• Title/Summary/Keyword: Personal Communication System

Search Result 812, Processing Time 0.041 seconds

A Secure Personal Health Record System for Handling of Emergency Situations (응급 상황 처리를 위한 안전한 개인건강기록 시스템)

  • Yi, Myung-Kyu;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.117-123
    • /
    • 2016
  • In recent years, Personal Health Record (PHR) has emerged as a patient-centric model of health information exchange. The Personal Health Record (PHR) owners enjoy the full right of accessing their records anywhere and anytime making storage and retrieval more efficient. Due to the sensitivity and confidential nature of the PHR, however, the PHR is maintained in a secure and private environment with the individual determining rights of access. In this paper, we propose a system which enables access to the user's PHR in the event of emergency. In emergency situation where the user is unconscious, the emergency staff can use the PHR information to request a emergency access to the PHR server based on the predefined rights of access for PHR. Under the proposed system, the PHR owner can specify a fine grain access control policy during emergency situations.

Design of Collective system of Automobile information in Korea (대한민국 표준 개인용 자동차 운행정보 수집 시스템 설계에 대한 연구)

  • Kim, Min-Young;Jang, Jong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1923-1930
    • /
    • 2012
  • 'No-Automobile driving Day' is one of Special option of Automobile Insurance in Republic of Korea. It option is used a system for collect to automobile driving information. However, Its system gives discomfort to users of this system. A Discomfort of this system to users is the OBD device's(Personal Car Driving Check Device) installation. A frequent installation of this device provides this OBD device's breakage to the users of this system. In this paper, for a solve this problem, studied new system design to supplement the existing system using Smartphone and WPAN(Wireless Personal Area Network).

An Implementation of the Mobile Communication Simulator using a Object-Oriented Simulation Platform (객체지향적 시뮬레이션플랫폼을 이용한 이동통신 시뮬레이션 구현)

  • Yoon, Young-Hyun;Kim, Sang-Bok;Lee, Jeong-Bae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.613-620
    • /
    • 2004
  • Traditionally, simulation method was used to test and evaluate the performance of communication protocol or functional elements for mobile communication service. In this Paper, PCSsim(Personal Communication System Simulator) was realized that can evaluate and review the call process of mobile communication service or to predict its performance by using the object-oriented simulation platform. PCSsim can simulate the base station and mobile host by considering the user's mobility, call generation rate and call duration time. In this paper, based on the simulation, presented the simulation results of hand-off generation ratio according to call generation, user's moving speed and call duration time both in residence area and commercial area, and it was confirmed that the hand-off rates in simulation and actual service environment have similar features. PCSsim can be used in adjusting the characteristics of base station fellowing the dynamic hand-off buffering or the characteristics of user's call in the design stage, and also can be used in building new mobile communication network by reflecting the characteristics of region where the base station is located and the mobility of the user.

A Case Study on the Application of Security Policy for Outsourcing Personnel in case of Large-Scale Financial IT Projects (금융회사 대형 IT프로젝트 추진 시 외주직원에 대한 보안정책 적용 사례 연구)

  • Son, Byoung-jun;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.193-201
    • /
    • 2017
  • Financial firms strengthen to protect personal information from the leakage, introducing various security solutions such as print output security, internet network Isolation system, isolationg strorage of customer information, encrypting personal information, personal information detecting system, data loss prevention, personal information monitoring system, and so on. Financial companies are also entering the era of cutthroat competition due to accept of the new channels and the paradigm shift of financial instruments. Accordingly, The needs for security for customer information held by financial firms are keep growing. The large security accidents from the three card companies on January 2014 were happened, the case in which one of the outsourcing personnel seized customer personal information from the system of the thress card companies and sold them illegally to a loan publisher and lender. Three years after the large security accidents had been passed, nevertheless the security threat of the IT outsourcing workforce still exists. The governments including the regulatory agency realted to the financail firms are conducting a review efforts to prevent the leakage of personal information as well as strengthening the extent of the sanction. Through the analysis on the application of security policy for outsourcing personnel in case of large-scale Financial IT projects and the case study of appropriate security policies for security compliance, the theis is proposing a solution for both successfully completing large-scale financial IT Project and so far as possible minizing the risk from the security accidents by the outsouring personnel.

Development of Personal Robot Platform : Designed Approach for Modularization

  • Roh, Se-gon;S. M Baek;Lee, D. H;Park, K. H;T. K Moon;S. W Ryew;T. Y Kuc;Kim, H. S;Lee, H. G H
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.117.3-117
    • /
    • 2002
  • In this paper a new framework is presented for developing the personal robot being used in home environments. We mainly focus on the system engineering technology such as the modularization and standardization. Effective ways for interfacing among modules are addressed regarding compatibility in hardware and software, and as a result a personal robot platform named DHR I is built. The robot is composed of five modules such as brain, mobile, sensor, vision, and user interface modules. Each module can be easily plugged in the system in a mechanical as well as electrical sense by sharing the communication protocol with IEEE1394 FireWire. &n...

  • PDF

Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internet

  • Kazuya, Odagiri;Shogo, Shimizu;Naohiro, Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.71-77
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize it, concept of the Internet PBNM Scheme is proposed as the final step.

Method to Analyze Information Leakage Malware using SSL Communication in Android Platform

  • Cho, Gilsu;Kim, Sangwho;Ryou, Jaecheol
    • Journal of Internet Computing and Services
    • /
    • v.19 no.3
    • /
    • pp.1-6
    • /
    • 2018
  • Widely used around the world, smartphones contain many features and can store content such as contacts, photos, and videos. Information that can be leaked in proportion to the information that the smartphone can store has also been increased. In recent years, accidents such as personal information leakage have occurred frequently. Personal information leakage is happening in the Android environment, which accounts for more than half of the smartphone operating system market share. Analyzing malicious apps that leak information can tell you how to prevent information leakage. Malicious apps that leak information will send importantinformation to the hacker's (C & C) server, which will use network communication. Malicious apps that are emerging nowadays encrypt and transmit important information through SSL communication. In this case, it is difficult to knowwhat kind of information is exposed to network. Therefore, we suggest a method to analyze malicious apps when leak important information through SSL communication. In this paper, we identify the way malicious apps leak information. And we propose a method for analyzing information leaked by SSL communication. Data before encryption was confirmed in the device through SSL hooking and SSL Strip method.

Forensic Data Acquisition on Cell Phone using JTAG Interface (JTAG을 이용한 휴대폰 포렌식 데이터 수집)

  • Kim, Keon-Woo;Ryu, Jae-Cheol
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.333-334
    • /
    • 2008
  • With the role of cell phones in today's society as a digital personal assistant as well as the primary tool for personal communication, it is possible to imagine the involvement of cell phones in almost any type of crime. The progression of a criminal investigation can hinge on vital clues obtained from a cell phone. This paper will be concentrated on CDMA system phones and focus on the data extraction for cell phone forensics. Especially, the data acquisition method of JTAG interface access to memory chip will be covered.

  • PDF

Personal Mutual Authentication System for Ubiquitous Wireless Environments (유비쿼터스 무선환경을 위한 개인 상호인증 시스템)

  • Kim Byung-Gi;Hong Sang-Sun;Jouhn Young-Keel
    • Journal of Internet Computing and Services
    • /
    • v.5 no.1
    • /
    • pp.99-111
    • /
    • 2004
  • Two general security measures in computing networks are secure data transmission and user authentication, These problems are still critical in the wireless LAN environments. Thus security becomes most significant issue in personal network environments and ubiquitous networks based on wireless LANs. We purpose a new authentication system for these kind of environments, and coined it UPMA(Ubiquitous Personal Mutual Authen-tication) model. UPMA supports authenticating configurations which provides personal verification for each system. It guarantees secure communications through the session key setup, and provides mutual authentication by verifying each user and his/her station. UPMA solves security problems in ubiquitous networks without accessing authentication server, Instead it performs mutual authentication between terminals or between systems. It is a global authentication system which enables global roaming service through the Internet or other public networks, It can be used to guarantee safe and convenient access to a company Intranet or to a home network.

  • PDF

A Study on Systemic Test Approach of Automated Control of the Personal Rapid Transit System (PRT 자동화 제어시스템의 체계적인 테스트 접근에 관한 연구)

  • Jeong Seung-Hwan;Kim Jong-Ki;Lee Kum-Seok
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.205-210
    • /
    • 2004
  • The PRT(Personal Rapid Transit) system has been being researched and examined to efficiently provide high quality services to passengers against the traffic congestion of the capital region. With concept that PRT differentiated from GRT(Group Rapid Transit), PRT generally is a tracked vehicle system operating with unmanned. The embedded software of PRT Automated Control system generally is comprised of the central software, stations software and vehicle software. The controllers of these software interface to each other using its RF communication antennas. In this paper, each embedded software of the PRT system should be applied to an incremental and systematic test approach technique in the design and implementation phase, because the reliability and safety of the PRT system should be assured

  • PDF