• 제목/요약/키워드: smartphone security technology

검색결과 117건 처리시간 0.024초

스마트폰 보안 기술 분석 (The Study on the security of Smartphone)

  • 이영숙;김지연
    • 디지털산업정보학회논문지
    • /
    • 제6권2호
    • /
    • pp.91-105
    • /
    • 2010
  • With the release Apple's iPhone, smartphone is enjoying a tremendous popularity. Security experts pointed the smartphone security risks and KCC(Korea Communications Commission) published safety rules for smartphone users. In this paper we surveyed market and product trends of smartphone and analyzed the security technology of smartphoen OS including Symbian, iPhone OS, Windows Mobile and Android.

Smartphone Banking: The Factors Influencing the Intention to Use

  • Kim, JinBaek;Kang, Sungmin;Cha, Hoon S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권5호
    • /
    • pp.1213-1235
    • /
    • 2013
  • In this paper, we investigated the factors affecting the intention to use smartphone banking with a research model based on the Technology Acceptance Model (TAM) extended to include security risk, trust, and self-efficacy. With analysis after controlling factors such as age, gender, and previous experience of smartphone banking that may have effects, we conclude that perceived usefulness, perceived ease of use, security risk, and trust have direct effect on the intention to use smartphone banking, and self-efficacy has indirect effect on the intention to use through mediation of perceived ease of use. We performed a study to check the validity of TAM in the context of smartphone banking, and confirmed that perceived ease of use has both direct and indirect effect on the intention to use.

Smartphone Color-Code based Gate Security Control

  • Han, Sukyoung;Lee, Minwoo;Mariappan, Vinayagam;Lee, Junghoon;Lee, Seungyoun;Lee, Juyoung;Kim, Jintae;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • 제5권3호
    • /
    • pp.66-71
    • /
    • 2016
  • Smart building gate security control system using smartphone integrated with near field communication (NFC) has become part of daily life usage these days. The technology change in replacing RF NFC device using visible light communication technology based approach growing faster in recent days. This paper propose a design and development of gate security control system using color code based user authentication ID generation as part of an intelligent access control system to control automatic door open and close. In this approach gate security access control use the recent visible light communication technology trends to transfer the user specific authentication code to door access control system using color code on smartphone screen. Using a camera in the door access control system (ACS), color codes on smartphone screens are detected and matched to the database of authenticated user to open the door automatically in gate security system. We measure the visual light communication technology efficiency as a part of the research and the experiments have revealed that more than 95% users authenticated correctly at the suggested experiment environment on gate security control system.

모바일 환경에서 OTP기술과 얼굴인식 기술을 이용한 사용자 인증 개선에 관한 연구 (A Study on The Improvement of User Authentication using the Facial Recognition and OTP Technique in the Mobile Environment)

  • 허승표;이대성;김귀남
    • 융합보안논문지
    • /
    • 제11권3호
    • /
    • pp.75-84
    • /
    • 2011
  • 모바일 기술의 급격한 발전으로 스마트폰 사용이 확산되고 있다. 미래의 모바일 뱅킹 시장 활성화를 위해서 무엇보다 중요하고 우선시되는 것은 안전한 금융 거래이다. 그러나, 스마트폰 확산에 비례하여 검증되지 않은 많은 앱들이 개발되고 있는 상황에서 보안 위협은 높아질 수 밖에 없다. 현재 스마트폰 금융 거래 방식은 기존 공인인증서나 OTP기술을 그대로 모바일 환경에 적용하고 있으나, 많은 보안 문제점이 꾸준히 지적되고 있다. 본 논문은 다단계 인증 방법을 통해 보안성을 강화하고 물리적 부인방지 기능을 제공함으로써 기존의 인증 방식의 보안성을 개선하고자 한다.

스마트폰 이용자의 악성코드용 모바일 백신 이용 의도에 영향을 미치는 요인 (The Factors Affecting Smartphone User's Intention to use Mobile Anti-Malware SW)

  • 장재영;김지동;김범수
    • 한국IT서비스학회지
    • /
    • 제13권2호
    • /
    • pp.113-131
    • /
    • 2014
  • Smartphone security threat has become an important issue in Information Science field following the wide distribution of smartphones. However, there are few studies related to such. Therefore, this study examined the factors affecting the intention of smartphone users to use the mobile vaccine against malware with the Protection Motivation Theory. To secure the reliability of the study, a surveying agency was commissioned. A total of 263 respondents, excluding 37 respondents who are users of iOS, which does not have mobile vaccine in the smart phone, or who gave invalid responses, were surveyed. The results showed that perception of the installed mobile vaccine significantly affected the Response Efficacy and Self-efficacy, and that the Perceived Severity, Perceived Vulnerability, Response Efficacy, and Self-efficacy significantly influenced the intention to use the mobile vaccine. On the other hand, Installation Perception of mobile vaccine itself did not affect the Perceived Severity and Perceived Vulnerability. This study is significant since it presented the new evaluation model of threat evaluation and response evaluation in the Protection Motivation Theory in accepting the security technology and raised the need for the promotion and exposure of mobile vaccine, since perception of mobile vaccine installation affects the response evaluation. It also found that the promotion must consider the seriousness of smartphone security, outstanding attribute of mobile vaccine, and user-friendliness of mobile vaccine above all.

Enhancing Document Security with Computer Generated Hologram Encryption: Comprehensive Solution for Mobile Verification and Offline Decryption

  • Leehwan Hwang;Seunghyun Lee;Jongsung Choi
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제16권1호
    • /
    • pp.169-175
    • /
    • 2024
  • In this paper, we introduce a novel approach to enhance document security by integrating Computer Generated Hologram(CGH) encryption technology with a system for document encryption, printing, and subsequent verification using a smartphone application. The proposed system enables the encryption of documents using CGH technology and their printing on the edges of the document, simplifying document verification and validation through a smartphone application. Furthermore, the system leverages high-resolution smartphone cameras to perform online verification of the original document and supports offline document decryption, ensuring tamper detection even in environments without internet connectivity. This research contributes to the development of a comprehensive and versatile solution for document security and integrity, with applications in various domains.

군사자료 정보유출의 스마트폰 포렌식 연구 (Smartphone Forensic of Military Data Information Leakage)

  • 김용윤;박대우
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2022년도 춘계학술대회
    • /
    • pp.238-241
    • /
    • 2022
  • 북한이 ICBM을 발사하여 9.19군사협의에 대한 모라트리움을 선언하였다. 국군은 국방과 안보를 위해 군사안보를 지켜야 한다. 북한으로부터 해킹공격을 받은 국방부는 군사안보에 더욱 보안을 지켜야한다. 최근 군사자료의 유출이 스마트폰을 통해 발생하고 있다. 장교와 부사관은 업무중에도 스마트폰 사용이 가능하다. 따라서 스마트폰에서 군사자료의 정보유출을 확인하고 책임소재를 분명히 하려면 스마트폰 포렌식이 필요하다. 본 연구에서는 S사의 갤럭시S20 기종에서 군사자료 유출애 대한 스마트폰 포렌식을 연구한다. 스마트폰 포렌식 증거자료의 확보와 Metadata 확보 및 증거자료의 채택을 위한 무결성 검증을 연구한다. 본 연구는 군사안보와 포렌식 기술발전에 기여할 것이다.

  • PDF

A Study on Smart Tourism Based on Face Recognition Using Smartphone

  • Ryu, Ki-Hwan;Lee, Myoung-Su
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권4호
    • /
    • pp.39-47
    • /
    • 2016
  • This study is a smart tourism research based on face recognition applied system that manages individual information of foreign tourists to smartphone. It is a way to authenticate by using face recognition, which is biometric information, as a technology applied to identification inquiry, immigration control, etc. and it is designed so that tourism companies can provide customized service to customers by applying algorism to smartphone. The smart tourism system based on face recognition is a system that prepares the reception service by sending the information to smartphone of tourist service company guide in real time after taking faces of foreign tourists who enter Korea for the first time with glasses attached to the camera. The smart tourism based on face recognition is personal information recognition technology, speech recognition technology, sensing technology, artificial intelligence personal information recognition technology, etc. Especially, artificial intelligence personal information recognition technology is a system that enables the tourism service company to implement the self-promotion function to commemorate the visit of foreign tourists and that enables tourists to participate in events and experience them directly. Since the application of smart tourism based on face recognition can utilize unique facial data and image features, it can be beneficially utilized for service companies that require accurate user authentication and service companies that prioritize security. However, in terms of sharing information by government organizations and private companies, preemptive measures such as the introduction of security systems should be taken.

보안 마이크로 웹페이지 기반 전장 스마트 지도 (Security Micro-web Page Based Battlefiled Smart Map)

  • 허준;하선주;차신;은성배
    • 대한임베디드공학회논문지
    • /
    • 제12권4호
    • /
    • pp.259-266
    • /
    • 2017
  • GPS was developed for military purposes. As a result, it is used as a military important means such as guided weapons and strategy / tactics. However, GPS depends on the communication infrastructure and is affected by interference signals. In this paper, we propose a secure micro - web page - based smart map that can enhance security without relying on communication infrastructure on the battlefield. The proposed system consists of general smartphone, security QR, central server and smart map. Only use the network when downloading the security key and SmartMap before the task starts. During operation, the smartphone transmits and receives data using a secure QR. The security QR inserts the security code to prevent forgery and falsification and confirms whether the data is authentic by checking whether the smart phone is forged or not. As a result of implementation, we solved communication security problem of existing technology by using location based service without relying on communication infrastructure.

시나리오 기반의 스마트폰 취약점에 대한 보안방안 연구 (Study on security method for scenario-based smartphone vulnerability)

  • 이재호;손민우;이상준
    • 예술인문사회 융합 멀티미디어 논문지
    • /
    • 제8권6호
    • /
    • pp.835-844
    • /
    • 2018
  • 최근 전 세계적으로 스마트폰(smartphone) 이용자 수가 늘어나면서 스마트폰으로 전자결제, 인터넷 사용, 금융결제 등 다양한 서비스를 사용하고 있으며, 이 외에도 스마트폰을 이용한 가전기기 제어, 자동차 제어 등을 위한 연구가 진행되고 있다. 이와 같이 스마트폰을 통해 이용자들이 좀 더 편리한 생활을 누릴 수 있게 되었으나 스마트폰 해킹을 통해 스마트폰 내 문자와 통화내용을 도청, 스파이 앱을 통한 위치추적, 스마트폰을 이용한 DDoS 공격, 악성 앱을 통해 소액결제 이용 시 특정 전화번호로 메시지가 수신되는 경우 해당 문자메시지를 원격지 서버로 전송하여 개인정보 등 유출 사례 등과 같은 위험이 역시 증가하고 있다. 따라서 본 논문에서는 우리가 실생활에서 사용하는 스마트폰을 통해 스마트폰 내·외부 환경적·물리적·콘텐츠(앱) 등으로 인해 발생되는 스마트폰의 위험요소를 정의하고 각 위험요소에 대한 보안방안 및 대응기법을 정의하여 스마트폰의 각 위험별 가장 효과적인 대응기법 및 CC평가와 같은 스마트폰 보안솔루션 평가 시 취약점 점검방법을 제시하고자 한다.