• Title/Summary/Keyword: 태블릿 PC

Search Result 251, Processing Time 0.024 seconds

Analysis of 27MHz Wireless Keyboard Electromagnetic Signal Using USRP and GNU Radio (USRP와 GNU Radio를 이용한 27MHz 무선 키보드 전자파 신호 분석)

  • Kim, Ho-Yeon;Sim, Bo-Yeon;Park, Ae-Sun;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.81-91
    • /
    • 2016
  • Nowadays, electronic device is in a close relationship with human life. Above all, the use of wireless electronic devices such as smart phone, tablet pc, and wireless keyboard is increasing owing to the high convenience and portability. Furthermore, according to the increasing use of sensitive personal and financial information from the electronic device, various attacks for stealing information are being reported. In this paper we do an analysis of 27MHz wireless keyboard vulnerability and set up an analysis environment. Moreover, we make an experiment and show that there are real vulnerabilities. An experimental result will be used for safety analysis and vulnerability verification of wireless electronic devices.

A Study on Online Fraud and Abusing Detection Technology Using Web-Based Device Fingerprinting (웹 기반 디바이스 핑거프린팅을 이용한 온라인사기 및 어뷰징 탐지기술에 관한 연구)

  • Jang, Seok-eun;Park, Soon-tai;Lee, Sang-joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1179-1195
    • /
    • 2018
  • Recently, a variety of attacks on web services have been occurring through a multiple access environment such as PC, tablet, and smartphone. These attacks are causing various subsequent damages such as online fraud transactions, takeovers and theft of accounts, fraudulent logins, and information leakage through web service vulnerabilities. Creating a new fake account for Fraud attacks, hijacking accounts, and bypassing IP while using other usernames or email addresses is a relatively easy attack method, but it is not easy to detect and block these attacks. In this paper, we have studied a method to detect online fraud transaction and obsession by identifying and managing devices accessing web service using web-based device fingerprinting. In particular, it has been proposed to identify devices and to manage them by scoring process. In order to secure the validity of the proposed scheme, we analyzed the application cases and proved that they can effectively defend against various attacks because they actively cope with online fraud and obtain visibility of user accounts.

A Design and Implementation of Virtual Grid for Reducing Frequency of Continuous Query on LBSNS (LBSNS에서 연속 질의 빈도 감소를 위한 가상그리드 기법의 설계 및 구현)

  • Lee, Eun-Sik;Cho, Dae-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.752-758
    • /
    • 2012
  • SNS(Social Networking Services) is oneline service that enable users to construct human network through their relation on web, such as following relation, friend relation, and etc. Recently, owing to the advent of digital devices (smart phone, tablet PC) which embedded GPS some applications which provide services with spatial relevance and social relevance have been released. Such an online service is called LBSNS. It is required to use spatial filtering so as to build the LBSNS system that enable users to subscribe information of interesting area. For spatial filtering, user and tweet attaches location information which divide into static property presenting fixed area and dynamic property presenting user's area changed along the moving user. In the case of using a location information including dynamic property, Continuous query occurred from the moving user causes the problem in server. In this paper, we propose spatial filtering algorithm using Virtual Grid for reducing frequency of query, and conclude that frequency of query on using Virtual Grid is 93% decreased than frequency of query on not using Virtual Grid.

Analysis of Story-Retelling Structure in Digital Storytelling Applications for Infants (유아용 서사 창작 어플리케이션의 스토리-리텔링 구조 분석)

  • Han, Hye-Won;Ryu, Min-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.5
    • /
    • pp.146-158
    • /
    • 2013
  • The purpose of this study is to analyze the story-retelling structure of tablet PC-based applications that designed to help infants to create stories. Owing to the popularization and the usability of smart devices, infants have become from content consumers to creators who reconstruct stories in creative ways, based on the stories they heard. In those participatory process, infants experience enjoying stories independently and expanding the meaning of texts. Story-retelling is an adequate methodology that cultivates creativity, expressiveness, and literacy ability to infant. Consequently, this study investigates three types of story-retelling in , , and , and searches structure elements and methods of story-retelling in integrated approach. In conclusion, the story-retelling applications that provide 'creative gap' have educational value, because they allow infants to demonstrate imagination by filling in the gap and to realize the rule of stories.

A QoS Adaption Model on the Policy-Based Network Management in the IMS (IMS에서 정책 기반 네트워크 관리 QoS 적용 모델)

  • Han, Seok-Jun;Lee, Jae-Oh;Kang, Seung-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.7
    • /
    • pp.3175-3181
    • /
    • 2012
  • The need of multimedia based application service is increasing as the number of smart mobile devices such as smart phone, tablet PC, and netbook is increasing rapidly and the development of application service like IPTV. There are various proposed policies to control the limited network resources. The IMS is used to control wired and wireless aggregation network to support multimedia services that are suitable to the user's need and the policy based models using the PDF of the IMS have emerged. In this paper, we propose the QoS adaption model using various protocols with the PDF of the IMS and the user scenario.

The Technology of Connected Car (커넥티드 카의 기술)

  • Shim, Hyun-Bo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.590-598
    • /
    • 2016
  • It comes into the spotlight as the new Blue Ocean in which the connected car industry in which the car and mobile communication technology is convergence. All sorts of infortainments services connecting with the portable electronic device(Smart phone, tablet PC, and MP3 player) and car are rapidly grown. The Connected car emphasizes the vehicle connectivity with the concept that the car has communication with the around on a real time basis and it provides the safety and expedience to the operator and using the thing of Internet (IoT) in the car and supports the application, presently, the entertainment service including the real-time Navigation, parking assistant function, not only the remote vehicle control and management service but also Email, multimedia streaming service, SNS and with the platform. Intelligent vehicle network is studied as the kind according to MANET(Mobile Ad Hoc Network) for the safety operation of the cars of the road and improving the efficiency of the driving.

Optimal Design of Long-fiber Composite Cover Plate with Ribs (리브를 가진 장섬유 복합재료 커버 플레이트의 최적설계)

  • Han, Min-Gu;Bae, Ji-Hun;Lee, Sung-Woo;Chang, Seung-Hwan
    • Composites Research
    • /
    • v.30 no.1
    • /
    • pp.65-70
    • /
    • 2017
  • Carbon fiber reinforced composites have light weight and high mechanical properties. These materials are only applicable in limited shape structure cause by complex curing process and low drapability. To solve this problem, Long Fiber Prepreg Sheet (LFPS) has been proposed. In this research, electric device cover plate was selected and designed by using LFPS. Before the design process, we analyzed the target structure to which the rib structures were applied. And 8-inch tablet PC product was selected. For FE analysis, simple loading and boundary conditions were applied. Stiffness of rib structure was investigated according to the rib pattern and shape changes. Rib pattern and shape were selected based on fixed volume condition analysis results. And uneven rib width model was selected for the best case whose deflection was reduced 6~10% than uniform rib model.

Processing Methods for Ink-and-Wash Painting in Mobile Contents (모바일 콘텐츠의 수묵 담채 렌더링을 위한 프로세싱 기법)

  • Jang, Hyun-Ho;Jeon, Jae-Woong;Choy, Yoon-Chul
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.3
    • /
    • pp.137-146
    • /
    • 2011
  • Development of mobile devices such as smart phones and tablet PC and increased usage for mobile contents make researches of mobile computer graphics noticeable. However, previous non-photorealistic renderings such as an ink-and-wash painting with thin colors are almost designed for desktop platform and not well-matched for mobile devices. In the result, mobile-specific rendering techniques are needed to create 3D mobile contents with non-photorealistic graphics. We introduce processing techniques that are especially ink-and-wash painting and oriental thin coloring in mobile devices. Through the result of this paper, it is expected that various 3D mobile contents with non-photorealistic styles are made. Proposed work also can allow mobile devices render it in realtime using proposed preprocessing techniques and rendering pipelines.

An Analysis on the Vulnerability of Secure Keypads for Mobile Devices (모바일 기기를 위한 보안 키패드의 취약점 분석)

  • Lee, Yunho
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.15-21
    • /
    • 2013
  • Due to the widespread propagation of mobile platforms such as smartphones and tablets, financial and e-commercial transactions based on these mobile platforms are growing rapidly. Unlike PCs, almost all mobile platforms do not provide physical keyboards or mice but provide virtual keypads using touchscreens. For this reason, an attacker attempts to obtain the coordinates of touches on the virtual keypad in order to get actual key values. To tackle this vulnerability, financial applications for mobile platforms use secure keypads, which change position of each key displayed on the virtual keypad. However, these secure keypads cannot protect users' private information more securely than the virtual keypads because each key has only 2 or 3 positions and moreover its probability distribution is not uniform. In this paper, we analyze secure keypads used by the most financial mobile applications, point out the limitation of the previous research, and then propose a more general and accurate attack method on the secure keypads.

Effect of teenager media usage control in the era of media convergence (미디어 융합 시대에 청소년 미디어 이용 통제의 효과)

  • Lee, Hwan-Soo
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.359-366
    • /
    • 2015
  • The media addiction of teenagers became a social problem in the era of media convergence. With the national efforts, parents has limited their children's media usage for proper parenting. However, current media environment where personalized media devices such as smartphone and tablet PC are common raises questions about whether the problems of media addiction can be solved with previous approaches. Thus, this study examines how the parental controls to teens' media usage affect their media usage and emotions. According to the results that analyzed 884 teens' responses, the parental controls did not affect their usage. On the other hand, it was appeared that excessive parental controls stimulated to teens' negative emotions. These results show that parental controls are not longer effective in current media environment, which implies that new efforts from their family or government are required in order to prevent teens' media addiction.