• Title/Summary/Keyword: Mobile Device Management

Search Result 449, Processing Time 0.025 seconds

Mobile database server management system (모바일 데이트베이스 서버 관리 시스템)

  • Zheng, Bao-Wei;Park, Sang-Gug
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.645-648
    • /
    • 2007
  • This paper describes database server management system by mobile device. Our system can control database server immediately in any where by mobile device. We have developed the dataset server CE which interface with mobile device, database management system which rons in mobile device and web services which connect the mobile database with desktop database. External mobile device communicate with web service agent via wireless equipment. Our system includes dataset server CE client engine, web service server agent and mobile device management system. Through the test by an application program, we have confirmed that our system operates very well each others.

  • PDF

Design of Device Management System for Removing Smartphone Malware (스마트폰 악성코드 제거를 위한 단말 관리 시스템 설계)

  • Jeong, Gi-Seog
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.67-75
    • /
    • 2011
  • Recently, the number of smartphone users is rising rapidly due to an influx of foreign smartphones and sales of domestic products. According to the increase of smartphone users, smartphone malwares are also increasing sharply. Hence it is necessary to protect smartphone against mobile malwares. There are device management protocols as SNMP, TR-069. But these protocols are not suitable for mobile device management because of restrictive management function and unsupported mobility. OMA DM which is a standard for mobile device management has been adopted as mobile device management protocol for most of 2G,3G. Thus it amounts that OMA DM is suitable for smartphone management system. In this paper, the mobile device management system based on OMA DM is designed. This system can remove smartphone malware by remote control.

A Scheme for Detecting and Preventing an Unauthorized Device Using Context Awareness and Mobile Device Management (상황 인지 기술과 모바일 단말 관리 기술을 이용한 비인가 단말 탐지 및 차단 기법)

  • Mun, Jiman;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.1
    • /
    • pp.1-8
    • /
    • 2014
  • This paper proposed a method that prevents data leakage and modulation and detects an unauthorized device by using AP and mobile device. Most of existing method for detecting and preventing an unauthorized device are similar to type of Evil Twin. However, in previous studies can not resolve many security accident and have the problem to cope with effectively security accident on various network. In order to solve these problem, companies prepare security accident through the varies policy and guideline. but It is hard to prevent all security accident because it is consistently increasing everyday. This paper suggests technique of detecting and preventing an unauthorized device using Context Awareness and Mobile Device Management. Firstly, when mobile device go into internal network, server distinguish access permission and authorization of mobile device using acquiring the conetxt information of mobile device. By using this result, server applies the appropriate management technique to the mobile device for leakage and accident of internal network.

Design and Implementation of the Management Agent for Mobile Devices based on OMA DM (이동 단말기를 위한 OMA DM 기반 관리 에이전트 설계 및 구현)

  • Shin, Jae-Young;Jung, Young-Woo;Ko, Kwang-Sun;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.15C no.1
    • /
    • pp.61-68
    • /
    • 2008
  • With the rapid advancement of mobile communication, mobile devices are evolving into convergence devices with various multimedia capabilities. But, high performance of devices demands complicated settings, and thus contains latent error possibilities, and poor system performance caused by the collision of different softwares. To solve these problems, device management becomes an important issue. Open Mobile Alliance(OMA) developed OMA DM(Device Management), which is a device management standard. Recently released OMA DM v1.2 provides improved mobile device management methods compared to earlier versions. This paper introduces design and implementation of OMA DM v1.2 based management agent. By using Tree and Description Serialization(TNDS) for acquiring, adding, and editing objects in the mobile devices, it provides more effective device management with small amount of network traffic.

Implementation of GPS Based Location Management System (GPS를 이용한 위치관리시스템 구현)

  • Choi, Jae-Myeong;Kang, Heau-Jo;Lee, Sang-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.1
    • /
    • pp.15-21
    • /
    • 2008
  • In this paper, person monitoring and personal identification information management by using the location positioning device and the location management system based on GPS is analysed and developed. Mobile HTE(Mobile HTE : Mobile Home Terminal Equipment) of the developed system uses the module for transmitting PID(Personal Identification Device) information and the module based on GPS's location information. HTE transmits the received information from Mobile HTE to the Location Management System through the internet system. The Location Management System is developed for person location management and information management.

  • PDF

Extended document format map service for mobile device (바일 기기를 위한 확장 문서 포맷의 맵 서비스)

  • Kim, Jung Sook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.83-94
    • /
    • 2010
  • Mobile network infrastructure is being completed with the development of hardware and software for mobile devices. Network in mobile devices has evolved for telematics that is expanded much more than its existing concept. Telematics is compound word that is formed from the words "telecommunication" and "informatics". It means that telematics performs control and monitoring service with using mobile device resources. These services provide their services for users' requests through wired or wireless network from mobile devices and server that offers contents and network service collects management information of mobile devices. Map service is one of the preferred services for many telematics users. However, mobile map service has a limit between traffic and information sharing. Therefore it is very important to supply their information for both service provider and terminal user. In this paper, we design a new interactive sketch map using routes and information on the space to be applied effectively, and provide an extended document format that is defined to an extensible and dynamic clustering scheme to have portability map service for mobile device.

A Study on Quality Evaluation Model of Mobile Device Management for BYOD (BYOD 환경의 MDM 보안솔루션의 품질평가모델에 관한 연구)

  • Rha, HyeonDae;Kang, SuKyoung;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.6
    • /
    • pp.93-102
    • /
    • 2014
  • A mobile office environment using mobile devices, such as tablet PC, mobile phone is gradually increased in enterprises, banking and public institutions etc which is no limitation on places. It occurs advanced and persist security threats that are required effective security management policy and technical solution to be secure. For BYOD (Bring Your Own Device) environment, technical security management solutions of network control based, MDM (Mobile Device Management), MAM (Mobile Application Management), MCM (Mobile Contents Management) were released, evolved and mixed used. In perspective of integrated security management solution, mobile security product should be selected to consider user experience and environment and correct quality evaluation model of product is needed which is provided standards and guidance on the selection criteria when it was introduced. In this paper, the most widely used MDM solution is selected to take a look at its features and it was reviewed the product attributes with related international standard ISO/IEC25010 software quality attributes. And then it was derived evaluation elements and calculated the related metrics based on the quality analysis model. For the verification of quality evaluation model, security checks list and testing procedures were established; it applied metrics and analyzed the testing result through scenario based case study.

  • PDF

Copyright Protection using Encryption of DCT Coefficients and Motion Vector in Video Codec of Mobile Device (모바일 기기내의 비디오 코덱에서 DCT 계수와 움직임 벡터의 암호화를 이용한 저작권 보호)

  • Kwon, Goo Rak;Kim, Young Ro
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.1
    • /
    • pp.41-46
    • /
    • 2008
  • With widespread use of the Internet and improvements in streaming media and compression technology, digital music, video, and image can be distributed instantaneously across the Internet to end-users. However, most conventional Digital Right Management are often not secure and fast enough to process the vast amount of data generated by the multimedia applications to meet the real-time constraints. In this paper, we propose the copyright protection using encryption of DCT coefficients and motion vector in MPEG-4 video codec of mobile device. This paper presents a new Digital Rights Management that modifies the Motion Vector of Macroblock for mobile device. Experimental results indicate that the proposed DRM can not only achieve very low cost of the encryption but also enable separable authentication to individual mobile devices such as Portable Multimedia Player and Personal Digital Assistants. The performance of the proposed methods have low complexity and low increase of bit rate in overhead.

A Mobile Stress Management System utilizing Variable Voice Information According to the Wearing Area

  • Kang, Byeongsoo;Vannroath, Ky;Kang, Hyun-syug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.6
    • /
    • pp.95-100
    • /
    • 2017
  • Recently, as stress has become a major threat to people's health, there is a growing interest in wearable stress management services for stress relief. In this paper, we developed a wearable device(Care-on) capable of extracting changeable human voice information at each site and a Healthcare App(S-Manager) that enables stress management in real time using the wearable device. It collects and analyzes variable real-time voice information for each part of the person's body. And It also provides the ability to monitor stress conditions in a mobile environment and provide feedback on the analysis results in step by step in the mobile environment. We tested the developed wearable devices and app in a mobile environment and analyzed the results to confirm their usefulness.

Implementation of the Mobile Device Management for Updating the Cellphone Software (효과적인 단말 Software 업데이트를 위한 Mobile Device Management 기법)

  • Jee, Chang-Woo;Kim, Hyeong-Doo;Lee, Uk-Jae;Seo, Tae-Sam;Kim, Min-Seok
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.371-375
    • /
    • 2007
  • In this paper, we have implemented the device management system to upgrade T-PAK software in mobile phone. The hybrid scheduling method and selective upgrade method are proposed. Hybrid scheduling method is based on distribution of delivery data in accordance with network traffic load and service priority from device management server to mobile phone. Selective upgrade method manages DSL classified by T-PAK software version to be upgrade using version management established in OMA DM SCOMO. Key mechanism of selective upgrade method is to only deliver DSL to be replaced to the mobile phone. We made an experiment on two methods using MS-700T terminals. The experimental result shows that the proposed method is faster than normal from delivery time standpoint.

  • PDF