• Title/Summary/Keyword: security enhance

Search Result 820, Processing Time 0.025 seconds

Implementation of Secure Keypads based on Tetris-Form Protection for Touch Position in the Fintech (핀테크에서 터치 위치 차단을 위한 테트리스 모양의 보안 키패드의 구현)

  • Mun, Hyung-Jin;Kang, Sin-Young;Shin, ChwaCheol
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.144-151
    • /
    • 2020
  • User-authentication process is necessary in Fintech Service. Especially, authentication on smartphones are carried out through PIN which is inputted through virtual keypads on touch screen. Attacker can analogize password by watching touched letter and position over the shoulder or using high definition cameras. To prevent password spill, various research of virtual keypad techniques are ongoing. It is hard to design secure keypad which assures safety by fluctuative keypad and enhance convenience at once. Also, to reconfirm user whether password is wrongly pressed, the inputted information is shown on screen. This makes the password easily exposed through high definition cameras or Google Class during recording. This research analyzed QWERTY based secure keypad's merits and demerits. And through these features, creating Tetris shaped keypad and piece them together on Android environment, and showing inputted words as Tetris shape to users through smart-screen is suggested for the ways to prevent password spill by recording.

Application Areas for Cloud Computing Services using M2M and WoT (클라우드 컴퓨팅 서비스를 위한 M2M과 WoT 활용 방안)

  • Kim, Jangwon;Park, Dae-Ha;Baik, Doo-Kwon
    • Journal of Service Research and Studies
    • /
    • v.2 no.1
    • /
    • pp.61-68
    • /
    • 2012
  • Much technologies building cloud computing environment and supporting sevices on the cloud computing have been developing. Through the environment, accessing new services and sharing knowledge become easy. So far, they have just focused on companies which can support services and people who can use those services. In other words, the environment and models for cloud computing are the most important issue. However, the environment changes rapidly, mobile devices that are connected with each other not only will replace the computing environment based on desktop, but also can create Big data. Therefore, technologies and models are need to follow the trend including mobile based cloud computing environment. In this paper, we explain the cloud computing technologies and trend. Also we address Machine to Machine(M2M) technology and Web of things(WoT) in order to apply those into the cloud computing environment because these two concepts will enhance effectiveness and service reusability in the coming days.

  • PDF

A Comparison Study on Data Caching Policies of CCN (콘텐츠 중심 네트워킹의 데이터 캐시 정책 비교 연구)

  • Kim, Dae-Youb
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.327-334
    • /
    • 2017
  • For enhancing network efficiency, various applications/services like CDN and P2P try to utilize content which have previously been cached somewhere. Content-centric networking (CCN) also utilizes data caching functionality. However, dislike CDN/P2P, CCN implements such a function on network nodes. Then, any intermediated nodes can directly respond to request messages for cached data. Hence, it is essential which content is cached as well as which nodes cache transmitted content. Basically, CCN propose for every nodes on the path from the content publisher of transmitted object to a requester to cache the object. However, such an approach is inefficient considering the utilization of cached objects as well as the storage overhead of each node. Hence, various caching mechanisms are proposed to enhance the storage efficiency of a node. In this paper, we analyze the performance of such mechanisms and compare the characteristics of such mechanisms. Also, we analyze content utilization patterns and apply such pattern to caching mechanisms to analyze the practicalism of the caching mechanisms.

Development of the High Reliable Safety PLC for the Nuclear Power Plants (고신뢰도 안전등급 제어기기 개발)

  • Son, Kwang-Seop;Kim, Dong-Hoon;Son, Choul-Woong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.1
    • /
    • pp.109-119
    • /
    • 2013
  • This paper presents the design of the Safety Programmable Logic Controller (SPLC) used in the Nuclear Power Plants, an analysis of a reliability for the SPLC using a markov model. The architecture of the SPLC is designed to have the multiple modular redundancy composed of the Dual Modular Redundancy(DMR) and the Triple Modular Redundancy(TMR). The operating system of the SPLC is designed to have the non-preemptive state based scheduler and the supervisory task managing the sequential scheduling, timing of tasks, diagnostic and security. The data communication of the SPLC is designed to have the deterministic state based protocol, and is designed to satisfy the effective transmission capacity of 20Mbps. Using Markov model, the reliability of SPLC is analyzed, and assessed. To have the reasonable reliability such as the mean time to failure (MTTF) more than 10,000 hours, the failure rate of each SPLC module should be less than $2{\times}10^{-5}$/hour. When the fault coverage factor (FCF) is increased by 0.1, the MTTF is improved by about 4 months, thus to enhance the MTTF effectively, it is needed that the diagnostic ability of each SPLC module should be strengthened. Also as the result of comparison the SPLC and the existing safety grade PLCs, the reliability and MTTF of SPLC is up to 1.6-times and up to 22,000 hours better than the existing PLCs.

A Study of Student Nurses' Knowledge and Awareness about Patients' Personal Information Protection (환자 개인정보 보호에 대한 학생간호사의 지식과 인식의 연구)

  • Bae, Yunjo;Lee, Soyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.1
    • /
    • pp.36-44
    • /
    • 2016
  • This study examined the nursing student's preliminary knowledge and awareness of patient's personal information protection. 187 respondents, who were trained in 2 different nursing colleges in Kyungpook province, participated in the survey from May 18 to June 12, 2015. Using the data collected, descriptive statistics, T-test and one-way ANOVA were implemented. As a result, the student nurses, who had heard about the Personal Information Protection Act showed a significantly higher awareness score of patient's personal information protection behavior than those who did not. The respondents educated in personal information protection were reported to have a higher score of awareness about the patient's personal information protection behavior. In this regard, it is vital for university organizers to develop education associated with ethics and information security, which could enhance the perceptions of personal information protection for student nurses before their working career begins.

Factors Determining the Economic Preparation for Later Life of the Elderly with Industrial Injury: Based on Andersen Behavioral Model of Health Care Utilization (산재경험 고령자의 경제적 노후준비에 관한 연구: 앤더슨 모형을 중심으로)

  • Moon, Yong-pil;Won, Seo-jin
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.8
    • /
    • pp.313-325
    • /
    • 2015
  • This study aims to address factors affecting economic preparation of the elderly with industrial injury using Andersen model. In addition, it is also to explore differences in accordance with changes in the employment status between regular employees and non-regular employees. The authors analyze Panel Study of Worker's Compensation Insurance(PSWCI)'s 1st wave data in the logistic regression model. The authors found gender and education were related to economic preparation. In addition, earned income, national health insurance and the degree to which pain interferes with daily life and the lives caused by industrial accidents were associated with economic preparation. But national pension was not statistically significant to economic preparation. Based on the findings, the researchers addressed political implications to enhance financial security of injured workers.

A Study on How to Reduce Vibration in order to Decrease the Cracks that Form on the Upper Floor of a Structure due to Continuous Dynamic Loading (반복되는 동하중에 의한 구조물 상부바닥 균열 감소를 위한 진동저감 연구)

  • Chun, Chong-Keun;Park, Sam-Jin;Park, Sang-Gon;Kim, Do-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.4
    • /
    • pp.1532-1538
    • /
    • 2011
  • In this study, we investigate the cracks that formed on the upper floor of the structures due to continuous dynamic loading. We explain the cause of floor slab cracks on the upper floor of the distribution center and discuss preventive measures that can enhance the center's functions and security. In order to explain how a forklift's excessive vibration can cause the cracks, we have measured and analyzed the vibration during a forklift's operation and discovered that the cracks form because the vibration exceeds the vibration criteria. Using a finite element modeling on such results, we have come up with optimal methods to reduce the vibration and confirmed their validity by measuring the vibration after implementing our methods.

A Study on the Exchange and Evidential Method & Evidential weight of Electronc Document (전자문서의 대체성과 증거방법 및 증거능력에 관한 고찰)

  • 홍선의
    • The Journal of Information Technology
    • /
    • v.2 no.1
    • /
    • pp.53-64
    • /
    • 1999
  • Due to the trend that the wave of the information society is rapidly expanding on a global basis, the level of informatization is emerging as one of the important elements for national competitiveness. To take a competitive position for individuals, corporations, or states beyond their survival in the rapidly changing information environment, they should be able to manage and transmit various information with swiftness and security Today, the exchange of electronic documents or data, through PC which were unknown in the past is indispensable to the expansion of electronic commerce(EC) and eventually contributes to promoting the information society. The improvement of productivity and efficiency through the exchange of electronic documents or data has been recognized as a means to enhance the competitiveness of corporations and states. The United States, the European nations, Japan, and the newly industrialized countries such as Singapore and Taiwan, have been contriving the utilization of electronic documents and the expansion of EC on the strategical dimension of each nation. To activate the use of electronic documents, thus, the purpose of this study is to examine the current environment concerning the use of electronic documents, to investigate the related legal barriers, and to propose some suggestions for reforming the legal system.

  • PDF

Survey on Network Virtualization Using OpenFlow: Taxonomy, Opportunities, and Open Issues

  • Abdelaziz, Ahmed;Ang, Tan Fong;Sookhak, Mehdi;Khan, Suleman;Vasilakos, Athanasios;Liew, Chee Sun;Akhunzada, Adnan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4902-4932
    • /
    • 2016
  • The popularity of network virtualization has recently regained considerable momentum because of the emergence of OpenFlow technology. It is essentially decouples a data plane from a control plane and promotes hardware programmability. Subsequently, OpenFlow facilitates the implementation of network virtualization. This study aims to provide an overview of different approaches to create a virtual network using OpenFlow technology. The paper also presents the OpenFlow components to compare conventional network architecture with OpenFlow network architecture, particularly in terms of the virtualization. A thematic OpenFlow network virtualization taxonomy is devised to categorize network virtualization approaches. Several testbeds that support OpenFlow network virtualization are discussed with case studies to show the capabilities of OpenFlow virtualization. Moreover, the advantages of popular OpenFlow controllers that are designed to enhance network virtualization is compared and analyzed. Finally, we present key research challenges that mainly focus on security, scalability, reliability, isolation, and monitoring in the OpenFlow virtual environment. Numerous potential directions to tackle the problems related to OpenFlow network virtualization are likewise discussed.

A Efficient Strategy Option to Develop Public Heliport in the Metropolitan Area (수도권 공용 헬기장 발전 방안에 관한 연구)

  • Lee, Young-Jong
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.2
    • /
    • pp.98-102
    • /
    • 2015
  • In this paper are This paper is about the efficient use operational management plan for the metropolitan public Jamsil heliport. First, understand the general operations and facilities to Jamsil heliport and raised the issue for them. And, in cases such as urban offshore heliport Jamsil heliport in New York and Texas (USA), for example, which was presented for comparative analysis and Jamsil heliport in London (UK). Operations, research is seen against a facility to install and manage a couple of airfield operations based on the subject by presenting the alternatives, thereby causing the principal operating facilities, infrastructure and security facilities even suggest ways to enhance the standards. Unlike other countries, Jamsil heliport location characteristics were excluded from the study on the safety aspects related to flight operations and for this I'm a military airport facilities coexist in the neighborhood.