• Title/Summary/Keyword: 스마트 모바일 컴퓨팅

Search Result 176, Processing Time 0.029 seconds

Analysis of Threats and Countermeasures on Mobile Smartphone (스마트폰 보안위협과 대응기술 분석)

  • Jeon, Woong-Ryul;Kim, Jee-Yeon;Lee, Young-Sook;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.153-163
    • /
    • 2011
  • Smartphone is a mobile device which can perform better than feature phone. Recently, growth in demand for advanced mobile devices boasting powerful performance, market share of smartphone is increasing rapidly in mobile device market, for example, iphone and android phone. Smartphone can provide many functionalities, e-mail, scheduler, word-processing, 3D-game, and etc, based on its powerful performance. Thus, various secret information is integrated in smartphone. To provide service, sometimes, smartphone transmits informations to outside via wireless network. Because smartphone is a mobile device, user can lose his/her smartphone, easily, and losing smartphone can cause serious security threats, because of integrated information in smartphone. Also data which is transmitted in wireless network can be protected for privacy. Thus, in present, it is very important to keep secure smartphone. In this paper, we analyze threats and vulnerabilities of smartphone based on its environments and describe countermeasures against threats and vulnerabilities.

Global Network Verification Test for Docker-based Secured mobile VoIP (Docker 기반의 Secured mobile VoIP를 위한 글로벌 네트워크 실증 테스트)

  • Cha, ByungRae;Kang, EunJu
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the computing paradigm has been changing and VoIP technology is being revisited to support various services in ICT field. In this paper, we have designed and implemented the systems of software PBX open source Asterisk using light-weighted virtualization Docker technique, hardware platform, and mobile devices to support voice service based on secured mobile VoIP. And we verified the delay test of network traffics and the secured voice communication test in global real network environment.

Design and Implementation of Mobile Augmented Reality System Using Infrared Camera (적외선 카메라를 이용한 모바일 증강현실 시스템 설계 및 구현)

  • Jang, Jae Hyeok;Kim, Byung Ki;Song, Chang Geun;Ko, Young Woong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1638-1641
    • /
    • 2010
  • 본 연구에서는 디스플레이 공간이 협소한 스마트 폰의 제약을 극복하고자 적외선 카메라를 이용한 입력 인터페이스를 제안한다. 제안하는 방식의 특징은 기존의 사용자의 손이나 펜을 이용한 입력 방식이 아닌 카메라를 통해 적외선 펜의 위치를 인식하고 추적하여 입력 공간의 크기에 제약을 받지 않고 사용하는 방식이다. 실험 결과 기존의 스마트 폰의 터치스크린을 이용한 입력 방식보다 더욱 편리하고 효율적인 입력도구로 사용될 수 있음을 보였다.

On the Distribution of the Movement Speed of Smartphone Users (스마트폰으로 측정된 사용자의 이동속도분포에 관한 연구)

  • Kim, Woojin;Jang, Woncheol;Song, Ha Yoon
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.11
    • /
    • pp.567-575
    • /
    • 2016
  • With the popularity of smartphone, user's location information is of great interest as mobile apps based on the location information are increasing. In this paper, we are interested in analyzing user's speed data based on the location information. It is not uncommon to observe locations with great measurement errors, removing them is necessary. The distribution of speed can be considered as a mixture model in accordance with transportation means. We identify a tail part as a component of a mixture model and fit a simple parametric model to the tail part of the speed distribution.

Implementation of ISO/IEEE 11073-10404 Monitoring System Based on U-Health Service (유헬스 서비스 기반의 ISO/IEEE 11073-10404 모니터링 시스템 구현)

  • Kim, Kyoung-Mok
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.625-632
    • /
    • 2014
  • The u-health service is using portable device such as smart device and it consists of small computing device. The u-health service carry out same performance with desktop computer. We designed message structure based on Bluetooth HDP. This message structure is used to transmit patient's biometric data on the smart device of medical team, patient and family over the mobile network environment. ISO/IEEE 11073 PHD standard was defined based on the method of communication between the agent and the manager. And We are confirmed the reliable transmission of biometric data at the smart device by implementing the android OS based patient information monitoring application to check the status of patient for medical team, patient and family.

Cloud based Android Mobile Malware Detection Using Stage by Stage Analysis (단계적 분석 기법을 이용한 클라우드 기반 모바일 악성코드 탐지)

  • Lee, Jina;Min, Jae-Won;Jung, Sung-Min;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1076-1079
    • /
    • 2012
  • 스마트폰의 사용이 생활에 필수적인 요소가 되었다. 스마트폰 특징의 가장 핵심적인 부분이 다양한 콘텐츠를 사용자의 취향에 맞게 선택 할 수 있다는 점이기에 스마트폰의 콘텐츠 시장 또한 빠르게 커지고 있다. 오픈 마켓인 안드로이드의 특성 상 누구나 어플리케이션을 만들어 원하는 곳에 배포할 수 있고 어플리케이션을 다운받을 수 있는 소스도 한정되어 있지 않기 때문에 스마트폰 보안을 위협하는 악의적인 어플리케이션에 노출되기 쉽다. 개인적인 정보가 저장되어 있는 핸드폰의 특징 상 악성코드에 노출 될 경우 전화번호부 유출로 인한 인한 스팸이나 피싱에서 크게는 금융정보 유출까지, 입을 수 있는 피해가 크다. 이를 방지하기 위해 클라우드 컴퓨팅을 이용해 단계적으로 악의적인 어플리케이션을 걸러 내고 클라우드 서버에 어플리케이션 실행 환경을 제공함으로써 사용자의 기기를 안전하게 보호 할 수 있는 시스템을 제안한다.

An Anonymity-Preserving User Authentication and Authorization Model for Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경을 위한 익명성을 보장하는 사용자 인증 및 접근제어 모델)

  • Kang Myung-Hee;Ryou Hwang-Bin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.4 s.304
    • /
    • pp.25-32
    • /
    • 2005
  • The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'Smart space' augmented with intelligence and enhanced with services. However, the deployment of this computing paradigm in real-life is disturbed by poor security, particularly, the lack of proper authentication and authorization techniques. Also, it is very important not only to find security measures but also to preserve user privacy in ubiquitous computing environments. In this Paper, we propose efficient user authentication and authorization model with anonymity for the privacy-preserving for ubiquitous computing environments. Our model is suitable for distributed environments with the computational constrained devices by using MAC-based anonymous certificate and security association token instead of using Public key encryption technique. And our Proposed Protocol is better than Kerberos system in sense of cryptographic computation processing.

A Study on Mobile Personalized Healthcare Management System (모바일 개인건강관리시스템에 관한 연구)

  • Lee, Nan Kyung;Lee, Jong Ok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.6
    • /
    • pp.197-204
    • /
    • 2015
  • Recent changes in health care environment including aging population and prevalence of chronic disease encourage the adoption of new innovative technological solutions including wearable vital sensors, wireless networks, and smart phone. In this paper, we present an effective at-home lifestyle monitoring system that can be used for self-management and health intervention of patient himself in the Management-by-Exception perspectives. We implemented the filtering and queuing algorithms as a preprocessor of monitoring system to enhance efficiency of proposed system, and the effective UX design for self-management of patients themselves. The 94,467 actual clinic data was used to test the efficiency of the proposed system. As as a result, 64.8% of the incoming vital data was identified to be filtered out.

An Exploration on the Academic Research Areas for Service Business Area in the Perspective of Service Business Innovation (안드로이드 운영체제 기반 Driver Manager 서비스 애플리케이션 개발 사례 연구)

  • Kwon, Hyuk-Ju;Kim, Jae-Woo;Ra, Hong-Min;Hong, Jin-Woo;Moon, Song-Chul
    • Journal of Service Research and Studies
    • /
    • v.1 no.1
    • /
    • pp.103-111
    • /
    • 2011
  • Smart phone products lead the mobile computing world really, and be expected as a major object of mobile phone market. In special, Android OS platform in smart phones is remarkedly uprising as of main software architecture. As many applications are applied as of the Location Based Service system in the perspective of technical support which represents open based technology. In this research, we developed the location information transformation service module, using LBS system, which effects some users urgently in the timing of traffic accidents. It supports to help some car drivers with smart phone, enables them to recognizes remote controller or another users.

  • PDF

Design of Configuration Management using Homomorphic Encryption in Mobile Cloud Service (모바일 클라우드 서비스 상에서 준동형 암호 기반의 형상 관리 방안)

  • Kim, Sun-Joo;Kim, Jin-Mook;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2217-2223
    • /
    • 2012
  • As smartphone users are over 20 million, companies, which offer cloud computing services, try to support various mobile devices. If so, users can use the same cloud computing service using mobile devices, as sharing document. When user share the work, there are problem in configuration management, data confidentiality and integrity. In this paper, we propose a method that cloud computing users share document efficiently, edit encrypted docuements, and manage configuration based on homomorphic encryption, which integrity is verifiable.