• Title/Summary/Keyword: 디바이스융합

Search Result 390, Processing Time 0.034 seconds

An Embedded System for Sensor Networks (센서 네트워크를 위한 임베디드 시스템)

  • Lee, Jong-Chan;Park, Sang-Joon
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.37-41
    • /
    • 2010
  • The object of this paper is to design a embedded system based on sensor networks. The proposed system can manage the heating by sensing and analyzing the temperature and humidity in apartment house and others. For implementing this system, we devide JAVA API into the platform-independent JAVA part and platform-dependent native part for the implementation of JAVA API to manage the linux based embedded system devices, and focus on the control of the embedded system devices using JAVA API.

A Study of Parameters in Smart Insole System (스마트 인솔의 파라미터에 대한 연구)

  • Young-Chan Choi;Min-Woo Tae;Su-Jong Shin;Sang-Il Choi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.759-762
    • /
    • 2023
  • 스마트 인솔은 멀티 센서가 장착된 디바이스로써, 발바닥의 정보를 추출하는 기기의 특성으로 인해 헬스케어 디바이스로 주목받고 있다. 최근에는 스마트 인솔 내 센서 사양의 증가로 인해 획득 가능한 데이터의 품질이 증가하였으나, 취득한 데이터를 모두 사용하는 것은 통신 대역폭 및 컴퓨팅 파워의 문제가 발생할 수 있다. 본 논문에서는 스마트 인솔 내 파라미터에 대한 분석과 연구를 진행하고, 최적의 파라미터를 제시한다.

모바일 기기의 신뢰연산을 위한 디버깅 기술 활용

  • Seungkyun Han;Jinsoo Jang
    • Review of KIISC
    • /
    • v.33 no.5
    • /
    • pp.25-38
    • /
    • 2023
  • 중요 데이터와 서비스를 격리하여 보호하기 위한 신뢰연산기술이 모바일 기기에서 널리 활용되고 있다. 신뢰연산기술은 보통 하드웨어 기반 접근제어를 통해 메모리, 레지스터, 캐시 등의 하드웨어 자원을 공격자로부터 격리하는 신뢰실행영역을 시스템 내에 생성할 수 있게 한다. 하지만 보호 대상 소프트웨어에 악용 가능한 취약점이 존재할 경우 그 보안성이 파훼될 수 있다. 따라서 신뢰실행영역 내에도 소프트웨어에 대한 공격 효율성을 최소화할 수 있는 보안 기술이 적용되어야 한다. 모바일 디바이스에 주로 적용된 ARM 아키텍처에서도 포인터 인증, 메모리 태깅과 같은 다양한 하드웨어 기반 보안기술들이 정의되고 있으며 최신 고사양 모바일 디바이스를 중심으로 적용되고 있다. 하지만 아키텍처 버전에 따라 가용한 하드웨어 보안 기술이 상이하기 때문에 보안기술의 범용성을 향상시키기 위한 방안 또한 중요하게 연구되어야 한다. 본고에서는 모바일 신뢰연산기술의 보안성을 향상시키기 위한 대표적인 범용 보안 기술들에 대해 소개한다. 특히 유저서비스, 운영체제, 하이퍼바이저의 보안성을 향상시키기 위해 제안된 디버깅 와치포인트 기반 보안 기술들에 대해 분석하고 그 한계와 타 아키텍처 확장 가능성에 대해서 논의한다.

Threat Detection Algorithm for Wearable Device User based on PPG Signal Processing (웨어러블 디바이스 착용자의 신변 보호를 위한 PPG 신호 처리 및 위협 감지 알고리즘 개발)

  • Sohee Yoo;Gyuwon Hwang;Jaehyun Yoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.648-649
    • /
    • 2024
  • 웨어러블 디바이스 착용자의 PPG 신호 데이터로 위협 상황을 감지하는 알고리즘을 개발한다. 본 논문에서는 외부 환경에 예민한 PPG 센서에 최적화된 전처리 알고리즘을 제안하고 긍정 및 부정 영상 시청 실험을 통해 얻은 PPG 신호 데이터를 이용하여 위험 상황과 안전한 상황을 구분하는 정확도 96.87%의 1D-CNN 모델을 개발한다.

A Study on Multi-Screen synchronization techniques based on Timed Button configuration for smart learning space (스마트 학습 공간 구성을 위한 Timed Button 기반의 다중스크린 동기화 기법)

  • Yoon, YongIk;Cho, YoonAh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.9
    • /
    • pp.91-99
    • /
    • 2013
  • In these days, the smart devices are being developed and used repeatedly. But almost E-learning System did not provide these smart devices environment and user's E-learning space is changing from Single-screen environment to multi-Screen environment. Accordingly we configure smart E-learning space based on multi-screen and integrate the multi-media contents for the Smart E-learning service. We present the synchronization techniques to make the multi-screen environment for smart space with Timed Link and design the Timed Button to relate each Screen which is using multi-media e-learning contents.

User Authentication Method using EEG Signal in FIDO System (FIDO 시스템에서 EEG 신호를 이용한 사용자 인증 방법)

  • Kim, Yong-Ki;Chae, Cheol-Joo;Cho, Han-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.1
    • /
    • pp.465-471
    • /
    • 2018
  • Recently, biometric technology has begun to be used as a fusion of IT technology and financial system. Using this biometric technology, FIDO(Fast Identity Online) technology, Samsung and Apple started Samsung Pay and Apple Pay service. FIDO authentication technology replaces existing authentication methods such as passwords. Among the biometric technologies, fingerprint recognition technology is attracting attention because it can minimize the device and user rejection at a relatively low price. However, fingerprint information has a limited number of users and it can not be reused if fingerprint information is leaked by an external attacker. Therefore, in this paper, we propose a method to authenticate a user using EEG signal which is one of biometrics technologies. W propose a method to use EEG signal measurement value in FIDO system by using convenience channel by using short channel EEG device. And propose a method to utilize EEG signal when the user recognizes a specific entity by measuring the EEG signal before and after recognizing a specific entity.

New Pre-processing Method for Second-Order CPA on the IT Convergence Device (IT융합 디바이스에 대한 물리적 2차 CPA 공격을 위한 새로운 전처리 기법)

  • Lee, Chul-Hee;Hwang, Ah-Reum;Lee, Dong-Geon;Kim, Hyoung-Nam;Kim, Ho-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1369-1380
    • /
    • 2010
  • In this paper, we propose the efficient Second-Order Differential Power Analysis attack, which has ability to find significant information such as secret key in the devices consisting IT convergence environment such as Smartgrid, Advanced Metering Infrastructure(AMI) and ZigBee-based home networking service. This method helps to find the secret key easily at a device, even though it uses a countermeasure like masking which makes First-Order DPA attack harder. First, we present the performance results of our implementation which implements practical Second-Order DPA attack using the existing preprocessing function, and analyze it. Then we propose a stronger preprocessing function which overcomes countermeasures like masking. Finally, we analyze the results of the Second-Order CPA attack using proposed preprocessing function and verify that proposed scheme is very threatening to the security fields of IT convergence technology through the experimental results.

A Study on the Development of Customized Home Care Beauty Device (맞춤형 홈 케어 뷰티 디바이스 개발에 관한 연구)

  • Kim, Tae-Won;Kim, Hyun-Woong;Lee, Chun-Hee;Min, Hye-Jin;Kim, Da-Du;Kim, Dong-Hun;Park, Sang-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.1
    • /
    • pp.23-34
    • /
    • 2022
  • Due to the regular usage of face masks during the COVID-19 pandemic, many people developed skin issues. As a result, interest in skin care which can be performed independently at home has increased. The purpose of this study is to design a customized home beauty care device to respond to these market trends. In order to do so, the double diamond model was applied in the design thinking process, and the design development process proceeded in the order of discovery, definition, development, and delivery. This study is meaningful in that it focused on the user-centered design development approach by fusing design thinking processes rather than styling-oriented design processes, and suggested new possibilities for design development using information based on the data measured.

A study on Seamless Security Connection of Web Services for Mobile Environment (모바일 환경을 위한 웹 서비스의 무단절 보안 연결에 관한 연구)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.41-49
    • /
    • 2008
  • Other server based-application and the need of more complex interaction is required with functional strengthening and variational uses of mobile device. And mobile environments make a problem of continuous of web-service by making a problem of instance cutting between web-server and mobile device which acts as a client because of mobility. Therefore, this paper embodies a framework which keeps security and connectivity between HTTP based web-service and mobile device, and is for connection to web-service of mobile device which uses WAP in a standard protocol based mobile environment of mobile web-service for continuous web-service. This paper is analyzed in the same standard condition to compared functional delay which is based on HTTP and WAP access, and data transmission volume. Also it investigates improvement of execution overhead which is brought by interaction process.

  • PDF

A Study of Development of Wearable Sports Helmet Device Using IoT Server Technology (IoT 서버 기술을 활용한 웨어러블 스포츠 헬멧 디바이스 설계)

  • Kim, Jin-Kook;Kim, Soo-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.4
    • /
    • pp.151-156
    • /
    • 2020
  • The purpose of this study is to design a process for developing wearable sports helmet devices by utilizing IoT server technology, focusing on sports where helmet wear is essential at sports sites. This enables customized training of athletes by continuously accumulating personal biometric information during training, checking players' condition based on data, and informing them of injury prevention and dangerous situations. In addition, the wearable device that can be useful when the training place is likely to damage the physical health due to heat waves or extremes can provide a foundation for improving the performance. Since such technology can be applied not only to the sports field but also to the society such as the industrial field or the underprivileged, it can be expected to be expandable.