• Title/Summary/Keyword: 웨어러블기기

Search Result 236, Processing Time 0.026 seconds

Study on the Methods of Security and Quality Evaluation of smart Healthcare System (스마트 헬스케어 시스템의 보안성 품질평가 방법에 대한 연구)

  • Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.15 no.11
    • /
    • pp.251-259
    • /
    • 2017
  • Recently, the smart healthcare industry that grafted the Internet of Things (IoT) onto the healthcare and medical services is being highlighted. Smart healthcare refers to the healthcare and medical services offered on the basis of information communication technologies including application, wearable devices and platforms, etc. The number of next generation smart healthcare devices are increasing in the smart healthcare industry through the combination of information technology (IT) and Bio Technology (BT), which are the most active areas among the 6T, which are the areas of the next generation industry. With the emergence of a diverse range of smart healthcare systems or devices, whether the smart healthcare system can be linked with other systems organically and the security and quality of the system have become important elements of evaluation. In this Study, the characteristics and service types of smart healthcare systems were examined, and the trends in the technology and industry of the smart healthcare system were analyzed. Moreover, this Study aims to develop the evaluation method for security and standards for quality evaluation by deducing the factors for the evaluation of smart healthcare system on the basis of the results of aforementioned examination. It is anticipated that this can induce improvement of quality and development of highly reliable products of a smart healthcare system, and will become the core technology to substitute the technology protection barrier.

A Study on Smart Home Service System Design to Support Aging in Place (Aging in Place 지원을 위한 스마트 홈 서비스 시스템 설계에 관한 연구)

  • Sim, Sungho
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.249-254
    • /
    • 2019
  • According to the recent expansion of the network environment, the spread of smart devices is continuously increasing. With the spread of smart devices such as smart phones, smart pads and wearables, changes are taking place in smart technologies and IT convergence technologies. The development of smart technology is a key element of the 4th industrial technology. The Fourth Industrial Revolution expanded the new service-based industry by adding intelligence to residential, industrial and production environments using IT convergence and smart devices. Research on providing various services using smart technologies, such as smart home, smart factory, smart farm, and smart healthcare, is being conducted in variety. In particular, There is a sharp rise in smart homes due to the proliferation of IoT devices and the growth of sensor technology, control technology, applications, data management, and cloud services. Smart home services using smart technology provide residents with convenient, beneficial services and environments. Smart home service has complemented the existing home network service, but there still are flaws to be modified. In other words, the spread of smart devices, the development of service provider-oriented services, and the interlocking of services have limitations in providing services in consideration of user environment and user state. In order to solve this problem, this study proposes a smart home service system that considers the situation of the elderly.

Development of Authentication Service Model Based Context-Awareness for Accessing Patient's Medical Information (환자 의료정보 접근을 위한 상황인식 기반의 인증서비스 모델 개발)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.99-107
    • /
    • 2021
  • With the recent establishment of a ubiquitous-based medical and healthcare environment, the medical information system for obtaining situation information from various sensors is increasing. In the medical information system environment based on context-awareness, the patient situation can be determined as normal or emergency using situational information. In addition, medical staff can easily access patient information after simple user authentication using ID and Password through applications on smart devices. However, these services of authentication and patient information access are staff-oriented systems and do not fully consider the ubiquitous-based healthcare information system environment. In this paper, we present a authentication service model based context-awareness system for providing situational information-driven authentication services to users who access medical information, and implemented proposed system. The authentication service model based context-awareness system is a service that recognizes patient situations through sensors and the authentication and authorization of medical staff proceed differently according to patient situations. It was implemented using wearables, biometric data measurement modules, camera sensors, etc. to configure various situational information measurement environments. If the patient situation was emergency situation, the medical information server sent an emergency message to the smart device of the medical staff, and the medical staff that received the emergency message tried to authenticate using the application of the smart device to access the patient information. Once all authentication was completed, medical staff will be given access to high-level medical information and can even checked patient medical information that could not be seen under normal situation. The authentication service model based context-awareness system not only fully considered the ubiquitous medical information system environment, but also enhanced patient-centered systematic security and access transparency.

Recent Progress in Micro In-Mold Process Technologies and Their Applications (마이크로 인몰드 공정기술 기반 전자소자 제조 및 응용)

  • Sung Hyun Kim;Young Woo Kwon;Suck Won Hong
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.30 no.2
    • /
    • pp.1-12
    • /
    • 2023
  • In the current era of the global mobile smart device revolution, electronic devices are required in all spaces that people interact with. The establishment of the internet of things (IoT) among smart devices has been recognized as a crucial objective to advance towards creating a comfortable and sustainable future society. In-mold electronic (IME) processes have gained significant industrial significance due to their ability to utilize conventional high-volume methods, which involve printing functional inks on 2D substrates, thermoforming them into 3D shapes, and injection-molded, manufacturing low-cost, lightweight, and functional components or devices. In this article, we provide an overview of IME and its latest advances in application. We review biomimetic nanomaterials for constructing self-supporting biosensor electronic materials on the body, energy storage devices, self-powered devices, and bio-monitoring technology from the perspective of in-mold electronic devices. We anticipate that IME device technology will play a critical role in establishing a human-machine interface (HMI) by converging with the rapidly growing flexible printed electronics technology, which is an integral component of the fourth industrial revolution.

Collecting Health Data from Wearable Devices by Leveraging Salient Features in a Privacy-Preserving Manner

  • Moon, Su-Mee;Kim, Jong-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.10
    • /
    • pp.59-67
    • /
    • 2020
  • With the development of wearable devices, individuals' health status can be checked in real time and risks can be predicted. For example, an application has been developed to detect an emergency situation of a patient with heart disease and contact a guardian through analysis of health data such as heart rate and electrocardiogram. However, health data is seriously damaging when it is leaked as it relates to life. Therefore, a method to protect personal information is essential in collecting health data, and this study proposes a method of collecting data while protecting the personal information of the data owner through a LDP(Local Differential Privacy). The previous study introduced a technique of transmitting feature point data rather than all data to a data collector as an algorithm for searching for fixed k feature points. Next, this study will explain how to improve the performance by up to 75% using an algorithm that finds the optimal number of feature points k.

Designed OTP Generation Method Using Health Information (건강정보를 이용한 OTP 생성 방식 설계)

  • Choo, Yeun-Su;Kang, Jung-Ho;Kim, Kyoung-Hun;Park, Jea-Pyo;Jun, Moon-Seog
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.315-320
    • /
    • 2015
  • User Authentication in Online service is essential for accurate and safe service. For this user authentication, One Time Password(OTP) is frequently used. To satisfy one-time-use characteristic of OTP, Offset information to generate OTP or final OTP value get generated through OTP generator or security card which could be lost. In this study, OTP generation method that bypasses OTP generator or security card by using health information collected from u-Health care system is proposed. Suggestion is that health information collected through wearable devices get utilized to offset information that are applied in OTP generations. OTP generated using suggested methods showed similar results than current OTP generation methods in the collision resistance test which tests how often it generate same authentication numbers, this implies that new proposed method can be applied to various on-line services.

DC-DC Converter for Low-Power Power Management IC (저-전력 전력 관리 회로를 위한 DC-DC 변환기)

  • Jeon, Hyeondeok;Yun, Beomsu;Choi, Joongho
    • Journal of IKEEE
    • /
    • v.22 no.1
    • /
    • pp.174-179
    • /
    • 2018
  • In this paper, design of high-efficiency DC-DC converter is presented for low-power PMIC (power management integrated circuit). As PMIC technologies for IoT and wearable devices have been continuously improved, high-efficiency energy harvesting schemes should be essential. Since the supply voltage resulting from energy harvesting is low and widely variable, design techniques to achieve high efficiency over a wide input voltage range are required. To obtain a constant switching frequency for wide input voltage range, frequency compensation circuit using supply-voltage variation sensing circuit is included. In order to obtain high efficiency performance at very low-power condition, accurate burst-mode control circuit was adopted to control switching operations. In the proposed DC-DC buck converter, output voltage is set to be 0.9V at the input voltage of 0.95~3.3V and maximum measured efficiency is up to 78% for the load current of 180uA.

A Method to Elicit Privacy Requirements and Build Privacy Assurance Cases for Privacy Friendly System (프라이버시 친화 시스템 개발을 위한 프라이버시 요구사항 도출 및 보증 사례 작성)

  • Cho, Ju Hye;Lee, Seok-Won
    • Journal of KIISE
    • /
    • v.44 no.9
    • /
    • pp.918-931
    • /
    • 2017
  • Recently, the spread of smartphones and various wearable devices has led to increases in the accumulation and usage of personal information. As a result, privacy protection has become an issue. Even though there have been studies and efforts to improve legal and technological security measures for protecting privacy, personal information leakage accidents still occur. Rather than privacy requirements, analysts mostly focus on the implementation of security technology within software development. Previous studies of security requirements strongly focused on supplementing the basic principles and laws for privacy protection and securing privacy requirements without understanding the relationship between privacy and security. As a result, personal information infringement occurs continuously despite the development of security technologies and the revision of the Personal Information Protection Act. Therefore, we need a method for eliciting privacy requirements based on related privacy protection laws that are applicable to software development. We also should clearly specify the relationship between privacy and security. This study aims to elicit privacy requirements and create privacy assurances cases for Privacy Friendly System development.

The System Developing Social Network Group by Using Life Logging Data (라이프로깅 데이터를 이용한 소셜 네트워크 그룹 생성 시스템)

  • Jo, Youngho;Woo, Jincheol;Lee, Hyunwoo;Cho, Ayoung;Whang, Mincheol
    • Journal of the HCI Society of Korea
    • /
    • v.12 no.2
    • /
    • pp.13-19
    • /
    • 2017
  • Various life-logging based on cloud service have developed social network according to the advanced technology of smartphone and wearable device. Daily digital life on social networks has been shared information and emotion and developed new social relationships. Recent life-logging has required social relationships beyond extension of personal memory and anonymity for privacy protection. This study is to determine social network group by using life-logging data obtained in daily lives and to categorize emotion behavior with anonymity guarantee. Social network group was defined by grouping similar representative emotional behavior. The public's patterns and trends was able to be inferred by analyzing representative emotion and behavior of the social groups network.

Korea's Development Strategy through 5G Network Global Status Analysis (5G 네트워크 글로벌 현황분석을 통한 한국의 발전 전략)

  • Kim, Hee-Jin;Park, Yun-Seon;Ryu, Seul-gi;Lee, Ga-Eun;Lee, Seung-joo;Won, Jong-Kwon;Hwang, Hye-Jeong;Chang, Young-Hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.3 no.2
    • /
    • pp.43-48
    • /
    • 2017
  • 5G will bring revolutionary development in mobile communication, and it is anticipated to have complete commercialization including mass adoption rate by 2020s. High number of smart devices including IoT, wearable devices, etc., which have high amount of data usage, will involve even higher data traffics. In addition, media dependency and demand is rapidly rising. These environmental aspects will necessity and sufficient condition for successful implementation of 5G mobile communication system. In this paper, global cooperation and competition for 5G technology leadership will be analyzed and summarized. Through this, proper solution to maintain competency of Korea in future will be proposed.