• Title/Summary/Keyword: 개인화 메시지

Search Result 85, Processing Time 0.023 seconds

System Specification-based Design of Mobile Alarm System for Privacy Protection (시스템 명세화 기법 기반의 개인정보보호 모바일 알람 시스템 설계 및 구현)

  • Jang, Eun-Young;Kim, Hyung-Jong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.113-121
    • /
    • 2010
  • The system specification is a system theory based formal representation method for systems' structure and behavior modeling. When we make use of the system specification method in each step of software development, we can derive a hierarchical and modularized system design which enables us to manage the software development process flexibly. This research presents system specification based design of a mobile alarm system which sends alerts about illegal usage of private information and manages the response against the each alert. In our design of mobile alarm system, there are formal definition of alert message overcoming the functional limitation of mobile device and hierarchical modularized modeling of alarm processing using system specification. The efficiency of making use of the system specification is shown by applying the specification method to implementation of mobile alarm system. The contribution of this work is in design and implementation of mobile alarm system which enables us to handle the private information leakage situation more flexible way using system specification based software designing method.

Distribute Intelligent Multi-Agent Technology for User Service in Ubiquitous Environment (유비쿼터스 환경의 사용자 서비스를 위한 분산 지능형 에이전트 기술)

  • Choi, Jung-Hwa;Choi, Yong-June;Park, Young-Tack
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.9
    • /
    • pp.817-827
    • /
    • 2007
  • In the age of ubiquitous environment, huge number of devices and computing services are provided to users. Personalized service, which is modeled according to the character of each and every individual is of particular need. In order to provide various dynamic services according to user's movement, service unit and operating mode should be able to operate automatically with minimum user intervention. In this paper, we discuss the steps of offering approximate service based on user's request in ubiquitous environment. First, we present our simulator designed for modeling the physical resource and computing object in smart space - the infrastructure in ubiquitous. Second, intelligent agents, which we developed based on a FIPA specification compliant multi-agent framework will be discussed. These intelligent agents are developed for achieving the service goal through cooperation between distributed agents. Third, we propose an automated service discovery and composition method in heterogeneous environment using semantic message communication between agents, according to the movement by the user interacting with the service available in the smart space. Fourth, we provide personalized service through agent monitoring anytime, anywhere from user's profile information stored on handhold device. Therefore, our research provides high quality service more than general automated service operation.

Design Techniques and Development of Mypage when Join the 6005+ Web-site (회원가입과 동시에 경험하게 되는 6005+사이트 Mypage 설계기법 및 개발)

  • Zhao, Mei-Hua;Ko, Hee-Ae;Kim, Jong-Keun;Sim, Kun-Ho;Lim, Young-Hwan
    • Journal of Digital Contents Society
    • /
    • v.11 no.3
    • /
    • pp.407-416
    • /
    • 2010
  • As the mobile internet rapidly progress and mobile terminals are activated, business entities which want to operate mobile web contents and individuals who want to use it increase. 6005plus.com as "I wish the mobile world" which is mobile UCC(User Created Contents) ponpy/invitation service web site(www.6005plus.com) was constructed. In 6005plus.com web site, which users could easily produce mobile contents and establish mobile web service servers as well, in order for mobile service users to create mobile invitation or ponpy and use it. But the service 6005plus.com advocates is that users can attach ponpy and invitations to the MMS/SMS Call back URL, which needs resolution since it has several inactivated problems. In this paper, we allow users who registered 6005plus.com can create mobile card, invitation, and personal ponpy with registration, so that apply automatic generation technique for users to experience ponpy/invitation service into MMS/SMS Call back URL which 6005plus.com advocates through registration. We also designed my page to which users can send their contents easily, conveniently and by one-stop.

Development of Emotional Messenger for IPTV (IPTV를 위한 감성 메신저의 개발)

  • Sung, Min-Young;Paek, Seon-Uck;Ahn, Seong-Hye;Lee, Jun-Ha
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.12
    • /
    • pp.51-58
    • /
    • 2010
  • In the environment of instant messengers, the recognition of human emotions and its automated representation with personalized 3D character animations facilitate the use of affectivity in the machine-based communication, which will contribute to enhanced communication. This paper describes an emotional messenger system developed for the automated recognition and expression of emotions for IPTVs (Internet Protocol televisions). Aiming for efficient delivery of users' emotions, we propose emotion estimation that assesses the affective contents of given textual messages, character animation that supports both 3D rendering and video playback, and smart phone-based input method. Demonstration and experiments validate the usefulness and performance of the proposed system.

Development of the Mobile AddressBook Web Services (모바일 주소록 웹서비스 개발)

  • Ku Yong-Mo;Lee Eun-Jung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.443-446
    • /
    • 2006
  • 최근 무선 인터넷 환경이 보편화 되면서 플랫폼과 언어에 독립적인 통신 방법인 웹서비스 기술이 모바일 환경에서도 주목을 받고 있다. 그러나 모바일 웹서비스를 위한 새로운 기술이 소개되고 있지만 아직 모바일 환경에서의 웹서비스 사례는 별로 많지 않다. 본 논문에서는 유무선 통합 환경을 지원하기 위한 주소록 웹서비스 시스템의 설계와 구현을 소개한다. 주소록 웹서비스는 개인 주소록 정보를 가지고 웹서비스를 지원하는 PIMS 주소록 웹서버와 웹서비스를 이용하는 모바일 클라이언트 및 온라인 클라이언트 애플리케이션으로 구성된다. 유선과 무선의 클라이언트 어플리케이션은 다른 접근 기능을 가지도록 설계하여 모바일 웹서비스 클라이언트의 활용 가능성을 확인하였다. 주소록 웹서비스를 구현하기 위해 Apache의 웹서비스 프로젝트인 Axis와 Axis의 J2ME 구현체인 Axis MIRAE 플랫폼을 이용하였다. 특히 모바일 웹서비스 클라이언트는 단말의 제한된 메모리 용량의 문제를 해결하기 위해 자동 생성된 Stub 코드를 사용하지 않고 파서 API를 통해 SOAP 메시지를 직접 생성하고 접근하는 방법을 도입하였다.

  • PDF

A Study on Secure XML Documents in Internet ]Environments (인터넷 환경에서 안전한 XML 문서에 관한 연구)

  • 홍성표;박영옥;조애리;유혁선;이준
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11a
    • /
    • pp.95-99
    • /
    • 2003
  • XML은 SGML(Standard Generalized Markup Language)의 간략화된 버전으로 SGML의 확장성, 구조, 검증의 특성을 계승하고 있다. 이런 장점으로 XML은 발표된 이래로 인터넷 상의 자료표현의 표준으로 각광받고 있다. 그러나, XML은 문서의 데이터 포맷 표현을 향상시키는데 중점을 두고 만들어졌기 때문에 문서변조 및 데이터 삭제 등의 공격에 취약한 문제점을 가지고 있다. 이러한 문제점에 대한 해결책으로 XML 전자 서명, XML 암호화 기법, XML 접근 제어와 같은 다양한 해결책이 제시되었다. 본 논문에서는 XML 문서에만 전자서명을 첨부하는 것이 아니라, DTD에 전자 서명을 첨부하는 방법을 제안하였다. 먼저 DTD파일을 끝까지 읽으면서 파싱을 하고 여기서 추출되는 엘리먼트나 속성, 엔티티들을 해쉬테이블에 저장한다. 파싱이 종료되면 해쉬 테이블을 읽어 들여서 메시지 다이제스트를 수행한다. 수행 후 이를 개인 키와 합성하여 전자 서명을 생성한다.

  • PDF

Specifying Spammers by Cycle Detection in Social Network (소셜 네트웍의 순환 관계를 적용한 스패머 특정화)

  • Eom, Chris Soo-Hyun;Lee, Woo-Key;Lee, James Jung-Hun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.19-20
    • /
    • 2012
  • 소셜 네트웍을 통한 다양한 서비스들은 새로운 비즈니스 모델의 형성이라는 긍정적인 측면이 있는 반면에, 개인정보 누출이나 스팸과 같이 부정적인 측면도 등장하고 있다. 현재 스팸을 차단하기 위해 스팸방지 가이드라인, 스팸 단어 검색에 의한 스팸 메시지 차단 등 많은 방법 및 연구들이 논의되어 왔다. 하지만, 기존의 차수를 활용한 방법은 스팸이 아닌 정점 또한 스팸으로 간주하는 문제점을 가지고 있어 부정확하다는 단점이 있다. 본 연구에서는 이를 해결하고자 다른 구조적 특성인 순환을 분석하여 스팸들을 차단하는 방법을 제안하고 그 효과를 입증하였다.

IoT Security Channel Design Using a Chaotic System Synchronized by Key Value (키값 동기된 혼돈계를 이용한 IoT의 보안채널 설계)

  • Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.981-986
    • /
    • 2020
  • The Internet of Things refers to a space-of-things connection network configured to allow things with built-in sensors and communication functions to interact with people and other things, regardless of the restriction of place or time.IoT is a network developed for the purpose of services for human convenience, but the scope of its use is expanding across industries such as power transmission, energy management, and factory automation. However, the communication protocol of IoT, MQTT, is a lightweight message transmission protocol based on the push technology and has a security vulnerability, and this suggests that there are risks such as personal information infringement or industrial information leakage. To solve this problem, we designed a synchronous MQTT security channel that creates a secure channel by using the characteristic that different chaotic dynamical systems are synchronized with arbitrary values in the lightweight message transmission MQTT protocol. The communication channel we designed is a method of transmitting information to the noise channel by using characteristics such as random number similarity of chaotic signals, sensitivity to initial value, and reproducibility of signals. The encryption method synchronized with the proposed key value is a method optimized for the lightweight message transmission protocol, and if applied to the MQTT of IoT, it is believed to be effective in creating a secure channel.

Case Studies on Deceptive Data Visualization (기만적 데이터 시각화 사례 연구)

  • Kim, Si-Hyun;Park, Jin-Wan
    • Journal of Digital Contents Society
    • /
    • v.19 no.3
    • /
    • pp.521-528
    • /
    • 2018
  • Data visualization has become a useful tool to effectively communicate information and is widely used not only by experts but also at a general level. However, it is dangerous that it is as efficient as it is to transmit false information. All data visualizations have hidden intent with powerful messages by editor. Building a system that grasps these intentions helps to understand the thoughts of groups and individuals. Most of the existing research focuses on effective data visualization methods and methods of expression. The more various visualization methods, the more likely the data will be distorted. In this paper, we present an analysis of deceptive data visualization in a goal-oriented environment. Based on the vulnerability of human cognitive processing, we classify the attack types and identify what tricks occur in the context of data visualization. This study suggests the first step in studying the case of aggressive visualization and opens the way for further research.

Multiagent-based Intellignet Electronic Commerce System (다중에이저트 기반의 지능형 전자상거래 시스템)

  • Lee, Eun-Seok;Lee, Jin-Goo
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.855-864
    • /
    • 2001
  • With the increasing importance and complexity of EC (Electronic Commerce) across the Internet, the need and expectation for intelligent software agents to support both consumers and suppliers through the whole process of EC are growing rapidly. To realize the intelligent EC. a multiagent based EC system. which includes foundational technologies such as the establishment of standard product ontology the definition of message and negotiation protocol and brockering, is required. In this paper we propose an intelligent EC System named ICOMA(Intelligent electronic CO mmerce system based on Multi-Agent) as an open infrastructure of multiagent-based EC. Concretely we have proposed. designed and implemented an architecture of multiagent-based EC system including 6-types of agents message protocol for inter-agent negotiation, personalized produst retrieval and filtering., We have confirmed the effectiveness of the system through experiments.

  • PDF