• Title/Summary/Keyword: Smart mobile device

Search Result 489, Processing Time 0.03 seconds

A study to detect and leaked personal information on the smartphone. (Web을 이용한 안드로이드 기기 제어 시스템 설계)

  • Kim, Wung-Jun;He, Yi-Lun;Park, Sung-Hyun;Ban, Tae-Hak;Kim, Yong-Un;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.845-847
    • /
    • 2014
  • In recent years, the mobile OS market, enlargement and, at the same time, Android has mounted various smart phones and feature air conditioning, smart TV, cleaning robot, camera, etc. that the number is being spread at a rapid pace. But a lot of devices to control the modules and applications at once, this is not a device for controlling the dissemination of applications all in one place, and in charge of the devices that allow you to manage applications are lacking. Accordingly, in this paper, use the Web Server registered in the appliance can be controlled by management, Web access, is proposing and designing the system. This is the current research is actively in progress in the field of IoT (Internet of Things) would be utilized.

  • PDF

Analysis and Improved Solution of Hussian et al.'s Authentication Protocol for Digital Rights Management

  • Mi-Og Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.5
    • /
    • pp.67-74
    • /
    • 2023
  • In this paper, we analyze the authentication protocol for DRM proposed by Hussain et al. in 2022, and present an improved solution. Hussain et al. argued that their authentication protocol guarantees man-in-the-middle attack, replay attacks, and mutual authentication. However, as a result of analyzing Hussain et al.'s authentication protocol in this paper, Hussain et al.'s authentication protocol still has an insider attack problem, a problem with Yu et al.'s authentication protocol that they pointed out. For this reason, when an inside attacker acquires information on a mobile device, a user impersonation attack was also possible. In addition, there were problems with the user's lack of ID format verification and the problem of the secret key mismatch of the digital contents between the server and the user. Therefore, this paper proposes an improved solution to solve these problems. As a result of analysis in this paper, the improved solution is safe from various attacks such as smart card attack, insider attack, and password guessing attack and can safely authenticate users of DRM.

FinTech - Conversions of Finance Industry based on ICT (핀테크 - 금융과 정보통신 기술의 융합)

  • Lee, Seong-Hoon;Lee, Dong-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.3
    • /
    • pp.97-102
    • /
    • 2015
  • It has been changed various patterns related with our consumption because of popularization and progress on mobile device and service. We can buy a necessary products anywhere and at any time during 24 hours. Through the change of patterns in our life, in recent years, Fintech attracts a lot of attention. Fintech is the fusion type of finance and technology. Industry fields related with Fintech are now proceeding well in america, england and china. Therefore, we studied the issues of Fintech, and described the industrial technology trends in this paper.

Channel Grade Method of multi-mode mobile device for avoiding Interference at WPAN (WPAN에서 간섭을 피하기 위한 멀티모드 단말기 채널등급 방법)

  • Jung, Sungwon;Kum, Donghyun;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2015
  • There is a new evolution in technological advancement taking place called the Internet of Things (IoT), The IoT enables physical world objects in our surrounding to be connected to the Internet. ISM (Industrial Scientific Medical) band that is 2.4GHz band authorized free of charge is being widely used for smart devices. Accordingly studies have been continuously conducted on the possibility of coexistence among nodes using ISM band. In particular, the interference of IEEE 802.11b based Wi-Fi devices using overlapping channel during communication among IEEE 802.15.4 based wireless sensor nodes suitable for low-power, low-speed communication using ISM band. Because serious network performance deterioration of wireless sensor networks. In this paper, we will propose an algorithm that identifies the possibility of using more accurate channels by mixing utilization of interference signal and RSSI (Received Signal Strength Indicator) Min/Max/Activity of Interference signal by wireless sensor nodes. In addition, it will verify our algorithm by using OPNET Network verification simulator.

The Implementation of Broadcasting Scalable Application on Multimedia mobile device using SADL (멀티미디어 모바일 단말기기를 이용한 방송통신용 스케일러블 애플리케이션 구현)

  • Kim, Sang-Hyun;Lim, Tae-Beom;Kim, Kyung-Won;Lee, Seok-Pil
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2011.07a
    • /
    • pp.556-559
    • /
    • 2011
  • 최근 디지털 방송 서비스가 본격화가 이루어짐에 따라 디지털 콘텐츠는 기하급수적으로 늘어나고 있다. 또한 방송통신 융합 환경은 기존 셋탑 박스와 같은 방송 전용 단말기와 PC, 노트북, PDA와 같은 인터넷 단말기기, 그리고 모바일 폰과 같은 통신기기 사이의 벽을 허물고 있다. IPTV, SmartTV 시대의 도래로 방송통신 제공자의 양방향성 콘텐츠의 제공 및 상호연동 서비스의 제공은 중요한 이슈가 되었다. 이에 따라 다양한 단말기를 이용해 N-Screen이 가능하도록 방송통신 융합 서비스를 제공하고, 이를 위한 여러 콘텐츠 제작이 활발히 일어나고 있다. 이에 본 논문은 양방향성과 상호운용성을 높이기 위한 하나의 방법으로, 방송통신 융합서비스를 인터넷에 의한 전송과 방송 셋탑에 의한 전송에 있어서 상호 동일한 콘텐츠의 통일성을 유지하여 관리가 쉽도록 하는 Scalable Application Framework를 이용하였고 이를 실제 멀티미디어 모바일 단말기기에 적용하고 구현하였다. 이를 통해 앞으로 스마트 방송 시대에 대비할 수 있는 시스템의 대안을 제안하고자 한다. MPEG-21의 DID를 기초로 하여 SADL(Scalable Application Description Language)를 정의하고 이를 이용한 다양한 프레임워크 모델 중 일부인 멀티미디어 모바일 단말기기에 적용하여 이를 활용하는 방안에 대해 논의한다.

  • PDF

Improvement of Activity Recognition Based on Learning Model of AI and Wearable Motion Sensors (웨어러블 동작센서와 인공지능 학습모델 기반에서 행동인지의 개선)

  • Ahn, Junguk;Kang, Un Gu;Lee, Young Ho;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.982-990
    • /
    • 2018
  • In recent years, many wearable devices and mobile apps related to life care have been developed, and a service for measuring the movement during walking and showing the amount of exercise has been provided. However, they do not measure walking in detail, so there may be errors in the total calorie consumption. If the user's behavior is measured by a multi-axis sensor and learned by a machine learning algorithm to recognize the kind of behavior, the detailed operation of walking can be autonomously distinguished and the total calorie consumption can be calculated more than the conventional method. In order to verify this, we measured activities and created a model using a machine learning algorithm. As a result of the comparison experiment, it was confirmed that the average accuracy was 12.5% or more higher than that of the conventional method. Also, in the measurement of the momentum, the calorie consumption accuracy is more than 49.53% than that of the conventional method. If the activity recognition is performed using the wearable device and the machine learning algorithm, the accuracy can be improved and the energy consumption calculation accuracy can be improved.

RSA-Based Enhanced Partially Blind Signature Algorithm Minimizing Computation Of The Signature Requester (서명 요청자의 계산량을 감소시키는 RSA에 기반한 개선된 부분은닉서명 알고리즘)

  • Kwon, Moon-Sang;Cho, Yoo-Kun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.5
    • /
    • pp.299-306
    • /
    • 2002
  • Partially blind signature scheme is used in applications such as electronic cash and electronic voting where the privacy of the signature requester is important. This paper proposes an RSA-based enhanced partially blind signature scheme minimizing the amount of computation of the signature requester. The signature requester needs computation in blinding the message to the signer and in generating the final signature using the intermediate signature generated by the signer. Since the proposed scheme enables the signature requester to get the final signature just by using modular additions and multiplications, it decreases computation of the signature requester considerably. So, the proposed partially blind signature scheme is adequate for devices such as mobile device, smart-card, and electronic purse that have relatively low computing power.

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.

A Case Study of a Navigator Optimization Process

  • Cho, Doosan
    • International journal of advanced smart convergence
    • /
    • v.6 no.1
    • /
    • pp.26-31
    • /
    • 2017
  • When mobile navigator device accesses data randomly, the cache memory performance is rapidly deteriorated due to low memory access locality. For instance, GPS (General Positioning System) of navigator program for automobiles or drones, that are currently in common use, uses data from 32 satellites and computes current position of a receiver. This computation of positioning is the major part of GPS which accounts more than 50% computation in the program. In this computation task, the satellite signals are received in real time and stored in buffer memories. At this task, since necessary data cannot be sequentially stored, the data is read and used at random. This data accessing patterns are generated randomly, thus, memory system performance is worse by low data locality. As a result, it is difficult to process data in real time due to low data localization. Improving the low memory access locality inherited on the algorithms of conventional communication applications requires a certain optimization technique to solve this problem. In this study, we try to do optimizations with data and memory to improve the locality problem. In experiment, we show that our case study can improve processing speed of core computation and improve our overall system performance by 14%.

Two-module robotic pipe inspection system with EMATs

  • Lee, Jin-Hyuk;Han, Sangchul;Ahn, Jaekyu;Kim, Dae-Hyun;Moon, Hyungpil
    • Smart Structures and Systems
    • /
    • v.13 no.6
    • /
    • pp.1041-1063
    • /
    • 2014
  • This work introduces a two-module robotic pipe inspection system with ultrasonic NDE device to evaluate the integrity of pipe structures. The proposed robotic platform has high mobility. The two module mobile robot platform overcomes pipe obstacle structures such as elbow, or T-branch joints by cooperative maneuvers. Also, it can climb up the straight pipeline at a fast speed due to the wheel driven mechanism. For inspection of pipe structure, SH-waves generated by EMAT are applied with additional signal processing methods. A wavelet transform is implemented to extract a meaningful and specific signal from the superposed SH-wave signals. Intensity ratio which is normalized the defect signals intensity by the maximum intensity of directly transmitted signals in the wavelet transforms spectrum is applied to evaluate defects quantitatively. It is experimentally verified that the robotic ultrasonic inspection system with EMAT is capable of non-destructive inspection and evaluation of defects in pipe structure successfully by applying signal processing method based on wavelet transform.