• Title/Summary/Keyword: 모바일 ID

Search Result 119, Processing Time 0.026 seconds

A Dual Security Technique based on Beacon (비콘 기반의 이중 보안 기법)

  • Park, Sang-Min;Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.311-317
    • /
    • 2016
  • Many services have been developed that are based on smart devices, and security between devices is emphasized. A beacon on the current IoT(Internet of Things) services has been utilized in the commercial field and is being applied to the services of the home IoT. On the other hand, the beacon is weak to security using Bluetooth-based services. Therefore, it is important to strengthen the security of the beacon. This paper proposes a dual security technique that can enhance the security of beacon-based services. The dual security architecture and security process is proposed based on beacon and authentication service. In addition, mobile application was developed and validated based on the beacon for proving the suitability of the proposed technique. The experimental method for verification are the authentication failure case, such as 1st authentication fail, and authentication success case, such as 1st authentication success and 2nd authentication success. The components of the verification experiments consists of two beacons (matched with Beacon ID, mismatched with Beacon ID), one mobile device and authentication application. This was tested to verify the compatibility of the dual security architecture and 1st/2nd authentication process.

Analyzing Effectiveness of the Web Application Development in Smartphone (스마트폰상에서의 웹 응용프로그램 개발 효율성 분석)

  • Lee, Go-Eun;Lee, Jong-Woo
    • Journal of Digital Contents Society
    • /
    • v.11 no.3
    • /
    • pp.323-330
    • /
    • 2010
  • Due to the widespread smartphones and application stores, mobile application developments are now booming again in the same manner of PC history. The smartphone software development process, however, gives much inconvenience to developers because of the heterogeneous platform APIs and hardware incompatibility between different devices. To make clear these problems, mobile web applications are being accepted as an alternative to the native smartphone applications. Mobile web applications can be developed more simply and easily than native applications by using webkit engine's html, Java script, and CSS. Additionally developers can provide a platform-independent applications since web applications are going to run on web browsers. In this paper, we develop a personal applications store running on an android phone's browsers. We can accomplish this very simply by using webkit's various APIs such as OpenID. We can find out by implementing a real web application that development of web applications can surpass the native one in cost and time period without much loss of performance.

The secured mobile wallet system using by integrated ID (통합 아이디를 이용한 안전한 모바일 월렛 시스템)

  • Nam, Choon-Sung;Jeon, Min-Kyung;Shin, Dong-Ryeol
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.9-20
    • /
    • 2015
  • Nowadays, Smart Wallet technology trend that is able to save users' consuming costs and also retain users' redundant behaviors such as Single-tapping, One-way communication, Integrated ID, has been issued in recent Mobile Industrial Fields. As one of Smart Wallet functions, Integrated ID is proposed for users' convenience, handiness, and immediate responses. It is designed for the effective management of users' IDs which are easy to be forgot because of its unusual structures. To be detail, instead of user, Integrated ID system can certificate users identification from various online sites (where user resisted) authorization requests via one-clicking, not putting identification data in each sites. So, this technology would be helpful much to a certain user who has lots ID and its Password in multiple Online shopping companies by establishing integrated ID. However, although Integrated ID has lots advantages to be used, most Mobile Service Companies has hesitated to apply Integrated ID service in their shopping systems because this technology requires them sharing their users' data. They have worried that this service would be not helpful to gain their profits. Furthermore, Users who join in multiple shopping companies and use Integrated ID services also are difficult to decide which company they have to save their points in before payment because this system could not show any financial benefit analysis data to their users. As following facts, via this paper majorly we propose the advanced Integrated ID system which concern shopping point management. Basically, this system has a strong security payment service and secure network services like other mobile Shopping systems. Additionally, this system is able to service (or to support) shopping -point -saving guide for customers' financial benefits and conveniences.

A Study of Enhanced Security for Groupware in a Mobile Environment (모바일 환경에서의 그룹웨어를 위한 보안성 강화 연구)

  • Ahn, Hyunjun;Lee, Taekkyeun;Shon, Taeshik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.778-781
    • /
    • 2013
  • 최근 모바일 단말기에 발전으로 기업의 업무 서비스가 모바일 환경으로 변화 하였다. 이에 기업의 그룹웨어 서비스는 모바일 환경으로 확장 되어 기업의 모바일 오피스 도입이 늘어나고 있다. 현재 대부분의 그룹웨어 서비스는 ID/Password에 따른 인증 시스템을 이용하고 있다. 모바일 환경에서의 접근은 매우 다양 하다. 하지만 기존의 인증 서비스는 사용자의 다양한 모발일 환경의 접근 상황 정보를 고려하지 않기 때문에 사용자 정보만을 통하여 접근 권한이 설정 되어 그룹웨어를 이용 할 때에는 보안 위협이 존재한다. 이에 본 논문에서는 기존 인증 시스템에 취약성을 알아보고 대안 방법으로 사용자의 상황 정보를 통한 인증과 권한 생성을 통한 모바일 환경에서의 그룹웨어 보안성 강화에 개선책을 제안한다.

Implementation and Evaluation of Dynamic and Distributed Mapping System in ID-LOC Separation Internet Architecture (ID-LOC 분리 기반 인터넷 구조에서 분산형 매핑 시스템의 구현 및 평가)

  • Kang, Hyung-Woo;Choi, Nak-Jung;Kim, Ji-In;Jung, Heeyoung;Koh, Seck-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.11
    • /
    • pp.984-992
    • /
    • 2012
  • In this paper, we discuss a new architecture of future Internet for mobile-oriented environments, named Mobile-Oriented Future Internet (MOFI). The MOFI architecture is designed with Host Identifier and Local Locator (HILL) for identifier and locator separation. Based on the HILL separation architecture, we propose a Dynamic and Distributed Mapping System (DDMS) for identifier-locator mapping control. In DDMS, the mapping control function is distributed onto each access router in the domain, which is different from the centralized approach using a central anchor. For validation of the proposed MOFI-DDMS architecture, we implemented the data delivery and mapping control functions using Linux platform. From the testbed experimental results, we see that the DDMS architecture can give better performance than the existing Proxy Mobile IP (PMIP) protocol in terms of data transmission throughput.

A Secure Telemedicine System for Smart Healthcare Service (스마트 헬스케어 서비스를 위한 홍채인식기반의 원격의료시스템)

  • Cho, Young-bok;Woo, Sung-Hee;Lee, Sang-Ho;Kim, Min-Kang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.205-214
    • /
    • 2017
  • In this paper, we proposed an iris-based authentication for smart healthcare service in secure telemedicine system. The medical and healthcare information's are very important data in telemedicine system from privacy information. thus, the proposed system provides a secure and convenient authentication method than the traditional ID/PW authentication method to a telemedicine system for age-related chronic diseases. When considering the peculiarities of the use of age-related chronic diseases convenience and healthcare environments, the proposed approach is difficult to secure than traditional ID/PW authentication method with the appropriate means to easily change when stolen or lost to others. In addition, the telemedicine system for the smart healthcare services is one of the types of privacy sensitive medical and health data. it is very important security needs in telemedicine system. Thus we protocol are offer high confidentiality and integrity than existing ID/PW method.

Factors affecting success and failure of Internet company business model using inductive learning based on ID3 algorithm (ID3 알고리즘 기반의 귀납적 추론을 활용한 인터넷 기업 비즈니스 모델의 성공과 실패에 영향을 미치는 요인에 관한 연구)

  • Jin, Dong-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.111-116
    • /
    • 2019
  • New technologies such as the IoT, Big Data, and Artificial Intelligence, starting from the Web, mobile, and smart device, enable new business models that did not exist before, and various types of Internet companies based on these business models has been emerged. In this research, we examine the factors that influence the success and failure of Internet companies. To do this, we review the recent studies on business model and examine the variables affecting the success of Internet companies in terms of network effect, user interface, cooperation with actors, creating value for users. Using the five derived variables, we will select 14 Internet companies that succeeded and failed in seven commercial business model categories. We derive decision tree by applying inductive learning based on ID3 algorithm to the analysis result and derive rules that affect success and failure based on derived decision tree. With these rules, we want to present the strategic implications for actors to succeed in Internet companies.

A Design and Implementation of Product Information Guide System Based on Beacon

  • Lee, Won Joo;Yoo, Jung Hyun;Lee, Kang-Ho;Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.119-126
    • /
    • 2020
  • In this paper, we design and implement a product information guidance system Based on BLE beacons. This system is designed to provide various functions such as contactless entrance service through mobile ticket, seat guidance service, event push service, content push service, and public service. This system consists of three modules: a beacon recognition module, a server linkage module, and a content transmission module. The beacon recognition module implements a function of transmitting a specific ID of a nearby beacon when a customer with a smartphone approaches the available service area. The server linkage module recognizes the beacon ID value, transfers it to the server, and implements the function to check the location of the server having the ID. The content transmission module implements a function of transmitting event or service information set at a corresponding location to a smartphone. The beacon-based product information guidance system implemented in this paper has the advantage of being able to quickly and easily implement various product information guidance systems.

국내 인증 기술 및 서비스 현황

  • Kang, HyoKwan
    • Review of KIISC
    • /
    • v.30 no.3
    • /
    • pp.31-36
    • /
    • 2020
  • 사용자를 온라인에서 확인하는 인증 기술은 최근 코로나 19로 인한 비대면 서비스들의 확산으로 더욱 중요해졌다. 이러한 인증 기술로는 인터넷/모바일 뱅킹, 전자 정부 등에 널리 사용되고 있는 공인인증서부터 카카오 뱅크 등의 사설인증, 블록체인을 이용한 분산ID 기술, 사용자 편의성을 강조한 간편 인증 등으로 진화하고 있다. 본 기고에서는 여러 가지 형태의 인증 방식에 대한 특징과 동향을 살펴보고 이를 통한 발전 방향을 살펴보고자 한다.