Fig. 1. USB2642 Block Diagram
Fig. 2. Whole block diagram
Fig. 3. SPI Block
Fig. 4. Advertising course
Fig. 5. BLE operation structure diagram
Fig. 6. SFMS module operation flowchart
Fig. 7. SFMS OS Operation Flowchart
Table. 1 Personal Information Infringement Report by Year
Table 2. SFMS Test result
References
- G. Heiser, K. Elphinstone, I. Kuz, G. Klein & S. M. Petters. (2007). Towards Trustworthy Computing Systems: Taking Microkernels to the Next Level. Operating Systems Review, 41(3), 3-11.
- H. Huh & J. Lee. (2009). A Study on Development of H8 MCU IDB(Integrated development board) for Embedded Education. J . of the Korea Institute of Electronic Communication Sciences, 4(1), 51-57.
- H. Lee & J. Oh. (2017). Design and Implementation of a Small Server Room Environment Monitoring System by Using the Arduino. J . of the Korea Institute of Electronic Communication Sciences, 12(2), 386-387.
- K. Kim, C. By on, C. Lim & S. Han. (2008). Design of Electrostatic Monitoring System. The J . of the korea Institute of Maritime Information & Communication Sciences, 12(11), 2069-2076.
- K. Kim, D. Wang & S. Han. (2017). Home Security System Based on IoT. J . of the Korea Institute of Electronic Communication Sciences, 12(1), 147-154 https://doi.org/10.13067/JKIECS.2017.12.1.147
- D. Ryu & T. Choi. (2016). Development of Open IoT platform based on Open Source Hardware & Cloud Service. J . of the Korea Institute of Electronic Communication Sciences, 11(5), 485-490. https://doi.org/10.13067/JKIECS.2016.11.5.485
- H. Xu & C. Kim. (2017). Design and Implementation of a Smart Home Cloud Control System Using Bridge based on IoT. J . of the Korea Institute of Electronic Communication Sciences, 12(5) 866-869
- K Yoo & D. Ko. (2012). Study on the Performance Test Technique of Open SW-based Cloud computing. J . Korean Institute of Information Technology, 10(7), 185-19
- Y. Oh & S. Lee. (2014). IoT and the open source development platform. J . of the Korean Institute of Information Scientists and Engineers, 32(6), 25-30.
- C. Ryu. (2014). Context Inference and Sensor Data Classification of Big Data Stream Environment. J . of The Korea Institute of Electronic Communication Sciences, 9(10), 1079-1085. https://doi.org/10.13067/JKIECS.2014.9.10.1079
- K. Nam. (2014). A Study on the Office Management Service Platform based on M2M/IoT. J . of the Korea Institute of Electronic Communication Sciences, 9(12), 1405-1413. https://doi.org/10.13067/JKIECS.2014.9.12.1405
- D. Lee, D. Bae, S. You, J. Chae, Y. Lee & H. Yang. (2011). An Analysis on the Security of Secure Keypads for Smartphone. Review of Korea Institute of Information Security and Cryptograph (KIISC), 21(7), 30-37.
- J. Saidov, B. Kim, J. Lee & G. Lee. (2017). Hardware Interlocking Security System with Secure Key Update Mechanisms In IoT Environments. J . of the Korea Institute of Electronic Communication Sciences, 12(4), 671-678. https://doi.org/10.13067/JKIECS.2017.12.4.671