• Title/Summary/Keyword: 사용자 편의환경

Search Result 542, Processing Time 0.03 seconds

Design and Evaluation of Hybrid Tag Interface (하이브리드 태그 인터페이스 디자인 및 평가)

  • 윤형민;이창수;신현구;권오영;손영우;한탁돈
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.11
    • /
    • pp.1483-1495
    • /
    • 2004
  • Recently, new computing technologies are emerging from various life environments, as a result of the spread of network environments and the advent of new computing devices. This trend in computing technology is called "Ubiquitous computing" and is being developed to provide a convenient lifestyle through the dynamic integration of physical objects and digital information. The hybrid tag interface suggested in this paper is a usage model that integrates widely used image codes and recently applied RFIDs in various applications. On the basis of this concept, we eventually designed five different models such as Dual, Partial, Relative, Rebind and Discrete types according to their interrelation. In this paper, the characteristics of tag interfaces in the form of image codes and RFIDs are analyzed and the hybrid tag interface is proposed here for more efficient and convenient interface.

Research of Customized Electric Wheelchair Control System using NFC on Mobile Device Environment (모바일 디바이스 환경 기반의 NFC를 이용한 사용자 맞춤형 전동 휠체어 제어 시스템 연구)

  • Park, Sanghyun;Kim, Jinsul
    • Smart Media Journal
    • /
    • v.4 no.2
    • /
    • pp.17-25
    • /
    • 2015
  • In this paper proposes an idea for using NFC(Near Field Communication) on smalt mobile devices, you can easily control the electric wheelchair system. In this system with previous researches controlled a power wheelchair in a mobile device using Bluetooth communication, the board communicates with the integrated control of the wheelchair. With smart mobile devices, the wheelchair control board integrating the signal generated by checking real time so that the user can easily monitor the state of the wheelchair. Users are using smalt mobile devices, the wheelchair can be controlled easily, and the setting at any time according to the state of the individual and can be used. HEX format control is directly in hardware, allowing analysis was read, the user settings are typically used to match cards which support NFC technology such as bus card for registration, storing the selected information and enable read and were applicable. By applying this system, wheelchairs oriented aids disabled and older people able to access to provide with stability.

A study on Cognitive faculties about Visual Information on Web Interface - With Emphasis on an Experiment with Visual Perception Measurement by Different Age Groups - (웹 인터페이스에서 시각정보의 인지특성에 관한 연구 - 연령계층별 시지각 계측 실험을 중심으로 -)

  • 고광필;류시천
    • Archives of design research
    • /
    • v.15 no.4
    • /
    • pp.243-252
    • /
    • 2002
  • The enlarge the range of internet users require user centered design method what understanding of cognitive faculties about users by different age groups. This study aims at analyzing cognitive faculties about visual information on web interface by different age groups, presenting visual perception cognitive process model as an evaluation model and proposing an effective web interface design guideline, On the basis of analyzing cognitive faculties verified what each detail property of visual perception cognitive process model as form, color, space, movement and physiological, physical cognitive faculties had have individual cognitive faculties. As the result visual perception cognitive process model suggested in this study can be used as an evaluation model of web interface and users' cognitive faculties analyzed in visual perception measurement by different age groups can be applied as a web interface design guideline. In addition, this study has a meaning in that it makes a chance to extend a web designer's roles and establish a direction of future research by usability of different age groups.

  • PDF

A Multi-Agent Scheme Considering User's Mobility RFID based on Knowledge Management System (사용자의 이동성을 고려한 멀티 에이전트 방식의 RFID 기반 지식 관리 시스템)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.2
    • /
    • pp.99-108
    • /
    • 2010
  • The Wireless Ad Hoc network is discussed as a core technology for ubiquitous computing, and the smart tag technology is currently being actively discussed as a part of the sensor network. Thus, considering its security may advance the realization of ubiquitous computing. RFID (Radio Frequency Identification) technology using the smart tag technology as a part of the sensor network is currently in the limelight. In particular, when RFID is applied to a knowledge management system managing various data, data mobility and management convenience are ensured and automated knowledge service can be provided to users. Accordingly, this paper to proposed a secure scheme for mobility knowledge management systems using multi-agents differentiated from the existing knowledge management systems. Specifically, the proposed scheme designates user's authentication and privilege information in multi-agents and provides effective knowledge service through grouping based on user information. Moreover, even user's movement, the proposed scheme ensures service availability and provides continuous information through communication with multi-agent systems.

User-driven Context-aware Service (사용자주도형 상황인식서비스)

  • Park, Jeongkyu;Lee, Keung Hae
    • Journal of Internet Computing and Services
    • /
    • v.14 no.4
    • /
    • pp.1-12
    • /
    • 2013
  • Context-awareness is a computing technology that automatically delivers useful services to users based on their situation. Most previous studies on context-awareness adopted the view that the user simply is a consumer of what the developer creates. Few studies addressed catering to the need of personalized services for the user. They are either too complex for the user to grasp or unable to express many useful services due to their weak expressive power. To address these issues, we propose Dobby as a new model and architecture for user-driven context-aware service development. Dobby enables the user to create services that are more suited to his personal preferences. We argue that Dobby offers an enhanced method for defining personalized context-aware services over existing methods.

Proposal of Safe PIN Input Method on VR (VR 상에서의 안전한 PIN 입력 방법 제안)

  • Kim, Hyun-jun;Kwon, Hyeok-dong;Kwon, Yong-bin;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.5
    • /
    • pp.622-629
    • /
    • 2019
  • VR(Virtual Reality), which provides realistic services in virtual reality, provides a similar experience using a Head Mounted Display(HMD) device. When the HMD device is worn, it can not recognize the surrounding environment and it is easy to analyze the input pattern of the user with the Shoulder Surfing Attack(SSA) when entering the Personal Identification Number(PIN). In this paper, we propose a method to safeguard the user's password even if the hacker analyzes the input pattern while maintaining the user's convenience. For the first time, we implemented a new type of virtual keypad that deviates from the existing rectangle shape according to the VR characteristics and implemented the lock object for intuitive interaction with the user. In addition, a smart glove using the same sensor as the existing input devices of the VR and a PIN input method suitable for the rotary type are implemented and the safety of the SSA is verified through experiments.

Analysis of the Influence of Domestic Open Banking Quality Factors on Intention to Use (국내 오픈뱅킹 품질요소가 사용자 이용의도에 미치는 영향분석)

  • Jung, Bo-chun;Hong, Suk-ki
    • Journal of Internet Computing and Services
    • /
    • v.22 no.5
    • /
    • pp.69-77
    • /
    • 2021
  • The main channels of the financial industry are rapidly changing to mobile. In this environment, banks are focusing on information and communication technology to secure their competitiveness, and rapid innovation is being pursued especially in the payment settlement sector. In October 2019, Korea also introduced open banking services to accelerate the financial innovation, such as the open conversion of financial settlement networks and the expansion of the use of simple payments. In this paper, an empirical study was conducted on the effect of domestic open banking quality factors on usage intention. The service quality factors for open banking were classified into interface design, innovation, security, and data sharing, and the technology acceptance model (TAM) was used to verify whether it has a significant effect on perceived convenience, usefulness and intention to use. According to the analysis results, while innovation and security did not have a significant effect on convenience and usefulness, interface design and data sharing were found to have an effect on perceived convenience. The results would provide implications for some quality issues for companies seeking to introduce open banking services as well as for the related academic arena.

User Authentication Mechanism using Smartphone (스마트폰을 이용한 사용자 인증 메커니즘)

  • Jeong, Pil-seong;Cho, Yang-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.301-308
    • /
    • 2017
  • With the popularization of smart phones and the development of the Internet, many people use smart phones to conduct identity verification procedures. smart phones are easier and faster to authenticate than personal desktop computers. However, as Internet hacking technology and malicious code distribution technology rapidly evolve and attack types become more diverse, authentication methods suitable for mobile environment are required. As authentication methods, there are methods such as possessive-based authentication, knowledge-based authentication, biometric-based authentication, pattern-based authentication, and multi-element authentication. In this paper, we propose a user authentication mechanism that uses collected information as authentication factor using smart phone. Using the proposed authentication mechanism, it is possible to use the smart phone information and environment information of the user as a hidden authentication factor, so that the authentication process can be performed without being exposed to others. We implemented the user authentication system using the proposed authentication mechanism and evaluated the effectiveness based on applicability, convenience, and security.

Blockchain-based new identification system (블록체인 기반 새로운 신원확인 체계)

  • Jung, Yong-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.452-458
    • /
    • 2021
  • The value and importance of personal information are increasing due to the increasing number of fields where the Internet environment and computing environment are used, and user authentication technology is also changing. Until now, accredited certificates, which are mainly used in the financial sector, are being replaced with biometric authentication technology due to the problem of revocation. However, another problem is that biometric information cannot be modified once it is leaked. Recently, with the advent of blockchain technology, research on user authentication methods has actively progressed. In this paper, both public certificate and blockchain-based user authentication can be used without system change, and a new DID issuance and reissuance method that can replace the resident registration number is presented. The proposed system can be used without restrictions in a blockchain. However, the currently used DID requires installation of an application at the Interworking Support Center for verification. Since a DID can be authenticated without registering as a member, indiscriminate information collection can be prevented. Security, convenience, and determinism are compared with the existing system, and excellence is proven based on various attack methods, its portability, and proxy use.

Study on The Data Decryption and Artifacts Analysis of KakaoTalk in Windows Environment (윈도우 환경에서 카카오톡 데이터 복호화 및 아티팩트 분석 연구)

  • Minuook Jo;Nam Su Chang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.51-61
    • /
    • 2023
  • Messengers such as KakaoTalk, LINE, and Facebook Messenger are universal means of communication used by anyone. As the convenience functions provided to users and their usage time increase, so does the user behavior information remaining in the artifacts, which is being used as important evidence from the perspective of digital forensic investigation. However, for security reasons, most of the data is currently stored encrypted. In addition, cover-up behaviors such as intentional manipulation, concealment, and deletion are increasing, causing the problem of delaying digital forensic analysis time. In this paper, we conducted a study on the data decryption and artifacts analysis in a Windows environment for KakaoTalk, the messenger with the largest number of users in Korea. An efficient way of obtaining a decryption key and a method of identifying and decrypting messages attempted to be deleted are presented, and thumbnail artifacts are analyzed.