• Title/Summary/Keyword: users' rights

Search Result 196, Processing Time 0.042 seconds

Design and implementation of protection and management system of digital contents based on MPEG-21 IPMP (MPEG-21 IPMP 기반의 디지털 콘텐츠 보호 관리 시스템 설계 및 구현)

  • Jung Hoe-Kyung;Ryu Kwang-Hee;Kim Kwang-Yong;Kim Jae-Gon;Hong Jin-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1003-1010
    • /
    • 2006
  • The usage increase of digital contents required solution for protection technology and interoperability of system. MPEG(Moving Picture Experts Group) proposed MPEG-21 Multimedia Frameworks. MPEG-21 IPMP is standard that provides the means to enable digital item and rights information to be persistently managed and protected across networks and devices. In this paper, MPEG-21 IPMP based system to protect digital contents designed by four structures of license server, production server, consumption server, tool server. License server create rights information document using the XML-based REL about multimedia contents of users. Production server makes a digital item by packaging multimedia resource and metadata, which is combined by REL information and IPMP information of multimedia resource. Consumption server takes care of the functions of players that use digital item, and tool server was implement to transmit for missing tool that might occur in all procedures.

The Secure Password Authentication Method based on Multiple Hash Values that can Grant Multi-Permission to a Single Account (단수 계정에 다중 권한 부여가 가능한 다중 해시값 기반의 안전한 패스워드 인증 기법 설계)

  • Hyung-Jin Mun
    • Journal of Industrial Convergence
    • /
    • v.21 no.9
    • /
    • pp.49-56
    • /
    • 2023
  • ID is used as identifying information and password as user authentication for ID-based authentication. In order to have a secure user authentication, the password is generated as a hash value on the client and sent to the server, where it is compared with the stored information and authentication is performed. However, if even one character is incorrect, the different hash value is generated, authentication will be failed and cannot be performed and various functions cannot be applied to the password. In this study, we generate several hash value including imaginary number of entered password and transmit to server and perform authentcation. we propose a technique can grants the right differentially to give various rights to the user who have many rights by one account. This can defend shoulder surfing attack by imaginary password and provide convenience to users who have various rights by granting right based on password.

A study of express bus entrance system for wheelchair users (고속버스용 휠체어 탑승 전용 승강구 개조부 연구)

  • Lee, Yong-Woo;Ha, Sung-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.1-8
    • /
    • 2019
  • In the rapidly aging society, the number of wheelchair users is increasing steadily. On the other hand, it is almost impossible for a disabled person using a wheelchair to use express buses. Therefore, it is necessary to develop an express bus that can secure the rights of wheelchair users. For these special types of express buses, it is required to develop a special entrance and lift system. The development of a wheelchair entrance system for the express buses requires design modification, retrofit, and reinforcement of the bus frame. This study evaluated the structural integrity of an entrance system for wheelchair users using a finite element method. Torsional stiffness and modal analysis were performed through structural analysis. Through sensitivity analysis, optimization was performed to reduce the weight of the frame. These results on the wheelchair entrance system are expected to be utilized in the vehicle modification and welfare industries.

Evaluation on the Specialized Quality Programs of the Senior Welfare Centers in Gyeonggi-do: Focusing on the Perspectives of the Service Users (경기도 노인복지관 특화 프로그램 평가: 서비스 이용자 관점을 중심으로)

  • Ji, Eric Seung-Hoon
    • 한국노년학
    • /
    • v.36 no.3
    • /
    • pp.847-867
    • /
    • 2016
  • The purpose of this study is to observe whether the specialized quality programs of senior welfare centers actually help service users and meet their needs. In order to find out, we have utilized three different research methods. First, an in-depth interview was generated among the service users of senior welfare centers. Second, the specialized quality program in senior welfare centers was analyzed. Third, a focused group interview among the senior welfare experts was conducted. Based on the results of this study, they suggest four practical proposals. First is to enhancing programs of senior welfare centers based on the service users' rights. Second is to providing high-class services by developing and transforming the 'elderly culture.' Third is to converting the existing programs to make associations with their local communities. Last is to building a network as a hub to communicate and sharing outstanding programs within senior welfare centers.

Motivating Factors for Providing Personal Data in MyData Services: The Moderating Effect of Perceived Personal Information Self-Determination (마이데이터 서비스 이용을 위한 개인정보제공 동기 요인: 개인정보자기결정권 인지 수준의 조절효과)

  • Hyeonjeong Kim;Soohyun Kwon;Jeongu Choi;Beomsoo Kim
    • Knowledge Management Research
    • /
    • v.25 no.2
    • /
    • pp.219-243
    • /
    • 2024
  • This study investigates the impact of privacy concerns, perceived utility, and awareness of the right to personal data self-determination on the effective use and expansion of MyData services, which are critical to the data economy. Integrating the value-based adoption model with privacy calculus theory, the research examines how perceived utility, privacy concerns, trust, and personal innovativeness influence perceived value, perceived privacy, and the intention to provide personal information. Data collected from an online survey of 442 MyData service users and prospective users were analyzed using PLS-SEM and Bootstrapping methods via SmartPLS 4. The results indicate that perceived utility positively affects the intention to provide personal information, while privacy concerns have a negative impact. Trust and personal innovativeness positively influence the intention to adopt MyData services, and the awareness of personal data self-determination rights moderates these intentions. The findings underscore the importance of developing beneficial services that mitigate users' privacy concerns and build trust for the successful implementation of MyData services. Additionally, the study highlights the need for education and awareness campaigns to enhance understanding of the right to personal data self-determination.

Analysis on Current Issues and Cases of Electronic Document Delivery Service for Sharing of Knowledge Information (지식정보 공유를 위한 전자원문서비스의 주요 이슈와 사례 분석)

  • Yoo, Su-Hyeon;Choi, Hee-Yoon
    • Journal of the Korean Society for information Management
    • /
    • v.23 no.2
    • /
    • pp.81-96
    • /
    • 2006
  • Changes in document delivery service environment such as spread of web-based research information communication and direct communication between users and information providers have considerable effects on document delivery service institutes. Swift advances in information technology have allowed users to receive information on their desktops via web. Web-based document delivery makes the massive scale of reproduction and distribution possible so it needs to protect the copyright holders' rights. This study identifies the current trends and issues of document delivery service environment and reviews electronic document delivery services of foreign countries. Also this study introduces the domestic electronic document delivery service, e-DDS, and evaluates the copyright issues for the service.

Fingerprinting Embedding Technique based on BIBD AND-ACC (BIBD AND-ACC 기반 핑거프린팅 삽입 기법)

  • SaKong, Myoung;Park, Yo-Han;Park, Young-Ho;Moon, Sang-Jae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.7
    • /
    • pp.41-47
    • /
    • 2011
  • Recently, digital contents are used a lot due to the rapid development of Internet and the commercialization of smartphones. However variety of attacks, such as collusion attack, can violate the intellectual property rights. BIBD AND-ACC is typical method to protect digital contents from attacks, but it is hard to distribute many users because of the heavy complexity of matrix computation. In this paper, we propose embedding technique to distribute BIBD AND-ACC for many users more than primitive one. We checked the PSNR result as 50.84dB when amplication factor is one and found out the colluders who involved the collusion attack by simulation.

Proposed Open Source Model for Video Offline Distribution using Cinema DRM for Home Users

  • Pardeshi, Sunil;Kwon, Soon Chul;Lee, Seung Hyun;Hamacher, Alaric
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.1
    • /
    • pp.10-14
    • /
    • 2015
  • Video Content owners seek to squeeze the maximum amount of revenue from their assets via distribution into more territories. Digital Cinema Package(DCP), trusted solution to distribute protected content to theaters, caters to relatively small user base, which limits revenue. With the growth of the Internet & other digital media, the economics of media content has changed dramatically. Security remains main concern to deliver content to millions of consumers using intelligent digital display devices like Tablets, Smartphones, Smart TVs, Desktop & Laptop. By making the video content available to this segment securely, content owners will benefit from increased revenue. Through this paper we propose Open Source HomeDCP model to distribute the content to home users for offline viewing. We propose to include other open source CODEC than JPEG2000/MPEG2, which are specifically designed for theatrical performance. Final image size will be further reduced considering the display device resolution where video will be finally played. Key Delivery Message(KDM) system to be altered to suit new devices. This will be a big boost to Content Economy as content owners would be able to distribute the content securely to the wider audience & ensure more revenue.

A Study of Password Management Methods for System in Access Control (시스템 접근통제를 위한 패스워드 관리 방안에 대한 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.303-306
    • /
    • 2011
  • System solutions for access control to the user's personal when you want to authenticate to the system is used. The valid user is really just a part of authorized users, the suitability of a valid user has been authenticated are not sure whether the problem is the fact. For example, one developer in the Unix operating system can be valid, but do not have permission to access the system should be limited for. In this paper, a single account for multiple users to use the system operational issues to improve the fine-grained delegation of authority, the session audit, the administrator account's policy-based management, with full rights the administrator account of distribution management and auditing the system overall is the study of access control measures.

  • PDF

Development of Forensic Marking technology for tracing multiple users (다중 불법콘텐츠 복제자 추적 기술 개발)

  • Kim, Jong-An;Kim, Jin-Han;Kim, Jong-Heum
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.102-106
    • /
    • 2008
  • Forensic Marking is the technology that enables the service providers (SP) to identify the illegal digital contents distributors by first inserting markings (data indicating the user information and playback time) in realtime into the digital contents at time of playback of digital contents, and then later by extracting inserted markings from the contents which are illegally captured from the multimedia device such as IPTV STBs and distributed over the Internet. Digital Rights Management (DRM), which is a very popular content protection technology, has the security hole that can be vulnerable because the encrypted digital contents are transformed into their original plaintext forms after the decrypting process on the STBs. Therefore Forensic Marking (FM) has now become a companion content protection solution to DRM. This article describes a new way of tracking up to 4 illegal content users in FM implementation using the blue-difference chroma component of YCbCr color space. This FM technology has many advantages like fast processing time and easy portability to STB devices compared to that of the traditional watermarking processing in the frequency domain.

  • PDF