• Title/Summary/Keyword: 유비쿼터스 전자상거래

Search Result 41, Processing Time 0.022 seconds

A Study of Security Protocol for IMT-2000 based on Java Card (자바카드 기반 IMT-2000 보안 프로토콜 연구)

  • Kim, Min-Jung;Lee, Ju-Hwa;Jung, Min-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1819-1822
    • /
    • 2003
  • 자바카드는 스마트카드와 같은 작은 메모리를 가진 임베디드 장치를 위한 프로그램으로 국제 표준인 ISO-7816 과 산업 표준인 EMV 와 호환되며 IMT-2000 보안 표준화를 진행하고 있다. 그러나, 기존 3GPP의 인증 및 키 일치 프로토콜에는 해킹에 대한 취약성이 존재한다. 그래서 본 논문에서는 표준 3GPP(보안 SMS), 자바카드 기술과 규격(보안 APDV) 그리고 암호화 기술 등을 사용하여 기존 3GPP 보안메커니즘의 취약성을 방지 및 극복할 수 있는 자바카드 기반 IMT-2000 보안 프로토콜에 대하여 연구하였다. 이 기술은 무선상거래, 무선 보안, 전자지불시스템, 모바일 인터넷, 위치추적 서비스 그리고 유비쿼터스 컴퓨팅 환경 등에 널리 사용 될 수 있다.

  • PDF

The Methodology for Performance Prediction in Architectural Design Stage of Software using Queuing Network Model (큐잉 네트웍 모델을 이용한 소프트웨어 아키텍처 설계 단계에서의 성능 예측 방법론)

  • Youn, Hyun-Sang;Jang, Su-Hyeon;Lee, Eun-Seok
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.8
    • /
    • pp.689-696
    • /
    • 2007
  • It is important issue for software architects to estimate performance of software in the early phase of the development process due to the need to verify non-functional requirements and estimation of performance in various stages of architectural design. In order to analyze performance of software, there are many approaches to translate software architecture represented by Unified Modeling Language, into analytical models. However, in the development of agent-based systems, these approaches ignore or simplify the crucial details of the underlying performance of the agent platform. In this paper, we propose performance prediction methodology for agent based system using formal semantic descriptions, and then, we transform the descriptions into queuing network model which model reflects performance of hardware and software platform. We prove the accuracy of proposed methodology using prototype implementation. The accuracy is summarized at 80%.

Collaborative Filtering Method Using Context of P2P Mobile Agents (P2P 모바일 에이전트의 컨텍스트 정보를 이용한 협력적 필터링 기법)

  • Lee Se-Il;Lee Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.5
    • /
    • pp.643-648
    • /
    • 2005
  • In order to supply services necessary for users intelligently in the ubiquitous computing, effective filtering of context information is necessary. But studies of context information filtering have not been made much yet. In order for filtering of context information, we can use collaborative filtering being used much at electric commerce, etc. In order to use such collaborative filtering method in the filtering of ubiquitous computing environment, we must solve such problems as first rater problem, sparsity problem, stored data problem and etc. In this study, in order to solve such problems, the researcher proposes the collaborative filtering method using types of context information. And as the result of applying this filtering method to MAUCA, the P2P mobile agent system, the researcher could confirm the average result of 7.7% in the aspect of service supporting function.

A Study on Restructuring of the Marine Products Value Chain and the Development of E-commerce Trading Systems in the Ubiquitous Environment (유비쿼터스 환경에서의 해양수산물 유통 가치사슬 혁신 및 전자상거래 시스템 구축에 관한 연구)

  • Pak, Myong-Sop;Kim, Jong-Uk;Lee, Won-Jun;Park, Sang-Cheol
    • Journal of Information Technology Services
    • /
    • v.5 no.2
    • /
    • pp.125-136
    • /
    • 2006
  • In general, the distribution structure of marine products is very vulnerable to the uncertainties in the process from the production to the sale, and a lot of difficulty is thus inevitable in the supply control. Such a distribution structure is a very critical issue in securing the suability of marine products through systematic quality and hygiene control of marine products, and it is thus time to discuss the method to innovate and restructuring the distribution structure of marine products. From this point of view, this study approached the flow from production to consumption in view of SCM(supply chain management) beyond the partial discussion conducted so far for the distribution structure in the field of marine products. Further, this study suggested the establishment of electronic commerce systems with a traceability system built in RFID for marine products as an alternative of redesigning distribution infrastructure in the ubiquitous environment. From the results, we assured that such an electronic commerce system would be a new measure to improve the structure currently causing inefficiency and excessive distribution cost for the distribution structure of marine products.

A Study on the Education of 5GL Program Tool at College (대학에서 국산 5세대 프로그램 저작도구의 교육에 대한 연구)

  • Park Daewoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.41-48
    • /
    • 2004
  • At Ubiquitous ages I am teaching of the Fifth Generation Languages Program Tool which was producted by Korea at college, and it develop software program for Internet Electronic Commerce Information. In this paper I have researched the problems from education in Operating System and the Use of Tool that Korean 5GL Program Tool was better than Foreign Program Tool on functions and peculiarity, merits and demerits. I have a research and analysis of students response about the Using of Tool, Coding(Script), Application Programming in college education whose have had existing Foreign Tool. Also. I propose that the alternative plans which analyze out opinions from teaching professors and program developers.

  • PDF

A Study on Recommendation Technique Using Mining and Clustering of Weighted Preference based on FRAT (마이닝과 FRAT기반 가중치 선호도 군집을 이용한 추천 기법에 관한 연구)

  • Park, Wha-Beum;Cho, Young-Sung;Ko, Hyung-Hwa
    • Journal of Digital Contents Society
    • /
    • v.14 no.4
    • /
    • pp.419-428
    • /
    • 2013
  • Real-time accessibility and agility are required in u-commerce under ubiquitous computing environment. Most of the existing recommendation techniques adopt the method of evaluation based on personal profile, which has been identified with difficulties in accurately analyzing the customers' level of interest and tendencies, as well as the problems of cost, consequently leaving customers unsatisfied. Researches have been conducted to improve the accuracy of information such as the level of interest and tendencies of the customers. However, the problem lies not in the preconstructed database, but in generating new and diverse profiles that are used for the evaluation of the existing data. Also it is difficult to use the unique recommendation method with hierarchy of each customer who has various characteristics in the existing recommendation techniques. Accordingly, this dissertation used the implicit method without onerous question and answer to the users based on the data from purchasing, unlike the other evaluation techniques. We applied FRAT technique which can analyze the tendency of the various personalization and the exact customer.

Optimal Associative Neighborhood Mining using Representative Attribute (대표 속성을 이용한 최적 연관 이웃 마이닝)

  • Jung Kyung-Yong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.4 s.310
    • /
    • pp.50-57
    • /
    • 2006
  • In Electronic Commerce, the latest most of the personalized recommender systems have applied to the collaborative filtering technique. This method calculates the weight of similarity among users who have a similar preference degree in order to predict and recommend the item which hits to propensity of users. In this case, we commonly use Pearson Correlation Coefficient. However, this method is feasible to calculate a correlation if only there are the items that two users evaluated a preference degree in common. Accordingly, the accuracy of prediction falls. The weight of similarity can affect not only the case which predicts the item which hits to propensity of users, but also the performance of the personalized recommender system. In this study, we verify the improvement of the prediction accuracy through an experiment after observing the rule of the weight of similarity applying Vector similarity, Entropy, Inverse user frequency, and Default voting of Information Retrieval field. The result shows that the method combining the weight of similarity using the Entropy with Default voting got the most efficient performance.

Remote Secure Entrance Control System using RFID and TCP/IP (RFID와 TCp/IP를 활용한 원격 보안 출입 제어 시스템)

  • Kim, Jeong-Sook;Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.60-67
    • /
    • 2008
  • At present, RFID system is highly welcomed as a substitute system with its bar code recognition system and self recognition equipment. Consequently, the system has multi applications and can be complementing to its security. In particular, RFID system is significantly related with electronic transaction equipments : transportation card, ID card in check point, attendance sheet. Based upon these characteristic, the system is becoming extremely popular in the field of logistics, harbor and stock management, animal control and product circulation & distribution. In this dissertation, I would like to present a more efficient and stable remote entry control system with the network-based TCP/IP. It is a simple example of ubiquitous computing function. Above all, approved protocol system should be applied to the remote entry control function. Its efficient function with the applied approval protocol based-remote entry control system should be confirmed. Therefore, a preliminary test should be prerequisite in automatic entrance function with the embedded and TCP/IP-based RFID system.

Design and Implementation of User Authentication Protocol for Wireless Devices based on Java Card (자바카드 기반 무선단말기용 사용자 인증 프로토콜의 설계 및 구현)

  • Lee, Ju-Hwa;Seol, Kyoung-Su;Jung, Min-Soo
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.585-594
    • /
    • 2003
  • Java card is one of promising smart card platform with java technology. Java card defines necessary packages and classes for Embedded device that have small memory such as smart card Jana card is compatible with EMV that is Industry specification standard and ISO-7816 that is international standard. However, Java card is not offers user authentication protocol. In this paper, We design and implement an user authentication protocol applicable wireless devices based on Java Card using standard 3GPP Specification (SMS), Java Card Specification (APDU), Cryptography and so on. Our Java Card user authentication techniques can possibly be applied to the area of M-Commerce, Wireless Security, E-Payment System, Mobile Internet, Global Position Service, Ubiquitous Computing and so on.

A Study on Secure and Efficient Heterogenous Network Management Scheme based on Static TTP (정적인 TTP 기반의 안전하고 효율적인 이기종 네트워크 관리 기법에 관한 연구)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.63-72
    • /
    • 2008
  • Recent heterogeneous network management researches on information security, however, deal only with simple management using PKI and could not sufficiently address the different kinds of security problems that could arise in a heterogeneous network. Thus, various security requirements should first be satisfied and a security management protocol should first be developed to achieve a secure heterogeneous network. Hence, in this paper, various secure and effective heterogeneous network management that address security issues, which were merely a consideration in existing studies, are proposed. The proposed scheme for the protection of the user privacy is the central object and static middle objects of the process used to mutual authentication, also if communication between users is required 1-out-2 oblivious transfer to communicate by using secret communication, as well as the effectiveness and security conscious approach. Specially The proposed scheme is designed to enhance security and efficiency related to various services required in heterogeneous network, based on the reliable peripheral devices for TTP. Using Mobile device, which has been applied to electronic commerce transactions in existing schemes, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services.

  • PDF