• Title/Summary/Keyword: 스마트 헬스

Search Result 428, Processing Time 0.027 seconds

A Study on Developing the System for Supporting Mobile-based Work Process in Construction Site (모바일 기반의 건설현장 업무처리 지원시스템 개발 연구)

  • Kim, Seong Jin;Kim, Tae Hak;Ok, Hyun
    • Smart Media Journal
    • /
    • v.6 no.4
    • /
    • pp.50-57
    • /
    • 2017
  • As the construction sites are far from the construction site offices, the construction workers perform work on the sites with a variety of reference books and materials. This inconvenience may lead to construction accidents, and as such, the demand for mobile app development for simplifying work is increasing. Therefore, in this study, the trends of mobile research and mobile app development, and their application to the construction field were investigated to develop a mobile app that would help construction workers process their work. Based on this, mobile services applicable to construction sites and work process improvement plans were proposed. To apply the proposed work process, the functions of the existing construction project management system were improved, and a mobile app that could be used in both the Android and iOS environments was developed.

생체신호를 이용한 텔레바이오인식기술 동향 및 전망

  • Kim, Jason;Lee, Saewoom
    • Review of KIISC
    • /
    • v.26 no.4
    • /
    • pp.41-46
    • /
    • 2016
  • 전통적으로 바이오인식기술은 출입국심사(전자여권, 승무원 승객 신원확인), 출입통제(도어락, 출입통제 근태관리), 행정(무인민원발급, 전자조달), 사회복지(미아찾기, 복지기금관리), 의료(원격의료, 의료진 환자 신원확인), 정보통신(휴대폰 PC 인터넷 인증), 금융(온라인 뱅킹, ATM 현금인출) 등 다방면에서 폭넓게 보급되어 실생활에서 널리 활용되고 있다. [그림1]은 신체적 특징(Physiological biometrics)과 행동적 특징(Behavioral biometrics)을 이용한 사용자 인증기술인 바이오인식기술의 유형과 함께 각 기술별 보안취약점(괄호 안 빨강색글자)을 나타내고 있다. 최근 들어, 모바일 지급결제서비스 ATM 인출기 인터넷전문은행 등과 같은 핀테크 분야에서 비대면 인증기술로 바이오인식기술이 각광을 받기 시작했다. 한편, 가짜지문 등 기존의 신체적 특징을 이용한 바이오인식기술의 위변조 위협에 대한 우려 존재함에 따라 뇌파 심전도 근전도 맥박 등 살아있는 사람의 행동적(신체의 기능적) 특징을 이용한 생체신호를 이용하여 비대면 인증기술로서 활용하기 위하여 주요 선진국에서 차세대 바이오인식 기술개발이 가속화되고 있는 추세이다.[1] 또한, 이러한 생체신호는 최근에 삼성전자, LG전자, 애플 등에서 스마트워치를 통해 심장박동수를 측정하고 스마트폰을 통하여 모바일 지급결제, 헬스케어 등과 같은 IoT 모바일 융복합 응용서비스에 활용될 전망이다. 본고에서는 뇌파 심전도(심박수)와 같은 생체신호를 측정하는 스마트워치 밴드형 의복형 또는 패치형태의 웨어러블 디바이스와 같은 생체신호센서, 생체신호 인증기술 및 관련표준화 동향을 고찰해 보기로 한다. 국내외 관련기술과 표준화 동향을 면밀히 분석하여 지난 2015년 5월29일에 발족한 국내외 전문가그룹인 KISA"모바일 생체신호 인증기술 표준연구회"(이하 KISA 표준연구회)가 구심점이 되어 한국형 생체신호를 이용한 차세대 텔레바이오인식기술에 대한 연구개발과 국내외 표준화 추진에 박차를 가할 계획이다.

Home Management System Using Smartphone and Sensor Networks (스마트폰과 센서 네트워크를 이용한 홈 관리 시스템)

  • Han, Joosik;Jung, Yeonsoo;Son, Youngho;Hwang, Soyoung;Joo, Jaeheum
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.405-406
    • /
    • 2012
  • A sensor network is composed of a large number of sensor nodes which have sensing, computation and wireless communication capabilities. The sensor node sends such collected data, usually via radio transmitter, to a command center (sink) either directly or through a data concentration center (a gateway). These sensor networks can be used for various application areas such as health, military, home network, managing inventory, monitoring disaster areas and so on. Moreover, owing to the rapid growth of mobile technology, high-performance smartphones are widespread and in increasing cases are utilized as a terminal device. In this paper, we propose a home management system using smartphone and sensor networks.

  • PDF

A Development of Non-Invasive Body Monitoring IOT Sensor for Smart Silver Healthcare (스마트 실버 헬스케어를 위한 비접촉 인체감지 IOT 센서 개발)

  • Kang, Byung Wuk;Kim, Sang Hee
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.19 no.1
    • /
    • pp.28-34
    • /
    • 2018
  • This paper is composed of a passenger management system using a temperature sensing module, a PIR sensor module for detecting movement inside a room, and a smart breath sensing module for determining a sleeping state. An embedded sensor module and a communication system integrated the sensing part and the algorithm driving part. As the aging society is accelerating and becoming more upgraded, the social cost of Silver Care increases, and in order to protect privacy, it is necessary to reduce costs by developing efficient smart silver care devices. The proposed non - image human body detection IOT sensor system is implemented by hardware and software and has superior performance compared with conventional image monitoring method.

Fitness System for Correcting Real-time Posture Using Smart Mirror (스마트 거울을 활용한 실시간 자세교정 피트니스 시스템)

  • Seo, Jae-sic;Shin, Min-ho;Moon, Mi-kyeong
    • Journal of IKEEE
    • /
    • v.23 no.1
    • /
    • pp.74-79
    • /
    • 2019
  • As the desire for healthcare increases due to the ageing population and the well-being boom, interest in fitness is increasing. People go to the fitness center to exercise, but many people do not know how to exercise, so they often make the order of exercise and the exercise posture wrong. This not only reduces the effectiveness of the exercise, but also increases the risk of injury. This paper describes the development process of fitness system using smart mirror. This system allows people to follow the motion by themselves in front of the smart mirror, and if the exercise posture goes wrong, in real time it checks and corrects for the wrong point. By using this system, people will be able to exercise by themselves in the right posture without the help of a trainer. Also, as a result, people will be able to exercise at any time they want without the constraint of time commitment with a trainer and the cost will be reduced.

Wearable Device Security Threat Analysis and Response Plan (웨어러블 디바이스 보안 위협 및 대응 방안)

  • Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.55-61
    • /
    • 2024
  • With the development of IoT technology, wearable services have also developed rapidly. Wearable devices required for this service are used as sensors and controllers in the form of smart bands. Wearable devices implement very concise SWlogic for possible long-term use and use wireless communication protocols to improve convenience. However, because this wearable device aims to be lightweight, it is more vulnerable to security than terminals used for other information services. Many smart healthcare or smart medical services are passive or do not apply security technology. By exploiting this security environment, attackers can obtain or modify important information through access to wearable devices. In this study, we analyzed the technical operating environment of wearable services and identified authentication information reuse attacks, BIAS attacks, battery drain attacks and firmware attacks on wearable devices. And we analyzed the mechanism of each security threat and confirmed the attack effect. In this study, we presented a response plan to respond to the identified security threats. When developing wearable services, it is expected that safer services can be built if the response plan proposed in this study is considered.

Vulnerability Analysis of Remote Multi-Server User Authentication System Based on Smart Card and Dynamic ID (스마트 카드 및 동적 ID 기반 멀티서버 원격 사용자 인증 프로토콜의 취약점 분석)

  • Kwon Soon Hyung;Byeon Hae won;Choi Youn Sung
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.43-52
    • /
    • 2023
  • Many businesses and organizations use smartcard-based user authentication for remote access. In the meantime, through various studies, dynamic ID-based remote user authentication protocols for distributed multi-server environments have been proposed to protect the connection between users and servers. Among them, Qiu et al. proposed an efficient smart card-based remote user authentication system that provides mutual authentication and key agreement, user anonymity, and resistance to various types of attacks. Later, Andola et al. found various vulnerabilities in the authentication scheme proposed by Qiu et al., and overcame the flaws in their authentication scheme, and whenever the user wants to log in to the server, the user ID is dynamically changed before logging in. An improved authentication protocol is proposed. In this paper, by analyzing the operation process and vulnerabilities of the protocol proposed by Andola et al., it was revealed that the protocol proposed by Andola et al. was vulnerable to offline smart card attack, dos attack, lack of perfect forward secrecy, and session key attack.

A Real-Time Vital Check System by Using Smart Devices (스마트 디바이스를 이용한 실시간 바이탈 체크 시스템)

  • Hwang, Tae-Gyu;Jang, Eun Gyeom;Ahn, Woo-Young
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.01a
    • /
    • pp.181-184
    • /
    • 2013
  • 의료기술이 나날이 발전해 감에 따라 인류의 평균수명이 늘어나고 건강한 삶에 대한 관심도 늘어가고 있으나 여전히 사각지대가 남아있다. 영유아나 고령/특정 질병으로 몸이 불편한 가족이 있는 이들을 위하여 복잡한 장비가 필요 없이 쉽게 구비할 수 있는 장비들을 이용하여 많은 비용을 쓰지 않고도 환자의 상태를 언제 어디서나 파악 가능한 시스템이 필요하다.

  • PDF

Fall Detection System using Smartphone for Mobile Healthcare (모바일 헬스케어 지원을 위한 스마트폰을 이용한 낙상 감지 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.435-447
    • /
    • 2013
  • If we use a smartphone to analyze and detect falling, it is a huge advantage that the person with a sensor attached to one's body is free from awareness of difference and limitation of space, unlike attaching sensors on certain fixed areas. In this paper, we suggested effective posture analysis of smartphone users, and fall detecting system. Suggested algorithm enables to detect falling accurately by using the fact that instantaneous change of acceleration sensor is different according to user's posture. Since mobile applications working on smart phones are low in compatibility according to mobile platforms, it is a constraint that new development is needed which is suitable for sensor equipment's characteristics. In this paper, we suggested posture analysis algorithm using smartphones to solve the problems related to user's inconvenience and limitation of development according to sensor equipment's characteristics. Also, we developed fall detection system with the suggested algorithm, using hybrid mobile application which is not limited to platform.

Analysis of Threats Factor in IT Convergence Security (IT 융합보안에서의 위협요소 분석)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.1 no.1
    • /
    • pp.49-55
    • /
    • 2010
  • As the developing of the information communication technology, more and more devices are with the capacity of communication and networking. The convergence businesses which communicate with the devices have been developing rapidly. The IT convergence communication is viewed as one of the next frontiers in wireless communications. In this paper, we analyze detailed security threats against M2M(Machine to Machine), intelligent vehicle, smart grid and u-Healthcare in IT convergence architecture. We proposed a direction of the IT convergence security that imbedded system security, forensic security, user authentication and key management scheme.