• Title/Summary/Keyword: Mobile Server

Search Result 1,299, Processing Time 0.025 seconds

Design and Implementation of Reception Systems for Non-Face-To-Face Medical Services (비대면 의료 서비스를 위한 접수시스템 설계 및 구현)

  • Baek, Yu-Jin;Lee, Hyo-Seung;Oh, Jae-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.5
    • /
    • pp.975-980
    • /
    • 2021
  • As technology utilizing low-power short-range wireless communication is applied in conjunction with medical information as a development of the fourth industrial revolution, interest in medical information is increasing. As the age group of smart devices increases and becomes more common, related research such as linking mobile devices with various objects and equipment is continuously being conducted. In addition, interest in untact (non-face-to-face) is increasing due to the prevalence of Coronavirus Disease-19 (COVID-19), including various infectious diseases. As a result, it is a state that requires distance not only in social but also in life. In this study, using a low-power near-field wireless communication technology of beacons to create an IoT device by communicating with the web server of the medical information system was studied to make it easier to receive medical treatment during visits to medical institutions.

Non-Interactive Oblivious Transfer Protocol based on EIGamal in WAP (WAP에서 사용 가능한 ElGamal 기반의 비대화형 불확정 전송 프로토콜)

  • 정경숙;홍석미;정태충
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.11-18
    • /
    • 2003
  • As the Internet moves to mobile environment, one of the most serious problems for the security is to required a new security Protocol with safety and efficiency. To solve the problem. we Propose a new Protocol that reduces the communication franc and solves the problem associated with the private security keys supplied by the trusted third party. The protocol is a non-Interactive oblivious transfer protocol, based on the EIGamal public-key algorithm. Due to its Non-Interactive oblivious transfer protocol, it can effectively reduce communication traffic in server-client environment. And it is also possible to increase the efficiency of protocol through the mechanism that authentication probability becomes lower utilizing a challenge selection bit. The protocol complexity becomes higher because it utilizes double exponentiation. This means that the protocol is difficult rather than the existing discrete logarithm or factorization in prime factors. Therefore this can raise the stability of protocol.

Development of Medical Electric Scooter Sharing Platform for the Transportation Vulnerable (교통 약자를 위한 전동차 공유 플랫폼 개발)

  • Joo, Jong-Yul;Song, Hwa-Jung;Oh, Jae-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1323-1328
    • /
    • 2021
  • In this paper, we present a medical electric scooter sharing platform for the transportation vulnerable who are experiencing difficulties and inconveniences in moving. The proposed medical electric scooter sharing platform for the transportation vulnerable includes basic mobile rental, return, and functions that incorporate the IOT technology of the currently operating personal mobility sharing platform. The safety function has been strengthened. The medical electric scooter sharing platform for the transportation vulnerable stores driving data on the server in real time through GPS, and strengthens the alarm and call function in advance of an accident to enable rapid SOS processing. By making the quick contact and responding to the situation, people with disabilities can drive safely and comfortably.

Development of personal health management data server platform based on health care data (헬스케어 데이터 기반의 개인 건강관리 데이터 서버 플랫폼 개발)

  • Park, Doyoung;Song, Hojun
    • Journal of Platform Technology
    • /
    • v.10 no.1
    • /
    • pp.29-34
    • /
    • 2022
  • The emergence of new diseases such as the Covid 19 pandemic that occurs in the 21st century and the occurrence of health abnormalities according to the busy daily life of modern people are increasing. Accordingly, the importance of health care management and data-based health management is being highlighted, and in particular, interest in personal health management data based on personal health care data of patients is rapidly increasing. In this study, to solve the difficult problems of personal health management, we developed a personal health care platform incorporating IT for self-diagnosis and solution and developed an application that measures bio-signals generated in the human body and transmits them to the platform. A health management system was established. Through this, not only the health care of modern people, but also the psychological and emotional care support needs through psychological and emotional monitoring of the developmentally disabled and the vulnerable who have difficulty in expressing their opinions are to be addressed. In addition, the overall health and living environment data of the individual was integrated to develop an optimized medical and health management service for the individual.

Development of a System for Field-data Collection Transmission and Monitoring based on Low Power Wide Area Network (저전력 광역통신망 기반 현장데이터 수집 전송 및 모니터링 시스템 개발)

  • Yeong-Tae, Ju;Jong-Sil, Kim;Eung-Kon, Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1105-1112
    • /
    • 2022
  • Field data monitoring systems such as renewable energy generation and smart farm integrated control are developing from PC and server to mobile first, and various wireless communication and application services have emerged with the development of IoT technology. Low-power wide-area networks are services optimized for low-power, low-capacity, and low-speed data transmission, and data collected in the field is transmitted to designated storage servers or cloud-based data platforms, enabling data monitoring. In this paper, we implement an IoT repeater that collects field data with a single device and transmits it to a wireless carrier cloud data flat using a low-power wide-area network, and a monitoring app using it. Using this, the system configuration is simpler, the cost of deployment and operation is lower, and effective data accumulation is possible.

Design of a Secure Keypads to prevent Smudge Attack using Fingerprint Erasing in Mobile Devices (모바일 단말기에서 지문 지우기를 활용한 스머지 공격 방지를 위한 보안 키패드 설계)

  • Hyung-Jin, Mun
    • Journal of Industrial Convergence
    • /
    • v.21 no.2
    • /
    • pp.117-123
    • /
    • 2023
  • In the fintech environment, Smart phones are mainly used for various service. User authentication technology is required to use safe services. Authentication is performed by transmitting authentication information to the server when the PIN or password is entered and touch the button completing authentication. But A post-attack is possible because the smudge which is the trace of using screen remains instead of recording attack with a camera or SSA(Shoulder Surfing Attack). To prevent smudge attacks, users must erase their fingerprints after authentication. In this study, we proposed a technique to determine whether to erase fingerprints. The proposed method performed erasing fingerprint which is the trace of touching after entering PIN and designed the security keypads that processes instead of entering completion button automatically when determined whether the fingerprint has been erased or not. This method suggests action that must erase the fingerprint when entering password. By this method, A user must erase the fingerprint to complete service request and can block smudge attack.

Analysis and Improved Solution of Hussian et al.'s Authentication Protocol for Digital Rights Management

  • Mi-Og Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.5
    • /
    • pp.67-74
    • /
    • 2023
  • In this paper, we analyze the authentication protocol for DRM proposed by Hussain et al. in 2022, and present an improved solution. Hussain et al. argued that their authentication protocol guarantees man-in-the-middle attack, replay attacks, and mutual authentication. However, as a result of analyzing Hussain et al.'s authentication protocol in this paper, Hussain et al.'s authentication protocol still has an insider attack problem, a problem with Yu et al.'s authentication protocol that they pointed out. For this reason, when an inside attacker acquires information on a mobile device, a user impersonation attack was also possible. In addition, there were problems with the user's lack of ID format verification and the problem of the secret key mismatch of the digital contents between the server and the user. Therefore, this paper proposes an improved solution to solve these problems. As a result of analysis in this paper, the improved solution is safe from various attacks such as smart card attack, insider attack, and password guessing attack and can safely authenticate users of DRM.

A Study on the Latency Analysis of Bus Information System Based on Edge Cloud System (엣지 클라우드 시스템 기반 버스 정보 시스템의 지연시간 분석연구)

  • SEO Seungho;Dae-Sik Ko
    • Journal of Platform Technology
    • /
    • v.11 no.3
    • /
    • pp.3-11
    • /
    • 2023
  • Real-time control systems are growing rapidly as infrastructure technologies such as IoT and mobile communication develop and services that value real-time such as factory management and vehicle operation checks increase. Various solutions have been proposed to increase the time sensitivity of this system, but most real-time control systems are currently composed of local servers and multiple clients located in control stations, which are transmitted to local servers where control systems are located. In this paper, we proposed an edge computing-based real-time control model that can reduce the time it takes for the bus information system, one of the real-time control systems, to provide the information to the user at the time it collects the information. Simulating the existing model and the edge computing model, the edge computing model confirmed that the cost for users to receive data is reduced from at least 10% to up to 80% compared to the existing model.

  • PDF

5G based Smart Railway Communication Technology Trends (5G 기반 스마트 철도 통신 기술 동향)

  • Kim, Young-dong;Kim, Jongki;Lee, Sanghak;Park, Eunkyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.478-480
    • /
    • 2022
  • Smart Railway as a next generation railway technology is expected to have rapid evolution with developments of information and communications tehchology. Especially, smart railway will be progressed more evolved transportation means for railway operation and costomer service based with spread of commercial 5G communication. So, it is very important to investigate and analyze trends of smart railway related tehcnology of 5G mobile communication for samrt railway infra structure, server technolgy for AI, big data, deep learning, information security technology, sensor and IoT. In this paper, 5G based communicaion technology and application techology related smart railway is described and trends of new techlogy on this communication tehnology is investigated. The results of this study can be used for smart railway study and implementation, research and development for smart railway communicaion technology, etc.

  • PDF

Application for Workout and Diet Assistant using Image Processing and Machine Learning Skills (영상처리 및 머신러닝 기술을 이용하는 운동 및 식단 보조 애플리케이션)

  • Chi-Ho Lee;Dong-Hyun Kim;Seung-Ho Choi;In-Woong Hwang;Kyung-Sook Han
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.5
    • /
    • pp.83-88
    • /
    • 2023
  • In this paper, we developed a workout and diet assistance application to meet the growing demand for workout and dietary support services due to the increase in the home training population. The application analyzes the user's workout posture in real-time through the camera and guides the correct posture using guiding lines and voice feedback. It also classifies the foods included in the captured photos, estimates the amount of each food, and calculates and provides nutritional information such as calories. Nutritional information calculations are executed on the server, which then transmits the results back to the application. Once received, this data is presented visually to the user. Additionally, workout results and nutritional information are saved and organized by date for users to review.