DOI QR코드

DOI QR Code

Smartphone Camera Control System in connection with Personnel Access Rights

인원 출입 권한과 연계한 스마트폰 카메라 제어 시스템

  • Jeon, Byung-Jin (Department of Information Security, Tongmyong University) ;
  • Han, Kun-Hee (Division of Information & Communication Engineering, Baekseok University) ;
  • Shin, Seung-Soo (Department of Information Security, Tongmyong University)
  • 전병진 (동명대학교 정보보호학과) ;
  • 한군희 (백석대학교 정보통신학부) ;
  • 신승수 (동명대학교 정보보호학과)
  • Received : 2017.10.02
  • Accepted : 2017.11.20
  • Published : 2017.11.28

Abstract

The purpose of this paper is to investigate the effect of the smart phone camera on the company's employees or employees of partner companies, we want to block things in advance. In this paper, we propose a smart phone camera control system which is connected with the personnel access right which enables to share the photographed image of the authorized user and the data shot only within the enterprise. To this end, we have developed the installation status of smart phone control program (MCS: Mobile Camera Control System) of employees, employees and visitors of company, and experimented and analyzed whether the smart phone control program installed in the authorized area. In addition, when visitors visited the company, the effect of prevention of photograph shooting through smart phone camera and the cost of seal sticker attached to the smart phone camera lens part were reduced.

본 연구의 목적은 기업체의 임직원이나 협력사 직원들이 스마트폰 카메라를 이용해 기업의 제품 도면이나 기밀유지가 보장되어야 하는 제품 개발 시 진행되었던 업무 내용이 저장된 문서 등을 스마트폰 카메라로 촬영하여 외부로 유출하는 것을 사전에 차단하고자 한다. 본 연구에서는 허가된 사용자에 대한 사진 촬영과 기업체 내부에서만 촬영된 데이터를 공유할 수 있게 하는 인원 출입 권한과 연계한 스마트폰 카메라 제어시스템을 제안한다. 이를 위해 기업체에 상주하는 임직원, 협력사 직원들과 방문객들의 스마트폰 제어 프로그램(MCS : Mobile Camera Control System) 대한 설치현황을 개발하여 출입이 허가된 지역에서 설치된 스마트폰 제어 프로그램 작동여부를 실험 및 분석한다. 또한, 방문객들이 기업체 방문 시 스마트폰 카메라를 통한 사진 촬영의 방지효과와 스마트폰 카메라 렌즈부분에 부착하는 봉인 스티커 비용의 절감효과가 나타났다.

Keywords

References

  1. Garba, A. B., Armarego, J., Murray, D. and Kenworthy, W., "Review of the information security and privacy challenges in BYOD environments," Journal of Information privacy and security, pp. 38-54, 2015.
  2. S. T. Kang, I. J. Jo, "Individual users based Smart Phone Remote Management System Design and Implementation," The Korea Institute of Information and Communication Engineering, Journal of the Korea Institute of Information and Communication Engineering 16(12), pp.2675-2681, 2012.12. https://doi.org/10.6109/jkiice.2012.16.12.2675
  3. Onechul Na, Hangbae Chang, "Critical Intelligence Management Plan Studies for the Prevention of Corporation's Technology Leakage," Korean Society For Internet Information, Korean Internet Information Society Conference 17(2), pp.231-232, 2016.11
  4. S. B. Kim, B. M. Chang, "Design and Implementation of Privacy Impact Assessment Information System", Korean Institute of Information Technology, Journal of Korean Institute of Information Technology 13(6), pp.87-104, 2015.6.
  5. D. K. Lee, J. I. Lim, "Forecast System for Security Incidents", Journal of The Institute of Electronics and Information Engineers Vol.53, No.6, 2016.6.
  6. B. J. Jeon, D. B. Yoon, S. S. Shin, "Improved Integrated Monitoring System Design and Construction", Journal of Korea Fusion Research Institute 7(1), pp.25-33, 2017.2
  7. Y. S. Kim, N. P., "IData Loss Prevention System having a function of Responding Data-Leaking Incidents", THE INSTITUTE OF ELECTRONICS ENGINEERS OF KOREA, Conference on the Institute of Electronics Engineers of Korea, pp.1872-1874, 2012.6.
  8. S. G. Ryu, Y. H. Park, C. K. Kim, Y. H. Park, "Vulnerability Analysis and Countermeasure of Access Control System", Korean Institute of Communication Sciences, Korea Telecom Society Summer Summit 2016, pp.800-801, 2016.
  9. B. M. Kim, J. M. Jeong, S. L. Yong, Taenam Cho, "A Password Scheme based on Calculation Resistant to Smudge and Shoulder Surfing Attacks", Korea Computer Information Association, Journal of the Korean Society of Computer Information Vol.22 No.2, pp.75-76, 2014.
  10. J. W. Kim, Y. H. Lee, "Continuous-authentication Method based on the Risk Profile associated with Context-awareness to Lock Smart Devices", KOREA INFORMATION SCIENCE SOCIETY, Journal of KIISE 43(11) Vol.20, No.8, pp.1259-1269, 2016.11.
  11. J. P. Yun, J. H. Kim, K. S. Lee, "Certificate-based SSO Protocol Complying with Web Standard", Korea Institute of Information and Communication Engineering, Journal of the Korea Institute of Information and Communication Engineering Vol.20, No.8, pp.1466-1477, 2016.8. https://doi.org/10.6109/jkiice.2016.20.8.1466
  12. S. H. Seo, C. Y. Choi, G. Y. Lee, H. K. Choi, "QR Code Based Mobile Dual Transmission OTP System", Korean Institute of Communication Sciences, The Journal of the Korean Institute of Communication Sciences Vol.38B No.5, pp.377-384, 2013.5. https://doi.org/10.7840/kics.2013.38B.5.377
  13. S. K. Hong, H. J. Jeon, Y. H. Kwon and S. H. Lee, "Extracting Information of Client Using Java Agent for Information leakage prevention", Korean Institute of Intelligent Systems, Proceedings of the Korea Intelligent Systems Society, pp.211-212, 2015.10.
  14. J. Y. Sung, S. D. Lee, C. J. R and S. J. Han, "Mutual Authentication Protocol using One Time Password for Mobile RFID System, Journal of the Korea Institute of Information and Communication Engineering, Vol.18, No.7, pp.1634-1642, 2014. https://doi.org/10.6109/jkiice.2014.18.7.1634
  15. H. J. Hwang, K. Y. Kim, I. K. Ha, "A Digital Door Lock System Using Time- Synchronous One Time Password", Journal of the Korea Institute of Information and Communication Engineering, Vol.21, No.5, pp.1027-1034, 2017. https://doi.org/10.6109/jkiice.2017.21.5.1027