• Title/Summary/Keyword: Paper-smartphone devices

Search Result 248, Processing Time 0.027 seconds

The Researches in the Present State of Applying Smart Device in Vehicle and Implementing Bi-Directional Mirroring Services (Smart Device 차량 도입 현황 및 양방향 Mirroring 구현에 관한 연구)

  • Park, Hwa-Beom;Lee, Jean;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.127-130
    • /
    • 2017
  • The information and communication technology that is being developed recently has been greatly influencing the automobile market. In recent years, devices equipped with IT technology have been installed for the safety and convenience of the driver. It is necessary to develop a system that can link the Smartphone with the vehicle in accordance with these changes. In this paper, first of all we analyze the car connectivity services that served by the other competitors. In addition, we proposed and implemented the improved system that can support and control most of smart device application in vehicle by user's NEEDS. We also implemented the application that can restrict the applications which unsatisfied the drive regulations and designed and proposed the scenario that can apply our company's car connectivity system in future.

  • PDF

A Study of File Format-Aware Fuzzing against Smartphone Media Server Daemons (스마트폰 미디어 서버 데몬에 대한 파일 포맷 인식 기반의 퍼징 연구)

  • Shin, MinSik;Yu, JungBeen;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.541-548
    • /
    • 2017
  • The smartphone operates the media server daemon to handle audio service requests. Media server daemons, running with a high privilege in the background, caused many vulnerabilities to applications most frequently used in smart devices including smartphones. Fuzzing is a popularly used methodology to find software vulnerabilities. Unfortunately, fuzzing itself is not much effective in such format-strict environments as media services. In this paper, we propose a file format-aware fuzzing in order to efficiently detect vulnerabilities of media server daemon. We acquired a remote arbitrary code execution vulnerability on iOS/tvOS/MacOS/watchOS, and we verified the effectiveness by comparing our methodology with the fuzzers FileFuzz and ZZUF.

Mobile Device and Virtual Storage-Based Approach to Automatically and Pervasively Acquire Knowledge in Dialogues (모바일 기기와 가상 스토리지 기술을 적용한 자동적 및 편재적 음성형 지식 획득)

  • Yoo, Kee-Dong
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.2
    • /
    • pp.1-17
    • /
    • 2012
  • The Smartphone, one of essential mobile devices widely used recently, can be very effectively applied to capture knowledge on the spot by jointly applying the pervasive functionality of cloud computing. The process of knowledge capturing can be also effectively automated if the topic of knowledge is automatically identified. Therefore, this paper suggests an interdisciplinary approach to automatically acquire knowledge on the spot by combining technologies of text mining-based topic identification and cloud computing-based Smartphone. The Smartphone is used not only as the recorder to record knowledge possessor's dialogue which plays the role of the knowledge source, but also as the sensor to collect knowledge possessor's context data which characterize specific situations surrounding him or her. The support vector machine, one of well-known outperforming text mining algorithms, is applied to extract the topic of knowledge. By relating the topic and context data, a business rule can be formulated, and by aggregating the rule, the topic, context data, and the dictated dialogue, a set of knowledge is automatically acquired.

OneNet Cloud Computing Based Real-time Home Security System (OneNet 클라우드 컴퓨팅 기반 실시간 홈 보안 시스템)

  • Kim, Kang-Chul;Zhao, Yongjiang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.1
    • /
    • pp.101-108
    • /
    • 2021
  • This paper builds a real-time home security system based on the OneNet cloud platform to control the status of the house through a smartphone. The system consists of a local part and a cloud part. The local part has I/O devices, router and Raspberry Pi (RPi) that collects and monitors sensor data and sends the data to the cloud, and the Flask web server is implemented on a Rasberry Pi. When a user is at home, the user can access the Flask web server to obtain the data directly. The cloud part is OneNet in China Mobile, which provides remote access service. The hybrid App is designed to provide the interaction between users and the home security system in the smartphone, and the EDP and RTSP protocol is implemented to transmit data and video stream. Experimental results show that users can receive sensor data and warning text message through the smartphone and monitor, and control home status through OneNet cloud.

Method to Limit The Spread of Data in Wireless Content-Centric Network (무선 Content-Centric Network에서 Data 확산 제한 방법)

  • Park, Chan-Min;Kim, Byung-Seo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.1
    • /
    • pp.9-14
    • /
    • 2016
  • Since Devices such labtop, tablet, smartphone have been developed, a lots of huge data that can be classified as content is flooded in the network. According to changing Internet usage, Content-Centric Network(CCN) what is new concept of Internet Architecture is appeared. Initially, CCN is studied on wired network. but recently, CCN is also studied on wireless network. Since a characteristic of wireless environment is different from a characteristic of wired environment, There are issues in wireless CCN. In this paper, we discuss improvement method of Data spread issue on wireless CCN. The proposed scheme of this paper use MAC Address of nodes when Interest and Data Packet are forwarded. As using the proposed scheme, we reduce the spread of Data and offer priority of forwarding to nodes of shortest path, reduce delay by modifying retransmission waiting time.

Security Analysis of Partially Hidden Password Systems Resistant to Shoulder Surfing Attacks

  • Seong, Jin-Taek
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.1
    • /
    • pp.17-26
    • /
    • 2020
  • As more users use mobile devices, shoulder surfing attacks have emerged as an important issue in security. According to research report, in fact, the result showed that about 30% of smartphone users are hit by shoulder surfing attacks. To this end, in this paper, we consider a shoulder surfing attack and propose a partially hidden password system to resistant to its attack. In order to help readers understand, we describe the proposed password system in more detail using one simple example. The core idea behind the proposed system is to place the user's password randomly in the specified grid instead of entering a password directly. As a result, even if an attacker makes a shoulder surfing attack to observe the password, the user can hide the preset password and defend against the attack. We also show how the security of the password system proposed in this paper is improved. In addition, even if there are consecutive shoulder surfing attacks, the security of the proposed password system is robust.

An Identification System Using QR Codes for Production and Disposal Information of Internet of Things Devices (QR코드 기반 사물인터넷 디바이스의 생산/폐기 정보 식별체계)

  • Lim, Jae-Hyun;Seo, Jeongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.664-665
    • /
    • 2016
  • This paper proposes an identification system based on QR (Quick Response) code for production and disposal information of Internet of Things (IoT) devices. Three thousands and five hundreds of electronic devices have replaced and discarded in South Korea in a year, and twenty millions to fifty millions tons of e-wastes have happened throughout the world every year. According to Gartner, market research institution, the number of IoT devices will increase from 2.3 billions in 2013 to 30 billions in 2020, however, the regulations and systems which take into account environment were not prepared. The identification systems for reflecting information of devices, which are produced or discarded, are required to resolve the problem. The proposed identification system based on QR code can store much more massive data such as the producer, product's model, serial number, recycling rate, recovering rate, recyclability rate, recoverability rate than RFID (Radio-Frequency Identification). Also, users can immediately recognize production and disposal information by a QR code application in a smartphone.

  • PDF

Design and Implementation of a Protocol for Interworking Open Web Application Store (개방형 웹 애플리케이션 스토어 연동을 위한 프로토콜의 설계 및 구현)

  • Baek, Jihun;Kim, Jihun;Nam, Yongwoo;Lee, HyungUk;Park, Sangwon;Jeon, Jonghong;Lee, Seungyoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.10
    • /
    • pp.669-678
    • /
    • 2013
  • Recently, because the portable devices became popular, it is easily to see that each person carries more than just one portable device and the use of the smartphone stretches as time goes by. After the smartphone has propagated rapidly, the total usage of the smartphone applications has also increased. But still, each application store has a different platform to develop and to apply an application. The application store is divided into two big markets, the Android and the Apple. So the developers have to develop their application by using these two different platforms. Developing into two different platforms almost makes a double development cost. And for the other platforms, the weakness is, which still have a small market breadth like Bada is not about the cost, but about drawing the proper developers for the given platform application development. The web application is rising up as the solution to solve these problems, reducing the cost and time in developing applications for every platform. For web applications don't need to make a vassal relationship with application markets platform. Which makes it possible for an application to operate properly in every portable devices and reduces the time and cost in developing. Therefore, all of the application markets could be united into one big market through a protocol which will connect each web applications market. But, still there is no standard for the web application store and no current web application store is possible to interlock with other web application stores. In this paper, we are trying to suggest a protocol by developing a prototype and prove that this protocol can supplement the current weakness.

Detecting User Activities with the Accelerometer on Android Smartphones

  • Wang, Xingfeng;Kim, Heecheol
    • Journal of Multimedia Information System
    • /
    • v.2 no.2
    • /
    • pp.233-240
    • /
    • 2015
  • Mobile devices are becoming increasingly sophisticated and the latest generation of smartphones now incorporates many diverse and powerful sensors. These sensors include acceleration sensor, magnetic field sensor, light sensor, proximity sensor, gyroscope sensor, pressure sensor, rotation vector sensor, gravity sensor and orientation sensor. The availability of these sensors in mass-marketed communication devices creates exciting new opportunities for data mining and data mining applications. In this paper, we describe and evaluate a system that uses phone-based accelerometers to perform activity recognition, a task which involves identifying the physical activity that a user is performing. To implement our system, we collected labeled accelerometer data from 10 users as they performed daily activities such as "phone detached", "idle", "walking", "running", and "jumping", and then aggregated this time series data into examples that summarize the user activity 5-minute intervals. We then used the resulting training data to induce a predictive model for activity recognition. This work is significant because the activity recognition model permits us to gain useful knowledge about the habits of millions of users-just by having them carry cell phones in their pockets.

A Study on the Design of Automatic Billing Information Systems for Long-Term Home Care Services Business Using iBeacon (iBeacon을 활용하는 장기요양 재가 서비스 업무를 위한 자동청구 정보시스템의 설계에 관한 연구)

  • Jung, Sung Hwa;Kim, Myong Hee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.3
    • /
    • pp.612-619
    • /
    • 2016
  • Applying evolved IT technology to increase the satisfaction of the consumer is a typical feature of the rapidly transformed service industry. Smart devices have taken a place as the mainstream of major media, moreover, IT service strategies utilizing smart devices have been constantly developed. Location recognition method of users has been proposed as one of the significant features to the IT service industry. The long-term care home services can be one example of user location recognition methods that real time computerization of service record utilize an attached tag to home of pensioners with RFID reader or an NFC function of mobile when a home carer provides service. And, the Homecare Electronics Management System (HEMS) and the various location recognition methods will be discussed to improve effectiveness of services. In this paper, we propose a home applicable electronic management system which insurer, home care service facilities, home cares, pensioners and guardians which enables to simultaneously check service records based on the improved system by use of iBeacon.