-
公开(公告)号:KR1020150083263A
公开(公告)日:2015-07-17
申请号:KR1020140002820
申请日:2014-01-09
Applicant: 한국전자통신연구원
CPC classification number: B63B43/18 , B63J99/00 , B63J2099/006
Abstract: 본발명은선박의충돌위험도산출시스템에관한것으로, 표적간(선박들간, 선박과물표간) 간의충돌위험도를산출함에있어, 표적간의거리를기반으로 DCPA, TCPA, VCD, 선박의종류, 주변환경등을선별적으로고려하여충돌위험도를산출함으로써, 충돌위험도의정확성향상은물론연산오버헤드를감소시킬수 있는선박의충돌위험도산출시스템을제공하고자한다. 이를위하여, 본발명은표적데이터와환경데이터를수신하는데이터수신부; 각표적간의충돌위험도산출연산을할당하는제어부; 퍼지연산을기반으로, 상기데이터수신부가수신한표적데이터와환경데이터를이용하여제 1 충돌위험도를산출하는제 1 충돌위험도계산부; 퍼지연산을기반으로, 상기데이터수신부가수신한표적데이터와환경데이터중에서 n(n은자연수)개의데이터를이용하여제 2 충돌위험도를산출하는제 2 충돌위험도계산부; 퍼지연산을기반으로, 상기데이터수신부가수신한표적데이터와환경데이터중에서 m(m은자연수, m
Abstract translation: 本发明涉及一种用于计算船舶碰撞风险的系统,其计算目标之间(船舶,船舶与目标之间)之间的碰撞风险,同时选择性地考虑DCPA,TCPA,VCD,一类船只, 基于目标之间的距离的周围环境等,从而减少计算开销并提高碰撞风险的精度。 为此,本发明包括接收目标数据和环境数据的数据接收单元; 控制单元,用于分配用于计算每个目标之间的碰撞风险的操作; 第一碰撞风险计算单元,使用所述目标数据和由所述数据接收单元基于模糊运算接收到的环境数据来计算第一碰撞风险; 第二碰撞风险计算单元,基于所述模糊运算,使用所述目标数据和所述数据接收单元接收的所述环境数据中的n(n为自然数)数据计算第二碰撞风险; 第三碰撞风险计算单元,使用基于模糊运算的数据接收单元接收的目标数据和环境数据中的m(m是自然数,m
-
公开(公告)号:KR1020120042465A
公开(公告)日:2012-05-03
申请号:KR1020100104167
申请日:2010-10-25
Applicant: 한국전자통신연구원
Abstract: PURPOSE: A flight plan management apparatus and a method thereof are provided to increase internal efficiency of a system by distributing a flight plan through AFTN. CONSTITUTION: A flight plan classifying module(210) classifies a flight plan through an AFTN(Aeronautical Fixed Telecommunication Network). A flight plan generating module(220) generates the flight plan and adds distribution information to the generated flight plan. A flight message verifying module(230) detects error within the flight plan. A flight message distributing module(240) distributes the flight plan to the AFTN.
Abstract translation: 目的:提供飞行计划管理装置及其方法,以通过AFTN分发飞行计划来提高系统的内部效率。 规定:飞行计划分类模块(210)通过AFTN(航空固定电信网络)对飞行计划进行分类。 飞行计划生成模块(220)生成飞行计划,并将分配信息添加到生成的飞行计划中。 飞行消息验证模块(230)检测飞行计划中的错误。 航班信息分发模块(240)将飞行计划分发给AFTN。
-
公开(公告)号:KR100989082B1
公开(公告)日:2010-10-25
申请号:KR1020080077456
申请日:2008-08-07
Applicant: 한국전자통신연구원
CPC classification number: G06F21/604 , G06F21/57 , G06F21/577 , H04L63/0823 , H04L63/0869 , H04L63/1433 , H04L63/1441 , H04L63/205 , H04W12/06 , H04W12/08
Abstract: 본 발명은 이동 단말간 보안 상황 정보 교환 방법 및 그 장치에 관한 것으로, 이동 단말간 P2P 통신을 하기 전에 미리 정해진 보안 프로파일을 이용하여 상대방의 유효성을 상호 검사한 후 신뢰할 수 있는 경우에만 통신 연결을 가능하게 함으로써, 이동 단말간 보안 상황 정보 교환이 효율적으로 이루어질 수 있는 잇점이 있다.
이동 단말, 보안, 프로파일, 유효성, 검사Abstract translation: 在用于在移动终端之间交换安全情况信息的方法中的每一个都连接到有线/无线网络,在要建立连接的两个移动终端之间交换安全简档。 安全简档包括移动终端的安全情况信息,并且每个移动终端对所接收的安全简档进行有效性检查,以确定对手移动终端的安全状况是否可信。 仅当两个移动终端的安全情况都可靠时才建立连接。
-
公开(公告)号:KR1020060012779A
公开(公告)日:2006-02-09
申请号:KR1020040061419
申请日:2004-08-04
Applicant: 한국전자통신연구원 , 경북대학교 산학협력단
IPC: H04L12/28
CPC classification number: H04L67/2823 , H04L69/22
Abstract: 액티브 노드, 액티브 노드를 이용한 컨텐츠 전송 시스템 및 그 방법이 개시된다. 컨텐츠 서버로부터 단말기로 전송할 컨텐츠를 수신하면, 단말기의 자원 정보를 파악하고, 컨텐츠 서버로부터 전송된 컨텐츠를 파악된 단말기의 자원 정보를 기초로 단말기에 적합한 형태로 변환하고, 컨텐츠의 헤더에 포함된 정보를 변환된 컨텐츠에 대한 정보로 변환한 후 컨텐츠를 단말기로 전송한다. 이로써, 컨텐츠 서버의 컨텐츠 변환에 따른 부하를 감소시킬 수 있다.
액티브 노드, 컨텐츠 변환, 단말기의 자원 정보-
公开(公告)号:KR100464567B1
公开(公告)日:2005-01-03
申请号:KR1020020053690
申请日:2002-09-06
Applicant: 한국전자통신연구원
IPC: G06F15/00
Abstract: PURPOSE: A method for confronting a packet intruding into an active network by using a sensor is provided to protect the network stably by making the sensor inform a sensor management server of a probability of an intrusion packet, making the sensor management server order a confrontation method to the sensor after confirming the intrusion, and making the sensor actively confront the intrusion. CONSTITUTION: Each sensor operated on an execution node detects the intrusion of the intrusion packet by checking the packet entered through the active network. If the sensor detects the intrusion, the information related to a pattern of the intrusion packet is reported to the sensor management server(S303). The sensor management server confirms the intrusion by comparing the pattern information of the intrusion packet with the stored pattern information(S304). If the intrusion is confirmed, the sensor management server transfers a confrontation instruction and method for the intrusion packet to the sensor(S305). The sensor performs the confrontation for the intrusion packet by using the confrontation method according to the confrontation instruction(S306).
Abstract translation: 目的:提供一种通过使用传感器面对分组侵入活动网络的方法,以通过使传感器通知传感器管理服务器入侵分组的概率,使传感器管理服务器命令为对抗方法来稳定地保护网络 确认入侵后传感器到传感器,并使传感器积极面对入侵。 构成:在执行节点上运行的每个传感器通过检查通过活动网络输入的数据包来检测入侵数据包的入侵。 如果传感器检测到入侵,则与传入管理服务器相关的信息被报告给传感器管理服务器(S303)。 传感器管理服务器通过比较入侵包的图案信息和存储的图案信息来确认入侵(S304)。 如果入侵被确认,则传感器管理服务器将用于入侵包的对抗指令和方法传送到传感器(S305)。 传感器根据对抗指令通过使用对抗方法执行入侵包的对抗(S306)。
-
公开(公告)号:KR1020040094985A
公开(公告)日:2004-11-12
申请号:KR1020030028571
申请日:2003-05-06
Applicant: 한국전자통신연구원
IPC: G06F15/00
Abstract: PURPOSE: A device and a method for securing/managing a network are provided to diversely manage security by distributing a security policy to a security equipment distributed/installed on a security framework, which is based on programmable network to execute a programmable packet, with use of the program packet. CONSTITUTION: A programmable policy manager(10) generates the abstract security policy to be applied to the security equipment by using a profile of the security equipment on the network and converts the generated security policy into a programmable security policy. A programmable policy processor(20) fills the programmable security policy to a payload part of an IP(Internet Protocol) packet. A programmable policy certifier(30) encrypts an IP packet. A programmable packet manager(40) converts the IP packet into the programmable packet, and monitors routing/scheduling/resources of the programmable packet.
Abstract translation: 目的:提供一种用于保护/管理网络的设备和方法,以通过将分发/安装在基于可编程网络的安全框架上的安全设备分发安全策略来安全地管理安全性,安全框架基于可编程网络来执行可编程分组 的程序包。 规定:可编程策略管理器(10)通过使用网络上的安全设备的配置文件生成要应用于安全设备的抽象安全策略,并将生成的安全策略转换为可编程安全策略。 可编程策略处理器(20)将可编程安全策略填充到IP(因特网协议)分组的有效载荷部分。 可编程策略验证者(30)加密IP分组。 可编程分组管理器(40)将IP分组转换成可编程分组,并监视可编程分组的路由/调度/资源。
-
公开(公告)号:KR1020030042318A
公开(公告)日:2003-05-28
申请号:KR1020010073051
申请日:2001-11-22
Applicant: 한국전자통신연구원
IPC: H04L12/22
CPC classification number: H04L63/0227 , H04L63/1416 , H04L63/1458
Abstract: PURPOSE: A method for blocking a cracker of an ISP(Internet Service Provider) border router by packet filtering and a system therefor are provided to disconnect an unlawful trespass traffic inputted through the border router of an ISP network by analyzing pattern and isolate the cracker from the network. CONSTITUTION: If packet data are inputted through a network, a sampling unit samples the packet data(S1). A traffic pattern analyzing unit judges whether many packet data are generated within a short time(S2). If many packet data are generated within the short time, the traffic pattern analyzing unit analyzes a traffic pattern(S3). An unlawful packet judging unit judges whether the corresponding packet data go toward an unlawful source IP(Internet Protocol) address or the same destination IP address(S4). If the corresponding packet data go toward the unlawful source IP address or the same destination IP address, the unlawful packet judging unit decides the corresponding packet data as unlawful packet data(S5). A packet filter filters the unlawful packet data(S6). The packet filter forwards lawful packet data except for the unlawful packet data to a destination IP address(S7).
Abstract translation: 目的:通过分组过滤及其系统来阻止ISP(Internet Service Provider)边界路由器的破解者的方法,以通过分析模式来断开ISP网络的边界路由器输入的非法入侵流量, 网络。 构成:如果通过网络输入分组数据,则采样单元对分组数据进行采样(S1)。 业务模式分析单元判断在短时间内是否生成了许多分组数据(S2)。 如果在短时间内产生许多分组数据,则业务模式分析单元分析业务模式(S3)。 非法分组判断单元判断对应的分组数据是否朝向非法的源IP(因特网协议)地址或相同的目的地IP地址(S4)。 如果相应的分组数据朝向非法的源IP地址或相同的目的地IP地址,则非法分组判断单元将相应的分组数据确定为非法分组数据(S5)。 分组过滤器过滤非法分组数据(S6)。 分组过滤器将除了非法分组数据之外的合法分组数据转发到目的地IP地址(S7)。
-
-
-
-
-
-