• Title/Summary/Keyword: 패턴 잠금

Search Result 25, Processing Time 0.023 seconds

Implementation of the Smartphone Based Carpal Tunnel Syndrome Monitoring System (스마트폰 기반의 손목터널증후군 모니터링 시스템 구현)

  • Hwang, Woo-Jin;Yang, Yoon-Jeong;Jeong, Do-Un
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.827-829
    • /
    • 2016
  • 장시간 컴퓨터나 스마트폰을 사용하는 사람들에게서 손목터널증후군(Carpal Tunnel Syndrome)의 발생 가능성이 높아지며, 이를 방지하기 위해서는 꾸준한 손목 스트레칭과 위험성의 모니터링을 통한 사용자 피드백이 중요하다. 본 연구에서는 사용자 스스로가 손목 터널 증후군의 위험성을 인지하고, 손목 스트레칭 할 수 있도록 손목 터널 증후군 예방 시스템(Carpal Tunnel Syndrome Prevention System, CTSPS)을 구현하였다. 전체 시스템은 하드웨어와 소프트웨어로 구성되며, 소프트웨어는 사용자가 설정한 사용 시간과 잠금 시간을 바탕으로 알림 및 잠금을 수행한다. 이때 사용자는 아두이노와 가속도 센서를 이용하여 손목 스트레칭 할 수 있으며, 사용 패턴을 분석하여 사용자에게 맞는 생활 가이드를 제공할 수 있다. 구현된 시스템을 평가하기 위해 피실험자 5명을 대상으로 3일간 스마트폰 사용 시간 및 터치 횟수를 측정하였고, 설문조사를 수행한 결과 스마트폰의 사용 빈도가 줄었으며, 통증 완화 등 긍정적인 효과를 확인할 수 있었다.

  • PDF

Automated Smudge Attacks Based on Machine Learning and Security Analysis of Pattern Lock Systems (기계 학습 기반의 자동화된 스머지 공격과 패턴 락 시스템 안전성 분석)

  • Jung, Sungmi;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.903-910
    • /
    • 2016
  • As smart mobile devices having touchscreens are growingly deployed, a pattern lock system, which is one of the graphical password systems, has become a major authentication mechanism. However, a user's unlocking behaviour leaves smudges on a touchscreen and they are vulnerable to the so-called smudge attacks. Smudges can help an adversary guess a secret pattern correctly. Several advanced pattern lock systems, such as TinyLock, have been developed to resist the smudge attacks. In this paper, we study an automated smudge attack that employs machine learning techniques and its effectiveness in comparison to the human-only smudge attacks. We also compare Android pattern lock and TinyLock schemes in terms of security. Our study shows that the automated smudge attacks are significantly advanced to the human-only attacks with regard to a success ratio, and though the TinyLock system is more secure than the Android pattern lock system.

Analysis of Preference for Encryption Algorithm Based on Decision Methodology (의사 결정 방법론을 기반한 암호화 알고리즘 선호도 분석)

  • Jin, Chan-Yong;Shin, Seong-Yoon;Nam, Soo-Tai
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.167-168
    • /
    • 2019
  • Lately, variety of algorithms using encryption technology has been adopted as methods of unlocking smartphone. It is advancing toward the direction to solve through human biometrics technology which has already succeeded in commercialization. These include finger print recognition, face recognition, and iris recognition. In this study, we selected biometrics recognition technology and pattern recognition and password input methods which are already commercialized as evaluation items. The evaluation items are five algorithms including finger print recognition, face recognition iris recognition, pattern recognition and password input method. Based on these algorithms, analytic hierarchy process is used to analyze the preference of smartphone users. Also, the theoretical implications are presented based on the analysis results.

  • PDF

Defect Detection of Impacted Composite Tubes by Lock-in Photo-Infrared Thermography Technique (위상잠금 열화상기법을 이용한 복합재 튜브 충격 손상 결함 측정)

  • Kim, Kyoung-Suk;Jeon, So-Young;Jung, Hyun-Chul
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.31 no.2
    • /
    • pp.139-143
    • /
    • 2011
  • The problem of delamination of composite tubes by impact has been acknowledged in aerospace and automobile industry. Non-destructive testing(NDT) methods in composite material structure are important to evaluate reliability of composite structure. There are many kinds of NDT methods which can detect the inside defect of the composite material such as Infrared Thermography(IRT). Infrared thermal imaging of object is different from that of a defect, in heated composite tubes with an internal defect, and then location and size of a defect can be measured by the analysis of thermal imaging pattern. In this study, Lock-in Infrared thermography detect internal defects of Impacted composite tubes by the inspection of infrared lay radiated from the surface of composite tubes.

바이오 인식 기술 적용 현황 및 서비스 문제점 연구 (모바일 기기를 중심으로)

  • Song, Cho-Rong;Park, Jae-Hyeok;Lee, Jae-Woo
    • Review of KIISC
    • /
    • v.25 no.3
    • /
    • pp.66-76
    • /
    • 2015
  • 최근 카드사 정보 유출과 더불어 유출된 개인정보를 악용한 범죄가 빈번하게 일어남에 따라 정보보호에 대한 관심과 중요성이 높아지고 있다. 국내 스마트폰 가입자 수도 4100만 명을 넘어가면서 모바일 보안에 대한 중요성 역시 강조되고 있는 가운데 지문, 홍채, 얼굴, 목소리, 눈동자 등 개개인의 고유 정보를 이용하여 인증하는 바이오 인식 기술이 주목을 받고 있다. 최근 휴대폰 제조업체들도 스마트폰 기기 내에 바이오 인식 기술을 탑재하여 기존의 인증 방식인 잠금 패턴이나 PIN 방식보다 강화된 보안성을 제공하고 있다. 또한 모바일 결제 서비스 이용 증가에 따라 바이오 인식 결제 서비스를 제공.이용할 수 있어 그 활용성은 매우 클 것으로 전망된다. 하지만 바이오 데이터의 안전한 처리 문제, 바이오 인식 서비스의 부족 등과 같은 문제점이 따르는 실정이다. 본고에서는 바이오 인식 기술의 적용 현황 및 국내외 동향을 살펴보고 바이오 인식 시장의 문제점 분석과 이에 따른 개선 방향에 대해서 연구한다.

Design of Small Space Convergence Locking device Using IoT (IOT를 이용한 소규모 공간의 융합 잠금 장치 제안)

  • Park, Hyun-Joo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.2
    • /
    • pp.45-50
    • /
    • 2021
  • In this paper, we propose the development of a smart space security device that can be opened and closed remotely using IoT. Existing space security devices can control opening and closing by breaking hardware or only using button devices or replicated keys. The recent COVID-19 crisis has created several applications for non-contact devices. In this study, we propose the development of a small space security device that has the function of unlocking through an app without touching the device. By transferring the control authority to a smartphone, device that cannot be opened or closed by only operating hardware at the user's option. It is convenient and hygienic because it can be opened and closed using an app without touching the locking device. Multiple security is possible because security can be released using an app after user authentication by fingerprint recognition and pattern input on a smartphone. If the user wishes, after using the app security, the security is released by directly touching a button installed in the safe or space or opening it with a key. In addition, by adding an inactive function to the app, it is designed so that the door of the safe cannot be opened when the key is lost or the small safe is lost. This study is expected to be able to effectively expand the security system by applying variously to objects that require security.

A Study on the Utilization of Biometric Authentication for Digital Signature in Electronic Financial Transactions: Technological and Legal Aspect (전자금융 거래 시 생체인증을 전자서명에 활용하기 위한 기술 및 법률에 관한 연구)

  • Song, Jae-Hun;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.4
    • /
    • pp.41-53
    • /
    • 2016
  • Today, leading smartphone manufacturers offer biometric technologies such as fingerprints, voice recognition, and iris patterns in their flagship models. These biometric technologies are used for authentication. Biometric authentications are widely used in device security and even in financial transaction. This paper examines cases where a user uses biometric authentication during financial transaction (both online and smartphone banking), and explains biometric for non-repudiation by digital signature. Finally, the paper also explains technical and legal requirements for biometric authentication in the area of financial services.

A Study of Behavior Based Authentication Using Touch Dynamics and Application Usage on Android (안드로이드에서 앱 사용과 터치 정보를 이용한 행위 기반 사용자 인증 기술 연구)

  • Kim, Minwoo;Kim, Seungyeon;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.361-371
    • /
    • 2017
  • The increase in user data stored in the device implies the increase in threats of users' sensitive data. Currently, smartphone authentication mechanisms such as Pattern Lock, fingerprint recognition are widely used. Although, there exist disadvantages of inconvenience use and dependence that users need to depend on their own memory. User behavior based authentication mechanism have advantages of high convenience by offering continuous authentication when using the mobile device. However, these mechanisms show limitations on low accuracy of authentication and there are researches to improve the accuracy. This paper proposes improved authentication mechanism that uses user's smartphone application usage pattern which has not considered on earlier studies. Also, we analyze performance of proposed mechanism with collected datasets from actual use of smartphone applications.

Smartphone Usage Data Collection Application and Management Program for Big Data Analysis (빅데이터 분석을 위한 스마트폰 사용 데이터 수집 앱 및 관리 프로그램)

  • Jo, Seong-Min;Oh, Seung-Hyeon;Ahn, Ji-Woo;Lee, Myung-Suk
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.225-228
    • /
    • 2021
  • 본 연구는 스마트폰 중독과 관련된 다양한 분석을 위한 스마트폰 사용 앱과 관리자 웹을 개발하고자 한다. 연구방법으로 이전 연구에서 중요한 변수로 작용되었던 '화면 켠 횟수', '실사용시간-인지사용시간' 변수를 분석할 있도록 적용하여 스마트폰 사용시간, 사용량, 사용 앱, 화면 잠금을 해제한 횟수 등 다양한 데이터 수집이 가능한 앱을 개발한다. 관리자 웹은 수집된 데이터를 저장, 분석할 수 있는 공간으로 사용할 것이다. 앱에서 수집된 데이터는 서버에 전송한 후, 시각화 분석 기능을 제공하는 관리 프로그램으로 개발하여 스마트폰 중독 연구에 사용한다. 향후 데이터 수집과 사용 목적에 동의한 사용자를 모집하여 데이터를 수집하고 스마트폰 사용 패턴, 데이터마이닝, 중독 등과 관련된 다양한 분석을 할 것이다. 이를 통해 보다 정확하고 효과적인 스마트폰 중독 진단이 가능해질 것과 나아가 스마트폰 중독 치료방안 연구에 기여할 것으로 기대한다.

  • PDF

Simulation of Woody Leaf Netted Venation Based on Optimization Technique (최적화기법에 의한 나뭇잎 그물맥 시뮬레이션)

  • Chen, Lei;Li, Weizheng;Jang, Gang Won;Baek, Tae Hyun
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.37 no.4
    • /
    • pp.323-329
    • /
    • 2013
  • This study attempts to simulate the structure of a woody leaf netted venation system by using topology optimization techniques. Based on finite element method (FEM) analysis of an incompressible fluid, a topology optimal design is applied to those woody leaf netted venation models. To solve the transverse shear locking problem of a thin plate caused by the Mindlin-Reissner plate model where a leaf netted venation is assumed to be a thin plate, a P1-nonconforming element and selective reduced integration are employed. Topology optimal design is applied to multiple physical domains. Combined with the Darcy-Stokes flow problems and extended to the optimal design of fluid channels, the multiple physical models of the flow system are analyzed and venation patterns of leafs are simulated. The calculated optimal shapes are compared with the natural shapes of woody leaf venation patterns. This interdisciplinary approach may improve our understanding of the leaf venation system.