• Title/Summary/Keyword: personal computer communication

Search Result 480, Processing Time 0.032 seconds

Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment (NFC 모바일 환경에서 결제정보보호를 위한 NTRU 기반 인증 기법)

  • Park, Sung Wook;Lee, Im Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.3
    • /
    • pp.133-142
    • /
    • 2013
  • Recently, smart devices for various services have been developed using converged telecommunications, and the markets for near field communication (NFC) mobile services is expected to grow rapidly. In particular, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of the Google wallet service. In this paper, we propose an mutual authentication scheme based on NTRU for secure channel in OTA and an zero-knowledge proof scheme NTRU based on for protecting user information in NFC mobile payment systems without directly using private financial information of the user.

Expansion Joint Motion Analysis using Hall Effect Sensor and 9-Axis Sensor (Hall Effect Sensor와 9-Axis Sensor를 이용한 Expansion Joint 모션 분석)

  • Kwag, Tae-Hong;Kim, Sang-Hyun;Kim, Won-Jung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.2
    • /
    • pp.347-354
    • /
    • 2021
  • In the equipment industry such as chemical plants, high temperature, high pressure, and toxic fluids move between various facilities through piping. The movement and damage of pipes due to changes in the surrounding environment such as temperature changes, vibrations, earthquakes, and ground subsidence often lead to major accidents involving personal injury. In order to prevent such an accident, various types of expansion joints are used to absorb and supplement various shocks applied to the pipe to prevent accidents in advance. Therefore, it is very important to measure the deformation of the used expansion joint and predict its lifespan to prevent a major accident. In this paper, the deformation of the expansion joint was understood as a kind of motion, and the change was measured using a Hall Effect Sensor and a 9-Axis Sensor. In addition, we studied a system that can predict the deformation of expansion joints by collecting and analyzing the measured data using a general-purpose microcomputer (Arduino Board) and C language.

A Study on the Development of ICT Curriculum for Private Security Workers (민간경비 종사자의 ICT직무교육과정 개발에 관한 연구)

  • Sim, Hyun;Kwon, Gyeong-Ae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.397-404
    • /
    • 2019
  • This study developed the ICT curriculum focusing on apartment security guards and analyzed the actual application results. We developed the educational contents and it designed ICT job courseware for elder education by considering and that designed in consideration of the computer attitudes and physical and cognitive characteristics of the elderly. The educational program was applied to the experimental group and the satisfaction and the educational effect were analyzed through the pre and post test results. As a result of the analysis, the satisfaction level of the education program was higher than the average of 4.00 points. The elderly informal education program was examined by using the qualitative assessment test tool before and after the application of the education program. Internet self-efficacy of experiment group, improvement of internet utilization ability, usage of internet use, personal information willingness, life correction, elimination of conflict among generations, self-confidence, and internet stress increased statistically significantly. These results suggest that the "Private Expense ICT Job Training" program developed in this study can be effective for elderly informatization and can be applied to other elderly education programs and contribute to promotion.

Cloud Computing Virtualization: It's Security Issues and Vulnerability (클라우드 컴퓨팅 가상화 기술: 보안이슈 및 취약점)

  • Kang, Dea-Hoon;Kim, Sang-Gu;Kim, HyunHo;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.234-237
    • /
    • 2014
  • The increasing of Cloud Computing technology among several companies has been a key strategy for IT services to provide desirable IT solutions to consumers of cloud services. More attention is concentrated to these core technologies that enable cloud services and more particularly to the virtualization aspect. The accessibility to a larger number of users is possible because of the usage of the data-intensive, data management and data integrity. Unfortunately, those useful services are vulnerable to kind of attacks by hackers, thus the security of personal information is in critical situation. To solve this to leakage vulnerability, and with the proliferation of cloud services, the cloud service providers adopt a security system with firewall, antivirus software and a large number of virtualized servers and Host. In this paper, a variety of virtualization technologies, threats and vulnerabilities are described with a complement of different security solutions as countermeasures.

  • PDF

Systems Engineering Approach to develop the FPGA based Cyber Security Equipment for Nuclear Power Plant

  • Kim, Jun Sung;Jung, Jae Cheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.14 no.2
    • /
    • pp.73-82
    • /
    • 2018
  • In this work, a hardware based cryptographic module for the cyber security of nuclear power plant is developed using a system engineering approach. Nuclear power plants are isolated from the Internet, but as shown in the case of Iran, Man-in-the-middle attacks (MITM) could be a threat to the safety of the nuclear facilities. This FPGA-based module does not have an operating system and it provides protection as a firewall and mitigates the cyber threats. The encryption equipment consists of an encryption module, a decryption module, and interfaces for communication between modules and systems. The Advanced Encryption Standard (AES)-128, which is formally approved as top level by U.S. National Security Agency for cryptographic algorithms, is adopted. The development of the cyber security module is implemented in two main phases: reverse engineering and re-engineering. In the reverse engineering phase, the cyber security plan and system requirements are analyzed, and the AES algorithm is decomposed into functional units. In the re-engineering phase, we model the logical architecture using Vitech CORE9 software and simulate it with the Enhanced Functional Flow Block Diagram (EFFBD), which confirms the performance improvements of the hardware-based cryptographic module as compared to software based cryptography. Following this, the Hardware description language (HDL) code is developed and tested to verify the integrity of the code. Then, the developed code is implemented on the FPGA and connected to the personal computer through Recommended Standard (RS)-232 communication to perform validation of the developed component. For the future work, the developed FPGA based encryption equipment will be verified and validated in its expected operating environment by connecting it to the Advanced power reactor (APR)-1400 simulator.

Improvement of Navigation System for Visually Impaired using Smart Watch Vibration and Safety Route First Algorithm (스마트워치의 진동과 안전 경로 우선 알고리즘을 이용한 시각 장애인 길 안내 시스템의 개선)

  • Kitae, Hwang;Seo, Young-Shin;Seul-Ah, Lim;Han-Byeol, Lee;In-Hwan, Jung;Jae-Moon, Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.1
    • /
    • pp.117-122
    • /
    • 2023
  • This paper introduces the improved and expanded contents of the previous research that implemented a system that guides the visually impaired using the vibration of a smart watch. In the previous study, we proposed an algorithm that recommends the most safe route based on calculating negative and positive values for the topography of the route and the features installed on the route. In addition, by designing several vibration patterns, a system that guides the user through vibration was proposed and implemented. In this paper, the user's personal preferences are reflected in the algorithm that recommends the safe route first. In addition, an automatic feedback function was added to the algorithm so that the user's satisfaction evaluation on the recommended route was immediately reflected. A history simulation function was added so that the past route could be reviewed, and the compass of a smart watch was used to help visually impaired people find directions at junctions.

Non-Fire Alarm Management and Customized Automatic Guidance System (비화재보 관리 및 맞춤형 자동안내 시스템)

  • Hyo-Seung Lee;Ju-Sang Lee;Woo-Jun Choi
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.2
    • /
    • pp.355-360
    • /
    • 2023
  • Fire is a disaster that causes irreversible damage to many people due to personal injury and property damage. Various fire detection equipments are installed around us to detect and cope with it quickly. However, due to various problems such as artificial, environmental, and aging, fire detection equipment is activated even though it is not a actual fire, and there are many problems such as delaying the support to the necessary fire scene. In this paper, we analyze the non-fire alarm of the fire detection equipment and propose a system that enables the field staff to check the scene situation through the video as a way to prevent the mobilization due to the misinformation by checking the fire. The purpose of the present invention is to stably cope with a disaster by suggesting a customized automatic guidance system which induces a rapid evacuation by sending an evacuation guidance notification to a range of a fire occurrence neighboring area, and supports a rapid and accurate processing by a rapid dispatch of a firefighter, rather than a wide range of guidance such as an existing emergency disaster guidance letter when it is determined to be an actual fire through the confirmation procedure.

A Review of Assistive Listening Device and Digital Wireless Technology for Hearing Instruments

  • Kim, Jin Sook;Kim, Chun Hyeok
    • Korean Journal of Audiology
    • /
    • v.18 no.3
    • /
    • pp.105-111
    • /
    • 2014
  • Assistive listening devices (ALDs) refer to various types of amplification equipment designed to improve the communication of individuals with hard of hearing to enhance the accessibility to speech signal when individual hearing instruments are not sufficient. There are many types of ALDs to overcome a triangle of speech to noise ratio (SNR) problems, noise, distance, and reverberation. ALDs vary in their internal electronic mechanisms ranging from simple hard-wire microphone-amplifier units to more sophisticated broadcasting systems. They usually use microphones to capture an audio source and broadcast it wirelessly over a frequency modulation (FM), infra-red, induction loop, or other transmission techniques. The seven types of ALDs are introduced including hardwire devices, FM sound system, infra-red sound system, induction loop system, telephone listening devices, television, and alert/alarm system. Further development of digital wireless technology in hearing instruments will make possible direct communication with ALDs without any accessories in the near future. There are two technology solutions for digital wireless hearing instruments improving SNR and convenience. One is near-field magnetic induction combined with Bluetooth radio frequency (RF) transmission or proprietary RF transmission and the other is proprietary RF transmission alone. Recently launched digital wireless hearing aid applying this new technology can communicate from the hearing instrument to personal computer, phones, Wi-Fi, alert systems, and ALDs via iPhone, iPad, and iPod. However, it comes with its own iOS application offering a range of features but there is no option for Android users as of this moment.

Development of Location Sharing App with Encryption (암호화를 적용한 위치 공유 앱 개발)

  • Do Eun Kim;Jae-Moon Lee;Kitae Hwang;Inhwan Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.27-32
    • /
    • 2023
  • Location sharing through apps is increasing, such as finding a friend's location or sharing delivery status on the Internet. However, location information is important personal information, and in some cases can be misused for crimes, and so encryption of location information is essential when developing such apps. This paper develops an app that encrypts and shares location information between friends for purposes such as finding friends and deciding meeting locations. To improve encryption performance, the symmetric key was encrypted and transmitted using an asymmetric key, and for location sharing, only the symmetric key was used to encrypt it. The proposed app was developed on iOS, and performance measurements showed that encryption of location information was at least 5,000 times faster when using a symmetric key than when using an asymmetric key.

A Study on Space Design and Space Uses of Community Based Small Public Libraries - Focused on the Cases of Ann Arbor District Library in the United States - (소규모 지역 공공도서관의 공간 구성과 이용 특성 연구 - 미국 앤아버 공공도서관 브랜치의 사례조사를 중심으로 -)

  • Moon, Eun-Mi
    • Korean Institute of Interior Design Journal
    • /
    • v.19 no.5
    • /
    • pp.217-225
    • /
    • 2010
  • Today's public libraries in communities are on the processes of changes to integrate information and communication technology into traditional library system in order to support current users' demands for the new digital era. The purpose of this study is to examine the changing characters on space design and space uses of community based public libraries by conducting case studies of three branch libraries which were built after 2004 in Ann Arbor, Michigan in the United States. As the conclusion of this research, the findings of the case studies are utilized as basic data for planning and design guidelines for public libraries as community resources. The study summarizes the characteristics of space design and space uses in public libraries as follow; first, the floor plans of small-scale public libraries are open visually as well as spatially. The space organization of the libraries is arranged by potential noise levels, as placing noisy spaces near the entrance halls and quiet spaces at the back. Main book shelves are located in the middle of the library buildings, while seats are arranged along the window sides. By placing various kinds of furniture in open reading areas, library users can select different types of seats and tables for their comforts. Second. the survey of observation also finds that a large number of users often use library computers and personal computers to connect the internet at the libraries. These personal computer users who are new user group in community based libraries preferred to sit in casual study areas and individual tables with one or two seats only. Third, the libraries, in addition, develop and provide various programs and events for people in communities. Especially, the programs for children, the elderly and new comers from the abroad are well prepared, thus provide opportunities for them to visit the libraries in regular bases. The survey finds that family entertainment and leisure activities are the important parts of the program as well as renting music CD and movie DVD are also important reasons for people to come. Thus, the libraries prepare high quality children's space and CD shelves near the entrance hall.