• Title/Summary/Keyword: 3'rd party server

Search Result 4, Processing Time 0.159 seconds

Design of Registrar Server capable of 3rd party SIP Registration (3rd Party SIP Registration 기능 지원을 위한 Registrar 서버 기능 설계)

  • Hyun, Wook;Kang, Shin-Kak
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.146-149
    • /
    • 2001
  • In order to provide VoIP service that using SIP on the Internet, users must register their current location to receive call from other cal]or. 13y using REGISTER method, users register his or her SIP URL address and currently contactable addresses to registrar server. The registered addresses are not only SIP URI but also mai]to, http, tel, and so on. In these procedures, we must consider authentication mechanism whether he/she has authority to handle the record or not. In this paper, we will briefly describe authentication mechanism that used in SIP and design of registrar server that support the 3rd party registration.

  • PDF

A Cost-efficient IPTV Strategy of Replica Placement for $3^{rd}$ Party Content Service

  • Diaz, Maria Elizabeth Aldana;Shin, Young-Rok;Huh, Eui-Nam
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06a
    • /
    • pp.391-394
    • /
    • 2011
  • 3rd party content service is a consumer-based wide selection of contents in which IPTV provider believes will enhance the service considerably extending the variety of contents to finally provide a personalized service. Therefore, the combination of 3rd party content services and the IPTV infrastructure creates a good revenue opportunity but they need to be created. IPTV offers to create personalized channels to distribute 3rd party content service. However, the cost of $3^{rd}$ party content delivery is high when the service is provided from a faraway server. IPTV provider requires an effective strategy of replica placement to minimize the cost without a tradeoff on the performance. We propose a cluster-based strategy of replica placement to find the right balance between cost and performance. The results demonstrate the achievement of an outstanding delivery time and low cost.

Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices (안드로이드 모바일 단말에서의 실시간 이벤트 유사도 기반 트로이 목마 형태의 악성 앱 판별 메커니즘)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.31-43
    • /
    • 2014
  • Large number of Android mobile application has been developed and deployed through the Android open market by increasing android-based smart work device users recently. But, it has been discovered security vulnerabilities on malicious applications that are developed and deployed through the open market or 3rd party market. There are issues to leak user's personal and financial information in mobile devices to external server without the user's knowledge in most of malicious application inserted Trojan Horse forms of malicious code. Therefore, in order to minimize the damage caused by malignant constantly increasing malicious application, it is required a proactive detection mechanism development. In this paper, we analyzed the existing techniques' Pros and Cons to detect a malicious application and proposed discrimination and detection result using malicious application discrimination mechanism based on Jaccard similarity after collecting events occur in real-time execution on android-mobile devices.

Image Security System Using Push Server and Smart Device (푸시 서버와 스마트 디바이스를 이용한 영상보안 시스템)

  • Park, Seung-Hwan;Oh, U-Chul;Kim, Chang-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.588-593
    • /
    • 2014
  • Recently, the smart devices has been possessed by a large majority of the adult, and offered various personalization services. This paper proposed the lightweight Intelligent Image Security System that notice the existence of any intruder in real time at the place of requiring the security by using smart device. The proposed image security system recognized whether or not intruder exists using the difference frame on the basis of Integral Image and the dynamic background updating algorithms. The intrusion notification is achieved by using the GCM push server that send massages in the application unit of user mobile device, and the SMTP mail server which is use of e-mail standard protocol. In case of the occurrence of intruder, GCM push server send an push-massage by the private mobile device, and SMTP mail server send the intruder's photograph and intrusion time. By the convergence of the various image processing algorithms and the performance of smart device, The proposed image security system can be applied to the various Intelligent Image Security field.