• Title/Summary/Keyword: Mobile SMS

Search Result 171, Processing Time 0.024 seconds

Design of Short Messaging Service based Public Address System for Industrial Architectures over Wireless Networks

  • Caytiles, Ronnie D.;Park, Byungjoo
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.9 no.2
    • /
    • pp.15-27
    • /
    • 2019
  • This paper deals with a web-based public address system for conveying information for different institutions. An architecture for a Short Messaging Service (SMS) based public address (PA) system that can be programmed by an authorized mobile phone or device is proposed. This PA system will facilitate information transfer from heads of offices, managers, directors, and deans of the institutions to its constituents or unit area as well as enable postings of information with proper authentication and validation remotely. The system supports high priority messaging, allowing the conveyance of critical and time sensitive information. The mobility management support for the PA system will be based on the Hierarchical Mobile Internet Protocol version 6 (HMIPv6), hence, allowing for a seamless connectivity to the system. The major advantage of this proposed PA system as compared with the traditional electronic displays and bulletin boards is seamless mobility wherein the display devices can be programmed remotely by heads of the institutions and business organization. It also allows faster communication and immediate actions concerning the different institutions, organizations, and businesses, thus, ensuring high productivity.

Gifticon, an Innovative New Service Standing at Crossroads

  • Kim, Sang-Hoon;Kim, Heejin
    • Asia Marketing Journal
    • /
    • v.14 no.2
    • /
    • pp.1-22
    • /
    • 2012
  • Gifticon is an innovative new service of SK Marketing & Company. Launched in the end of 2006 for the first time in the world, the mobile gift certificate is in the form of a SMS message that bears a bar code to exchange with real products sent to the intended recipient through internet portal, messenger or/and mobile phones. The service started by connecting individuals (B2C business) and was expanded to the new marketing tools of companies (B2B business). While the business took off with soft progress in the initial year of launch, Gifticon business finally gained its momentum in the growth of sales in its second and third year. Yet, the data showed that the growth of user-base was getting stagnant that the number of users remained flat for the past few months. Moreover, competition from latecomers such as Giftishow from KTF and Heartcon from LG Telecom gets fierce. Particularly in B2B sector where Gifticon has made minimal profit, competitors started aggressive promotional activities, taking away shares from Gifticon. Under these circumstances, team is facing tough strategic decisions for its long-term growth; How can they further grow the business? Should they go after more massive targets for broader user-base? Should they pursue B2B business more aggressively? This case study asks students to come up with solutions for these questions by understanding concepts, theories and models for diffusion of innovations and strategies to overcome a chasm.

  • PDF

Design and Implementation of User Authentication Protocol for Wireless Devices based on Java Card (자바카드 기반 무선단말기용 사용자 인증 프로토콜의 설계 및 구현)

  • Lee, Ju-Hwa;Seol, Kyoung-Su;Jung, Min-Soo
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.585-594
    • /
    • 2003
  • Java card is one of promising smart card platform with java technology. Java card defines necessary packages and classes for Embedded device that have small memory such as smart card Jana card is compatible with EMV that is Industry specification standard and ISO-7816 that is international standard. However, Java card is not offers user authentication protocol. In this paper, We design and implement an user authentication protocol applicable wireless devices based on Java Card using standard 3GPP Specification (SMS), Java Card Specification (APDU), Cryptography and so on. Our Java Card user authentication techniques can possibly be applied to the area of M-Commerce, Wireless Security, E-Payment System, Mobile Internet, Global Position Service, Ubiquitous Computing and so on.

Face Recognition System Technologies for Authentication System - A Survey (인증시스템을 위한 얼굴인식 기술 : 서베이)

  • Hwang, Yooncheol;Mun, Hyung-Jin;Lee, Jae-Wook
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.9-13
    • /
    • 2015
  • With the advance of ICT, the necessity of user authentication to verify the identity of an opponent online not face to face is increasing. The authentication, the basis of the security, is used in various fields. Because ID-based authentication has weaknesses in terms of stability and losses, two or more than two authentication tools are used in the place in which the security is important. Recently, biometric authentication rather than ID, OTP, SMS authentication has been an issue in terms of credibility and efficiency. As the fields applied to current biometric recognition technologies are increasing, the application of the biometric recognition is being used in various fields such as mobile payment system, intelligent CCTV, immigration inspection, and access control. As the biometric recognition, finger print, iris, retina, vein, and face recognition have been studied actively. This study is to inspect the current state of domestic and foreign standardization including understanding of the face recognition and the trend of technology.

  • PDF

A Design on Error Tracking System for Enhanced-Reliable IoT Service (사물인터넷 서비스의 신뢰성 강화를 위한 오류 추적 시스템 설계)

  • Lim, Ho-Seung;Choi, Chang-Won
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.15-20
    • /
    • 2020
  • In this paper, an error tracking platform is designed for enhanced-reliable IOT system. The platform is designed to enhance reliability of IOT system by analysing additional informations(OS, Browser, Device) and by notifying error detection to developers. Especially, in the case of an error in the service which it is difficult for developers to recognize it, The platform also supports notification services through various communication media(Email, Slack, SMS). The common interface is designed to accommodate many languages(typescript, Swift, and Android) in the development process, and the interface allows users to analyze errors that occur on various platforms, including mobile/web/desktop applications. By presenting each error in groups through issues, developers can easily identify issues in the service. The visualizing function is included to recognize various error type by dashboard.

Optimal Machine Learning Model for Detecting Normal and Malicious Android Apps (안드로이드 정상 및 악성 앱 판별을 위한 최적합 머신러닝 기법)

  • Lee, Hyung-Woo;Lee, HanSeong
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.1-10
    • /
    • 2020
  • The mobile application based on the Android platform is simple to decompile, making it possible to create malicious applications similar to normal ones, and can easily distribute the created malicious apps through the Android third party app store. In this case, the Android malicious application in the smartphone causes several problems such as leakage of personal information in the device, transmission of premium SMS, and leakage of location information and call records. Therefore, it is necessary to select a optimal model that provides the best performance among the machine learning techniques that have published recently, and provide a technique to automatically identify malicious Android apps. Therefore, in this paper, after adopting the feature engineering to Android apps on official test set, a total of four performance evaluation experiments were conducted to select the machine learning model that provides the optimal performance for Android malicious app detection.

Implementation of A Mobile Application for Spam SMS Filtering Using Set-Based POI Search Algorithm (집합 기반 POI 검색 알고리즘을 활용한 스팸 메시지 판별 모바일 앱 구현)

  • Ahn, Hye-yeong;Cho, Wan-zee;Lee, Jong-woo
    • Journal of Digital Contents Society
    • /
    • v.16 no.5
    • /
    • pp.815-822
    • /
    • 2015
  • By the growing of SMS phishing victims, applications for processing spam messages are being released in succession. However most spam messages that cleverly modified the content like separating the consonants and vowels are fail to be filtered. In this paper, we implemented an application 'AntiSpam' which is able to identify spam strings in the text message to solve this problem. 'AntiSpam' searches spam strings in the text message by using set-based POI search algorithm, and then calculate the possibility of whether it is spam or not in accordance with the search results. In addition, it catches skillfully disguised spam messages in order to avoid missing the spam filtering. Users, who received a message, can check the result in spam message possibility decision result and the contents of the message and they can choose how to handling the message.

Design of Safety School Bus System Using RFID (RFID를 활용한 안전 스쿨버스 시스템 설계)

  • Kim, Ji-Yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.11
    • /
    • pp.1741-1746
    • /
    • 2022
  • As the use of school buses becomes more common, related laws are being enacted, such as making it mandatory for children to check school bus dropouts due to frequent accidents caused by the negligence of school bus drivers and their guardians. In this paper, we propose a safe school bus system that links efficient radio-frequency identification (RFID) and mobile APP in terms of energy utilization and cost. The school bus system uses RFID cards to check information on children boarding the school bus, and real-time SMS transmission allows parents to safely send their children to and from school. Instructors on the school bus can check their children's disembarkation information once more through APP, preventing various accidents that may occur to children left on the bus. Due to the automation of the school bus operation log, daycare center teachers can not only check the information on getting on and off, but also manage the information on the attendance and discharge of the students.

Behavior Monitoring System based on WAP for the Elderly and the Disabled (장애인 및 노약자를 위한 WAP 기반 행동 모니터링 시스템)

  • 김택현;이희영
    • Proceedings of the IEEK Conference
    • /
    • 2003.07c
    • /
    • pp.2565-2568
    • /
    • 2003
  • This paper presents a behavioral data monitoring system based on WAP(wireless application protocol) service for the 24-hour continuous health state monitoring of the elderly and the disabled. The developed system transmits a character message to the predefined mobile cell phone through SMS service when an emergency state takes place. Simultaneously, the image captured by a CCD camera is transmitted to the server computer installed WAP service program. Then, the user of the cell phone who received he message can access the server and open the transmitted image. This system can be used for the effective health monitoring of the elderly and disabled.

  • PDF

Design and Implementation of Linux based Wireless Instant Messaging System (리눅스 기반 무선 인스턴트 메시징 시스템의 설계 및 구현)

  • 김종민;이성용;최창열
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.871-873
    • /
    • 2004
  • 인스턴트 메신저는 데스크탑 PC뿐 아니라 PDA, 핸드헬드 PC 같은 개인용 무선정보기기에서도 활발하게 이용되고 있다. 그러나 대부분의 메신저가 데스크탑 환경을 고려한 기능을 그대로 사용하기 때문에 이동성이 있는 무선 환경에서는 활용성이 떨어지고, 사용하기에 불편한 단점이 있다. 본 논문에서는 리눅스 환경에서 사용자 음성인증로그인, RF 모듈을 이용한 자리비움 자동변환, 단문메시지서비스(Short Message Service) 등 무선 환경에서 필요한 기능을 제공하여 사용자 편리성을 제고한 무선 인스턴트 메시징 시스템의 설계와 구연에 대해 기술한다. 구현된 시스템은 과일전송과 단문메시지서비스를 위한 재버(Jabber) 기반의 프록시와 SMS 송신모듈을 갖는 서버와 USM(Ubiquitous, Smart, Mobile) 클라이언트로 구성된다. USM 클라이언트는 본 논문에서 라이트 XML 파서를 내장하여 메시지 통신시 클라이언트의 작업량을 크게 줄여 우선 클라이언트 프로그램의 최적화를 꾀하였다.

  • PDF