• Title/Summary/Keyword: Mobile Phone Case

Search Result 206, Processing Time 0.028 seconds

Design and Implementation of an Enhanced Secure Android-Based Smartphone using LIDS

  • Lee, Sang Hun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.49-55
    • /
    • 2012
  • Recently, with the rapid development of android-based smartphones, it is becomes a major security issue that the case of Android platform is an open platform. so it is easy to be a target of mobile virus penetration and hacking. Even there are a variety of security mechanisms to prevent the vulnerable points of the Android platform but the reason of most of the security mechanisms were designed at application-level that highly vulnerable to the attacks directly to the operating system or attacks using the disadvantages of an application's. It is necessary that the complementary of the android platform kernel blocks the kernel vulnerability and the application vulnerability. In this paper, we proposed a secure system using linux-based android kernel applied to LIDS(Linux Intrusion Detection and Defense System) and applied a smart phone with s5pc110 chip. As a result, the unauthorized alteration of the application was prevented with a proposed secure system.

A Transmission Service Method for Processing Visual Recognition of Sender Information (발신자 정보에 대한 시각적 인식 처리를 위한 전송 서비스 기법)

  • 김기현
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.4
    • /
    • pp.328-336
    • /
    • 2004
  • Recently a mobile service is changing into a system environment that offers the customer various contents service. Representative example of service is a Calling Identity Del ivory Service(CID). Such service has the problem in the case which the receiver cannot remember the phone number of the sender; it has a difficult problem that cannot easily confirm whose the phone number it is. Therefore, it is desirable to design and implement visual services that can enhance the recognition of users. In this paper, we propose the architecture that is similar to a Calling Identity Delivery Service. We propose the architecture for communication service and system that is able to visually display the information of the sender using 2D image data in mobile environment. After that we set the image information to represent the user and this method is able to visually display the information of the sender by transmitting an image data through channels from switch station or base station using the server. When the receiver receives a phone call from the sender, this method provides an efficient service by transmitting visual data with bell sound. That is, the image information of sender is appeared on liquid crystal display(LCD) of the receiver at the same time. We investigate the concepts for processing real-time transmission of image data and describe an example of the implementation result that is based on system. This technology has a potential influence on the marketing and presents an efficiency of this method.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

A Study on the Improvement Directions of Mobile Simple Payment System: Usage Status Point of View (모바일 간편결제 시스템 개선 방향 연구: 이용 실태 관점)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.4
    • /
    • pp.51-62
    • /
    • 2019
  • Recently, as the number of Smart Phone users increase, the simple payment system has been able to make payments using only card information such as a registered password without extra authorized certificate authentication or input of card information. In this paper, it will examine and analyze simple payment system provided by IT companies and financial institutions and the simple payment system that operates global online payment system by case view of operational direction. Then with this examination, it will study ways to improve the problems with terms of convenience and stability in terms of users. In this paper, it will analyze the inconvenient problem in using the QR code system that recently introduced and will propose solutions. Also, it will propose suggestions to solve inconvenience that caused by system that supports NFC simple payment terminal in Korea is not universalize by analyze case study on the overseas simple payment system. It will also propose opinions on the matters that customer having responsible for event of a small financial accident related to loss or theft when using the simple payment system. Then it will suggest expected requirements to prepare new security technical countermeasures and solve the conditions of meeting expectation satisfaction of users.

Rethinking the Right to Culture in the Digital Age The Issues of Copying Culture and Content Curation (디지털 시대 문화 권리의 제고 복제문화와 콘텐츠 큐레이션의 쟁점)

  • Lee, Kwang-Suk
    • Korean journal of communication and information
    • /
    • v.74
    • /
    • pp.197-224
    • /
    • 2015
  • This paper critically investigates the cultural phenomenon surrounding the news mobile phone app in which 'curation', relying on the news editing and adaption, has become much more significant than making the news directly. This study affirms the fact that a copying culture which is basically a combinative effect of duplication (alias) and imitation(mimesis) enables us enrich the human beings' creative activities. However, we need to warn the regressive aspects of copying culture challenging the journalistic principles. This study exemplifies a case of Pikicast, which has become the most rapid growing news content mobile app in Korea. By doing a case study, this paper suggests that 'social gift' should be given to the online users as a whole. The communal and social gift would be an alternative way to the unpaid crawling of the news resources from the digital commons by the news content curating corporation such as Pikicast.

  • PDF

Analysis and Design on Mobile Application Based Social Dating Contents (모바일 앱 기반 소셜 데이팅 콘텐츠의 분석과 설계)

  • Lee, Hyo-Jung;Choi, Yoon-Ho;Lee, Byoung Yup;Lee, Jae-Won
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.4
    • /
    • pp.336-345
    • /
    • 2014
  • Social dating contents that transformed from online dating service needs understanding about the market status, magnitude, business concept and related area, and its development process. Nowadays the field of dating service had expanded from off-line to on-line, and then started to be changed to social dating services with the development of the highest smart phone penetration rate. Therefore, we investigated about the market, business concept and its functions of social dating application, and then classified the typology of those social dating applications according to feature with utilization rate of user. We had described about its partial deficits and improvements on the social dating application through comparative analysis and business model analysis about successful case. As conclusions, we suggested future strategies of competition and directivity with an improving way about concrete plan for industry development of social dating application.

Method of Fuzzing Document Application Based on Android Devices (안드로이드 기반 문서 어플리케이션의 퍼징 방법론 연구)

  • Jo, Je-Gyeong;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.31-37
    • /
    • 2015
  • As the forms of cyberattacks become diverse, there has been reported another case of exploiting vulnerabilities revealed while processing either a document or multimedia file that was distributed for attacking purpose, which would replace the traditional method of distributing malwares directly. The attack is based upon the observation that the softwares such as document editer or multimedia player may reveal inherent vulnerabilities on some specific inputs. The fuzzing methods that provide invalid random inputs for test purpose could discover such exploits. This paper suggests a new fuzzing method on document applications that could work in mobile environments, in order to resolve the drawback that the existing methods run only in PC environments. Our methods could effectively discover the exploits of mobile applications, and thus could be utilized as a means of dealing with APT attacks in mobile environments.

A Case of IT System Development for Engineering Education of Low-carbon & Green-growth (저탄소 녹색성장 공학 교육을 위한 IT 시스템 개발 사례)

  • Kang, Minshik
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.3 no.2
    • /
    • pp.27-33
    • /
    • 2011
  • Recently, the most important paradigm is to prepare future and to protect the environment through the carbon savings occurs in everyday life and whole industry. For the success of this new paradigm, Korean government encourages the green certification and the development of green technologies and green growth as one of the important policies are adopted and implemented. Public agencies and companies establish the plans about the carbon savings and implement a lot of research has moved on using IT technology. There are some attempts in Korea to use as an electronic document instead of the use of paper document using these green IT and mobile devices. In this paper, the waiting sequence system using mobile phone is proposed as an example of practical engineering education for 'Low carbon, Green growth'.

  • PDF

Consumer Satisfaction Model for Digital Convergence Products (디지털컨버전스 제품에 대한 소비자만족모델)

  • Yoo, Hyun-Jung
    • Journal of Families and Better Life
    • /
    • v.27 no.5
    • /
    • pp.25-42
    • /
    • 2009
  • This study examines the actual state of using digital convergence products by consumers, and analyzes the expectation that consumers have regarding digital convergence products and the actual satisfaction of the digital convergence products. In addition, it analyzes factors affecting the satisfaction with digital convergence products. First, mobile phones, which 99.4% of those surveyed had, cameras, which 90.6% had, and mp3s, which 71.8% had, were found to be necessities. Second, the ratio of owning digital convergence products was 79.5%, 48.1%, and 52.4%, respectively. In the case of a mobile phones, a digital convergence type is already common. Third, regarding the reason for purchasing digital convergence products, they chose convergence products because there was no product with a simple function that they wanted to have: 38.2% in terms of a mobile phone, 47.2% for a camera, and 28.2% for an mp3. This shows that a consumer's choice was infringed in a great deal at the back of remarkable quantitative growth in digital convergence products. Fourth, the analysis of the factor regarding the consumer's expectation on digital convergence products showed 3 kinds of factors, i.e., expectation of benefit, expectation of risk, and expectation of situation. Fifth, as a result of analyzing the structural model regarding the effect on satisfaction by a consumer's expectation and the outcome on digital convergence products, all the expectations and outcomes of benefit, risk, and situation did not have a direct effect on satisfaction. Only an indirect effect through inconsistency showed a statistical significance.

A Novel D2D Communication Scheme for Location-Based OTT Service in Cellular Networks (셀룰러 통신망에서 위치기반 OTT 서비스 지원을 위한 D2D 통신 방안)

  • Han, Kyeong-Il;Min, Sang-Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.6
    • /
    • pp.195-207
    • /
    • 2017
  • Since the smart phone was first introduced, the amount of mobile traffic has increased explosively. The OTT service with personal broadcasting and TV contents and the number of users have been increased in wired network, and there are needs to expand the OTT service to mobile network. In the case of the OTT service in mobile network, the relative small and finite resource may cause the overload of the network due to the massive and high transfer rate. In this paper, we consider a future situation of the OTT user services in the cellular network and propose a novel D2D communication scheme for location-based OTT service, which can reduce and distribute the amount of video traffics. To effectively handle the traffic of OTT services, we propose D2DS and LCS functional blocks in EPC network, which can provide location-based service and D2D management. And, we suggest additional procedures for the location-based service of both content provider and contents receiver UEs with the operation of the proposed D2DS and LCS function block.