• Title/Summary/Keyword: Personal Server

Search Result 351, Processing Time 0.024 seconds

The Development of Monitoring System for PC and Server State Management (PC 및 서버 상태관리를 위한 모니터링 시스템 개발에 관한 연구)

  • Ryu, Chang-ju;Han, Seung-jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1741-1746
    • /
    • 2016
  • Recently, technology using a PC and the personal server efficiently has been highlighted in accordance with the historical background. Solutions for large enterprises and public institutions and PC and personal server management are being commercialized for fee. Paying a fee for PC and personal server management being a burden and commercialized solutions include a function that does not require. In this paper, proposed the PC and personal server management system include monitoring that cpu, hdd, memory, respond speed. It expects to extend the PC and service life is available without charge through the free distribution of the burden. The Development program and application is available for free from the android market and on-line. Server agent program of the proposed system operates based on a single-threaded system. That is low load and the low functional burden on the server.

The Method of Data Synchronization Among Devices for Personal Cloud Services (퍼스널 클라우드 서비스를 위한 임의의 단말간 컨텐츠 동기화 방법)

  • Choi, Eunjeong;Lee, Jeunwoo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.6 no.6
    • /
    • pp.377-382
    • /
    • 2011
  • This paper describes the method of data synchronization among devices for personal cloud services. Existing data synchronization for mobile devices is based on a central server to mobile devices or a PC to a mobile device. However, the purpose of this paper is to share user data in heterogeneous environments, without depending on central server. This technology can be applied to synchronize personal data between a device and a personal cloud storage for personal cloud services. The ad hoc synchronization needs a sync agent service discovery module, a user authentication module, a network adapter, and an application data synchronization module. The method described in this paper is better than existing synchronization technology based on client-server in availability, performance, scalability quality attributes.

A Model of Authority Management for the Protection of Personal Information in OLAP (OLAP 환경에서 개인정보보호를 위한 개인정보 분리 권한관리 모델)

  • Kim, Hyoung-Gyu;Kim, Min-Ho;Kwon, Jung-Sook;Choi, Yong-Lak
    • Journal of Information Technology Services
    • /
    • v.13 no.2
    • /
    • pp.163-172
    • /
    • 2014
  • Personal information has been stolen continuously and it is also affected from development of the Internet. So the government requires that companies spend more effort for protecting customers' personal information. The OLAP server also should meet this requirement, but it is hard to satisfy for the authority management. The OLAP server must use personal information to extract required information from database. This thesis suggests a model of separating between general information and personal information, so this model can help to minimize the leakage of personal information. The model is implemented and tested as a prototype. This prototype can prove that the new model is better than the original one. This study presents that the authority management on the separation between personal information and general information helps protect the personal information of customers.

NAVER : Design and Implementation of Networked Virtual Environments Based on PC Cluster (NAVER : PC 클러스터 기반의 분산가상환경 커널 설계 및 구현)

  • Park, Chang-Hoon;Ko, Hee-Dong;Changseok Cho;Ahn, Hee-Kap;Han, Yo-Sub;Kim, Tai-Yun
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2002.05a
    • /
    • pp.221-228
    • /
    • 2002
  • The NAVER is based on a cluster of low-cost personal computers. The goal of NAVER is to provide flexible, extensible, scalable and re-configurable framework for the diverse virtual environments especially for Gamsung research experiments. Personal computers are divided into three servers are according to their specific functions: Render Server, Device Server and Control Server. While Device Server contains external modules requiring event-based communication for the integration, Control Server contains external modules requiring synchronous communication every frame. And, the Render Server consists of 5 managers: Scenario Manager, Event Manger, Command Manager, Interaction Manager and Sync Manager. In this paper, we discuss NAVER as effective distributed system and its application to Gamsung experiment.

  • PDF

Implementation of Automatic Backup System for Personal Data based on ECA Model (ECA 모델 기반의 개인 데이터 자동 백업 시스템 구현)

  • Jun, In-Ha;Lee, Bong-Goo;Kim, Young-Ji;Mun, Hyeon-Jeong;Woo, Yong-Tae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.2
    • /
    • pp.101-108
    • /
    • 2008
  • In this paper, we develop system to backup automatically personal data by real time based on ECA model. This system backups data that is changed in user PC using CDP technology based on ECA model. Proposed ECA model defines file's change such as file creation, update, remove etc. in user PC to event for synchronization between server and user PC. If event is detected about file, proposed system examines condition that is defined and backup the file to server. Backup data that is stored to server can recovery on point of time that user wants. The proposed system can be applied to data management system for business, personal data management system, high-capacity contents management system etc.

The implementation of home-server for intelligent Personal Video Recorder (지능형 PVR의 원격제어를 위한 홈 서버 구현)

  • Son, Kang-Sun;Oh, Young-Ho;Kim, Dae-Jin
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.414-416
    • /
    • 2004
  • The intelligent PVR(Personal Video Recorder) is an enhanced PVR that provides viewers with some advanced features as well as pause, instant replay, search and skip forward found in conventional PVRs. By embedding a home server into a PVR, it is possible for an intelligent PVR to provide a powerful web-based management user interface constructed using HTML, graphics and other features common to web-browsers. When applied to other embedded systems, web technologies offer graphical user interfaces which are user-friendly, inexpensive, cross-platform and network-ready. It is the purpose of this paper to introduce implementation of intelligent PVR which is control by internet. We present the architecture of an home- server with a simple but powerful web-based network interconnection.

  • PDF

An Implementation of a Home Automation Server Based on Linux (리눅스를 기반으로 한 홈오토메이션 서버의 구현)

  • Sung, Han-Yong;Kim, Kyu-Chil;Bang, Chul-Won;Kim, Yong-Seok
    • Journal of Industrial Technology
    • /
    • v.22 no.B
    • /
    • pp.141-146
    • /
    • 2002
  • It becomes common to use computers to control electronic devices and security facilities in newly constructed buildings and house. There are many home application devices in the market which can be controlled by computers. But they are expensive and managed by specialized companies. This paper is focused on personal computers which are available in most homes and can be used to control home electronic appliances and home security facilities. We implemented a home automation server based on Linux. The standard parallel port of personal computer is used to connect sensors and actuators. Therefore, the cost of the server is very low. Moreover, the server is connected to Internet and anywhere we can control and monitor the home security facilities and home automation systems.

  • PDF

Evaluation of CDMA Network Based Wireless 3 Channel ECG Monitoring System (CDMA망 기반 3채널 심전도 모니터링 시스템의 평가)

  • Hong, Joo-Hyun;Cha, Eun-Jong;Lee, Tae-Soo
    • Journal of Biomedical Engineering Research
    • /
    • v.29 no.4
    • /
    • pp.295-301
    • /
    • 2008
  • A wireless 3 channel ECG monitoring system was developed so that it could monitor the health and movement state during subject's daily life. The developed system consists of a wireless biomedical signal acquisition device, a personal healthcare server, and a remote medical server. Three experiments were performed to evaluate the accuracy, reliability and operability, applicability during daily life of the developed device. First, ECG signals were measured using the developed device and commercial reference device during sitting and marking time and compared to verify the accuracy of R-R intervals. Second, the reliable data transmission to remote server was verified on two types of simulated emergency event using patient simulator. Third, during five types of motion in daily life, the accuracy of data transmission to remote server using CDMA network was verified on two types of event occurring. By acquiring and comparing subject's biomedical signal and motion signal, the accuracy, reliability and operability, applicability during daily life of the developed device were verified. In addition, PDA-phone based wireless system enabled subject to be monitored without any constraints. Therefore, the developed system is expected to be applicable for monitoring the aged and chronic diseased people and giving first-aid in emergency.

Design of Mutual Authentication and Grouping Protocol Based On Network Control Server Applicable to General Purpose (범용적으로 적용 가능한 네트워크제어서버 기반의 상호인증 및 그룹핑 프로토콜 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.13-23
    • /
    • 2017
  • In order to protect personal information and important information (confidential information, sales information, user information, etc.) in the internal network, companies and organizations apply encryption to the Server-To-Server or Server-To-Client communication section, And are experiencing difficulties due to the increasing number of known attacks and intelligent security attacks. In order to apply the existing S / W encryption technology, it is necessary to modify the application. In the financial sector, "Comprehensive Measures to Prevent the Recurrence of Personal Information Leakage in the Domestic Financial Sector" has been issued, and standard guidelines for financial computing security have been laid out, and it is required to expand the whole area of encryption to the internal network. In addition, even in environments such as U-Health and Smart Grid, which are based on the Internet of Things (IoT) environment, which is increasingly used, security requirements for each collection gateway and secure transmission of the transmitted and received data The requirements of the secure channel for the use of the standard are specified in the standard. Therefore, in this paper, we propose a secure encryption algorithm through mutual authentication and grouping for each node through H / W based Network Control Server (NCS) applicable to internal system and IoT environment provided by enterprises and organizations. We propose a protocol design that can set the channel.

Delegated Provision of Personal Information and Storage of Provided Information on a Blockchain Ensuring Data Confidentiality (개인정보의 위임 제공 및 데이터 기밀성을 보장하는 블록체인에 제공 정보의 저장)

  • Jun-Cheol, Park
    • Smart Media Journal
    • /
    • v.11 no.10
    • /
    • pp.76-88
    • /
    • 2022
  • Personal information leakage is very harmful as it can lead to additional attacks using leaked information as well as privacy invasion, and it is primarily caused by hacking server databases of institutions that collect and store personal information. We propose a scheme that allows a service-requesting user to authorize a secure delegated transfer of his personal information to the service provider via a reliable authority and enables only the two parties of the service to retrieve the provided information stored on a blockchain ensuring data confidentiality. It thus eliminates the necessity of storing customer information in the service provider's own database. As a result, the service provider can serve customers without requiring membership registration or storing personal information in the database, so that information leakage through the server database can be completely blocked. In addition, the scheme is free from the risk of information leakage and subsequent attacks through smartphones because it does not require a user's smartphone to store any authentication credential or personal information of its owner.