• Title/Summary/Keyword: Personal information Controller

Search Result 66, Processing Time 0.019 seconds

The Design of Controller System for a Personal Computer Using Echo (에코를 활용한 개인용 컴퓨터 조작 시스템의 설계)

  • Lee, Tae Jun;Kim, Dong Hyun;Ahn, SungWoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.143-144
    • /
    • 2018
  • Generally, to operate the IT devices, a user should exploit his eye and hand. It is so difficult for the most disabled user with the limited vision or hand to manipulate a personal computer and to buy devices assisting the manipulation due to the expensive price. In this paper, we propose the voice system manipulating the personal computer using the Amazon echo. The proposed system controls the mouse of the personal computer and activates functions of the personal computer using the skill stored in the Amazon web service.

  • PDF

A Study on Improvement Plans for Application of the Personal Information Protection Act(Based on the Subject to Duty of Safeguards) (개인정보보호법 적용 대상에 대한 개선 방안 연구(안전성 확보조치 기준 의무 대상 중심으로))

  • Jang Sang Soo
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.35-43
    • /
    • 2023
  • Since the Personal Information Protection Act was enacted in 2011, it has played a role in safely protecting people's personal information and protecting their rights. Personal information controller must comply with the duty of safeguards for safe personal information management. Even though administrative regulation is an accompanying issue, it is not clear to whom, when and how it applies. According to the imposition of duties, the scope, standards, safety measures, procedures, etc. for the target person should be clearly and specifically specified, but the current legal system is insufficient .In this study, problems and reasonable improvement plans were presented for the classification criteria for applicable subjects, the criteria for the criteria for determining the targets, and the criteria for measures to ensure safety. Through this, we intend to contribute to enhancing the effectiveness of the system by presenting reasonable measures by clarifying and specifying the scope and standards of application.

Rational Allocation of Liability for Damages in Personal Information Infringement by Third Party (제3자의 행위에 의한 개인정보침해사고로 발생한 손해배상책임의 합리적 배분)

  • Yoo, Beeyong;Kwon, Hunyeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.231-242
    • /
    • 2020
  • In the case of damages caused by personal information infringement accidents caused by information infringer such as hackers, the information subject will usually claim damages to the information controller rather than the information infringer who is the perpetrator, and the information controller who has been claimed will claim damages again to the information security enterprise that has entrusted the information protection business. These series of claims for damages, which are expected to be carried out between the information subject, the information controller and the information security enterprise, are nothing but quarrels for transferring of liability among themselves who are also victims of infringement. So the problem of damage compensation should be discussed from the perspective of multi-faceted rational distribution of the damages among the subjects who make up the information security industry ecosystem rather than the conventional approach. In addition, due to the nature of personal information infringement accidents, if a large amount of personal information infringement occurs, the amount of compensation can be large enough to affect the survival of the company and so this study insist that a concrete and realistic alternatives for society to share damages is needed.

The Development of LED Lighting Controller based on the PAN (PAN 기반의 LED 조명 제어 장치 개발)

  • Ohm, Woo-Yong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.1
    • /
    • pp.145-152
    • /
    • 2016
  • The usage of LED(Light Emitting Diode) has been rapidly increased and energy efficient management of LED light system is regarded as an important technology to enhance the energy efficiency. In this paper, we design and implementation of LED lighting controller which can control the LED lighting by using the wire and wireless communication technology based on the LAN(Local Area Network) and PAN(Personal Area Network). The implemented system can reduce the cost of LED lighting installing and avoids complicated wiring problem. And it is possible to minimize power consumption through automatic or manual LED control that they wished. In experimental results, the implemented LED lighting controller was satisfactory for all of the desired functions.

Development of Operating Technology for AGV System (AGV 시스템의 운영기술 개발)

  • Song, Jun-Yeop;Lee, Seung-U;Lee, Hyeon-Yong
    • 연구논문집
    • /
    • s.22
    • /
    • pp.27-38
    • /
    • 1992
  • We deals with stationary layout control system of AGV. It is a intelligent control system to he wholly charged control PC a layout information and guided command and to be controlled a vehicle driving, steering, safety of natural functions of AGV. Fieldbus concentrator of stationary layout control system serves control command from control PC and status information of AGV. Telegram software monitors transmitted command and status information through IR(JnfraRed) modem. Especially it is possible to easily network to use not an exclusive controller of AGV but personal computer(PC) when communicate and interface a different kind of controller.

  • PDF

Personal Environment Service and Technology Based on Smart Phone (스마트폰 기반의 개인 환경 서비스 및 기술)

  • Oh, Jong-Taek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.5
    • /
    • pp.454-463
    • /
    • 2013
  • The smart phone has already proliferated, and the smart devices of the living appliances and vehicles embedded with communication device, sensors and connected with the smart phone have been developed. Currently it can provide simple remote controller and user interfaces, it could be envisaged that intelligent technology is converged with the smart phone, and Personal Environment Service in which the smart devices are configured automatically as reflecting personal preference, device attribute, and living environment condition would be activated in the future. In this paper PES services, system architecture, and core technology are described.

Software Framework of Reconfigurable Data-oriented and Bi-directional Universal Remote Controller (동적 재구성이 가능한 데이터 지향적인 양방향 통합 리모컨의 소프트웨어 프레임워크)

  • Shin, Young-Sul;Lee, Woo-Jin
    • The KIPS Transactions:PartA
    • /
    • v.14A no.5
    • /
    • pp.287-294
    • /
    • 2007
  • Most of existing integrated remote controllers can control only a group of home appliances made by the same manufacturer. And they cannot monitor the status of home appliances since they are based on analog RF(Radio Frequency) signal and operate in a uni-directional manner In this paper, we propose a software framework for a hi-directional universal remote controller(URC) which monitors the status of home appliances in Wireless Personal Area Network(WPAN). The URC can handle the control and status messages which consist of a command with related arguments. When a user wants to control any home appliance, the URC can be dynamically configured to its dedicated remote controller by generating a GUI according to its profile. Any other devices which have a capacity for understanding the profile from the controlled devices can play the same role of the URC.

Privacy Authorization for Internet Identity Management System (인터넷 Identity 관리 시스템을 위한 프라이버시 인가)

  • Roh Jong-Hyuk;Jin Seung-Hun;Lee Kyoon-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10B
    • /
    • pp.648-659
    • /
    • 2005
  • One's identity on the Internet has been disclosed and abused without his consent. Personal information must be protected by appropriate security safeguard. An Individual should have the right to know whether his personal details have been collected and stored. This paper proposes various conceptual models for designing privacy enabling service architecture in the Internet identity management system. For the restriction of access to personal information, we introduce the owner's policy and the management policy The owner's policy should provide the user with enough information to manage easily and securely his data. To control precisely and effectively all personal information in the Identity provider, we propose the privacy management policy and the privacy authorization model.

A Framework and Guidelines for Personal Data Breach Notification Act (개인정보 유출 시 통지.신고 프레임워크 및 가이드라인)

  • Lee, Chung-Hun;Ko, Yu-Mi;Kim, Beom-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.169-179
    • /
    • 2011
  • Recent personal data breach incidences draw the public's attention to their privacy and personal rights. The new personal data protection law effective in September 2009 imposes additional legal responsibility on personal data controllers and processors. For instance, if a data breach occurs, this new law requires that the processors must notify individuals (data subjects) and data protection authorities of the nature of incidents. This research reviews the U.S. forty six state laws and related acts, and offers a framework for managing incidents. This framework includes five major components: (1) type of personal data required to be reported and notified, (2) the ultimate subject notifying data subjects, (3) event occurrence and notification time phases, (4) notification message details, and (5) direct/indirect communication media. Along with this framework, we also offer directions for effective/manageable guidelines on data breach notification act.

Development of the Horizontal Arm Type Coordinate Measuring Machine Using Open-Architecture Controller (개방형 수치제어기를 이용한 수평암 타입 좌표측정기의 개발)

  • 김민석;정성종
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1997.10a
    • /
    • pp.184-187
    • /
    • 1997
  • Coordinate measuring machines(CMMs) are used to obtain the dimensional information with micron accuracy. This paper is concerned with the development of the horizontal arm type coordinate measuring machine using open architecture controller. The coordinate measuring machine considered in this paper consists of three orthogonal axes in the x, y and z directions. Open architecture controller IS used to implement a measuring system which can be fulfill to various needs of endusers of coordinate measuring machines. The open architecture controller presented here is embodied in personal computers. The programs and man-machine interfaces(MM1) are developed for various measuring conditions. Through the computer simulation based on the mathematical models of the coordinate measuring machine, control parameters are optimally tuned.

  • PDF