• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.027 seconds

An Efficient Application of eBSS DRM Method to eBook Contents based on ePub 3.0 for Smart Device

  • Jun, Eung Sup
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.12
    • /
    • pp.59-72
    • /
    • 2016
  • DRM(Digital Rights Management) is essential for the copy right protection of eBooks based on ePub 3.0 by IDPF. In this paper, we developed eBSS(eBook Service System) as ePub 3.0 builder and viewer system with DRM and proposed an efficient DRM method which improves the performance of contents generation, security and distribution system. The efficient application of DRM method to the eBook contents based on ePub 3.0 for smart phone is practically useful for eBook service system. It is very useful for the suggested eBSS with DRM method and strategy to apply easily and practically to the encryption and decryption of the eBook contents. Also, it is very efficient to generate the ePub 3.0 contents and to apply DRM method to it especially, by using practically this suggested ePub 3.0 builder system from the view point of the eBook content generation and its viewer such as eBook reader for user and eBook providers.

Advanced Unified Communication Service System (차세대 통합 커뮤니케이션 서비스 제공 시스템)

  • Shin, Young-Mee;Bae, Hyun-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.962-970
    • /
    • 2011
  • This paper describes an advanced unified communication system. The advanced unified communications mean a service that integrates basic communications such as call, SMS, email, and chatting with social networking service considered as a new communication channel, presenting a unified user interface. The advanced unified communication system is composed of advanced UC(Unified Communications) applications, open UC service platform, and UC back-end servers. The advanced UC applications consist of web-based application and smart phone application. The open UC service platform provides a variety of service components that enable the third party applications to access basic communications and social network services within an enterprise. The UC back-end servers provide server functionalities for call, SMS, email, and chatting.

A Guide App Service for Safety Navigation using Public Data (공공데이터를 활용한 안전 길 안내 앱 서비스)

  • Lee, Jae-seon;Kang, Kyeong-Don;Lee, Su-Bong;Lim, Hwan-Seob;Jung, Deok-Gil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.367-369
    • /
    • 2017
  • Recently, many crimes are occurred frequently on the public roads. The purpose of this application is to inform people who are in need of safety about places where they can be protected from the dangerous situations and help them to be prepared for the risks. It is a key feature of this application to show the locations of CCTV, police station, and guard houses, etc. when the user is in the potential danger.

  • PDF

Bedtime Routine Management for Babies at 4-6 Months Based IoT Service (4-6개월 아기의 수면의식 관리를 위한 IoT기반 서비스)

  • Kim, Rokbeum;Park, Hyunjeong;Kim, Hyerin;Jeong, Solbee;Park, Su e;Park, Jung Kyu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.205-207
    • /
    • 2017
  • This paper introduces the IoT-based service 'RapportRapport' using arduino and mobile application that focuses on consistency and repetition to manage bedtime routine - the core part of sleep education. It is necessary for baby's better sleep outcomes, including deep sleep and long sleep duration. 'RapportRapport' provides Arduino dolls with sensors attached to provoke sleep association to baby, and to help user's bedtime routine efficiently at the same time. Arduino and mobile application exchange data by communicating via bluetooth.

  • PDF

Iris Ciphertext Authentication System Based on Fully Homomorphic Encryption

  • Song, Xinxia;Chen, Zhigang;Sun, Dechao
    • Journal of Information Processing Systems
    • /
    • v.16 no.3
    • /
    • pp.599-611
    • /
    • 2020
  • With the application and promotion of biometric technology, biometrics has become more and more important to identity authentication. In order to ensure the privacy of the user, the biometrics cannot be stored or manipulated in plaintext. Aiming at this problem, this paper analyzes and summarizes the scheme and performance of the existing biometric authentication system, and proposes an iris-based ciphertext authentication system based on fully homomorphic encryption using the FV scheme. The implementation of the system is partly powered by Microsoft's SEAL (Simple Encrypted Arithmetic Library). The entire system can complete iris authentication without decrypting the iris feature template, and the database stores the homomorphic ciphertext of the iris feature template. Thus, there is no need to worry about the leakage of the iris feature template. At the same time, the system does not require a trusted center for authentication, and the authentication is completed on the server side directly using the one-time MAC authentication method. Tests have shown that when the system adopts an iris algorithm with a low depth of calculation circuit such as the Hamming distance comparison algorithm, it has good performance, which basically meets the requirements of real application scenarios.

A Design for Unified Web Authentication at Network Service Foundation (네트워크 서비스 기반의 단일 웹 인증설계)

  • Ban, Kyung-Sig;Lee, Jae-Wan;Kim, Hyoung-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2171-2178
    • /
    • 2008
  • Recently, Network companies have introduced security solutions to protect the network from intrusions, attacks and viruses but the network has still weakness and vulnerability. It is time to bring more stable and reliable authentication system that would meet the Internet user's need. In this study, Current broadband networks don't have hierarchic and stable authentication solutions. And so, an integrated and hierarchic system is needed to provide a various kinds of application services. I'd like to present a new authentication system which is based on unified web authentication design. It will unit various authentication systems that have been deployed in various network environment and reinforce network security to provice a various kinds of application services in a stable and safe environment. that is a simple and more secure method for fighting a rise in card-not-present fraud.

Smart elevator operation management mobile application design using clustering techniques (클러스터링 기법을 이용한 스마트 엘리베이터 운영관리 모바일 어플리케이션 설계)

  • Park, Hung-Bog;Son, Gwan-yeong;Choi, Geum-kang;Hwang, You-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.661-662
    • /
    • 2016
  • It's being a trend that contemporary buildings are getting higher. And in line with this, we suggest the smart elevator operation management mobile application which is designed using clustering techniques to improve user's elevator access control and convenience. This clustering technique using the elevator's calling data make it possible to find its best position, and know the state of it using a smart phone as well. With this, not only the users' waiting time can be decreased, but also their convenience can be improved with the remote control system that got efficient a lot.

  • PDF

Light-weight Defense Mechanisms for application layer DDoS Attacks in the Web Services (웹서비스 대상 경량화 된 응용계층 DDoS 공격 대응 메커니즘)

  • Lee, Tai-Jin;Im, Chae-Su;Im, Chae-Tae;Jung, Hyun-Chul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.99-110
    • /
    • 2010
  • Recently, network based DDoS attacks have been changed into application layer DDoS attacks which are targeted at the web services. Specially, an attacker makes zombie PCs generate small traffic and its traffic pattern has been similar to the normal user's pattern. So, existing HTTP PPS based Threshold cannot defend the DDoS attacks effectively. In this paper, we displayed all the GET Flooding attack types and propose three DDoS attack defense mechanisms which are simple and very powerful. Proposed mechanisms can defend all the existing GET Flooding DDoS attacks and be deployed in the real environment immediately with little resource consumption.

Securing Anonymous Authenticated Announcement Protocol for Group Signature in Internet of Vehicles

  • Amir, Nur Afiqah Suzelan;Malip, Amizah;Othman, Wan Ainun Mior
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4573-4594
    • /
    • 2020
  • Announcement protocol in Internet of Vehicles (IoV) is an intelligent application to enhance public safety, alleviate traffic jams and improve transportation quality. It requires communication between vehicles, roadside units and pedestrian to disseminate safety-related messages. However, as vehicles connected to internet, it makes them accessible globally to a potential adversary. Safety-related application requires a message to be reliable, however it may intrude the privacy of a vehicle. Contrarily, if some misbehaviour emerges, the malicious vehicles must be able to traceable and revoke from the network. This is a contradiction between privacy and accountability since the privacy of a user should be preserved. For a secure communication among intelligent entities, we propose a novel announcement protocol in IoV using group signature. To the best of our knowledge, our work is the first comprehensive construction of an announcement protocol in IoV that deploys group signature. We show that our protocol efficiently solves these conflicting security requirements of message reliability, privacy and accountability using 5G communication channel. The performance analysis and simulation results signify our work achieves performance efficiency in IoV communication.

On the Application of Gamification Elements in Libraries

  • Seong-Kwan Lim
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.2
    • /
    • pp.1-11
    • /
    • 2023
  • Libraries are still conservative in their approach or practice of providing various services for the unspecified majority of visitors attending these institutions. It is very apparent that libraries are not actively trying to increase the interest and participation of users by applying the various angles or elements associated with gamification. By its very nature, gamification is the application of game-playing elements such as point scoring, peer competition, team work, score tables, and such used to motivate participants and make them more engaged with the subject matter. In areas such as education, marketing, and exercise, the implementation of gamification techniques is actively taking place in order to maximum participation by taking advantage of uncertainties or the competitive nature that many people have with the setting of goals. In this study, four libraries that have applied gamification are analyzed to understand how and to what degree gamification has been applied. Broken down into four different elements, this includes: Point, Reward, Leaderboards & Competition, Self-expression & Achievement. By focusing on the results of this analysis, gamification measures that can be applied to other libraries are specifically proposed. The overall results of this study will provide useful guidance and potential plans for libraries seeking to increase the number of users by using gamification to increase user participation and/or satisfaction with additional library services.