• 제목/요약/키워드: 모바일 시스템 보안

검색결과 424건 처리시간 0.029초

Design of a Middleware for Android-based Smart Phone Applications (안드로이드 기반 스마트 폰 응용을 위한 미들웨어 설계)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • 제12권2호
    • /
    • pp.111-117
    • /
    • 2012
  • With the rapid growth of smart phone technologies, mobile user's demands for using services provided by existing web or portal cites are highly increased. These services, however, are designed for the environment of desktop PCs or laptops in general, so it requires lots of costs for corrections and has difficulties for system protection to use in current mobile devices. In this paper, we design and implement a middleware for android-based smart phone apps to cooperate with a portal system with minimum corrections and function configuration. Our middleware system is working as an interface between an existing portal system and mobile devices to provide harmonious usage and safe system protection.

A Study on Embedded Operating System Security Technology for Ubiquitous Computing (유비쿼터스 컴퓨팅을 위한 임베디드 운영체제 보안 기술 연구)

  • Park, Jong-Hyuk
    • Journal of Korea Multimedia Society
    • /
    • 제13권8호
    • /
    • pp.1194-1201
    • /
    • 2010
  • Currently embedded system has been widespreadly used in digital Set-top box, mobile phone, USN, etc and the significance of security has been increased due to be necessarily embedded in these all system. In this paper we propose new integrity verification scheme among the main security requirements in target system based on the korea TTA standard, security reference model for embedded operating system, published in december 2006. Moreover the proposed scheme is more effective than the previous scheme, Jung, et al.[2,6].

Mobile Augmented Reality for Smart-Learning System (모바일 증강현실을 활용한 스마트러닝 시스템)

  • Lee, Jae-Young;Kim, Young-Tae;Lee, Seok-Han;Kim, Tae-Eun;Choi, Jong-Soo
    • Convergence Security Journal
    • /
    • 제11권6호
    • /
    • pp.17-23
    • /
    • 2011
  • In this paper, we propose mobile Augmented Reality(AR) for smart learning system which is advanced e-learning. AR is technology that seamlessly overlays computer graphics on the real world. AR has become widely available because of mobile AR. Mobile AR is possible to get information from real world anytime, anywhere. Nowadays, there are various areas using AR such as entertainment, marketing, location-based AR. One of the most promising areas is education. AR in education shows lifelike images to users for realism. It's a good way for improving concentration and attention. We utilize only a camera for image-based AR without other sensor.

Security Analysis on NFC-based M-coupon Protocols and its Countermeasure (NFC에 기반한 모바일 쿠폰 프로토콜에 대한 안전성 분석 및 대응 방안)

  • Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제16권2호
    • /
    • pp.1388-1397
    • /
    • 2015
  • Recently, an application business model was proposed to implement an M-coupon system using the NFC-based mobile devices. In this paper, the security requirements were surveyed for a secure M-coupon system and to analyze the threats on the existing NFC-based M-coupon protocols. After considering the implementation efficiency and security, this paper presents a novel M-coupon protocol based on the Diffie-Hellman key agreement scheme. This protocol can be an alternative to solve the security problems related to the PKI (Public Key Infrastructure) and secret key distribution. Furthermore, this M-coupon protocol is designed to provide user authentication and counteract the relay attack.

The Mobile Security Diagnostic System against Smart-phone Threat (스마트폰 악성코드 대응을 위한 모바일 보안 진단 시스템)

  • Cheon, Woo-Bong;Lee, Jung-Hee;Park, Won-Hyung;Chung, Tai-Myoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제22권3호
    • /
    • pp.537-544
    • /
    • 2012
  • With wireless network infrastructure, the number of smart-phone users is remarkably increasing in the world and the amounts of damage due to the smart-phone malwares are also raised. Many security solutions for wireless network have come into the market but these solutions are for companies or large enterprises, therefore, the public users of smart-phone don't feel easy to select as their solutions and it is difficult to detect unknown malwares. In this paper, we propose the mobile security diagnostic system for public smart-phone users, which provides functions like smart-phone system check, comparison with blacklist of applications and collecting malwares.

Design and Implementation of Security Frame work for Application Server with Components

  • 김행곤;강전근
    • Journal of the Korea Computer Industry Society
    • /
    • 제5권4호
    • /
    • pp.531-540
    • /
    • 2004
  • Development of Web service application requires the interoperability between various heterogeneous systems, extensibility to allow modification of business environment not of user interface, maintainability, flexibility and reusability As the properties of CBD (Component Based Development) have gradually become clear, attention has started to turn the smooth technology and methodology to solve the existing problems and issues the dynamic responds for the distributed web environments. In this paper, we identify some of the major architectural affecting CBD and describe the Design and Implementation of Security Framework for Application Server with Components. We identify the candidate components, model it using UML and layer it on the architecture. The frameworks will Provide the various security functions, such as incorporating with legacy security systems, supporting of J2EE, JAAS and Kerberos and assisting in increasing the tailorability of component.

  • PDF

Security Verification of Wireless Remote Control System Using CPN (CPN을 이용한 무선원격제어시스템의 안전성 검증)

  • 이문구
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제13권5호
    • /
    • pp.81-90
    • /
    • 2003
  • Existing web-based system management software solutions show some limitations in time and space. Moreover, they possess such as shortcomings unreliable error message announcements and difficulties with real-time assistance suppers and emergency measures. In order to solve these deficiencies, Wireless Remote Control System was designed and implemented. Wireless Remote Control System is able to manage and monitor remote systems by using mobile communication devices for instantaneous control. The implementation of Wireless Remote Control System leads to these security Problems as well as solutions to aforementioned issues with existing web-based system management software solutions. Therefore, this paper has focused on the security matters related to Wireless Remote Control System. The designed security functions include mobile device user authentication and target system access control. For security verification of these security functions introduced CPN(Coloured Petri Nets) which is capable of expressing every possible state for each stage. And then in this paper was verified its security through PI(Place Invariant) based on CPN(Coloured Petri Nets). The CPN expression and analysis method of the proposed security function can also be a useful method for analyzing other services in the future.

Leakage Prevention System of Mobile Data using Object Recognition and Beacon (사물인식과 비콘을 활용한 모바일 내부정보 유출방지 시스템)

  • Chae, Geonhui;Choi, Seongmin;Seol, Jihwan;Lee, Jaeheung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • 제18권5호
    • /
    • pp.17-23
    • /
    • 2018
  • The rapid development of mobile technology has increased the use of mobile devices, and the possibility of security incidents is also increasing. The leakage of information through photos is the most representative. Previous methods for preventing this are disadvantageous in that they can not take pictures for other purposes. In this paper, we design and implement a system to prevent information leakage through photos using object recognition and beacon. The system inspects pictures through object recognition based on deep learning and verifies whether security policies are violated. In addition, the location of the mobile device is identified through the beacon and the appropriate rules are applied. Web applications for administrator allow you to set rules for taking photos by location. As soon as a user takes a photo, they apply appropriate rules to the location to automatically detect photos that do not conform to security policies.

Object Directory Service (효율적인 로컬 모바일 RFID 시스템을 위한 ODS 검색 서비스 성능개선)

  • Sung-Min Choi;Jung-Jin Oh;Han-Suk Choi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2008년도 추계학술발표대회
    • /
    • pp.1031-1034
    • /
    • 2008
  • 현재 ODS(Object Directory Service) 검색 서비스는 글로벌한 모바일 RFID 환경에 적합하지만, 지역적인 로컬 네트워크 및 정보보안이 필요한 사설 네트워크에서는 불필요한 검색시간이 요구되고 효율성이 떨어지는 서비스 시스템이다. 따라서 본 논문에서는 기존의 ODS 검색 서비스 알고리즘을 개선하여 새롭게 로컬 환경에 적합한 ODS 검색 서비스 알고리즘을 제안하고, 개선된 ODS 검색 서비스 시스템의 성능평가 결과를 제시한다..

제어시스템 ICCP 프로토콜 사이버 보안 현황

  • Kim, SungJin;Shon, Taeshik
    • Review of KIISC
    • /
    • 제24권5호
    • /
    • pp.32-38
    • /
    • 2014
  • 전력시스템에 IT를 결합한 스마트그리드에 대한 연구가 최근 활발히 진행되고 있다. 스마트그리드 중 전력시스템의 핵심이라 할 수 있는 전력시스템 제어센터 간 통신을 담당하는 것이 ICCP 프로토콜이며, 주로 중앙급전소와 지역급전소간의 전력망 정보들을 교환하는데 사용되고 있다. 이 프로토콜은 단지 전력망의 정보교환 뿐 아니라 전력기기제어 기능도 가지고 있다. ICCP 프로토콜은 TCP/IP 프로토콜을 기반으로 동작하기 때문에 잠재적으로 다양한 형태의 사이버 공격이 가능하다. 또한 이 프로토콜을 사용하는 중앙급전소의 경우 주요 국가기반시설로써 사이버테러에 더욱더 공고한 대응체계를 갖추어야 할 필요가 있다. 현재 ICCP 프로토콜을 사용하는 통신 구간은 일반적으로 외부 네트워크와 분리되어 그 안전성을 담보하고 있지만, 네트워크 분리를 통한 보안성 향상 기법이 체계적인 관리와 함께 수반되지 않으면 인적 취약성이나 새로운 형태의 모바일 기기를 통한 물리적 취약성에 지속적으로 노출 될 수 있는 잠재적 위험을 내포하고 있다. 따라서 이러한 보안 사고의 잠재적 발생 가능성으로 인해 외부네트워크와 분리된 제어센터들도 향후 더욱더 높은 수준의 보안 기술을 적용할 필요성이 강조되고 있다. 본 논문에서는 전력 제어센터 사이에서 사용되고 있는 ICCP 프로토콜의 사이버 보안 현황에 대해 살펴보고 해당 프로토콜의 보안 위험성과 이에 대한 대응방안을 고찰한다.