摘要:
A traffic information service apparatus using an ad-hoc network and a method for controlling the same. The apparatus provides an ad-hoc network between vehicles and roadside devices, and collects/provides traffic information using the ad-hoc network. The method for providing a user with traffic information, comprising the steps of a) allowing vehicles to broadcast their registration messages to create an ad-hoc network, and creating the ad-hoc network between the vehicles on the basis of the registration messages, b) allowing a Road Side Equipment (RSE) to receive the registration messages broadcast from the vehicles, and collecting traffic information from the registration messages, and c) allowing the RSE to transmit the traffic information to a traffic information service center.
摘要:
A traffic information service apparatus using an ad-hoc network and a method for controlling the same. The apparatus provides an ad-hoc network between vehicles and roadside devices, and collects/provides traffic information using the ad-hoc network. The method for providing a user with traffic information, comprising the steps of a) allowing vehicles to broadcast their registration messages to create an ad-hoc network, and creating the ad-hoc network between the vehicles on the basis of the registration messages, b) allowing a Road Side Equipment (RSE) to receive the registration messages broadcast from the vehicles, and collecting traffic information from the registration messages, and c) allowing the RSE to transmit the traffic information to a traffic information service center.
摘要:
A domain management method and substitutable system is provided. When a domain manager, which manages digital rights in a local area, permanently or temporarily becomes unavailable, the domain management method and system may protect the digital rights of the area by using another domain manager.
摘要:
Disclosed is a method for authenticating a mobile node in a wireless local area network including at least two access points and an authentication server. When the mobile node associates with a first access point and performs initial authentication, the mobile node receives a first session key for secure communication from the authentication server by using a first private key generated with a secret previously shared with the authentication server, and the first access point receives the first session key from the authentication server by using a second private key previously shared with the authentication server. When the mobile node is handed over from the first access point to a second access point and performs re-authentication, the mobile node receives a second session key for secure communication from the authentication server by using a third private key generated with authentication information generated during previous authentication and shared with the authentication server and the second access point receives the second session key from the authentication server by using the second private key previously shared with the authentication server.
摘要:
A method of searching for a broadcasting channel of a specific program in a digital multimedia broadcasting (DMB) receiving terminal. The method includes detecting a program number input by a user, determining whether particular bits in a header of a received transport stream (TS) packet are identical to fixed values for the particular bits in the header, if the particular bits in the header are identical to the fixed values for the particular bits in the header, determining whether particular bits in a payload of the TS packet are identical to fixed values for the particular bits in the payload, and if the particular bits in the payload are identical to the fixed values for the particular bits in the payload, determining that the TS packet has program map table (PMT) information, and analyzing the PMT information to detect a packet identifier (PID) of an audio/video packetized elementary stream (PES) constituting the specific program.
摘要:
The present invention relates to novel strains of Pseudomonas putida, more specifically, to a novel strain of Pseudomonas putida which are tolerant to organic solvents including hydrocarbons, alcohols, ethers, ketones and their derivatives or mixtures thereof, and a mutant strain of said microorganism having the availability of genetic manipulation. The said Pseudomonas putida strains can be used in biotransformation in the presence of organic solvents and bioremediation of toxic organic compounds. Furthermore, they are useful as supply sources of resistance genes and cell fusion of organic solvent-tolerant microorganisms producing useful substances and the breeding of said microorganisms can be practiced in the art, which allows their universal use in the fields of bioreactor, liquid-waste treatment, protein engineering, etc.
摘要:
A device and method for verifying the integrity of a memory in a remote device are provided. An exemplary memory integrity verification method compares, based on a verification parameter received from a verifier, the time for retrieving data block of a memory of a remote device with a maximum threshold time allowed to read the memory, and transmits to the verifier a remote verification code and a data status according to the result of comparison so that the verifier can verify the integrity of the memory. Instead of relying on the verifier, the remote device provides data status information for integrity verification by using the memory retrieval time. As a result, accurate integrity verification is provided, and no independent hardware is required to verify integrity.
摘要:
Provided is an apparatus for encryption/decryption and electronic signature in a mobile communication environment. A signal processing apparatus, performing modular multiplication in an electronic device, includes a first logic for outputting a signed multiplicand by selectively performing a one's complementary operation on a multiplicand according to a Booth conversion result of a multiplier in modular multiplication; a second logic for outputting a modulus which is signed in the modular multiplication based on a carry input value Carry-in of a current clock, determined from a carry value cin for correction of a previous clock, and on a sign bit of the multiplicand; and a third logic for receiving the signed multiplicand and the signed modulus, and calculating a result value of the modular multiplication by iteratively performing a full addition operation on a carry value C and a sum value S of the full addition operation, found at the previous clock.
摘要:
A method of searching for a broadcasting channel of a specific program in a digital multimedia broadcasting (DMB) receiving terminal. The method includes detecting a program number input by a user, determining whether particular bits in a header of a received transport stream (TS) packet are identical to fixed values for the particular bits in the header, if the particular bits in the header are identical to the fixed values for the particular bits in the header, determining whether particular bits in a payload of the TS packet are identical to fixed values for the particular bits in the payload, and if the particular bits in the payload are identical to the fixed values for the particular bits in the payload, determining that the TS packet has program map table (PMT) information, and analyzing the PMT information to detect a packet identifier (PID) of an audio/video packetized elementary stream (PES) constituting the specific program.
摘要:
A data verification method and system is provided. The data verification method includes the steps of transmitting data from a sender to a receiver over a signaling channel, transmitting a first set of bits to the receiver over a voice channel, wherein the first set of bits is generated using the data in the sender, and verifying the data through comparison between the first set of bits and a second set of bits that is generated based on the data in the receiver. The first and the second sets of bits may be a group of bits that are selected from a hash value using a selection mask in the sender and the receiver respectively, wherein the section mask has the same length as the hash value and the hash value is calculated based on the data, and the selection mask may be pre-defined between the sender and the receiver.