• Title/Summary/Keyword: Lock Screen

Search Result 12, Processing Time 0.025 seconds

Development of Real Time Information Service Model Using Smart Phone Lock Screen (스마트 폰 잠금 화면을 통한 실시간 정보제공 서비스 모델의 개발)

  • Oh, Sung-Jin;Jang, Jin-Wook
    • Journal of Information Technology Services
    • /
    • v.13 no.3
    • /
    • pp.323-331
    • /
    • 2014
  • This research is based on real-time service model that uses lock screen of smart devices which is mostly exposed to device users. The potential for lock screen space is immense due to their exposing time for user. The effect can be maximized by offering useful information contents on lock screen. This service model offers real-time keyword with abridged sentence. They match real-time keyword with news by using text matching algorithm and extracts kernel sentence from news to provide short sentence to user. News from the lock screen to match real-time query sentence, and then only to the original core of the ability to move a user evaluation was conducted after adding. The report provided a key statement users feel the lack of original Not if you go to an average of 5.71%. Most algorithms allow only real-time zoom key sentence extracted keywords can accurately determine the reason for that was confirmed.

LOCK - TOEIC Application Development Study-based Android (안드로이드 기반의 LOCK-TOEIC 어플리케이션 개발에 관한 연구)

  • Ok, Jun Hyun;Kang, Gu Yeal;Kang, Dong Hoon;Lee, Jong Hyen;Moon, Song Chul
    • Journal of Service Research and Studies
    • /
    • v.3 no.2
    • /
    • pp.61-74
    • /
    • 2013
  • Lately, We have experienced increasing of Smartphone. Therefore we have experienced increasing of Application for Smartphone. This study suggested Lock-Toeic Learning Application using the smartphone. English the universal language of the world. TOEIC need to get job in Korea. It should be able to learn using LOCK-TOEIC Application of smartphone. This study add an Lock Screen Learning differentiate function of other smartphone application. We can expect Iteration learning effect using this study of Loch TOEIC smatphone application.

  • PDF

Layered Pattern Authentication Scheme on Smartphone Resistant to Social Engineering Attacks (사회공학적 공격에 강인한 스마트폰 계층화 패턴 인증 기법)

  • Tak, Dongkil;Choi, Dongmin
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.280-290
    • /
    • 2016
  • In this paper, we propose a layered pattern authentication scheme resistant to social engineering attacks. Existing android pattern lock scheme has some weak points for social engineering attacks. Thus, the proposed scheme improves the existing pattern lock scheme. In our scheme, pattern is recorded by touch screen, however, it is different with existing schemes because of the layered pattern. During the pattern registration process, users register their own pattern with many layers. Thus, registered pattern is 3D shape. When the smudge attack is occurring, the attacker can see the shape of user pattern through the smudge on smartphone screen. However, it is described on 2D surface, so acquired pattern is not fully determine to users original 3D shape. Therefore, our scheme is resistant to social engineering attack, especially smudge attack.

A proposal of Circular Lock Pattern Method on Smart phone (원형 스마트폰 잠금 패턴 방식 제안)

  • Im, Ji-woo;Lee, Seung-jay;Jang, Won-jun;Kwon, Hyeok-dong;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1471-1477
    • /
    • 2019
  • Currently, there are various security methods in smart phone. Among them, pin number and pattern lock were used long as they were used from early smart phone. However, security is weak that much. The security of pin number is slightly high, but the security of conventional pattern lock remains moderate. However, the conventional pattern lock is still used by several people because of convenience. This is because some users' smart phones don't support biometric security. The most convenient security method for devices that don't support biometric security is pattern lock. However, this method is vulnerable to shoulder surfing attack and smudge attack. Therefore, we introduce random pattern lock that solves the vulnerability of the conventional pattern lock while maintaining the convenience of the pattern lock. This is a lock method that places each point placed on the screen in a circular shape and assigns a random number to it. Therefore, If this is introduced, It's expected to solve vulnerability.

Side-Channel Attack of Android Pattern Screen Lock Exploiting Cache-Coherent Interface in ARM Processors (ARM 캐시 일관성 인터페이스를 이용한 안드로이드 OS의 스크린 잠금 기능 부채널 공격)

  • Kim, Youngpil;Lee, Kyungwoon;Yoo, Seehwan;Yoo, Chuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.227-242
    • /
    • 2022
  • This paper presents a Cache-Coherency Interconnect(CCI)-based Android pattern screen lock(PSL) attack on modern ARM processors. CCI has been introduced to maintain the cache coherency between the big core cluster and the little core cluster. That is, CCI is the central interconnect inside SoC that maintains cache coherency and shares data. In this paper, we reveal that CCI can be a side channel in security, that an adversary can observe security-sensitive operations. We design and implement a technique to compromise Android PSL within only a few attempts using the information of CCI in user-level applications on Android Nougat. Further, we analyzed the relationship between the pattern complexity and security. Our evaluation results show that complex and simple patterns would have similar security strengths against the proposed technique.

Design and Implementation of Hybrid VR lock system by Arduino Control (아두이노 제어를 통한 증강현실 도어록 설계 및 구현)

  • Lee, Kyung-Mu;Kim, Jin-Il
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.15 no.3
    • /
    • pp.97-103
    • /
    • 2014
  • Recently, digital door locks have been widely used as physical security devices for the door. Although they are convenient compared to the existing lock system, they have the problem of being opened by an electric shock. In this study, to improve safety, a method to hide the door-lock device inside and to display the door-lock on a user's smart-phone screen through the augmented reality is suggested. Furthermore, an additional function has been added which provides memo notes to facilitate communication among family members. The results of this study have been implemented by using motors to control locks, Wi-Fi shield, Arduino, and a virtually created door and showed desirable experimental results.

Development of LabVIEW Program for Lock-In Infrared Thermography (위상잠금 열화상장치 제어용 랩뷰 프로그램 개발)

  • Min, Tae-Hoon;Na, Hyung-Chul;Kim, Noh-Yu
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.31 no.2
    • /
    • pp.127-133
    • /
    • 2011
  • A LabVIEW program has been developed together with simple infrared thermography(IRT) system to control the lock-in conditions of the system efficiently. The IR imaging software was designed to operate both of infrared camera and halogen lamp by synchronizing them with periodic sine signal based on thyristor(SCR) circuits. LabVIEW software was programmed to provide users with screen-menu functions by which it can change the period and energy of heat source, operate the camera to acquire image, and monitor the state of the system on the computer screen. In experiment, lock-in IR image for a specimen with artificial hole defects was obtained by the developed IRT system and compared with optical image.

Enhanced Knock Code Authentication with High Security and Improved Convenience

  • Jang, Yun-Hwan;Park, Yongsu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4560-4575
    • /
    • 2018
  • Since smartphone contains various personal data, security is one of the important aspects in smartphone technologies. Up to now, various authentication techniques have been proposed to protect smartphones. The pattern lock on the Android system is one of the most widely used authentication methods for low-cost devices but it is known to be vulnerable to smudge attack or shoulder surfing attack. LG's smartphone uses its own technique, which is called "Knock Code." The knock code completes the authentication by touching the user defined area in turn on the screen. In this paper, we propose the new, enhanced version of knock code by adding the sliding operation and by using flexible area recognition. We conducted security analysis, which shows that under the same password size, the search space is overwhelmingly larger than the original algorithm. Also, by using the sliding operation, the proposed scheme shows resilience against smudge attacks. We implemented the prototype of our scheme. Experimental results show that compared with the original Knock Code and Android pattern lock, our scheme is more convenient while providing better security.

Designing Augmentative and Alternative Communication (AAC) Application for Children with Severe and Multiple Disabilities (중도중복장애아동을 위한 보완대체 의사소통(AAC) 앱 설계)

  • Kim, Seul-Gi;Yook, Juhye
    • Journal of Digital Contents Society
    • /
    • v.19 no.7
    • /
    • pp.1281-1287
    • /
    • 2018
  • In this study, specific elements and functions in modules of the AAC (Augmentative and Alternative Communication) application for children with severe and multiple disabilities were elicited, and screen interface was designed accordingly. As results, screen configuration, communication display edition, audiovisual output, and switch and scanning modules were defined. Screen configuration module consists of communication category, spelling board, favorites, screen lock, and setting function. The Communication display edition module includes communication categories, symbols, and favorites edition. The audiovisual output module provides the ability to adjust the pitch, intensity, speed, and tone of the voice individually in the form of auditory output. In the form of visual output, the background color and size of the frame, border color and thickness are adjusted. The switch and scanning module provides a function to select by pressing the switch when the symbol cell is highlighted audibly and visually. The development of the AAC application designed in this study is needed.

Smartphone Color-Code based Gate Security Control

  • Han, Sukyoung;Lee, Minwoo;Mariappan, Vinayagam;Lee, Junghoon;Lee, Seungyoun;Lee, Juyoung;Kim, Jintae;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.66-71
    • /
    • 2016
  • Smart building gate security control system using smartphone integrated with near field communication (NFC) has become part of daily life usage these days. The technology change in replacing RF NFC device using visible light communication technology based approach growing faster in recent days. This paper propose a design and development of gate security control system using color code based user authentication ID generation as part of an intelligent access control system to control automatic door open and close. In this approach gate security access control use the recent visible light communication technology trends to transfer the user specific authentication code to door access control system using color code on smartphone screen. Using a camera in the door access control system (ACS), color codes on smartphone screens are detected and matched to the database of authenticated user to open the door automatically in gate security system. We measure the visual light communication technology efficiency as a part of the research and the experiments have revealed that more than 95% users authenticated correctly at the suggested experiment environment on gate security control system.