• 제목/요약/키워드: Mobile Transactions

검색결과 1,614건 처리시간 0.021초

결함 어골도 분석에 의한 모바일 결제 시스템의 보안성 개선에 관한 연구 (A Study on the Security Improvement for Mobile Payment Systems by the Fault Fishbone Analysis)

  • 서진호;박만곤
    • 한국멀티미디어학회논문지
    • /
    • 제21권1호
    • /
    • pp.26-33
    • /
    • 2018
  • As financial transactions using mobile devices have been activated, mobile payment services have appeared and many changes have been made to the existing financial service methods. Due to the simplified payment method of mobile payment service, security threats such as personal information leakage, phishing damage, and malicious code are increasing. Research that can solve this is needed. In this paper, we discuss the features and security factors of mobile payment system. In order to improve the security of mobile payment system, we propose a fault analysis method based on frequency of occurrence using Fault Fishbone Analysis(FFA) technique.

가변구조형 주행로봇 개발 및 확장형 칼만필터를 이용한 추측 항법에 대한 연구 (A Study on Development of a Reconfigurable Mobile Robot and Dead-Reckoning Using Extended Kalman Filter)

  • 강봉수;여기환
    • 대한기계학회논문집A
    • /
    • 제33권5호
    • /
    • pp.455-462
    • /
    • 2009
  • This paper presents design concepts of a reconfigurable mobile robot for both of indoor and outdoor applications. A linkage mechanism and wheel-in-motors give the proposed mobile robot various driving modes in maneuver and good adaptability to irregular surface. Since the mobile robot receives multiple sensor signals from odometers and an orientation sensor, states related to the position and the orientation of the mobile robot are optimally estimated by an extended Kalman filter. Simulations and experimental results show that the performance of dead reckoning on estimating the pose of a mobile robot can be improved remarkably by the optimal state observer.

Implementation of Telebiometrics Application System Using Mobile Device

  • Shin, Yong-Nyuo;Kim, Jae-Sung
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제14권1호
    • /
    • pp.34-40
    • /
    • 2014
  • Today, with the wide use of mobile devices, the amount of business transactions conducted through such devices is increasing drastically. However, there are several limitations in the area of authentication for mobile use, which requires strong authentication mechanisms to satisfy security and convenience requirements. The proposed model and application system provide a framework to ensure the security and reliability of the flow of biometric information for telebiometric applications using mobile devices. We also specify protocols for each model and implement a mobile telebiometric application to improve security vulnerabilities compared to storage in a microSD match on card (MOC) based on the proposed model. As a consequence of this implementation, we propose substantial guidelines for security countermeasures from both technical and managerial perspectives in order to establish a safe mobile environment for the use of telebiometric systems.

위험과 운전 분석을 통한 이동식 수소충전소 안전성 향상에 관한 연구 (A Study on Safety Improvement for Mobile Hydrogen Refueling Station by HAZOP Analysis)

  • 변윤섭
    • 한국수소및신에너지학회논문집
    • /
    • 제32권5호
    • /
    • pp.299-307
    • /
    • 2021
  • In order to expand the supply of hydrogen vehicles, the first thing to be done is to build an infrastructure to supply hydrogen. There are fixed and mobile types of hydrogen refueling stations that can supply hydrogen. Mobile hydrogen refueling stations have the advantage of supplying hydrogen to two or three areas, so the introduction of mobile hydrogen refueling stations is considered at the initial stage of hydrogen vehicle dissemination. However, mobile hydrogen refueling stations have greater risks than fixed hydrogen refueling stations due to the hazard associated with movement and intensive installation of facilities in vehicle, so stricter design standards to lower the risk must be applied. Therefore, in this study, basic data for establishing safety standards for mobile hydrogen refueling stations were proposed by suggesting improvements such as the location of emergency shutoff valves, the number of gas detectors etc., using HAZOP analysis.

분산 환경에서의 이동 에이전트 핸드오프 처리 (Handoff Processing for Mobile Agent in Distributed Environment)

  • 박기현
    • 정보처리학회논문지C
    • /
    • 제8C권6호
    • /
    • pp.815-820
    • /
    • 2001
  • 본 논문은 단말의 이동성을 수용하기 위한 분산 이동 구조에 대하여 다루고 있다. 제안된 구조에서는 세가지 분산 객체에 대하여 소개하고 있는데, 무선 이동 사용자가 이용하는 이동 단말(MS:Mobile Station), 유선망에서 이동 단말을 논리적으로 대신하는 이동 에이전트(MA:Mobile Agent), 이동 단말에 서비스를 제공하는 유선용 응용 서버(AS:Application Server)를 이동 환경에서 수용하기 위한 추적 에이전트(TA:Trace Agent)가 그들이다. 이동 에이전트는 이동 단말과 밀접한 관련을 갖고, 추적 에이전트는 응용 서버와 밀접한 관련을 갖는다. 핸드오프 과정에서 패킷 손실이나 순서 변경과 같은 문제점을 처리하기 위한 흐름 제어 기법이 고려되었으며, 제시된 알고리즘을 사용하는 경우의 추가적인 지연 시간에 대한 산술적인 결과를 제시하고 있다. 시뮬레이션을 통하여 알고리즘의 검증과 함께 산술적인 결과와 동일한 지연 시간을 확인하였다.

  • PDF

User Behavior of Mobile Enterprise Applications

  • Lee, Sangmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권8호
    • /
    • pp.3972-3985
    • /
    • 2016
  • Organizations have been implementing mobile applications that actually connect to their backend enterprise applications (e.g. ERP, SCM, etc.) in order to increase the enterprise mobility. However, most of the organizations are still struggling to fully satisfy their mobile application users with the enterprise mobility. Even though it has been regarded as the right direction that the traditional enterprise system should move on, the studies on the success model for mobile enterprise applications in user's acceptance perspective can hardly be found. Thus, this study focused not only to redefine the success of the mobile enterprise application in user's acceptance persepective, but also to find the impacts of the factors on user's usage behavior of the mobile enterprise applications. In order to achieve this, we adopted the Technology Acceptance Model 2 (TAM2) as a model to figure out the user's behavior on mobile applications. Among various mobile enterprise applications, this study chose mobile ERP since it is the most representing enterprise applications that many organizations have implemented in their backend. This study found that not all the constructs defined by Davis in TAM2 have a significant influence on user's behavior of the mobile-ERP applications. However, it is also found that most social influence processes of TAM2 influence user's perception of the degree of interaction by mobile-ERP applications.

이동로봇의 원격제어를 위한 햅틱 글러브 개발 (Development of Haptic Glove for Remote Control)

  • 황요섭;이장명
    • 전기학회논문지
    • /
    • 제60권5호
    • /
    • pp.1030-1035
    • /
    • 2011
  • The remote control of mobile robot is widely used to perform dangerous and complex tasks such as underwater exploration and cleaning of nuclear reactor. For this purpose, the obstacle avoidance process will proceed to ensure a safe drive. In this paper, we tested that mobile robot drive in which replaced a pipe with a box. After we measured the distance around the obstacle through a sensor of robot, we got the information that changed haptic force from the distance of the obstacle.

An Enhanced Mutual Key Agreement Protocol for Mobile RFID-enabled Devices

  • Mtoga, Kambombo;Yoon, Eun-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제1권1호
    • /
    • pp.65-71
    • /
    • 2012
  • Mobile RFID is a new application that uses a mobile phone as an RFID reader with wireless technology and provides a new valuable service to users by integrating RFID and ubiquitous sensor network infrastructures with mobile communication and wireless Internet. Whereas the mobile RFID system has many advantages, privacy violation problems on the reader side are very concerning to individuals and researchers. Unlike in regular RFID environments, where the communication channel between the server and reader is assumed to be secure, the communication channel between the backend server and the RFID reader in the mobile RFID system is not assumed to be safe. Therefore it has become necessary to devise a new communication protocol that secures the privacy of mobile RFID-enabled devices. Recently, Lo et al. proposed a mutual key agreement protocol that secures the authenticity and privacy of engaged mobile RFID readers by constructing a secure session key between the reader and server. However, this paper shows that this protocol does not meet all of the necessary security requirements. Therefore we developed an enhanced mutual key agreement protocol for mobile RFID-enabled devices that alleviates these concerns. We further show that our protocol can enhance data security and provide privacy protection for the reader in an unsecured mobile RFID environment, even in the presence of an active adversary.

  • PDF

수정된 비용함수를 이용한 비선형 최적화 방법 기반의 이동로봇의 장애물 회피 비주얼 서보잉 (Visual Servoing of a Wheeled Mobile Robot with the Obstacle Avoidance based on the Nonlinear Optimization using the Modified Cost Function)

  • 김곤우
    • 전기학회논문지
    • /
    • 제58권12호
    • /
    • pp.2498-2504
    • /
    • 2009
  • The fundamental research for the mobile robot navigation using the numerical optimization method is presented. We propose an image-based visual servo navigation algorithm for a wheeled mobile robot utilizing a ceiling mounted camera. For the image-based visual servoing, we define the composite image Jacobian which represents the relationship between the speed of wheels of a mobile robot and the robot's overall speed in the image plane. The rotational speed of wheels of a mobile robot can be directly related to the overall speed of a mobile robot in the image plane using the composite image Jacobian. We define the mobile robot navigation problem as an unconstrained optimization problem to minimize the cost function with the image error between the goal position and the position of a mobile robot. In order to avoid the obstacle, the modified cost function is proposed which is composed of the image error between the position of a mobile robot and the goal position and the distance between the position of a mobile robot and the position of the obstacle. The performance was evaluated using the simulation.

Smoothe Handoff 지원을 위한 빠른 인증 알고리즘 (A Fast Authentication Algorithm For Smooth Handoff)

  • 김인수;김기천;김현곤
    • 정보처리학회논문지C
    • /
    • 제9C권1호
    • /
    • pp.17-20
    • /
    • 2002
  • IMT-2000망 핵심기술은 mobile IP를 이용하는 북미의 3G packet data system과 GSM망과 연계를 하는 유럽의 GPRS로 구분할 수 있다. 이러한 IMT-2000망 핵심기술은 글로벌한 로밍을 위해 Mobile IP도입을 추진하고 있다. Mobile IP상에서는 RADIUS나 DIAMETER같은 AAA 서버가 다이얼 업 컴퓨터의 인증, 허가 서비스를 제공하기 위해 사용되고 있는데, 이것은 MN에게 매우 중요하다. Mobile IP는 MN과 HA간에 강력한 인증을 요구하기 때문이다. 본 논문에서는 이러한 IMT-2000 환경에서 고려되고 있는 Smooth Handoff 기법에서 효과적인 AAA프로토콜의 적용에 관하여 논한다.