• Title/Summary/Keyword: MOBILE PC

Search Result 968, Processing Time 0.024 seconds

A Property-Based Data Sealing using the Weakest Precondition Concept (최소 전제조건 개념을 이용한 성질 기반 데이터 실링)

  • Park, Tae-Jin;Park, Jun-Cheol
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.1-13
    • /
    • 2008
  • Trusted Computing is a hardware-based technology that aims to guarantee security for machines beyond their users' control by providing security on computing hardware and software. TPM(Trusted Platform Module), the trusted platform specified by the Trusted Computing Group, acts as the roots for the trusted data storage and the trusted reporting of platform configuration. Data sealing encrypts secret data with a key and the platform's configuration at the time of encryption. In contrast to the traditional data sealing based on binary hash values of the platform configuration, a new approach called property-based data sealing was recently suggested. In this paper, we propose and analyze a new property-based data sealing protocol using the weakest precondition concept by Dijkstra. The proposed protocol resolves the problem of system updates by allowing sealed data to be unsealed at any configuration providing the required property. It assumes practically implementable trusted third parties only and protects platform's privacy when communicating. We demonstrate the proposed protocol's operability with any TPM chip by implementing and running the protocol on a software TPM emulator by Strasser. The proposed scheme can be deployed in PDAs and smart phones over wireless mobile networks as well as desktop PCs.

  • PDF

A Specific Characters of Products In viewpoint of Inter-combination with Human -Concentrated on Inter-Combined Products′Type and Feather- (인간과 인터컴비네이션 관점에서의 제품특성연구 -상호결합제품의 유형과 특징을 중심으로-)

  • 진선태;박영목
    • Archives of design research
    • /
    • v.14 no.3
    • /
    • pp.145-154
    • /
    • 2001
  • These days, the products like Walkman, mobile phone, notebook PC, PDA are moving together with our body, and in the imaginary world like internet, our other self, Avatar is moving in place of our body on the cyber world. These products are related with our human body, and when considering the ones, attached to the human body, and having the meaning of mental combination like these, as the combination of the human and the products, it is necessary to examine these products in approaching them with respect to the combination relation between the human and the products. As a result of examining we can understand that the products, said to combine with the human body, are coming oui steadily. and recently, the inclination on the combination and the movement appears strongly. As this background, there are a breakdown of dichotomy thought, mixed sexual imitation, cyber culture, techno culture. concept of informative nomands, phenomenon which the division of human and machine becomes vague. and the miniaturization of products. imitation of human, phenomenon that the Inclination on the combination with human is more accelerated by networking. These products combine with human body at each wearing type in the various forms. Its functions become multi-layered, and closer to the human body physically. or its communication becomes high·graded and, they have the recombined form through the existing products which the human has And, they communicate each other. have the strong fashionable property, and the characteristics like the imaginary product to imitate the human body and substitute for the human behave.

  • PDF

Research on Light Application System for the Dynamic Moving Effect of The Design on Porcelain (도자기 표면의 문양을 역동적으로 움직이는 효과를 갖는 광응용 시스템연구)

  • Ryoo, Hee Soo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.11
    • /
    • pp.205-210
    • /
    • 2014
  • This is concerned with the technology to display the design on Porcelain and adjust malfunction for moving effect and light intensity by curator. More precisely, the technology makes it possible that the porcelain is connected to Light module which is the device for controlling light emission and rotating rolling plate, etc that are connected to LED light module, optical fiber and controller that is for scenario from the given storytelling. In addition, with a WiFi portable device (Smart-phone, other mobile device). equipped with a scenario programs, information for operation, failure and malfunction can be obtained and analyzed in real-time, and menu color and alarm is alerted when the displaying design is in abnormal status, which makes the early reactions to the status. Furthermore, the collected data can be sent through WiFi network to the device and PC managed by the curator specialized in managing the design on the Porcelain, thus the technology could help the curator who have less knowledge about moving pattern on the Porcelain. There is always a possibility of malfunction due to various condition that are caused by wring-harness when modules are wired-connected. In this research, in order to overcome this problem, we propose a system configuration that can do monitoring and diagnosis with a device for collecting data from LED control module, Light emission sensor and a personal WiFi device. Also, we performed connection between optical Fiber and LED and interlock for the system defined by the definition for information and storytelling scenario.

Shoulder Surfing Attack Modeling and Security Analysis on Commercial Keypad Schemes (어깨너머공격 모델링 및 보안 키패드 취약점 분석)

  • Kim, Sung-Hwan;Park, Min-Su;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1159-1174
    • /
    • 2014
  • As the use of smartphones and tablet PCs has exploded in recent years, there are many occasions where such devices are used for treating sensitive data such as financial transactions. Naturally, many types of attacks have evolved that target these devices. An attacker can capture a password by direct observation without using any skills in cracking. This is referred to as shoulder surfing and is one of the most effective methods. There has been only a crude definition of shoulder surfing. For example, the Common Evaluation Methodology(CEM) attack potential of Common Criteria (CC), an international standard, does not quantitatively express the strength of an authentication method against shoulder surfing. In this paper, we introduce a shoulder surfing risk calculation method supplements CC. Risk is calculated first by checking vulnerability conditions one by one and the method of the CC attack potential is applied for quantitative expression. We present a case study for security-enhanced QWERTY keyboard and numeric keypad input methods, and the commercially used mobile banking applications are analyzed for shoulder surfing risks.

AS B-tree: A study on the enhancement of the insertion performance of B-tree on SSD (AS B-트리: SSD를 사용한 B-트리에서 삽입 성능 향상에 관한 연구)

  • Kim, Sung-Ho;Roh, Hong-Chan;Lee, Dae-Wook;Park, Sang-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.18D no.3
    • /
    • pp.157-168
    • /
    • 2011
  • Recently flash memory has been being utilized as a main storage device in mobile devices, and flashSSDs are getting popularity as a major storage device in laptop and desktop computers, and even in enterprise-level server machines. Unlike HDDs, on flash memory, the overwrite operation is not able to be performed unless it is preceded by the erase operation to the same block. To address this, FTL(Flash memory Translation Layer) is employed on flash memory. Even though the modified data block is overwritten to the same logical address, FTL writes the updated data block to the different physical address from the previous one, mapping the logical address to the new physical address. This enables flash memory to avoid the high block-erase cost. A flashSSD has an array of NAND flash memory packages so it can access one or more flash memory packages in parallel at once. To take advantage of the internal parallelism of flashSSDs, it is beneficial for DBMSs to request I/O operations on sequential logical addresses. However, the B-tree structure, which is a representative index scheme of current relational DBMSs, produces excessive I/O operations in random order when its node structures are updated. Therefore, the original b-tree is not favorable to SSD. In this paper, we propose AS(Always Sequential) B-tree that writes the updated node contiguously to the previously written node in the logical address for every update operation. In the experiments, AS B-tree enhanced 21% of B-tree's insertion performance.

A Study on the Improvements of eBook Services for Children in the Public Library (공공도서관 어린이 전자책 서비스 개선방안에 관한 연구)

  • Baek, Ji-Won
    • Journal of Information Management
    • /
    • v.43 no.1
    • /
    • pp.63-87
    • /
    • 2012
  • This study aims to analyse the actual condition of the ebook services and propose the improvements of ebook services for children in the Korean public library. For this purpose, the current condition of the ebook services in the public libraries were analyzed and categorized by three criteria. Secondly, the ebook use analysis was conducted using PCs and mobile devices in terms of access to ebook library site, searching method, contents type and viewer, lending process, and user help. As a result of the analysis, several issues such as the difficulty in access to ebook site, the complexity of setting and usage depending on the file format, the insufficient user guide, the relatively lower quality service than the commercial's, and the lack of retrieval functions specialized for the ebook were presented. The improvement plan for the ebook services, especially for children in the public library was suggested.

Design of method to analyze UI structure of contents based on the Morphology (형태적 관점의 콘텐츠 UI구조 분석 방법 설계)

  • Yun, Bong Shik
    • Smart Media Journal
    • /
    • v.8 no.4
    • /
    • pp.58-63
    • /
    • 2019
  • The growth of the mobile device market has changed the education market and led to the quantitative growth of various media education. In particular, smart devices, which have better interaction than existing PCs or consoles, can develop more user-friendly content, allowing various types of educational content and inducing changes in traditional education methods for consumers. Although many researchers recently suggest viable development methods or marketing elements of contents, development companies, and developers, until now, merely rely on the human senses. Therefore, it is necessary to study the actual user's smart-device based usability and experience environment. This study aims to propose an intuitive statistical processing method for analyzing the usability of game-type educational contents in terms of form, for popular games that have been released as a basis for analyzing the user experience environment. In particular, because the game industry has a sufficient number of similar examples, it is possible to conduct research based on big data and to use them for immediate decision-making between multiple co-developers through the analysis method proposed by the research. It is expected to become an analytical model that can communicate with other industries because it is effective in securing data sources.

A Study on the Librarians' Perception about the Future of Libraries in the era of the 4th Industrial Revolution (4차 산업혁명 시대 도서관의 미래상에 대한 사서 인식조사)

  • Park, Tae-Yeon;Gang, Ju-Yeon;Kim, Yong;Kim, Tae-Kyung;Oh, Hyo-Jung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.52 no.1
    • /
    • pp.203-229
    • /
    • 2018
  • This study examined current status and futurity of libraries based on the survey of librarians awareness in the era of the $4^{th}$ Industrial Revolution and sought to find effective response strategies for future changes. For this purpose, this study reviewed research issues against the $4^{th}$ Industrial Revolution based on preceding researches in our library area and other fields. The awareness survey was conducted of librarians of several types including national libraries and public libraries. The results are as follows: First, librarians were interested in the $4^{th}$ Industrial Revolution, but they thought that new technologies are poorly adopted in their libraries. Second, librarians were most frequently using Desktop PCs, mobile phones, RFID tags, and QR codes for library services. Third, librarians were required intelligent-information services because of their effectiveness, but their libraries did not provide them for users. Fourth, librarians expected that the $4^{th}$ Industrial Revolution brings positive influences to libraries' future. On the other hands, they also concerned about their job losses. Fifth, librarians agreed with necessity of new technologies of the $4^{th}$ Industrial Revolution and they especially wanted educations and training related with technologies. Also, technical supports for online services and simply repeated works are required.

교실은 어떻게 '스마트'해지는가?

  • JEONG, Hanbyul
    • Journal of Science and Technology Studies
    • /
    • v.19 no.3
    • /
    • pp.201-246
    • /
    • 2019
  • Information technology is sometimes considered as a cause that puts education in a big crisis, or it can be seen as a savior. In 2011, the Korean government announced that it would innovate education and build a talented nation by bringing IT into schools of public education system through the SMART education policy. The policy initiative aimed to establish a standard classroom models that can be diffused all over the country's schools so that teachers and students may become familiar of using devices such as tablet PCs and laptops. This paper analyzes how the smart classrooms caused friction in the actual education practices. To this end, I analyzed the direction and ideals of the SMART education policy by reading government policy document and design guidelines officially published, and visited three elementary schools that are actually building and operating a smart classroom environment to visit the facilities and have in-depth interviews with teachers and technicians. The ideal type of classroom proposed by the smart education policy was a package equipped with various functions at once in a neatly designed space like a "model house", but it was difficult to be used as a normal classroom in everyday life of school. Instead of copying and installing the model, each school decided to get "smart" in its own way, depending on how factors such as size, local characteristics, socioeconomic conditions of students and teachers, teacher experiences, and the level of existing infrastructure were combined. In Elementary School A, the machines tamed specific space of the school to create their own space, while following the rules of the school for being mobile. Although Elementary School B could not construct fully supported environment that encompassed the entire school, the system was organized with the help of well trained teacher's experiences in other schools. In Elementary School C, the machines are concentrated on specific classrooms and they promote teacher's professionalism. The components of the smart classroom were disassembled and recombined in context to make each school's classroom "smart".

Analyses on Attitudes to Smart Education-related Variables Based on Parents' Age, Levels of Education and Income (학부모의 연령, 학력 및 소득수준에 따른 스마트교육 관련변인 태도분석)

  • Kim, Jae-Hoon;Park, Young-Ran;Lim, Keol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.255-264
    • /
    • 2013
  • This research was conducted to analyze parents' attitudes on the issues related to the Smart Education Initiative Korea. The questions included the usefulness of major digital tools for educational purposes, knowledge on the Smart Education, necessity for better educational methods, and Bring Your Own Devices (BYOD) policy. A total of 432 response cases from the parents were analyzed considering the parents' age, academic level, and income. As a result, parents regarded desktop PCs as more effective tools for learning when compared to tablet PCs. Meanwhile, mobile devices and SNSs were hardly considered as instructional tools. Second, familarity and understanding of the Smart Education were proportional to household income and mothers' education levels. Third, parents needed for the change in educational methods and agreed with the importance of students' self-regulated learning, collaboration, inquiry ability and creativity. Fourth, regarding BYOD, parents were willing to buy devices with a reasonable price. In conclusion, it is required to reflect the results of the study when implementing the Smart Education throughout the nation.