• Title/Summary/Keyword: 유비쿼터스 시대

Search Result 465, Processing Time 0.027 seconds

A Study of Voice over Internet Protocol Encryption in Smart Phone (스마트폰을 이용한 VoIP 암호화 기술 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.281-284
    • /
    • 2011
  • Smart phone is being used in the job as the ubiquitous society will Without being restricted by the time and place and devices. The rapid increase in the use of smart phones has brought the activation of the mobile job. And government agencies have brought in the transition to a smart society. In this paper, using a Voice over Internet protocol(VoIP) service for your smart phones to enhance security is the study of encryption technologies. External and internal signals, and call encryption and security standards of administrative agencies is the study of VoIP. Smart phone VoIP service is a study that security of equipment certificate, the internal signal and call encryption. This paper will contribute what using smart phone VoIP security and usability In smart generation.

  • PDF

The data transmission of the of u-ID sensor networks configuration with a Bluetooth (Bluetooth를 이용한 u-ID센서네트워크 구성에서의 데이터 전송)

  • 김영길;박지훈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.45-48
    • /
    • 2004
  • RFID(Radio Frequency Identification) which is emerging from a change in digital convergence paradigm and recently rapidly advancing throughout the overall society is the core technology based on Ubiquitous network. In other words, This is a technology to identify the information of the object and recognize the situation by attaching electrical tag to an object and using Reader that can read the information of the object. With the emergence of the technology, it has turned the existing maintenance of the product into the network and intelligence of the product control by using the bar cord to maintain the product and will lead a revolution throughout overall society by affecting the fields of distribution and product maintenance as well as those of medicines, chemicals and food which the electrical tag can be attached to. this paper shows that utilizing the Bluetooth which is a local wireless telecommunication in the standalone imbedded system can implement the piconet configuration among the Readers and the data telecommunication with the main server

  • PDF

A Study on Secure Key Management Technology between Heterogeneous Networks in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 이기종 네트워크간 안전한 키 관리 기술에 관한 연구)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.4
    • /
    • pp.504-515
    • /
    • 2008
  • Fast transmission speeds and various wired network services have been combined with the convenience and mobility of wireless services. The combination of wired/wireless technologies is spreading rapidly since it enables the creation of new services and provides new features to both users and service providers. In such wired/wireless integrated services, network integration is very important because such systems are integrated by a linkage between heterogeneous networks and they involve an integration of transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable since the network are integrated with heterogeneous networks. The network may also have several security flaws. In existing homogeneous networks, user authentication and key management between heterogeneous networks are required for these new technologies. The establishment of security technologies for heterogeneous devices is a very important task between homogeneous networks. In this paper, we propose a secure and efficient key management system for a heterogeneous network environment. Our system provides secure communications between heterogeneous network devices.

  • PDF

Self Re-Encryption Protocol (SREP) providing Strong Privacy for Low-Cost RFID System (저가형 RFID 시스템에 강한 프라이버시를 제공하는 자체 재암호화 프로토콜)

  • Park Jeong-Su;Choi Eun-Young;Lee Su-Mi;Lee Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.3-12
    • /
    • 2006
  • RFID (Radio Frequency Identification) system is expected to play a critical role providing widespread services in the ubiquitous period. However, widespread use of RFID tags may create new threats to the privacy of individuals such as information leakage and traceability. It is difficult to solve the privacy problems because a tag has the limited computing power that is not the adequate resource to support the general encryption. Although the scheme of [2] protects the consumer privacy using an external agent, a tag should compute exponential operation needed high cost. We propose Self Re-Encryption Protocol (SREP) which provides song privacy without assisting of any external agent. Our SREP is well suitable to low-cost RFID system since it only needs multiplication and exclusive-or operation.

A Study on Roles of CERT and ISAC for enhancing the Security of Smart Mobile Office (스마트 모바일 오피스 보안을 위한 CERT와 ISAC의 역할)

  • Lee, Keun-Young;Park, Tae-Hyoung;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.109-127
    • /
    • 2011
  • Mobile Office is a new type of working method in the workplace that can be used at any time or anywhere by connecting to the network with mobile devices. This allows people to do their jobs without their physical presence in their offices to use computers. The elements in mobile office environment are advancing. They include the widespread distribution of the smart phones, the network enhancing strategy in a ubiquitous environment and expansion of the wireless internet; however, there are not enough security guidelines or policies against these threats on the new environment, the mobile office, although there is the revitalization policy of smart work supported by the government. CERT and ISAC, the known security system as of now, could be used for the secure mobile office, In this paper, suggestions are to be provided for strengthening the security of smart mobile office by analysing the functions of CERT and ISAC.

Design of A IoT Platform Based on CQRS Pattern to Accommodate Various Requirements and Improve Data Query Performance (다양한 요구사항 수용 및 데이터 조회 성능 향상을 위한 CQRS 패턴 기반의 사물인터넷 플랫폼 설계)

  • Jeon, Cheol-Ho;Jeon, Hyeon-Sig;Park, Hyun-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.11
    • /
    • pp.1539-1545
    • /
    • 2020
  • With the advent of the ubiquitous era due to the development of science and technology in the modern society, interest in data generated in the IoT environment has increased socially. However, the existing IoT platform has difficulties in processing inquiry requests that require large amounts of throughput, such as statistical processing of large amounts of data. Accordingly, in this paper, we propose an IoT platform that can flexibly accommodate requirements for inquiry requests and improve inquiry performance. The platform proposed in this paper showed a performance improvement of about 1200 times in terms of average response time by introducing a separate read database. By separating the object model into a command side and a query side, the complexity of the object is reduced to meet the various demands on the platform. It was made to allow quick acceptance of the matter.

Development Plan of Guard Service According to the LBS Introduction (경호경비 발전전략에 따른 위치기반서비스(LBS) 도입)

  • Kim, Chang-Ho;Chang, Ye-Chin
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.145-168
    • /
    • 2007
  • Like to change to the information-oriented society, the guard service needs to be changed. The communication and hardware technology develop rapidly and according to the internet environment change from cable to wireless, modern person can approach every kinds of information service using wireless communication machinery which can be moved such as laptop, computer, PDA, mobile phone and so on, LBS field which presents the needing information and service at anytime, anywhere, and which kinds of device expands it's territory all the more together with the appearance of ubiquitous concept. LBS use the chip in the mobile phone and make to confirm the position of the joining member anytime within several tens centimeters to hundreds meters. LBS can be divided by the service method which use mobile communication base station and apply satellite. Also each service type can be divided by location chase service, public safe service, location based information service and so on, and it is the part which will plan with guard service development. It will be prospected 8.460 hundred million in 2005 years and 16.561 hundred million in 2007 years scale of market. Like this situation, it can be guessed that the guard service has to change rapidly according to the LBS application. Study method chooses documentary review basically, and at first theory method mainly uses the second documentary examination which depends on learned journal and independent volume which published in the inside and the outside of the country, internet searching, other kinds of all study report, statute book, thesis which published at public order research institute of the Regional Police Headquarter, police operation data, data which related with statute, documents and statistical data which depend on private guard company and so on. So the purpose of the study gropes in accordance with the LBS application, and present the problems and improvement method to analyze indirect of manager side of operate guard adaptation service of LBS, government side which has to activate LBS, systematical, operation management, manpower management and education training which related with guard course side which has to study and educate in accordance with application of the new guard service, as well as intents to excellent quality service of guard.

  • PDF

A Study on The Effect Quality Innovation of Convergence Management (융합경영이 품질혁신에 미치는 영향)

  • Choi, Seung-Il;Song, Seong-Bin
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.99-106
    • /
    • 2015
  • The biggest change in modern society because we will transition to a ubiquitous environment. Changes in the environment has become a crucial instrument that finally opens the era of convergence management through integrating the various fields in their own business. The desire of consumers to new innovative products appears to be a constant thing companies are constantly trying to respond to these changes, there may not be a problem for the convergence of sustainability management company in the end. In this study, based on the convergence of corporate management need to be a fusion component of corporate management to examine whether any impact on the quality of innovation. Results showed that the fusion management components that affect both internal factors and external factors, core factors quality improvement. Internal factors detailed in the convergence management leadership, risk management factors showed a positive external factors affecting appeared to affect positively the knowledge-sharing factors, infrastructure factors. Finally, core factor is technology factors, educational learning factors showed a positive impact. This results suggest that be a big impact factors of competitiveness of enterprises through convergence management in the future and will serve as the strategic basis for the convergence of future corporate management.

A Research on types of DMB advertising according to features of DMB Media (DMB의 미디어와 기술 특성에 따른 DMB광고 유형과 종류에 관한 연구)

  • Ahn, Jong-Bae
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.3 no.4
    • /
    • pp.59-88
    • /
    • 2008
  • For the success of the DMB market to meet consumers' demands for Ubiquitous Media and strengthen the nation's competitiveness, it's inevitable for us to activate DMB advertising as of main profit source for DMB Media, and to develop various types of DMB advertising which are linked to the profit model. So I'd like to look over the various types of DMB advertising which are suitable for DMB features as one of the efforts to activate DMB advertising. First of all, I've figured out what kinds of advertising are available for new media and which related technologies are required for DMB media. Through this research, I could find out what features of new media such as cable broadcasting, Internet and Mobile have become the source of developing various types of advertising and how to a great part to activate new media advertising markets by making the best use of their media features. This research also shows that DMB advertising has the high potential to be developed in various and effective types and kinds of advertising with its media feature and technological feature. This research observing DMB advertising cases showed that DMB advertising can be divided into 6 types such as forms, purposes, techniques, advertising positions, the use of LBS(Location Based Service), coupons and it could be developed into various kinds of DMB advertising dependent on each type. On the other hands, it would be great to have continual researches and follow-ups for various types of DMB advertising and the verification of the effectiveness for DMB advertising by performing potential DMB advertising.

  • PDF

Developing a Classification Matrix of Intelligent Geospatial Information Services (지능형 공간정보 서비스 분류 매트릭스)

  • Kim, Jung-Yeop;Lee, Yong-Ik;Park, Soo-Hong
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.1
    • /
    • pp.157-168
    • /
    • 2009
  • Geospatial information, which deeply has an effect on our life, have been evolved as intelligent geospatial information in Ubiquitous era. Also, Various services are introduced using the intelligent geospatial information. However, there is no classification system, for understanding the intelligent geospatial information services, considering any developers and users. It needs to be classification system to classify these services. In this paper, we introduced a concept of intelligent geospatial information and developed a service classification matrix regarding to the features of the services. This service classification matrix has three scales; service domain, service intelligent level, and geo-location accuracy. The propose of this matrix can be utilized in two aspects. First, the matrix can improve the reality that doesn't reflect actual demands for the services. Second, the matrix can present the goal of the new services or the development direction. The matrix can be utilized to the geospatial industry as creating the new blue ocean services. However, the service classification matrix needs to modify and complement to have no anything wrong when the various services are applied to the matrix. In the long run, the matrix has to be utilized as a material to make out a service roadmap or TRM(Technical Reference Model).

  • PDF