• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.033 seconds

Design of smart mobility status notification system (스마트 모빌리티 상태 알림 시스템 설계)

  • Park, Se-il;Jang, Jong-wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2128-2132
    • /
    • 2017
  • Smart mobility is rapidly emerging as a next-generation eco-friendly transportation system, and the market is booming every year. However, due to the characteristics of the devices that use electricity as the power source, the motor and the battery are different from the performance and actual performance indicated by the manufacturer depending on the user's weight and driving environment. Therefore, The frequency of the overload is increased and the failure and damage of the device are increasing. In this paper, we propose an application that provides personalized recommended driving guidance and overloaded driving situation notification at the actual driving separately from the recommended driving provided by the manufacturer after measuring the driving environment of the user, so as to prevent malfunction and damage of the smart mobility device, To ensure safety.

A Study on Differentiated Personal Proofing Service Based on Analysis of Personal Identification Requirements in Online Services (온라인 서비스의 본인확인 요구사항 분석 기반의 차등화된 본인확인서비스 적용 방안)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.201-208
    • /
    • 2020
  • Recently, the application of personal proofing service based on social security number(SSN) replacement means for verifying identity in non-face-to-face transactions is increasing. In this paper, we propose a method of applying differentiated personal proofing service on whether identity verification is necessary in the online service provided by ISP and if it is appropriate to apply a certain level of assurance. By analyzing the requirements related to personal proofing required by current ISPs, we analyze the risks for each of the requirements and propose a method of applying differentiated personal proofing service according to the level of identity assurance guarantee to minimize the risks. In applying the proposed method to online service provision, it is possible to reduce user's unnecessary authentication cost by minimizing the application of personal proofing service based on alternative means, and to help protect user personal information by minimizing excessively collected personal information.

Implementation of Bi-directional Broadcasting System Using Interaction Channel (대화 채널을 이용한 양방향 방송 시스템의 구현)

  • Jeong Jong-Myeon;Choi Jin Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.1002-1011
    • /
    • 2005
  • In this paper. we design and implement a bi-directional broadcasting system, so called return channel server, to allow users to participate in a broadcasting program by using a hi-directional interaction channel. To provide user participation in a program and reflect the user's opinions or responses in real time, the return channel server can be viewed as consisting of four major functional modules: a control module, network interface module, DBMS module, and real-time content authoring module. To construct a return channel server that has a service independent architecture, we designed a return channel server to include the hierarchical structure. The presented return channel server consists of two parts: an RCSAE(return channel server application environment) and RCSA(return channel server application). An RCSA is composed of an execution code and a parameter for executing the execution code. RCSA defines the procedures for providing a specific broadcasting program using the return channel server. On the other hand, an RCSAE provides the environment for the execution of RCSAS. By adopting RCSAE and RCSA, we construct the return channel server that has a service-independent architecture which are shown by the test.

Attacks and Defenses for Vulnerability of Cross Site Scripting (크로스 사이트 스크립팅(XSS) 취약점에 대한 공격과 방어)

  • Choi, Eun-Jung;Jung, Whi-Chan;Kim, Seung-Yeop
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.177-183
    • /
    • 2015
  • Cross Site Scripting enables hackers to steal other user's information (such as cookie, session etc.) or to do abnormal functions automatically using vulnerability of web application. This attack patterns of Cross Site Scripting(XSS) can be divided into two types. One is Reflect XSS which can be executed in one request for HTTP and its reply, and the other is Stored XSS which attacks those many victim users whoever access to the page which accepted the payload transmitted. To correspond to these XSS attacks, some measures have been suggested. They are data validation for user input, output validation during HTML encoding procedures, and removal of possible risk injection point to prevent from trying to insert malicious code into web application. In this paper, the methods and procedures for these two types are explained and a penetration testing is done. With these suggestions, the attack by XSS could be understood and prepared by its countermeasures.

Implementation of Attitude measurement monitoring system and application according to pressure distribution (압력 분포에 따른 자세 측정 모니터링 시스템 및 어플리케이션 구현)

  • Jo, Yong-Woon;Ha, Eun-Gyo;Noh, Yun-Hong;Jeong, Do-Un
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.629-630
    • /
    • 2017
  • Recently, the number of patients with habitual vertebrae is increasing due to inappropriate postures and habits while sitting on a chair for a long time, because modern people have a great deal of work and studying due to a lot of work and study. Therefore, it is necessary to prevent such a disease through real-time monitoring and to present a guide for the user to recognize the importance of correct posture. In this study, we implemented a posture discrimination system which can help users to calibrate posture by judging the user's sitting position and feedback by using a pressure sensor based weight distribution system. We analyzed the distribution pattern of body weight to determine one normal posture and six abnormal postures. If the abnormal posture is maintained constantly, the implementation of the application that induces the right posture by ringing the notification is described.

  • PDF

Application of a 3D Graphic Model for Bridge Maintenance (3D 그래픽 모델을 활용한 교량 시설물 유지관리 시스템)

  • Moon, Sung-Woo;Kim, Sang-Do;Park, Mi-Kyoung
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.2
    • /
    • pp.64-71
    • /
    • 2011
  • Construction projects are becoming larger in size and higher in complexity. Operation and maintenance, therefore, is an important part in providing the serviceability of the built facility from the perspective of life-cycle. This paper presents a 3D graphic model-integrated data extraction for bridge maintenance. The 3D graphic model environment assigns attributes to the member blocks in CAD, and link the attributes to the data stored in a database. Then, the user can click the member block to extract the data associated with the attributes. A prototype has been developed to test the applicability of the 3D graphic model environment using CAD and web. Application of the system in an actual bridge construction showed that the 3D graphic model environment can help the user find necessary data at a shorter time, thereby increasing the effectiveness of operation and maintenance in bridge structures.

Implementation Of Wireless Telephony Application Server (무선 텔레포니 에플리케이션 서버의 구현)

  • Choi, Chul-Oong;Jang, Ji-San;Lee, Jung-Eun;Kim, Min-Soo;Shin, Dong-Kyoo;Shin, Dong-Il
    • Annual Conference of KIPS
    • /
    • 2001.04a
    • /
    • pp.561-564
    • /
    • 2001
  • 본 논문은 무선 에플리케이션 프로토콜 Specification에서 제시하고 있는 WTA(Wireless Telephony Application) 를 기초로 네트워크에서 발생한 실시간 Event를 처리할 수 있는 모바일 클라이언트 및 WTA서버에 대한 설계와 구현에 대해서 기술한다. 또한 네트워크 이벤트 및 사용자가 발생시킨 이벤트를 디바이스에 독립적으로 처리할 수 있는 WTA 라이브러리와 필요한 컨텐츠를 실시간으로 브라우징하기 위한 Repository 에 대해 기술한다. 전체적인 WTA 환경 구조는 크게 2개의 물리적 구조인 Mobile Client와 WTA Server로 구현되어있다. Mobile Client의 내부 모듈은 표준 WAE 사용자 에이전트(Standard WAE User Agent)의 확장인 WTA 사용자 에이전트 모듈(WTA User-Agent Module), 필요한 resource를 서버로 요청하고 저장하는 채널 인스톨 모듈(Channel Install Module), network로부터 발생한 Event를 처리하는 이벤트 핸들러 모듈(Event Handler Module), mobile network 기능들(e.g. setting up calls)과 device specific feature(e.g. manipulating the phonebook)를 다루는 WTA 스크립트 라이브러리(WTA Script Library), Phonebook 엑세스 모듈(Phonebook Access Module), 실시간으로 즉각 이벤트에 반응하기 위한 Repository로 구성되어있고, WTA Server는 Client가 요청한 Content(services)를 전달 해 주는 컨텐트 전달 모듈(Content Deliver Module)과 서버 Phonebook 엑세스 모들(Server Phonebook Access Module)로 구성되어 있다.

  • PDF

One-time Session Key based HTTP DDoS Defense Mechanisms (일회성 세션 키 기반 HTTP DDoS 공격 방어기법)

  • Choi, Sang-Yong;Kang, Ik-Seon;Kim, Yong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.8
    • /
    • pp.95-104
    • /
    • 2013
  • DDoS attacks have became as a social threat since 2009 7.7 DDoS turmoil. Even though defence techniques have been developing to provide against those threats, they become much more sophisticate. In recent years, the attack form of DDoS is changing from high amount of traffic attack of network layers to highly sophisticate small amount of application layers. To make matters worse, attack agent for the attack has became very intelligent so that it is difficult to be blocked since it can't be distinguished from normal PCs. In the user authentication system(such as CAPTCHA) User intervention is required to distinguish normal PCs and intelligent attack agents and in particular, in a NAT environment, IP-based blocking method can be cut off the normal users traffic at the same time. This research examined defense techniques which are able to distinguish between agent and normal PC and effectively block ways the HTTP DDoS offense applying one-time session key based authentication method using Cookie which is used in HTTP protocol to protect web sever from sophisticate application layer of DDoS.

A Study on the Improvement and Application of KDC 6th ed. for Classifying the Children's Books (어린이도서 분류를 위한 KDC 6판 개선 및 적용 방안에 관한 연구)

  • Oh, Young-ok;Lee, Mi-hwa
    • Journal of Korean Library and Information Science Society
    • /
    • v.50 no.1
    • /
    • pp.105-124
    • /
    • 2019
  • This study was to suggest the improvement and the application of KDC 6 for classifying children's books by the literature review and survey. First, it was suggested to shorten the classification numbers by the divisions and subdivisions and to expand the classification numbers by sub-subdivisions according to the library-specific classification policy, using the subject statistics of the children's books held by 20 public libraries affiliated in Seoul Metropolitan Office of Education and representative C libraries. Second, the knowledge picture books and the fairy tales were suggested to be classified according to its subject, and the fairy tales in each country were suggested to be classified by adding sub-subdivisions and genre subdivisions. Third, it was suggested to shelve by collection and location codes that were distinguished by the ages and the reading level for user, to prepare a standard guideline for shelving, and to implement the regular user education about the classification system. This study could contribute to the development of the KDC abridged version for children's books in the future.

A Study on Privacy Preserving Methods in the Metaverse Environment Using Secure Multi-Party Computation (안전한 다자간 연산을 활용한 메타버스 환경에서의 프라이버시 보존 방안 연구)

  • Jiun Jang;Kwantae Cho;Sangrae Cho;Soo Hyung Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.725-734
    • /
    • 2024
  • The rapidly growing metaverse environment has received widespread attention across various fields such as health and medicine, culture and gaming, as well as politics. However, the excessive collection of personal data by the diverse sensors and devices used in the metaverse environment poses a substantial threat to user privacy. In this paper, we investigate existing cases of secure Multi-Party Computation(MPC) applications, examine the services anticipated to be necessary for the expansion of the metaverse environment, and analyze the privacy issues present in the metaverse environment as well as the limitations of current real-world services. Based on these findings, we propose application scenarios that utilize MPC to preserve user privacy in the metaverse environment. These proposed MPC application scenarios present a new perspective in metaverse security research. In the future, they are expected to be utilized in the development of secure metaverse services.