국회도서관 서비스 이용에 대한 안내를 해드립니다.
검색결과 (전체 1건)
원문 있는 자료 (1)열기
원문아이콘이 없는 자료는 국회도서관에 방문하여 책자로만 이용이 가능합니다.
목차보기더보기
Title Page
Abstract
요약문
Contents
Chapter 1. Introductions 32
1.1. Systems Engineering Management 32
1.1.1. Systems 32
1.1.2. Systems Engineering 34
1.1.3. Systems Engineering Processes 34
1.1.4. Systems Engineering Standards 36
1.2. Conditional Access Module Systems 38
1.2.1. Healthcare Information Systems 38
1.2.2. Smart Card Terminal Systems 39
1.2.3. Digital Content Protection Systems 42
1.3. Organizations of This Dissertation 42
1.4. Contributions of This Dissertation 45
Chapter 2. Reviews of Systems Engineering Management 47
2.1. Overview of MIL-STD-499A and MIL-STD-499B 47
2.1.1. Description 47
2.1.2. Relation to Other Frameworks 48
2.1.3. MIL-STD-499B Definitions of Systems Engineering 48
2.2. Overview of IEEE 1220 51
2.2.1. Description 51
2.2.2. Relation to Other Frameworks 51
2.2.3. Standard Overview 54
2.3. Overview of ANSI/EIA 632 56
2.3.1. Description 56
2.3.2. Relation to Other Frameworks 57
2.3.3. Standard Overview 57
2.4. Overview of ISO/IEC 15288 65
2.4.1. Description 65
2.4.2. Relation to Other Frameworks 65
2.4.3. Standard Overview 65
Chapter 3. Reviews of Conditional Access Module Systems 72
3.1. Overview of Smart Card Systems 72
3.1.1. What Is a Smart Card? 72
3.1.2. Smart Card Configuration 72
3.1.3. Smart Card Technology 73
3.1.4. Smart Card Terminal Types and Operations 73
3.1.5. Interoperability Issues 74
3.1.6. Specification Overview 74
3.2. Overview of PC Card Systems 75
3.2.1. What is the PCMCIA? 75
3.2.2. PC Card Technology 76
3.2.3. PC Card Types and Release Numbers 76
3.2.4. PC Card Compatibility 77
3.2.5. Specification Overview 77
3.3. Overview of OpenCable Systems 80
3.3.1. What Is OpenCable? 80
3.3.2. Reference Model and Architecture 81
3.3.3. Frequency Domain Views 83
3.3.4. Channel Types 85
3.3.5. Specification Overview 85
Chapter 4. Systems Engineering Framework for the Application of Systems Engineering Processes to Business Processes in Enterprise R&D Environments 93
4.1. Introduction 93
4.1.1. Overview 93
4.1.2. Contribution 94
4.2. Systems Engineering Business Processes 97
4.2.1. Enterprise Domain Processes 101
4.2.2. Project Domain Processes 101
4.2.3. System Technical Domain Processes 102
4.2.4. Implementation Technical Domain Processes 102
4.3. System Technical Domain Processes 103
4.3.1. Sequential View of Life-Cycle Processes 103
4.3.2. Process of Stakeholder Requirements 105
4.3.3. Process of Requirements Analysis 105
4.3.4. Process of Architectural Design 106
4.3.5. Process of Component Development 107
4.3.6. Process of Integration and Verification 108
4.3.7. Process of Installation and Validation 108
4.3.8. Process of Operation and Maintenance 108
4.3.9. Basic System Development Life-Cycle 109
4.3.10. Systems Engineering Management 110
4.3.11. Agreements Between Layers 111
4.4. Requirement Relationships 111
4.5. Specified Requirements for the Acquirer Needs and Expectations 115
4.6. Concluding Remarks 118
Chapter 5. Healthcare Information Systems Using Digital Signatures and Synchronized Smart Cards Based on the Public-Key Infrastructure 119
5.1. Introduction 119
5.1.1. Overview 119
5.1.2. Contribution 120
5.2. Systems Engineering Business Processes 122
5.3. Requirements Analysis Process 122
5.3.1. Smart Card-Based Healthcare Information Systems 122
5.3.2. Network-Based Healthcare Information Systems 123
5.3.3. PKI-Based Healthcare Information Systems 124
5.3.4. Problems of Currently Existing Healthcare Information Systems 125
5.3.5. Four Candidate System Models in the Republic of Korea 126
5.4. Architectural Design Process 127
5.4.1. Applications of Healthcare Smart Card 127
5.4.2. Security Features of Healthcare Smart Card 127
5.4.3. Functions of Healthcare Professional's Card 130
5.4.4. Functions of Patient's Data Card 130
5.4.5. System Configuration and Its Components 133
5.5. Component Development Process 133
5.5.1. Software System Development and Its Functions 133
5.5.2. Hardware System Development and Its Functions 137
5.6. Integration and Verification Process 139
5.7. Concluding Remarks 142
Chapter 6. Smart Card Terminal Systems Using ISO/IEC 7816-3 Interface and 8051 Microprocessor Based on the System-on-Chip 144
6.1. Introduction 144
6.1.1. Overview 144
6.1.2. Contribution 147
6.2. Systems Engineering Business Processes 147
6.3. Requirements Analysis Process 148
6.4. Architectural Design Process 148
6.4.1. Functions of the System-on-Chip 148
6.4.2. Functions of Security 148
6.5. Component Development Process 153
6.5.1. Microprocessor 153
6.5.2. Smart Card Interface Controller 153
6.5.3. Serial and Parallel I/O Interfaces 157
6.6. Integration and Verification Process 158
6.6.1. Simulation of Analog Blocks 158
6.6.2. Simulation of Digital Blocks 159
6.6.3. Classes of Operating Conditions 159
6.6.4. Selection of the Operating Class 161
6.6.5. Modes of Operation 161
6.7. Concluding Remarks 163
Chapter 7. Digital Content Protection Systems Using PCMCIA and ISO/IEC 7816-3 Interfaces for Digital Cable Broadcasting Based on the OpenCable Specification 165
7.1. Introduction 165
7.1.1. Overview 165
7.1.2. Contribution 167
7.2. Systems Engineering Business Processes 167
7.3. Requirements Analysis Process 168
7.4. Architectural Design Process 176
7.4.1. MPEG-2 Systems Layer in the Headend 176
7.4.2. OCI-H2 Reference Architecture 178
7.4.3. Transport Processing in the Host 179
7.4.4. Conditional Access System in the Host 179
7.4.5. OCI-C2 Reference Architecture 183
7.4.6. Conditional Access System in the POD Security Module 185
7.4.7. POD Security Module Architecture 185
7.4.8. Content Protection System 186
7.5. Component Development Process 188
7.5.1. POD Security Module with PCMCIA Interface 188
7.5.2. POD Security Module with PCMCIA and ISO/IEC 7816-3 Interfaces 188
7.5.3. In-Band Processor for the POD Security Module 189
7.5.4. Out-of-Band Processor for the POD Security Module 192
7.6. Integration and Verification Process 195
7.6.1. Construction of the Integrated Test Environments 195
7.6.2. Operation Procedures of the POD Security Module 195
7.6.3. Copy Protection and Authentication 197
7.7. Concluding Remarks 200
Chapter 8. Conclusions 203
8.1. Summaries of This Dissertation 203
8.1.1. Systems Engineering Business Processes R&D 203
8.1.2. Conditional Access Module Systems R&D 203
8.2. Contributions of This Dissertation 204
8.2.1. Systems Engineering Business Processes R&D 204
8.2.2. Conditional Access Module Systems R&D 205
8.3. Concluding Remarks of This Dissertation 206
8.3.1. Systems Engineering Business Processes R&D 206
8.3.2. Conditional Access Module Systems R&D 206
Appendix 208
Appendix A. References 208
Appendix B. Abbreviations and Acronyms 218
Appendix C. Curriculum Vitae 226
C.1. Biography 226
C.2. MS Thesis and PhD Dissertation 227
C.3. Invited Journal Papers 227
C.4. Published Journal Papers 227
C.5. Submitted Journal Papers 228
C.6. Published Conference Papers 229
C.7. Patents 231
C.8. Projects 231
Table 1.1. The selection of definitions of systems engineering. 35
Table 2.1. The life-cycle stages, objectives, and decisions in ISO/IEC 15288 systems life-cycle processes. 70
Table 2.2. The role views and system stages of the life-cycle in ISO/IEC 15288 systems life-cycle processes. 71
Table 3.1. The services, features, and functions for Uni-Directional Cable (UDC) Set-Top Terminal (STT). 87
Table 3.2. The services, features, and functions for Bi-Directional Cable (BDC) Set-Top Terminal (STT). 89
Table 3.3. The services, features, and functions for Uni-Directional Cable (UDC) Terminal Device (TD). 90
Table 6.1. The requirements analysis for 'Identification Cards-Integrated Circuit(s) Cards with Contacts-Part 3. Electronic Signals and Transmission Protocols' and its allocation matrix are the primary focus in the system's engineering process because the process's primary purpose is... 149
Table 6.2. The requirements analysis for 'Identification Cards-Integrated Circuit(s) Cards with Contacts-Part 3. Electronic Signals and Transmission Protocols' and its allocation matrix are the primary focus in the system's engineering process because the process's primary purpose is... 150
Table 6.3. The requirements analysis for 'Identification Cards-Integrated Circuit(s) Cards with Contacts-Part 3. Electronic Signals and Transmission Protocols' and its allocation matrix are the primary focus in the system's engineering process because the process's primary purpose is... 151
Table 6.4. The requirements analysis for 'Identification Cards-Integrated Circuit(s) Cards with Contacts-Part 3. Electronic Signals and Transmission Protocols' and its allocation matrix are the primary focus in the system's engineering process because the process's primary purpose is... 152
Table 7.1. The requirements analysis for 'OpenCable POD Copy Protection System' and its allocation matrix are the primary focus in the system's engineering process because the process's primary purpose is to transform the requirements into designs. 169
Table 7.2. The requirements analysis for 'OpenCable POD Copy Protection System' and its allocation matrix are the primary focus in the system's engineering process because the process's primary purpose is to transform the requirements into designs. 170
Table 7.3. The requirements analysis for 'OpenCable POD Copy Protection System' and its allocation matrix are the primary focus in the system's engineering process because the process's primary purpose is to transform the requirements into designs. 171
Table 7.4. The requirements analysis for 'OpenCable HOST-POD Protection System' and its allocation matrix are the primary focus in the system's engineering process because the process's primary purpose is to transform the requirements into designs. 172
Table 7.5. The requirements analysis for 'OpenCable HOST-POD Protection System' and its allocation matrix are the primary focus in the system's engineering process because the process's primary purpose is to transform the requirements into designs. 173
Table 7.6. The requirements analysis for 'OpenCable HOST-POD Protection System' and its allocation matrix are the primary focus in the system's engineering process because the process's primary purpose is to transform the requirements into designs. 174
Table 7.7. The requirements analysis for 'OpenCable HOST-POD Protection System' and its allocation matrix are the primary focus in the system's engineering process because the process's primary purpose is to transform the requirements into designs. 175
Figure 1.1. The systems engineering competence is a measure of the ability to conduct system life-cycle processes. 33
Figure 1.2. The mutual interaction of domains in business processes and systems engineering business processes. 37
Figure 1.3. The paper, network, and smart card-based Prescription Order Communication Systems (POCS) between the hospital and the pharmacy. 40
Figure 1.4. The system overview of proposed smart card terminal. 41
Figure 1.5. The Point-of-Deployment (POD) security module using smart card in connection with the host. 43
Figure 1.6. The dissertation structure consists of introduction (one chapter), review (two chapters), contribution (four chapters), and conclusion (one chapter) parts. 44
Figure 2.1. The brief history of systems engineering standards including MIL-STD-499B systems engineering, IEEE 1220 application and management of the systems engineering process, ANSI/EIA 632 processes for engineering a system, and ISO/IEC 15288 systems life-cycle pro-... 49
Figure 2.2. The scope of systems engineering standards for MIL-STD-499B systems engineering, IEEE 1220 application and management of the systems engineering process, ANSI/EIA 632 processes for engineering a system, and ISO/IEC 15288 systems lifecycle processes. 50
Figure 2.3. The basic systems engineering process in MIL-STD-499B systems engineering. 52
Figure 2.4. The systems engineering processes in IEEE 1220 application and management of the systems engineering process. 53
Figure 2.5. The relationship of ANSI/EIA 632 processes for engineering a system. 58
Figure 2.6. The acquisition and supply processes in ANSI/EIA 632 processes for engineering a system. 60
Figure 2.7. The technical management processes in ANSI/EIA 632 processes for engineering a system. 61
Figure 2.8. The system design processes in ANSI/EIA 632 processes for engineering a system 62
Figure 2.9. The product realization processes in ANSI/EIA 632 processes for engineering a system. 63
Figure 2.10. The technical evaluation processes in ANSI/EIA 632 processes for engineering a system. 64
Figure 2.11. The processes in the system life-cycle in ISO/IEC 15288 systems life-cycle processes. 67
Figure 2.12. The enterprise, project, and technical functions in cooperating organizations in ISO/IEC 15288 systems life-cycle processes. 68
Figure 3.1. The OpenCable reference model and architecture. 82
Figure 3.2. The OCI-N frequency plan in OCI-N cable network interface specification. 84
Figure 4.1. The general systems engineering processes. 95
Figure 4.2. The basic systems engineering process in B.S.Blanchard. 96
Figure 4.3. The systems view of systems engineering. 98
Figure 4.4. The mutual interaction of domains in business processes and systems engineering business processes. 99
Figure 4.5. The systems engineering context. 100
Figure 4.6. The sequential representation of life-cycle processes including system acquisition, development, and operation processes. 104
Figure 4.7. The basic system creation process with three layers in systems engineering business processes. 109
Figure 4.8. The system development process. 112
Figure 4.9. The evolution of requirements in ANSI/EIA 632 processes for engineering a system. 113
Figure 4.10. The requirement relationships in ANSI/EIA 632 processes for engineering a system. 114
Figure 4.11. The requirement flow in ANSI/EIA 632 processes for engineering a system. 116
Figure 4.12. The requirements for engineering a system in ANSI/EIA 632 processes for engineering a system. 117
Figure 5.1. The paper, network, and smart card-based Prescription Order Communication Systems (POCS) between the hospital and the pharmacy. 121
Figure 5.2. The first processing sequence required to generate a digital signature for authentication purposes. 129
Figure 5.3. The second processing sequence required to generate a digital signature for authentication purposes. 131
Figure 5.4. The system design to implement the government project for the separation of the dispensary from the doctors office in the Republic of Korea. 134
Figure 5.5. The secure Internet/Intranet and 2-way double-type smart card terminals in a healthcare center over the secure protocols. 135
Figure 5.6. The 2-way double-type smart card terminal made in IPS Corporation has two smart card terminals within one body. 136
Figure 5.7. The digital signature and certificate have been issued under the Public-Key Infrastructure (PKI) environment. 138
Figure 5.8. The system overview of the developed 2-way double-type smart card terminal. 140
Figure 5.9. The encryption and decryption procedures in the developed 2-way double-type smart card system. 141
Figure 6.1. The system overview of proposed smart card terminal. 145
Figure 6.2. The flow chart of smart card operating sequence. 146
Figure 6.3. The encryption and decryption procedures in the developed SoC-based smart card system. 154
Figure 6.4. The block diagram of 8-bit microprocessor. 155
Figure 6.5. The block diagram of Smart Card Interface (SCI) controller consisting of digital blocks based on ISO/IEC 7816-3 and the voltage generator. 156
Figure 6.6. The block diagram of serial interface with transmitter and receiver modules. 157
Figure 6.7. The block diagram of parallel interface with transmitter and receiver modules. 158
Figure 6.8. The integrated test board made in IPS Corporation for development of smart card terminal. 160
Figure 6.9. The selection of the class of operating conditions by the interactive device. 162
Figure 6.10. The mode selection and switching between the specific and negotiable status. 163
Figure 7.1. The OpenCable reference model and architecture. 166
Figure 7.2. The MPEG-2 Transport Stream (TS) packets are always 188 bytes long to facilitate multiplexing and error correction. 177
Figure 7.3. The MPEG-2 Program Specific Information (PSI) is used to tell a demultiplexer Program Association Table (PAT) and Program Map Table (PMT) the Transport Stream (TS) contains. 177
Figure 7.4. The MPEG-2 Program Specific Information (PSI) is used to tell a demultiplexer what the Transport Stream (TS) contains Conditional Access Table (CAT). 178
Figure 7.5. The OpenCable SimuCrypt model and operation. 180
Figure 7.6. The basic principles of operation of the digital Conditional Access System (CAS). 181
Figure 7.7. The overview of the OpenCable Set-Top Box (STB) and Point-of- Deployment (POD) security module. 183
Figure 7.8. The Point-of-Deployment (POD) security module using smart card in connection with the host. 184
Figure 7.9. The overview of the OpenCable Content Protection System (CPS). 187
Figure 7.10. The designed and developed Point-of-Deployment (POD) security module chip architecture for conditional access system (CAS). 190
Figure 7.11. The designed and developed Point-of-Deployment (POD) security module chip architecture for conditional access system (CAS). 191
Figure 7.12. The basic Data Encryption Standard (DES) Cipher Block Chaining (CBC). 193
Figure 7.13. The implementation of super descrambling operation at Conditional Access System (CAS). 194
Figure 7.14. The developed OpenCable integrated test environments. 196
Figure 7.15. The flow chart of the MPEG-2 Transport Stream (TS) packet header parsing or filtering algorithm. 198
Figure 7.16. The overall Point-of-Deployment (POD) copy protection. 199
Figure 7.17. The Diffie-Hellman (DH) key agreement protocol between the Point-of-Deployment (POD) security module and the host. 201
원문구축 및 2018년 이후 자료는 524호에서 직접 열람하십시요.
도서위치안내: / 서가번호:
우편복사 목록담기를 완료하였습니다.
* 표시는 필수사항 입니다.
* 주의: 국회도서관 이용자 모두에게 공유서재로 서비스 됩니다.
저장 되었습니다.
국회전자도서관에 오신 것을 환영합니다. 로그인을 하시려면 아이디와 비밀번호를 입력해주세요. 모바일 간편 열람증으로 입실한 경우 회원가입을 해야합니다.
공용 PC이므로 한번 더 로그인 해 주시기 바랍니다.
아이디 또는 비밀번호를 확인해주세요