and safe payment technology. In this thesis, we consider the service types of the current mobile payments and the authentication method, investigate the disadvantages, problems and their solutions for smart and secure payment. Also, we propose a novel authentication method which is easily adopted without modification and addition of the existed mobile hardware platform. Also, we present a simple implementation as a demonstration version. Based on virtual machine (VM) approach, the proposed model is to use a pseudo-random number which is confirmed by the VM in a user's mobile phone and then is sent to the authentication site. This is more secure and safe rather than use of a random number received by the previous SMS. For this payment operation, a user should register the serial number at the first step after downloading the VM software, by which can prevent the illegal payment use by a mobile copy-phone. Compared with the previous SMS approach, the proposed method can reduce the amount of packet size to 30% as well as the time. Therefore, the VM-based method is superior to the previous approaches in the viewpoint of security, packet size and transaction time.

A Design of Smart Sensor Framework for Smart Home System Bsed on Layered Architecture (계층 구조에 기반을 둔 스마트 홈 시스템를 위한 스마트 센서 프레임워크의 설계)

  • Chung, Won-Ho;Kim, Yu-Bin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.49-59
    • /
    • 2017
  • Smart sensing plays a key role in a variety of IoT applications, and its importance is growing more and more together with the development of artificial intelligence. Therefore the importance of smart sensors cannot be overemphasized. However, most studies related to smart sensors have been focusing on specific application purposes, for example, security, energy saving, monitoring, and there are not much effort on researches on how to efficiently configure various types of smart sensors to be needed in the future. In this paper, a component-based framework with hierarchical structure for efficient construction of smart sensor is proposed and its application to smart home is designed and implemented. The proposed method shows that various types of smart sensors to be appeared in the near future can be configured through the design and development of necessary components within the proposed software framework. In addition, since it has a layered architecture, the configuration of the smart sensor can be expanded by inserting the internal or external layers. In particular, it is possible to independently design the internal and external modules when designing an IoT application service through connection with the external device layer. A small-scale smart home system is designed and implemented using the proposed method, and a home cloud operating as an external layer, is further designed to accommodate and manage multiple smart homes. By developing and thus adding the components of each layer, it will be possible to efficiently extend the range of applications such as smart cars, smart buildings, smart factories an so on.

Significant Factors for Building Enterprise Mobile Cloud (기업용 모바일 클라우드 시스템 구축 시 고려 요인)

  • Lee, Jae-Jin;Oh, Jun-Seok;Lee, Bong-Gyou
    • The KIPS Transactions:PartD
    • /
    • v.18D no.6
    • /
    • pp.481-492
    • /
    • 2011
  • Recently, various mobile services are provided by the spread of wireless network infrastructures and smart devices. The improvement of cloud computing technologies increases the interests for enterprise mobile cloud services in various IT companies as well. By increasing the interests for enterprise mobile cloud services, it is necessary to evaluate the use of enterprise mobile cloud services. Therefore, the factors which affect the user acceptance of enterprise mobile cloud services are analyzed on the basis of Davis' technology acceptance model in this research. As analysis results, four external variables have significant effects on perceived ease of use of mobile cloud services. Also, these variables indirectly affect attitude toward using cloud services. The results show that the security is the most important factor for attitude toward using enterprise mobile cloud services. The service users also consider the interoperability as an important factor for the user acceptance of cloud services. The perceived ease of use has more contribution than the perceive usefulness on attitude toward using enterprise mobile cloud services. This research has both industrial and academic contributions because it provides the guideline to companies for introducing the enterprise mobile cloud services and apply the technology acceptance model on new IT services.

Implementation and Validation of the Web DDoS Shelter System(WDSS) (웹 DDoS 대피소 시스템(WDSS) 구현 및 성능검증)

  • Park, Jae-Hyung;Kim, Kang-Hyoun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.4
    • /
    • pp.135-140
    • /
    • 2015
  • The WDSS improves defensive capacity against web application layer DDoS attack by using web cache server and L7 switch which are added on the DDoS shelter system. When web DDoS attack occurs, security agents divert traffic from backbone network to sub-network of the WDSS and then DDoS protection device and L7 switch block abnormal packets. In the meantime, web cache server responds only to requests of normal clients and maintains stable web service. In this way, the WDSS can counteract the web DDoS attack which generates small traffic and depletes server-client session resource. Furthermore, the WDSS does not require IP tunneling because it is not necessary to retransfer the normal requests to original web server. In this paper, we validate operation of the WDSS and verify defensive capability against web application layer DDoS attacks. In order to do this, we built the WDSS on backbone network of an ISP. And we performed web DDoS tests by using a testing system that consists of zombie PCs. The tests were performed by three types and various amounts of web DDoS attacks. Test results suggest that the WDSS can detect small traffic of the web DDoS attacks which do not have repeat flow whereas the formal DDoS shelter system cannot.

Automatic Detection Approach of Ship using RADARSAT-1 Synthetic Aperture Radar

  • Yang, Chan-Su
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.14 no.2
    • /
    • pp.163-168
    • /
    • 2008
  • Ship detection from satellite remote sensing is a crucial application for global monitoring for the purpose of protecting the marine environment and ensuring marine security. It permits to monitor sea traffic including fisheries, and to associate ships with oil discharge. An automatic ship detection approach for RADARSAT Fine Synthetic Aperture Radar (SAR) image is described and assessed using in situ ship validation information collected during field experiments conducted on August 6, 2004. Ship detection algorithms developed here consist of five stages: calibration, land masking, prescreening, point positioning, and discrimination. The fine image was acquired of Ulsan Port, located in southeast Korea, and during the acquisition, wind speeds between 0 m/s and 0.4 m/s were reported. The detection approach is applied to anchoring ships in the anchorage area of the port and its results are compared with validation data based on Vessel Traffic Service (VTS) radar. Our analysis for anchoring ships, above 68 m in length (LOA), indicates a 100% ship detection rate for the RADARSAT single beam mode. It is shown that the ship detection performance of SAR for smaller ships like barge could be higher than the land-based radar. The proposed method is also applied to estimate the ship's dimensions of length and breadth from SAR radar cross section(RCS), but those values were comparatively higher than the actual sizes because of layover and shadow effects of SAR.

  • PDF

A Study of the Establishment of Small and Medium Sized Architectural Design Firm BIM Environment based on Virtual Desktop Infrastructure (가상 데스크톱 인프라(VDI) 기술을 활용한 중소규모 설계사의 BIM 사용자 별 데스크탑 자원 할당 전략에 관한 연구)

  • Lee, Kyuhyup;Shin, Joonghwan;Kwon, Soonwook;Park, Jaewoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.5
    • /
    • pp.78-88
    • /
    • 2016
  • Recently BIM technology has been expanded for using in construction project. However its spread has been delayed than the initial expectations, due to the high-cost of BIM infrastructure development, the lack of regulations, the lack of process and so forth. In design phase, especially, collaboration based on BIM system has being a key factor for successful next generation building project. Through the analysis of current research trend about IT technologies, virtualization and BIM service, data exchange such as drawing, 3D model, object data, properties using cloud computing and virtual server system is defined as a most successful solution. In various industrial fields, cloud computing technology is utilized as a promising solution which can reduce time and cost of hardware infrastructure. Among the cloud computing technology, VDI is receiving a great deal of attention from it market as an essential part cloud computing. VDI enables to host multiple individual virtual machines by using hypervisor. It has an advantage to easy main device management. Therefore, this study implements a step-by-step user's DaaS by analyzing the desktop resource data of the workers from Pre-design phase to Schematic design, Design develop and Construction design phase. It also develops BIM environment based on test of BIM modeler and designers in architectural design firm. The goal of the study is to enable the cloud computing BIM server. It provides cost saving, high-performance quality of working environment and cooperation's convenience and high security when doing BIM work in small and medium sized architectural design firm.

A study on career competency, task and job satisfaction of dental hygienists - Focusing on public officials, public institution workers, and researchers (치과위생사 취업 역량, 업무, 직무만족에 관한 연구 - 공무원·공기업 취업자·연구원 중심으로)

  • Jeong, So-Hyeon;Nam, Sang-Hee;Park, Ji-Hyeon;Shin, Eun-Ji;Oh, Na-Won;Yu, Ha-Rim;Kim, SeolHee
    • Journal of Korean society of Dental Hygiene
    • /
    • v.18 no.4
    • /
    • pp.477-488
    • /
    • 2018
  • Objectives: The purpose of this study was to investigate career competency, tasks, and job satisfaction of public servants, public institutions, and researchers. Methods: The survey was conducted about career competency, job satisfaction, and satisfaction on work life. Next, they interviewed on the characteristics of each job by two or three dimensions. The following conclusions were obtained from July to August 2017. Results: Career competencies were GPA with 3.87, 818 points of TOEIC score, and ITQ certification. Public servants required the information on literacy skills for employment and job performance, while civil servants need more than one year of clinical experience in the dental hospital. The non-commissioned officer needed a written test and fitness training. The health insurance review and assessment center required more than one year of experience from general hospital or medical institutions. Researchers required a research career, language skill, and professors required research and teaching experiences with clinical experience more than three years. The main job tasks were as follows; for public servants, they were official document processing and community projects. For the civilian workers and military/noncommissioned officers, they were medical assistant and administrative works. The employees of the health insurance review and assessment service are examining the medical expenses and the medical examination, the researchers are experimenting, researching and writing articles, and the teaching staff are lecturing and conducting individual research. Conclusions: The results of job satisfaction survey showed that occupational satisfaction was the highest in civil servants, researchers, and teaching professions. Job security was the highest in health workers and health inspectors' evaluation centers, and time vacancy was the highest in civilian workers and military/noncommissioned officers. If you want to work in such an institution, you should prepare elements that match your basic literacy and job specific characteristics. And we should try to increase the satisfaction of work even after work.

A Design of Hybrid Implementation Server System for Network Game (네트워크 게임을 위한 하이브리드 분산 서버 시스템 설계에 관한 연구)

  • 배재환
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.455-459
    • /
    • 2003
  • In the great motive power which promotes the Game of future to develop. three main factors focus on 3D Graphics, Network and Virtual Reality. the Network technique as necessary elemental technique in Next-generation on-line game is being researched largely. However, from viewing the features of on-line game, if many users meet in same server, it not only causes heavy load to the server and brings inconvenience to the users, but also increases expense to the service provider and creates a problem which is to put up server or not. A proposal is going to do hybrid distributed system a client hardly depends on server for this paper, and to be able to enjoy a network game through information alternating current between clients. depended on the existing server, and the most message processing did a design in order to achieve between clients. A design way to propose is as follows. Primarily it was done in order proposed a message grade anger process way, and to be able to manage server or a client according to importance of message, and, with the second, did a Client-Server method and a Pear-to-Pear method at the same time, and a chase did efficiency. Third is going to propose other problem solving way by message grade anger in multi-anger and a security section of a message cue.

  • PDF

Leased Line Traffic Prediction Using a Recurrent Deep Neural Network Model (순환 심층 신경망 모델을 이용한 전용회선 트래픽 예측)

  • Lee, In-Gyu;Song, Mi-Hwa
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.10
    • /
    • pp.391-398
    • /
    • 2021
  • Since the leased line is a structure that exclusively uses two connected areas for data transmission, a stable quality level and security are ensured, and despite the rapid increase in the number of switched lines, it is a line method that is continuously used a lot in companies. However, because the cost is relatively high, one of the important roles of the network operator in the enterprise is to maintain the optimal state by properly arranging and utilizing the resources of the network leased line. In other words, in order to properly support business service requirements, it is essential to properly manage bandwidth resources of leased lines from the viewpoint of data transmission, and properly predicting and managing leased line usage becomes a key factor. Therefore, in this study, various prediction models were applied and performance was evaluated based on the actual usage rate data of leased lines used in corporate networks. In general, the performance of each prediction was measured and compared by applying the smoothing model and ARIMA model, which are widely used as statistical methods, and the representative models of deep learning based on artificial neural networks, which are being studied a lot these days. In addition, based on the experimental results, we proposed the items to be considered in order for each model to achieve good performance for prediction from the viewpoint of effective operation of leased line resources.

Analysis of Health Care Service Trends for The Older Adults Based on ICT (국내외 ICT기반 노인 건강관리 서비스 동향분석)

  • Lee, Sung-Hyun;Hong, Sung Jung;Kim, Kyung Mi
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.5
    • /
    • pp.373-383
    • /
    • 2021
  • Our society is aging rapidly. In this super-aged society, the increase in healthcare costs are considered a national problem that undermines the sustainability of social security. Various services for healthcare for the elderly have been promoted to address this. However, most of them have focused on healthcare after the outbreak of chronic diseases and lack preventive healthcare. Most of the preventive healthcare projects are only pilots. In this paper, the current status of health care services for senior citizens at home and abroad was analyzed and based on this, the limitations and improvements were analyzed to propose the establishment of IoT-based Total Silver Care Center. IoT-based Total Silver Care Center may be conveniently monitored the health status of the elderly through various sensors, medical devices, and smart bands. And based on this, it can improve the quality of nursing services through time-saving and work efficiency of nursing providers. In addition, health care interventions may be provided in a timely manner if there is a change in the health status of users. And real-time imaging systems can help overcome mental difficulties.