• Title/Summary/Keyword: 스마트웨어

Search Result 896, Processing Time 0.024 seconds

User Authentication of a Smart City Management System (스마트시티 매니지먼트 시스템에서의 사용자인증보안관리)

  • Hwang, Eui-Dong;Lee, Yong-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.1
    • /
    • pp.53-59
    • /
    • 2019
  • In this paper, we introduce the UTOPIA Smart City Security Management System which manages a user authentication for smart cities. Because the smart city management system should take care of huge number of users and services, and various kinds of resources and facilities, and they should be carefully controlled, we need a specially designed security management system. UTOPIA is a smart city system based on ICT(Information and Communication Technology), and it has a three tier structure of UTOPIA portal system, UTOPIA processing system and UTOPIA infrastructure system. The UTOPIA processing system uses the smart city middleware named SmartUM. The UTOPIA Smart City Security Management System is implemented in the application security layer, which is the top layer of the SmartUM middleware, and the infrastructure security layer, which is the lowest layer. The UTOPIA Smart City security management system is built on the premise that it supports all existing user authentication technologies. This paper introduces the application security layer and describes the authentication management in the application security layer.

Design of a Middleware for Android-based Smart Phone Applications (안드로이드 기반 스마트 폰 응용을 위한 미들웨어 설계)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.111-117
    • /
    • 2012
  • With the rapid growth of smart phone technologies, mobile user's demands for using services provided by existing web or portal cites are highly increased. These services, however, are designed for the environment of desktop PCs or laptops in general, so it requires lots of costs for corrections and has difficulties for system protection to use in current mobile devices. In this paper, we design and implement a middleware for android-based smart phone apps to cooperate with a portal system with minimum corrections and function configuration. Our middleware system is working as an interface between an existing portal system and mobile devices to provide harmonious usage and safe system protection.

스마트 홈 네트워크 미들웨어 기술동향

  • Geum, Seung-U;Im, Tae-Beom;Lee, Seok-Pil
    • Information and Communications Magazine
    • /
    • v.29 no.9
    • /
    • pp.44-49
    • /
    • 2012
  • 멀티미디어 및 네트워크 관련 기술의 발전에 힘입어 최근의 멀티미디어 단말은 높은 품질의 영상 및 음향 데이터를 처리할 수 있게 되었다. 이러한 멀티미디어 데이터는 디바이스의 내장스토리지에 저장되거나 혹은 인터넷 기반의 스트리밍으로 전송될 수 있으며,또한 홈 네트워크 미들웨어를 통한 전송이 가능하다. 이 중 홈 네트워크 미들웨어를 통한 전송의 경우 홈 네트워크의 콘텐츠 공유 및 제어를 위한 별도의 설정이 필요 없으며, 콘텐츠 공유에 대한 보다 직관적인 인터페이스를 제공하고, 콘텐츠의 물리적인 복제가 불필요한 점등에 힘입어 멀티미디어 콘텐츠 공유에 대한 표준으로 자리잡고 있다. 또한 이러한 홈 네트워크 미들웨어는 단순한 멀티미디어 콘텐츠 공유 및 제어 뿐만 아니라 기기간의 자동 설정을 위한 기기간 통신(Machine-to-Machine Interface)으로의 확장이 진행되고 있다. 본고에서는 산업계에서 널리 사용되고 있는 스마트 홈 네트워크 미들웨어의 업계 표준과 그 확장성에 대해 알아본다.

A Study on Smart Fuzzing System Based on Grey Box Test (그레이 박스 테스트를 활용한 스마트 퍼징 시스템 연구)

  • Kim, Mansik;Kim, Minjin;Yeom, Yun-Ho;Jun, Moon-Soeg
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.812-814
    • /
    • 2015
  • 유비쿼터스 시대가 ICT 산업의 발달과 함께 도래함에 따라 이용자들의 요구를 충족시켜 주는 다양한 서비스들이 소프트웨어 형태로 등장하고 있다. 이제는 단순 컴퓨터 뿐만이 아니라 모바일, 웨어러블 디바이스, 자동차, 로봇, 의료 산업 등 까지 소프웨어는 현대 사람들의 삶에 깊이 연계되어 있으며 아직도 그 영역은 팽창하고 있다. 이러한 소프트웨어의 풍부한 발달과 비례로 소프트웨어의 취약점을 공략하여 서비스에 치명적인 위협을 가해 이익을 얻으려는 단체도 증가하게 되었다. 본 논문에서는 소프트웨어를 출시하기 전에 취약점을 미리 탐지 식별 할 수 있는 그레이 박스를 활용한 스마트 퍼징 시스템을 제안한다.

Interaction and Interface Design of Smart Watches (스마트워치 인터렉션 및 인터페이스 디자인)

  • Lim, Da-Eun;Wang, Lin
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.3
    • /
    • pp.11-20
    • /
    • 2015
  • Recently, with the market of smart phones slowing down, more attention is paid to wearable devices. It was suggested that 2013 was the "year of the smart watch", due to that the majority of major consumer electronics manufacturers were undertaking work on a smart watch device. However there are still many issues on the interaction and interface design of smart watches. This study reviewed related literatures and evaluated the interaction methods, interface and content design of current smart watches. Based on that, future research directions were proposed. The research results have significant meanings for the guidance of future directions of smart watch.

Wearable Device Security Threat Analysis and Response Plan (웨어러블 디바이스 보안 위협 및 대응 방안)

  • Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.55-61
    • /
    • 2024
  • With the development of IoT technology, wearable services have also developed rapidly. Wearable devices required for this service are used as sensors and controllers in the form of smart bands. Wearable devices implement very concise SWlogic for possible long-term use and use wireless communication protocols to improve convenience. However, because this wearable device aims to be lightweight, it is more vulnerable to security than terminals used for other information services. Many smart healthcare or smart medical services are passive or do not apply security technology. By exploiting this security environment, attackers can obtain or modify important information through access to wearable devices. In this study, we analyzed the technical operating environment of wearable services and identified authentication information reuse attacks, BIAS attacks, battery drain attacks and firmware attacks on wearable devices. And we analyzed the mechanism of each security threat and confirmed the attack effect. In this study, we presented a response plan to respond to the identified security threats. When developing wearable services, it is expected that safer services can be built if the response plan proposed in this study is considered.