• Title/Summary/Keyword: Internet registration

Search Result 209, Processing Time 0.026 seconds

Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain (블록체인을 이용한 위변조 안드로이드 악성 앱 판별)

  • Hwang, Sumin;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.61-68
    • /
    • 2019
  • Although the number of smartphone users is continuously increasing due to the advantage of being able to easily use most of the Internet services, the number of counterfeit applications is rapidly increasing and personal information stored in the smartphone is leaked to the outside. Because Android app was developed with Java language, it is relatively easy to create counterfeit apps if attacker performs the de-compilation process to reverse app by abusing the repackaging vulnerability. Although an obfuscation technique can be applied to prevent this, but most mobile apps are not adopted. Therefore, it is fundamentally impossible to block repackaging attacks on Android mobile apps. In addition, personal information stored in the smartphone is leaked outside because it does not provide a forgery self-verification procedure on installing an app in smartphone. In order to solve this problem, blockchain is used to implement a process of certificated application registration and a fake app identification and detection mechanism is proposed on Hyperledger Fabric framework.

Design and Implementation of Scheduler Applications for Efficient Daily Management (효율적 일상 관리를 위한 일정관리 어플리케이션의 설계와 구현)

  • Park, Eunju;Han, Seungjun;Yoon, Jimin;Lim, Hankyu
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.41-50
    • /
    • 2021
  • According to the progress of IT and data processing technology, the usage of internet increased rapidly and various smart devices are appearing. As such, modern people use smartphone to acquire informations they wish and also on daily life including leisure activity free of place. This study has designed and implemented schedule managing application that can help effective managing of our daily life, such as taking note of schedule and sharing appointments. The schedule managing application in this study offers diary taking, sharing the registrated schedule with other users on kakaotalk, saving the deleted schedule or diary to certain folder when users delete file, continuous alarm of daily schedule function together with schedule registration function. The application which is differentiated to other applications and raised usage is expected to effectively manage the busy everyday life.

Enhancing Transparency and Trust in Agrifood Supply Chains through Novel Blockchain-based Architecture

  • Sakthivel V;Prakash Periyaswamy;Jae-Woo Lee;Prabu P
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.7
    • /
    • pp.1968-1985
    • /
    • 2024
  • At present, the world is witnessing a rapid change in all the fields of human civilization business interests and goals of all the sectors are changing very fast. Global changes are taking place quickly in all fields - manufacturing, service, agriculture, and external sectors. There are plenty of hurdles in the emerging technologies in agriculture in the modern days. While adopting such technologies as transparency and trust issues among stakeholders, there arises a pressurized necessity on food suppliers because it has to create sustainable systems not only addressing demand-supply disparities but also ensuring food authenticity. Recent studies have attempted to explore the potential of technologies like blockchain and practices for smart and sustainable agriculture. Besides, this well-researched work investigates how a scientific cum technological blockchain architecture addresses supply chain challenges in Precision Agriculture to take up challenges related to transparency traceability, and security. A robust registration phase, efficient authentication mechanisms, and optimized data management strategies are the key components of the proposed architecture. Through secured key exchange mechanisms and encryption techniques, client's identities are verified with inevitable complexity. The confluence of IoT and blockchain technologies that set up modern farms amplify control within supply chain networks. The practical manifestation of the researchers' novel blockchain architecture that has been executed on the Hyperledger network, exposes a clear validation using corroboration of concept. Through exhaustive experimental analyses that encompass, transaction confirmation time and scalability metrics, the proposed architecture not only demonstrates efficiency but also underscores its usability to meet the demands of contemporary Precision Agriculture systems. However, the scholarly paper based upon a comprehensive overview resolves a solution as a fruitful and impactful contribution to blockchain applications in agriculture supply chains.

Usability of CPR Training System based on Extended Reality (확장현실 기반의 심폐소생술 교육 시스템의 사용성 평가)

  • Lee, Youngho;Kim, Sun Kyung;Choi, Jongmyung;Park, Gun Woo;Go, Younghye
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.6
    • /
    • pp.115-122
    • /
    • 2022
  • Recently, the importance of CPR training for the layperson has been emphasized to improve the survival rate of out-of-hospital cardiac arrest patients. An accurate and realistic training strategy is required for the CPR training effect for laypersons. In this study, we develop an extended reality (XR) based CPR training system and evaluate its usability. The XR based CPR training system consisted of three applications. First, a 3D heart anatomy image registered to the manikin is transmitted to the smart glasses to guide the chest compression point. The second application provides visual and auditory information about the CPR process through smart glasses. At the same time, the smartwatch sends a vibration notification to guide the compression rate. The 'Add-on-kit' is a device that detects the depth and speed of chest compression via sensors installed on the manikin and sends immediate feedback to the smartphone. One hundred laypersons who participated in this study agreed that the XR based CPR training system has realism and effectiveness. XR based registration technology will contribute to improving the efficiency of CPR training by enhancing realism, immersion, and self-directed learning.

An Exploratory Study on the Competition Patterns Between Internet Sites in Korea (한국 인터넷사이트들의 산업별 경쟁유형에 대한 탐색적 연구)

  • Park, Yoonseo;Kim, Yongsik
    • Asia Marketing Journal
    • /
    • v.12 no.4
    • /
    • pp.79-111
    • /
    • 2011
  • Digital economy has grown rapidly so that the new business area called 'Internet business' has been dramatically extended as time goes on. However, in the case of Internet business, market shares of individual companies seem to fluctuate very extremely. Thus marketing managers who operate the Internet sites have seriously observed the competition structure of the Internet business market and carefully analyzed the competitors' behavior in order to achieve their own business goals in the market. The newly created Internet business might differ from the offline ones in management styles, because it has totally different business circumstances when compared with the existing offline businesses. Thus, there should be a lot of researches for finding the solutions about what the features of Internet business are and how the management style of those Internet business companies should be changed. Most marketing literatures related to the Internet business have focused on individual business markets. Specifically, many researchers have studied the Internet portal sites and the Internet shopping mall sites, which are the most general forms of Internet business. On the other hand, this study focuses on the entire Internet business industry to understand the competitive circumstance of online market. This approach makes it possible not only to have a broader view to comprehend overall e-business industry, but also to understand the differences in competition structures among Internet business markets. We used time-series data of Internet connection rates by consumers as the basic data to figure out the competition patterns in the Internet business markets. Specifically, the data for this research was obtained from one of Internet ranking sites, 'Fian'. The Internet business ranking data is obtained based on web surfing record of some pre-selected sample group where the possibility of double-count for page-views is controlled by method of same IP check. The ranking site offers several data which are very useful for comparison and analysis of competitive sites. The Fian site divides the Internet business areas into 34 area and offers market shares of big 5 sites which are on high rank in each category daily. We collected the daily market share data about Internet sites on each area from April 22, 2008 to August 5, 2008, where some errors of data was found and 30 business area data were finally used for our research after the data purification. This study performed several empirical analyses in focusing on market shares of each site to understand the competition among sites in Internet business of Korea. We tried to perform more statistically precise analysis for looking into business fields with similar competitive structures by applying the cluster analysis to the data. The research results are as follows. First, the leading sites in each area were classified into three groups based on averages and standard deviations of daily market shares. The first group includes the sites with the lowest market shares, which give more increased convenience to consumers by offering the Internet sites as complimentary services for existing offline services. The second group includes sites with medium level of market shares, where the site users are limited to specific small group. The third group includes sites with the highest market shares, which usually require online registration in advance and have difficulty in switching to another site. Second, we analyzed the second place sites in each business area because it may help us understand the competitive power of the strongest competitor against the leading site. The second place sites in each business area were classified into four groups based on averages and standard deviations of daily market shares. The four groups are the sites showing consistent inferiority compared to the leading sites, the sites with relatively high volatility and medium level of shares, the sites with relatively low volatility and medium level of shares, the sites with relatively low volatility and high level of shares whose gaps are not big compared to the leading sites. Except 'web agency' area, these second place sites show relatively stable shares below 0.1 point of standard deviation. Third, we also classified the types of relative strength between leading sites and the second place sites by applying the cluster analysis to the gap values of market shares between two sites. They were also classified into four groups, the sites with the relatively lowest gaps even though the values of standard deviation are various, the sites with under the average level of gaps, the sites with over the average level of gaps, the sites with the relatively higher gaps and lower volatility. Then we also found that while the areas with relatively bigger gap values usually have smaller standard deviation values, the areas with very small differences between the first and the second sites have a wider range of standard deviation values. The practical and theoretical implications of this study are as follows. First, the result of this study might provide the current market participants with the useful information to understand the competitive circumstance of the market and build the effective new business strategy for the market success. Also it might be useful to help new potential companies find a new business area and set up successful competitive strategies. Second, it might help Internet marketing researchers take a macro view of the overall Internet market so that make possible to begin the new studies on overall Internet market beyond individual Internet market studies.

  • PDF

A Design of Authentication Method for Secure Communication based on Wearable Device (웨어러블 디바이스 기반의 안전한 통신을 위한 인증기법 설계)

  • Park, Jung-Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.41-46
    • /
    • 2016
  • Recently, many domestic and foreign corporates are concentrating in investment to wearable devices and users are provided with various service based on wearable devices 26% more than compared to last year. It is widely used in previous healthcare, smart work, smart home environment, and it is now introduced to get connection to fused service environment. However, as products of G company are commercialized, the security issue of personal information is causing dispute in society, and the danger of data management and security regarding telecommunication is increasing. Also, because the password system used in previous wireless environment is still in use, there are possible vulnerability considering the new and mutant security threat. This thesis conducted study about protocols that can exercise safe telecommunication in the basis of wearable devices. In the registration and certification process, the signature value is created based on the code value. The telecommunication method is designed to conduct safe telecommunication based on the signature value. As for the attack method occurring in the wearable device environment, the safety was analyzed and conducted performance evaluation of previous password system and proposal system, and verified about 14% of efficiency.

Developing Advanced Location-Based Route-Search Service for Smart-phones (진보된 스마트폰용 위치 기반 경로 검색 서비스 개발)

  • Pak, Woo-Guil;Lim, Sung-Man;Oh, Han-Joon;Yu, Kwang-Hyun;Kwon, Min-Young;Lee, Hee-Seung;Choi, Young-June
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.173-180
    • /
    • 2011
  • Various smart-phone applications for location-based service are enabled through mobile communications such as 3G and WiFi. We have developed MARS, an advanced location-based route-search application based on the Android platform. It provides three functions: route-registration, route-search, and route-evaluation. These functions are dynamically maintained by a web server, a database server, and user mobile terminals. As users can update location information using their smart-phone devices, servers provide the information and allow users to add, modify, and remove their own information as well as adding comments to others, while existing map services do not support direct inputs from users. We show our implementation process and demonstration of its operations. We also show the comparison results with existing services. Through these results, we can confirm that MARS can achieve better performance.

Attribute-based authentication scheme in IPTV broadcasting system (IPTV 방송 시스템에서의 속성기반 사용자 인증 기법)

  • Lee, Ji-Seon;Kim, Hyo-Dong
    • Journal of Broadcast Engineering
    • /
    • v.14 no.3
    • /
    • pp.280-287
    • /
    • 2009
  • An IPTV (Internet Protocol Television) technology is the new convergence technology of the telecommunication and broadcasting which provides various bidirectional TV services. To provide these services only to legal subscribers, mutual authentication between set-top box connected with TV set and the smart card owned by a subscriber is needed. In this paper, we propose an attribute-based mutual authentication scheme that only someone who is satisfied with some attributes, such as titles or departments, can access the contents provided by the IPTV service in an organization. We also show that the proposed scheme is secure. Our proposed scheme has a virtue that user can access various services, provided by an organization where he/she belongs to, according to their attributes with only one time registration. As far as we know, this is the first attribute-based authentication scheme which can be applied to any organizations in IPTV environments.

The Smart Contract based Copyright Protection Model for Wisdom Contents Distribution (지혜콘텐츠 유통에 적합한 스마트계약 기반 저작권 보호 모델)

  • Yun, Sunghyun
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.2
    • /
    • pp.21-26
    • /
    • 2019
  • Wisdom contents is made by an ordinary person and contains life tips helpful in general. As the existing copyright management systems are designed for the corporate or professional authors, it's not easy to use and requires high cost for the ordinary person to get the copyright. Blockchain based system can notarize the block of transactions without help of trustful third party such as existing copyright protection center. Thus, blockchain based copyright protection model is needed to protect the ordinary author's copyright. In this study, we propose the smart contract based copyright protection model which run on the blockchain network. The proposed model consists of smart contract creation, contents purchase and profit sharing stages. The digital signature scheme is used to get the contract agreed by the seller and the author. The smart contract stores the author information, contents information and the percentage of the share as states. If the contents is sold, the sales tokens are redistributed to the author and the seller according to the share. The proposed model can be applied to the ordinary person's copyright registration and management for Wisdom contents distributed in cafe, blog, YouTube, etc.

A Study on Lost Child Prevention Service Using LBS and Map Information (LBS와 지도 정보를 이용한 미아방지 서비스에 관한 연구)

  • Kim, Seung-Jae;Jung, Chai-Yeoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.6
    • /
    • pp.181-186
    • /
    • 2017
  • Child crimes such as child abduction and lost children(MIA) have long been pointed out as social problems. However, there are few ways to solve these problems. According to MIA statistics, about 3,000 babies are lost each year. This paper presents a study on prevention of lost children ratio using mobile LBS in order to reduce the incidence of lost children ratio in dense space. First, we input the personal information of the child and the contact information of the parent. Second, we use the Google Maps API to get the location (parent's location, child's location) information. Third, the personal information of the child and the parent is indicated in the obtained location information. In future research, based on SNS, we will carry out research on sending child location information and parent location information via SMS. It is expected that the prevention system of lost child using LBS and SNS will make a great contribution to reduce the lost children ratio in the ubiquitous society.