• Title/Summary/Keyword: Mobile Convergence Device

Search Result 257, Processing Time 0.026 seconds

The Technological Method for Safe Processing of Sensitive Information in Network Separation Environments (망분리 환경에서 민감정보를 안전하게 처리하기 위한 기술적 방안)

  • Juseung Lee;Ilhan Kim;Hyunsoo Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.125-137
    • /
    • 2023
  • Companies that handle sensitive information, led by public institutions, establish separate networks for work and the Internet and protect important data through strong access control measures to prevent cyber attacks. Therefore, systems that involve the junction where the Intranet(internal LAN for work purposes only) and the Internet network are connected require the establishment of a safe security environment through both administrative and technical measures. Mobile Device Management(MDM) solutions to control mobile devices used by institutions are one such example. As this system operates by handling sensitive information such as mobile device information and user information on the Internet network, stringent security measures are required during operation. In this study, a model was proposed to manage sensitive information data processing in systems that must operate on the Internet network by managing it on the internal work network, and the function design and implementation were centered on an MDM solution based on a network interconnection solution.

Predicting User Profile based on user behaviors (모바일 사용자 행태 기반 프로파일 예측)

  • Sim, Myo-Seop;Lim, Heui-Seok
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.7
    • /
    • pp.1-7
    • /
    • 2020
  • As the performance of mobile devices has dramatically improved, users can perform many tasks in a mobile environment. This means that the use of behavior information stored in the mobile device can tell a lot of users. For example, a user's text message and frequently used application information (behavioral information) can be utilized to create useful information, such as whether the user is interested in parenting(profile prediction). In this study, I investigate the behavior information of the user that can be collected in the mobile device and propose the item that can profile the user. And I also suggest ideas about how to utilize profiling information.

mVoIP Vulnerability Analysis And its Countermeasures on Smart Phone (스마트폰에서 mVoIP 취약성 분석 및 대응 방안)

  • Cho, Sik-Wan;Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.3
    • /
    • pp.7-12
    • /
    • 2012
  • mVoIP (mobile Voice over Internet Protocol) service is a technology to transmit voice data through an IP network using mobile device. mVoIP provides various supplementary services with low communication cost. It can maximize the availability and efficiency by using IP-based network resources. In addition, the users can use voice call service at any time and in any place, as long as they can access the Internet on mobile device easily. However, SIP on mobile device is exposed to IP-based attacks and threats. Observed cyber threats to SIP services include wiretapping, denial of service, and service misuse, VoIP spam which are also applicable to existing IP-based networks. These attacks are also applicable to SIP and continuously cause problems. In this study, we analysis the threat and vulnerability on mVoIP service and propose several possible attack scenarios on existing mobile VoIP devices. Based on a proposed analysis and vulnerability test mechanism, we can construct more enhanced SIP security mechanism and stable mobile VoIP service framework after eliminating its vulnerability on mobile telephony system.

User Authentication Using Biometrics and OTP in Mobile Device (중소기업형 바이오정보와 OTP를 이용한 사용자 인증)

  • Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.27-31
    • /
    • 2014
  • According to increasing of payment and settlements like smart banking, internet shopping and contactless transaction in smart device, the security issues are on the rise, such as the vulnerability of the mobile OS and certificates abuse problem, we need a secure user authentication. We apply the OTP using biometrics and PKI as user authentication way for dealing with this situation. Biometrics is less risk of loss and steal than other authentication that, in addition, the security can be enhanced more when using the biometric with OTP. In this paper, we propose a user authentication using biometrics and OTP in the mobile device.

  • PDF

Developing Measures for Empirical Research on Economic Activities of the Convergence Generation: Exploratory Approach

  • Park, Ki-Ho
    • Journal of Digital Convergence
    • /
    • v.9 no.1
    • /
    • pp.61-70
    • /
    • 2011
  • Ultimately, this research will focus on the activity traits of future customers in the convergence age. To accomplish that, firstly, researcher develop measures for assessing the convergence level of digital devices and digital services. Next, this will investigate the behavioral traits of people who use specific devices or services on the internet or mobile networks. This study proposed five convergence measures each for devices and services. For digital devices, measures such as converged functions, accessibility to network, portability, immediate communicability, and expandibility of functions were utilized. For digital measures such as scope of users, newness, social network level, ease-of use on mobile networks, and expandibility of information were used. We believe that the research results can provide insights for those wishing to explore the convergence level of devices and services and those developing high-level converged devices and digital services.

Smart Phone and Vehicle Authentication Scheme with M2M Device (M2M 기기에서 스마트폰 및 차량 인증 기법)

  • Yeo, Seong-Gwon;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.4
    • /
    • pp.1-7
    • /
    • 2011
  • As the developing of the information technology, M2M market that is using communication between devices is growing rapidly and many companies are involved in M2M business. In this paper, the concept of telematics and vulnerabilities of vehicle network security are discussed. The convergence of vehicle and information technology, the development of mobile communication technology have improved quality of service that provided to user but as a result security threats has diverse. We proposed new business model that be occurred to the participation of mobile carriers in telematics business and we analyzed mobile radio communication network security vulnerabilities. We proposed smart phone and Vehicle authentication scheme with M2M device as a way to solve vulnerabilities.

Simulation Studies for Noninvasive Optical Measurements of Blood-Scattering Changes in a Skin Model with a Large Blood Vessel

  • Zephaniah, Phillips V;Paik, Seung-ho;Nam, Jungyong;Chang, Ki Young;Jung, Young-Jin;Choi, Youngwoon;Lee, Joonhyung;Kim, Beop Min
    • Current Optics and Photonics
    • /
    • v.3 no.1
    • /
    • pp.46-53
    • /
    • 2019
  • Monte Carlo simulations were performed for a three-dimensional tissue model with and without an embedded large vessel, to understand how varying vessel geometry affects surface light distribution. Vessel radius was varied from 1 to 5 mm, and vessel depth from 2 to 10 mm. A larger difference in surface fluence rate was observed when the vessel's radius increased. For vessel depth, the largest difference was seen at a depth of approximately 4 mm, corresponding to human wrist region. When the vessel was placed at depths greater than 8 mm, very little difference was observed. We also tested the feasibility of using two source-detector pairs, comprising two detectors distinctly spaced from a common source, to noninvasively measure blood-scattering changes in a large vessel. High sensitivity to blood-scattering changes was achieved by placing the near detector closer to the source and moving the far detector away from the source. However, at longer distances, increasing noise levels limited the sensitivity of the two-detector approach. Our results indicate that the approach using two source-detector pairs may have potential for quantitative measurement of scattering changes in the blood while targeting large vessels near the human wrist region.

Secure Authentication with Mobile Device for Ubiquitous RFID Healthcare System in Wireless Sensor Networks

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.562-566
    • /
    • 2011
  • As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure M-health systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.

Functions for RFID Middleware Development on Mobile Device Emulator (모바일 단말 에뮬레이터에서 RFID 미들웨어 구현을 위한 기능 연구)

  • Ye, Seoung-Bin;Han, Soon-Hee;Ceong, Hee-Taek
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.2
    • /
    • pp.106-111
    • /
    • 2008
  • At the ubiquitous computing, Mobile RFID, which the convergence RFID and mobile device, researches are core method and infra to service B2B, B2C, and B2B2C service domain. We propose the functions of middleware to develop the mobile RFID device. It consists of multi-code integrated recognition module, the reader control module, the module code interpretation, and Dispatcher module. These functions can recognize the tag of EPC/ISO and mCode type. We describe the zone file of local ODS and the implemented module to read the 13.56MHz tag.

  • PDF

SOCKET-based mobile SNS interlocking System Design and Implementation (SOCKET기반 모바일SNS 연동시스템 설계 및 구현)

  • Koh, Wan-Ki;Koh, Seok-Yong;Kim, Je-Seok
    • Journal of Digital Convergence
    • /
    • v.11 no.8
    • /
    • pp.367-373
    • /
    • 2013
  • Mobile SNS is a new paradigm of the communication. These days, mobile services communicate with server by client applications. TALK or PUSH provide services using TCP/IP software in operation system through massage or data by socket. Thus, SNS and mobile convergence are necessary and new service is constructed using platform of SNS. In this paper, we design and implement TALK and PUSH services between clients by location based SNS using the socket type.