• Title/Summary/Keyword: 모바일 ID

Search Result 119, Processing Time 0.026 seconds

Implementation of Mobile Authentication System for Context-Awareness based on Near Field Communication (근거리 통신 기반의 상황 인식을 위한 모바일 인증 시스템의 구현)

  • Park, Hung-Bog;Seo, Jung-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.39-46
    • /
    • 2017
  • Today, mobile devices are becoming essential for everyday life, and integration of mobile computing, situation recognition and intellectual service accelerates mobile interaction. Surrounding intelligence detection technology is extremely important. These technologies can automatically acquire and recognize surrounding information and situations. Situation recognition can realize wide-range mobile recognition for intellectual services of users' diverse activities, by distinguishing many surrounding devices and recognizing their situations. Thus, this paper suggests application for students' mobile authentication such as college campus attendance authentication, and redesign existing plastic student ID as NFC-compatible mobile authentication system. Experiment results proved NFC-compatible mobile touch-based interactions can maximize the strengths of NFC technology because it can recognize limits in some situations such as tardiness and absences by automating student validation and preventing far-distance reading.

Enhanced Operator Authentication Method in SCADA Control Network (SCADA제어망에서 강화된 운용자 인증 방안)

  • Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.416-424
    • /
    • 2019
  • The authentication technologies used to access computers in both IT and operational technology (OT) network areas include ID/PW, public certificate, and OTP. These authentication technologies can be seen as reflecting the nature of the business-driven IT network. The same authentication technologies is used in SCADA control networks where the operational technology is centered. However, these authentication technologies do not reflect the characteristics of the OT control network environment, which requires strict control. In this paper, we proposed a new enhanced user authentication method suitable for the OT SCADA control network centered on control information processing, utilizing the physical terminal address and operator location information characteristics of the operator's mobile terminal and control network.

A Study on the Empowerment of Mobile Services using Barcodes and RFID(Radio-Frequency Identification) in Korean Libraries (국내 도서관에서 바코드와 RFID를 이용한 모바일 서비스 증진에 관한 연구)

  • Gu, Jung-Eok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.2
    • /
    • pp.309-331
    • /
    • 2010
  • In this study, the characteristics and types of 1D, 2D barcodes were examined. It is necessary to provide mobile services by making full use of the advantages of the technologies, such as 1D, 2D barcodes, and RFID, and by complementing the disadvantages of them mutually in Korea. Especially, in a mobile environment where the spread of smart phones and mobile networks are expanding, barcodes and RFID (Radio-Frequency Identification) were analyzed as a very useful information media which is able to connect offline analogue media and online digital media. In addition, library automation systems and the cases of mobile student ID services using barcodes and RFID in Korean libraries were analyzed. The cases of mobile services using barcodes in foreign countries were also analyzed. With these cases, we propose a method to empower mobile services using barcodes in Korean libraries.

Fuzzy Relevance-Based Clustering for Routing Performance Enhancement in Wireless Ad-Hoc Networks (무선 애드 혹 네트워크상에서 라우팅 성능 향상을 위한 퍼지 적합도 기반 클러스터링)

  • Lee, Chong-Deuk
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.4
    • /
    • pp.495-503
    • /
    • 2010
  • The clustering is an important mechanism thai provides information for mobile nodes efficiently and improves the processing capacity for routing and the allocation of bandwidth. This paper proposes a clustering scheme based on the fuzzy relevance degree to solve problems such as node distribution found in the dynamic property due to mobility and flat structure and to enhance the routing performance. The proposed scheme uses the fuzzy relevance degree, ${\alpha}$, to select the cluster head for clustering in FSV (Fuzzy State Viewing) structure. The fuzzy relevance ${\alpha}$ plays the role in CH selection that processes the clustering in FSV. The proposed clustering scheme is used to solve problems found in existing 1-hop and 2-hop clustering schemes. NS-2 simulator is used to verify the performance of the proposed scheme by simulation. In the simulation the proposed scheme is compared with schemes such as Lowest-ID, MOBIC, and SCA. The simulation result showed that the proposed scheme has better performance than the other existing compared schemes.

A Study on the Evaluation of the Mobile Web Accessibility of Public Library Services (공공도서관 모바일 웹 접근성 평가에 관한 연구)

  • Park, Ok Nam
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.48 no.1
    • /
    • pp.415-439
    • /
    • 2014
  • The purpose of this study is to analyze mobile web accessibility of public libraries. To achieve this, accessibility checklists were driven from mobile web and application guidelines. The study also conducted automatic and manual evaluations. As results, the study found that text alternatives for resource image, main menu, image for text contents were mainly missing. In addition, focus for retrieval, operating system accessibility for retrieval, and id & password label, color difference for library calendar and seat reservation, brightness difference for main manu and resource display, and space between controls for retrieval were mainly missing. The study also suggested focal missing areas for main library services. It will be utilized as checklists for development of mobile services.

미래 스마트시티에서의 바이오인식 기술표준화

  • Kim, Jason
    • Review of KIISC
    • /
    • v.32 no.4
    • /
    • pp.135-146
    • /
    • 2022
  • 포스트 코로나시대에는 다가올 디지털 인프라 사회에서의 스마트시티에서 안전하고 편리한 사이버 경제활동을 구현하기 위해서는 특히 비대면 디지털 환경에서 바이오인식기술의 중요성은 증대될 것으로 전망된다. 이에 따라 바이오인식 관련 국제표준화기구인 ISO/IEC JTC1 SC37(Biometrics)/SC27(Security)과 ITU-T SG17 Q10(ID Management & Telebiometrics) 등 바이오인식기술 국제 표준화 동향과 아시아바이오인식협의회(Asian Biometric Consoritum) 사실 표준화 현황을 면밀히 분석하여, 모바일기기·웨어러블 디바이스 응용분야, 디지털 헬스케어분야, 자율주행 응용분야, 국제공통·국가공용 ID카드분야, 동물보호 공학분야 등 미래의 스마트시티에서 활용될 바이오인식기술에 대한 전망과 함께 관련되는 국제표준에 대한 주요내용과 적용분야를 제안하고자 한다. 이를 통하여 향후 디지털 사회로의 대전환 시대가 도래함에 따른 생체인식기술을 적용한 스마트시티의 발전전망을 고찰하고자 한다.

A Low-Cost RFID Tag Search Protocol Preventing the Reuse of Mobile Reader's Tag-List (모바일 리더의 태그 리스트 재사용을 방지하는 저비용 RFID 태그 검색 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Choi, Hyun-Woo;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2011
  • When a real-time data transfer is not possible between a reader and a back-end server in the mobile environment, the reader should support a capability to search a certain tag without communicating with a back-end server. Some recent papers related to the mobile reader-based tag search protocol have addressed privacy concerns for the reader and the tags. However, to our best knowledge, there are no papers addressing the problem arising from reusing tag lists existed in the mobile reader. In other words, there arise a problem that a mobile reader which has lost an right to access to a specific tag is able to search that tag by reusing a tag list for searching a particular tag. If mobile reader having an unauthorized tag list, the mobile reader can reuse a particular tag list. Our protocol provides the enhanced secure tag lists preventing the reuse of the tag lists and an efficient tag search protocol based on dynamic identity in the mobile reader-based RFID environments.

A Secure Micro-Payment Protocol based on Credit Card in Wireless Internet (무선인터넷에서 신용카드기반의 안전한 소액 지불 프로토콜)

  • Kim Seok mai;Kim Jang Hwan;Lee Chung sei
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1692-1706
    • /
    • 2004
  • Recently, there are rapid development of information and communication and rapid growth of e-business users. Therefore we try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. Wireless e-business adopts credit card WPP protocol and AIP protocol proposed by ASPeCT. WAP, one of the protocol used by WPP has weakness of leaking out information from WG which conned wire and wireless communication. certification chain based AIP protocol requires a lot of computation time and user IDs are known to others. We propose a Micro-Payment protocol based on credit card. Our protocol use the encryption techniques of the public key with ID to ensure the secret of transaction in the step of session key generation. IDs are generated using ECC based Weil Paring. We also use the certification with hidden electronic sign to transmit the payment result. The proposed protocol solves the privacy protection and Non-repudiation p개blem. We solve not only the safety and efficiency problem but also independent of specific wireless platform. The protocol requires the certification organization attent the certification process of payment. Therefore, other domain provide also receive an efficient and safe service.

A Method for Data Access Control and Key Management in Mobile Cloud Storage Services (모바일 클라우드 스토리지 서비스에서의 데이터 보안을 위한 데이터 접근 제어 및 보안 키 관리 기법)

  • Shin, Jaebok;Kim, Yungu;Park, Wooram;Park, Chanik
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.8 no.6
    • /
    • pp.303-309
    • /
    • 2013
  • Cloud storage services are used for efficient sharing or synchronizing of user's data across multiple mobile devices. Although cloud storages provide flexibility and scalability in storing data, security issues should be handled. Currently, typical cloud storage services offer data encryption for security purpose but we think such method is not secure enough because managing encryption keys by software and identifying users by simple ID and password are main defectives of current cloud storage services. We propose a secure data access method to cloud storage in mobile environment. Our framework supports hardware-based key management, attestation on the client software integrity, and secure key sharing across the multiple devices. We implemented our prototype using ARM TrustZone and TPM Emulator which is running on secure world of the TrustZone environment.

The Study on Improvement of Broadcast Metadata about Clip Video at Broadcast Content Managements (방송용콘텐츠관리에서 분절형동영상에 대한 메타데이터 개선연구)

  • Cho, Young-Joon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2014.06a
    • /
    • pp.59-63
    • /
    • 2014
  • 최근 미디어 간 컨버전스가 가속화되면서 그 사이를 흐르는 콘텐츠 유형이 방송과 인터넷 양쪽을 충족시키고 또한 모바일 환경에 최적화된 서비스를 위해 클립화 되어 가고 있다. 다수의 미디어 콘텐츠를 공급하는 방송사의 입장에서는 콘텐츠서비스를 위한 콘텐츠 관리방안이 중요한 이슈가 되고 있으며 ID, 메타데이터 등 관리를 위한 체계를 잡는 것의 중요성도 증대되고 있으며 또한 분절된 동영상을 어떻게 만들고 어떻게 서비스 할것인가도 중요한 이슈이다. 이번연구는 대표적인 방송용 콘텐츠 메타데이터 표준인 EBU Core, PB Core와 우리나라 KBS 메타데이터의 분절형동영상 관련하여 메타데이터 구조를 파악하고 어떻게 구성되어 있는지 비교분석하여 보았다. 분석결과 메타데이터가 근간을 이루는 기본구조는 거의 유사하였고 각각 관점의 차이에 따라 추가되는 항목이 존재함을 발견할 수 있었다. 그리고 최근 미디어 환경변화에 따라 분절형동영상을 표현하는 메타데이터 항목에 대한 개선방향을 몇가지 제안하였다.

  • PDF