• Title/Summary/Keyword: Mobile Server

Search Result 1,299, Processing Time 0.025 seconds

Chronic Disease Management using Smart Mobile Device (스마트 모바일 기기를 이용한 만성질환 관리)

  • Kim, Gui-Jung;Han, Jung-Soo
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.335-342
    • /
    • 2014
  • According to the recent trends in the growing elderly population, the chronically ill have increased. Thus the importance of the health care issues for them has emerged. In this paper, we want to implement a chronic disease management system using smart mobile devices. Proposed chronic disease management system is consisted of the biometric sensor, smart mobile devices, the patient management server, patient management DB, and patient symptoms analysis agent. The biometric sensor detects a biological information. Smart mobile devices receive the patient information from the sensor and transmit the information to the patient management server. The patient management server, patient management DB, and patient symptoms agent analysis agent analyze to process data delivered through a wireless communication network. Bio-signals includes modules of ECG, blood pressure, blood sugar and PPG. We are able to determine the current health status by monitoring measured biometric data through chronically ill health management system. We will focus on the individual service to be appropriate for a patient group in a mobile environment.

A Synchronization Algorithm for Mobile Database using Message Digest (메시지 다이제스트를 이용한 모바일 데이타베이스 동기화 알고리즘)

  • Moon, Chang-Joo;Choi, Mi-Young;Kim, Sang-Min;Jung, Jin-Hwan
    • Journal of KIISE:Databases
    • /
    • v.34 no.4
    • /
    • pp.357-368
    • /
    • 2007
  • This paper proposes the SAMD(Synchronization Algorithms based on Message Digest) algorithm based on message digest in order to data synchronization between a database server and a mobile database. The SAMD algorithm makes the images at the database server and the mobile database using message digest tables and compares two images in order to select the rows needed to synchronization. If two images are different, the synchronization is progressed according to synchronization policy. The SAMD algorithm does not use techniques which are dependent the some database vendor and also triggers, stored procedures and timestamps. The SAMD only uses the standard SQL functions for the synchronization. Therefore the SAMD algorithm is used in any combinations of the database server and the mobile database because the SAMD algorithm is not depended on some database venders. Also the SAMD algorithm shows better performance compared with existing synchronization products.

Handoff Method Supporting LBS Information in Mobile Clouding Computing (이동 클라우딩 환경에서 LBS 지원 핸드오프 기법)

  • Kim, Ki-Young;Kim, Sun-Jib
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.2
    • /
    • pp.89-97
    • /
    • 2015
  • In this paper, we propose a handoff method supporting LBS (Location Based Services) Information in mobile clouding environment. In mobile clouding computing, handoff delay and re-authentication is occurred. A mobile node needs re-authentication procedure from cloud server whenever it arrives new AP. But Using of location information of node enables to reduce delay time due to re-authentication. To reduce re-authentication delay time, proposed method stores location information of APs on WiFi based location server to complement. GPS-based technology which can't receive satellite signal in indoor and then node collects location information of AP at handoff time. And also enables to process LBS without increasing handoff delay by splitting the process of handoff from process of requesting location information. For analysis of proposed method, We analyze handoff delay and location information process time and have compared previous handoff method in cloud environment. We confirmed that proposed method shows lower delay time without increasing LBS process time than previous method because node receives location information from location information server when handoff is occurred.

A Study on Network Service Using Authorization Ticket in AAA system (AAA시스템의 인가 티켓을 이용한 네트워크 서비스에 관한 연구)

  • Kang, Seo-Il;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.11-19
    • /
    • 2007
  • A ubiquitous network environment is a system where the user can avail of the network's services anytime, anywhere. To establish such an environment, studies continue being conducted on wireless communication technology and mobile terminals. The company that provides such services should have an established system for authentication, authorization and charging for users. This service is referred to as Authentication, Authorization, Accounting(AAA), and its aspects have been consistently studied. On the other hand, existing studies have been promoted with regard to the authentication and efficiency of the mobile terminal. One of the method is that the mobile terminal contacts to the home authentication server through the external authentication server every time it is required and; another one is to use a medium server to provide authentication in the middle between them. Thus, this study aims to determine the best method to use ticketing, where tickets are provided through a mobile terminal, complete with authentication and authorization features. Also, as it uses ticket, it can efficiently provide mobile verification processing.

A Secure RFID Search Protocol Protecting Mobile Reader's Privacy Without On-line Server (온라인 서버가 없는 환경에서 이동형 리더의 프라이버시를 보호하는 안전한 RFID 검색 프로토콜)

  • Lim, Ji-Wwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.73-90
    • /
    • 2010
  • Recently, Tan et al. introduced a serverless search protocol in which a mobile reader maintains a tag authentication list and authenticates a tag using the list without connecting authentication server. A serverless RFID system is different from general RFID systems which use on-line server models. In the serverless RFID system, since the mobility of a personalized reader must be considered, we have to protect not only the privacy of a tag but also the privacy of a mobile reader. In this paper, we define new security requirements for serverless RFID search system and propose a secure serverless RFID search system. In our system, since tag authentication information maintained by a reader is updated in every session, we can provide the backward untraceability of a mobile reader. Also we use an encrypted timestamp to block a replay attack which is major weakness of search protocols. In addition, we define a new adversary model to analyze a serverless RFID search system and prove the security of our proposed system using the model.

Design of Caching Scheme for Mobile Underground Geospatial Information Map System (모바일용 지하공간정보지도 관리 시스템에서 응답속도 향상을 위한 캐싱 기법)

  • Kim, Yong-Tae;Kouh, Hoon-Joon
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.1
    • /
    • pp.7-14
    • /
    • 2022
  • Unlike general maps, the underground geospatial Information is a system made to view underground information in a 3D shape. This system is managed by a tile maps to lighten the data. But there are various underground structures in the basement, and the structures are made of 3D data, so the data size is large. Therefore, when a client mobile program requests a tile map, the service server fetches the requested tile map from the DB server and transmits ti to the client, but there is a transmission delay time problem. In this paper, we design the tile cache method to improve the request response speed for the tile map data provided to the client in the mobile underground geospatial information system. We propose a method in which a service server predicts and prefetchs the next tile map while the client is viewing tile map, and stores the prefetching data in the memory of client mobile terminal. Then, the transmission delay time problem can be solved.

A Lightweight Pseudonym Authentication and Key Agreement Protocol for Multi-medical Server Architecture in TMIS

  • Liu, Xiaoxue;Li, Yanping;Qu, Juan;Ding, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.924-944
    • /
    • 2017
  • Telecare Medical Information System (TMIS) helps the patients to gain the health monitoring information at home and access medical services over the mobile Internet. In 2015, Das et al proposed a secure and robust user AKA scheme for hierarchical multi-medical server environment in TMIS, referred to as DAKA protocol, and claimed that their protocol is against all possible attacks. In this paper, we first analyze and show DAKA protocol is vulnerable to internal attacks, impersonation attacks and stolen smart card attack. Furthermore, DAKA protocol also cannot provide confidentiality. We then propose a lightweight pseudonym AKA protocol for multi-medical server architecture in TMIS (short for PAKA). Our PAKA protocol not only keeps good security features declared by DAKA protocol, but also truly provides patient's anonymity by using pseudonym to protect sensitive information from illegal interception. Besides, our PAKA protocol can realize authentication and key agreement with energy-saving, extremely low computation cost, communication cost and fewer storage resources in smart card, medical servers and physical servers. What's more, the PAKA protocol is proved secure against known possible attacks by using Burrows-Abadi-Needham (BAN) logic. As a result, these features make PAKA protocol is very suitable for computation-limited mobile device.

Performance Enhancement of ECC Algorithm-based Mobile Web Service System (ECC 알고리즘 기반 모바일 웹 서비스 시스템의 성능 향상)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • The KIPS Transactions:PartD
    • /
    • v.15D no.5
    • /
    • pp.699-704
    • /
    • 2008
  • By the dependence on Web from popularization of internet and increasing number of users, web services capability and security problem of communication is becoming a great issue. Existing web services technology decrease the capability of web application server by limiting the number of synchronous client, decreasing the processing load and increasing average response time. The encryption process to secure communication and the early expense of handshake decrease transmission speed and server capability by increasing the calculation time for connecting. Accordingly, this paper executes an encryption procedure by elliptical encryption algorithm to satisfy secure demands, improve the overload of server for web services and get reliability and security of web server architecture and proposes an improved mobile web sever which provides better ability and the techniques for deferred processing.

A Scheme of Concurrent Two-Way Synchronizations for Spatio-Temporal Data on a Mobile Environments (모바일 환경에서 시공간 데이터의 동시 양방향 동기화 기법)

  • Kim, Hong-Ki;Kim, Dong-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.171-174
    • /
    • 2008
  • As the mobile devices and the wireless networks have high-performance capabilities, it is possible to synchronize the spatio-temporal data of a server with the spatio-temporal data of a mobile device which are collected at a field. However, since the server process the synchronization which the model device requests the whole synchronizations of mass mobile devices take long time. In this paper, we propose the scheme to Process concurrently the synchronizations of mobile devices which does not conflict with others using the scheme of a multi-queue.

  • PDF

Mobile Content Curation Service Based on Real-Time Request/Response Model (실시간 요청/응답 모델에 기반한 모바일 콘텐츠 큐레이션 서비스)

  • Kim, Namyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.1-6
    • /
    • 2014
  • This paper proposes a mobile content curation service to collect various online/offline publications. The company publishes one-time topic information to a broker server in advance and customer curates topic information on a mobile device by requesting it. The main characteristics of the proposed service are: it is based on request/response model rather than existing publish/subscribe model, can easily specify topic information by input string without QR code or audio recognition, and retrieves all of topic information anywhere anytime by storing it on mobile device. This service can be used for second screen campaign for TV and various online/offline events.