• Title/Summary/Keyword: Mobile Policy

Search Result 1,001, Processing Time 0.026 seconds

Cloud-Based DRM Service Model for Secure Contents Service (안전한 콘텐츠 서비스를 위한 클라우드 기반 DRM 서비스 모델)

  • Lee, Hyejoo;Seo, Changho;Shin, Sang Uk
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.465-473
    • /
    • 2012
  • The mobile devices and cloud computing technology introduced new content services such as N-Screen service. The DRM techniques have been developed to support interoperability and multi-platform for new environment of content service. Nevertheless, it is still inconvenient for the consumers to purchase a new DRM-supported device or to migrate some purchased contents into new device due to the change of the subscription of service. Therefore, in this paper, cloud-based DRM model which is referred as DRMaaS (DRM-as-a-Service) model, is proposed to allow the consumer to freely use and move some DRM-protected contents in various smart devices regardless of subscription of service.

Intuitive Controller based on G-Sensor for Flying Drone (비행 드론을 위한 G-센서 기반의 직관적 제어기)

  • Shin, Pan-Seop;Kim, Sun-Kyung;Kim, Jung-Min
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.319-324
    • /
    • 2014
  • In recent years, high-performance flying drones attract attention for many peoples. In particular, the drone equipped with multi-rotor is expanding its range of utilization in video imaging, aerial rescue, logistics, monitoring, measurement, military field, etc. However, the control function of its controller is very simple. In this study, using a G-sensor mounted on a mobile device, implements an enhanced controller to control flying drones through the intuitive gesture of user. The implemented controller improves the gesture recognition performance using a neural network algorithm.

The Impact of Fintech User and Product Characteristics on Intention for Continuous Use (핀테크의 사용자 특성과 제품 특성이 지속 사용의도에 미치는 영향)

  • Ha, Chang-Seung;Jung, Dae-Hyun
    • Informatization Policy
    • /
    • v.23 no.4
    • /
    • pp.59-75
    • /
    • 2016
  • In the era of convergence, more attention is paid to development of Fintech which attempts for innovation of the financial transaction paradigm through ICT. Proliferation of Fintech to engraft finance-related services on mobile and ICT is found in various fields such as loans, investment and asset management in addition to simple payment or remittance services but awareness of consumers regarding the matter is rather low. Therefore, it is the time to conduct a research on various Fintech businesses. This thesis conducted an empirical research from the viewpoint of consumers to investigate influence on continuous use intention of Fintech users. From the user environment perspective, it was found that influence of innovativeness on satisfaction was not statistically significant. In case of the product characteristics, perceived risk did not have statistical significance on satisfaction.

DroidSecure: A Technique to Mitigate Privilege Escalation in Android Application (DroidSecure: 안드로이드 어플리케이션 권한 상승 완화를 위한 기술에 대한 연구)

  • Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.169-176
    • /
    • 2016
  • Android platform is designed to be user-friendly, yet sometimes its convenience introduces vulnerabilities that normal users cannot justify. In this paper, after making an overview of popular open source analysis tools for android applications, we point out the dangerous use of Permission Group in current Google Policy, and suggest a technique to mitigate the risks of privilege escalation that attackers are taking advantage of. By conducting the investigation of 21,064 malware samples, we conclude that the proposed technique is considered effective in detecting insecure application update, as well as giving users the heads-up in security awareness.

Content Protective Multi-Agent Platform for MsMu Service and Pattern-Based Content Management

  • Uhm, Yoon-Sik;Hwang, Zi-On;Lee, Min-Soo;Nah, Jae-Hoon;Song, Hwang-Jun;Park, Se-Hyun
    • ETRI Journal
    • /
    • v.32 no.5
    • /
    • pp.665-675
    • /
    • 2010
  • Recent research on mobile Internet protocol television and digital right management (DRM) interconnections has focused on multimedia technologies designed to enhance content scalability and adaptive content distribution. However, due to the architectural and scalable limitations, recent systems are not flexible and securable with respect to their adaptive content distribution and protective policy management. Therefore, we propose a content protective multi-agent platform that provides secure multimedia services, correlation management, pattern-based management, and multi-source multi-use (MsMu)-based services. Our architecture, supported by DRM, lets us create a rich set of MsMu-based content protection and seamless multimedia services through the extension of one source multi-use (OsMu)-based content services. We have verified our platform, which provides scalable and securable services with a 17% lower service response time by using a testbed.

사업자 사전 선택제 도입 사례와 시사점

  • 유영상
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2002.11a
    • /
    • pp.45-57
    • /
    • 2002
  • Since a new entrant in the telecommunications market requires time in order to construct its own network, a requirement on the incumbent operator to implement carrier selection and pre-selection can enable a new entrant to immediately attract customers and earn revenue. Carrier selection can normally be accomplished in two ways, on a call-by-call basis or through carrel pre-selection. Call-by-call selection allows customers to choose a new entrant rather than the incumbent carrier using a specific code designated to the new carrier each time a call is made. Carrier Pre-Selection, on the other hand, allows customers directly connect to the network of one provider to have access automatically to another company's services when they pick up the phone to make certain types of calls. The carrier pre-selection option is generally considered to be a second regulatory step following the implementation of the call-by-call carrier selection option. Carrier pre-selection with the ability to override on a call-by-call basis for long distance, international, local, and fixed-to-mobile calls has now been implemented in many EU countries. This paper attempts to identify the issues in introducing CPS and to draw policy implications from other countries' experiences.

  • PDF

A Study on Internet of Things in IT Convergence Period (융복합 시대의 사물인터넷에 관한 연구)

  • Lee, Seong-Hoon;Lee, Dong-Woo
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.267-272
    • /
    • 2014
  • Many people have used a internet at various purposes. Internet have been used the optimal space to share informations by information producer or consumer. But, recently, through the development of networks and devices, The Internet is expanding beyond PCs and mobile devices into enterprise assets such as field equipment, and consumer items such as cars and televisions. The Internet of Things will enable forms of collaboration and communication between people and things, and between things themselves, hitherto unknown and unimagined. This paper presents various meanings of IoT, and describe the electronic and car domain of internet of things.

A Study of System Validity and Development of Evaluation System for Improving Smart Learning (스마트러닝 개선을 위한 평가시스템 개발 및 타당도 연구)

  • Lee, Myung-Suk;Son, Yoo-Ek
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.3
    • /
    • pp.31-39
    • /
    • 2013
  • We developed a smart learning system by using the 'bring your own device' concept, which means the policy of permitting teacher and learners to bring personally owned mobile devices such as laptops, tablets, smart phones, etc. and applied the system to school classes. In addition, we analyzed the learner's satisfaction related to interfaces, interactions, applications, technical support, and evaluation areas. The evaluation system consists of App program for tablet PC's and smartphones, web program for desktop PC and electronic teaching desk, and server program for evaluation and database. Because all the teaching materials, feedback data and evaluation materials about learners are stored on the server, students can receive the necessary data through real-time feedback using their smartphones and desktop PC's. As a result, it could increase educational achievement with interest in learning.

  • PDF

A Dynamic Security Service using Access Control Model in Distributed Framework Support for u-Healthcare (u-헬스케어 지원 분산 프레임워크에서 접근 제어 모델을 이용한 동적 보안 서비스)

  • Jeong, Chang-Won;Kim, Dong-Ho;Kim, Myung-Hee;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.29-42
    • /
    • 2007
  • This paper describes a security object designed to support a dynamic security service for application services in u-healthcare computing environments in which domains are used to object groups for specifying security policies, In particular, we focus on security object for distributed framework support for u-healthcare including policy, role for security and operations use to access control. And then, by using the DPD-Tool. we showed the access right grant procedure of objects which are server programs, the developing process of client program. Also, we verified the executablility of security service supporting by distributed framework support for u-healthcare use to the mobile monitoring application developing procedure implemented through DPD-Tools.

  • PDF

Structure and service applications for smart work environment (스마트워크 환경을 위한 구조와 서비스 응용)

  • Kang, Sungyeol
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.265-270
    • /
    • 2016
  • The advance in mobile devices such as smartphone, wireless networking, and Internet technologies enables many organizations to improve drastically not only the ways of carrying out every job activity but also their business processes and operations management. As the effort to work smart utilizing the technological change, they are interested in the implementation of Smart Work environment. In this paper we examine several types of smart work and their service scenarios. We also describe the structures of networking and system configurations for building up the smart work environment. These study results may be useful as reference materials for the successful implementation of smart work.