• Title/Summary/Keyword: Phone Number

Search Result 517, Processing Time 0.028 seconds

Profile Management System for Contact Information Privacy in Social Network Service (소셜 네트워크 서비스에서 사용자 연락정보 프라이버시 강화를 위한 개인 프로필 관리 시스템 연구)

  • Youn, Taek-Young;Hong, Do-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.141-148
    • /
    • 2011
  • Recently, various social network services have been grown. Among them, personal relationships based social network services such as Facebook and Twitter make a remarkable growth of industry. In such services, users' profiles are very important for establishing the relationship between two users. However some information in a user's profile causes the leakage of the user's privacy, and thus we have to deal with the information in the profile. Especially, we have to treat contact information, such as the phone number and the e-mail address, very carefully since an adversary can use the information to violate the user's privacy in real life. In this paper, we propose two profile management systems that can enhance the privacy of users in social network services. We compare our systems with existing profile management techniques in well-known social network services such as Facebook and Twitter, and show that our systems provide enhanced privacy.

A Study on the Korean-Stroke based Graphical Password Approach (한국어 획 기반 그래피컬 패스워드 기법에 관한 연구)

  • Ko, Tae-Hyoung;Shon, Tae-Shik;Hong, Man-Pyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.189-200
    • /
    • 2012
  • With increasing the number of smart device such as Tablet PC, smart phone and netbook, information security which based on smart device in mobile environment have become the issue. It is important to enter a password safety. In various types of mobile devices, because of hardware limitation of device, it is difficult that to equip secondary input device such as keyboard and mouse. Also, a loss of accuracy becomes a problem because input information was entered by touch screen. Because of problem mentioned above it can be predicted to change password scheme text based password scheme to graphical password scheme, graphical password scheme is easy to use and is resistant to shoulder surfing attack. So this paper proposes new graphical password scheme based 5 strokes which are made by decomposed the Korean to defend against shoulder surfing attack.

Shoulder-Surfing Resistant Password Input Method for Mobile Environment (모바일 환경에서 엿보기 공격에 강한 패스워드 입력방법)

  • Kim, Chang-Soon;Youn, Sun-Bum;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.93-104
    • /
    • 2010
  • The advent of various mobile devices and mobile services has caused diversification of information stored in a mobile device, e.g., SMS, photos, movies, addresses, e-mails, digital certificates, and so on. Because mobile devices are lost or stolen easily, user authentication is critical to protect the information stored in mobile devices. However, the current user authentication methods using Personal Identification Numbers (PINs) and passwords are vulnerable to Shoulder Surfing Attacks (SSAs), which enables an attacker to obtain user's information. Although there are already several SSA-resistant authentication methods in the literature, most of these methods lack of usability. Moreover, they are not suitable for use in mobile devices. In this paper, we propose a user friendly password input method for mobile devices which is secure against SSA. We also perform user tests and compare the security and usability of the proposed method with those of the existing password input methods.

Implementation and Utilization of Decentralized Identity-Based Mobile Student ID (분산 ID 기반 모바일 학생증 구현과 활용)

  • Cho, Seung-Hyun;Kang, Min-Jeong;Kang, Ji-Yun;Lee, Ji-Eun;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1115-1126
    • /
    • 2021
  • In this paper, we developed a mobile student ID providing a self sovereignty identity (SSI) which replaces the conventional plastic-type student ID that includes private information of a student such as a name, a student number, a facial photo, etc. The implemented mobile student ID solves the problem of exposing student's identity due to a loss or a theft of a plastic-type student ID, and it has a structure and process of FRANCHISE model which is developed by a concept of a decentralized Identity(DID) of a Blockchain, in which specialized for convenience as an electronic student ID through an application on a smart phone device. In addition, it protects student's privacy by controlling personal information on oneself. By using a smartphone, not only it easily identifies the student but also it expands to several services such as participation in school events, online authentication, and a student's exchange program among colleges.

Case Study of Smart Phone GPS Sensor-based Earthwork Monitoring and Simulation (스마트폰 GPS 센서 기반의 토공 공정 모니터링 및 시뮬레이션 활용 사례연구)

  • Jo, Hyeon-Seok;Yun, Chung-Bae;Park, Ji-Hyeon;Han, Sang Uk
    • Journal of KIBIM
    • /
    • v.12 no.4
    • /
    • pp.61-69
    • /
    • 2022
  • Earthmoving operations account for approximately 25% of construction cost, generally executed prior to the construction of buildings and structures with heavy equipment. For the successful completion of earthwork projects, it is crucial to constantly monitor earthwork equipment (e.g., trucks), estimate productivity, and optimize the construction process and equipment on a construction site. Traditional methods however require time-consuming and painstaking tasks for the manual observations of the ongoing field operations. This study proposed the use of a GPS sensor embedded in a smartphone for the tracking and visualization of equipment locations, which are in turn used for the estimation and simulation of cycle times and production rates of ongoing earthwork. This approach is implemented into a digital platform enabling real-time data collection and simulation, particularly in a 2D (e.g., maps) or 3D (e.g., point clouds) virtual environment where the spatial and temporal flows of trucks are visualized. In the case study, the digital platform is applied for an earthmoving operation at the site development work of commercial factories. The results demonstrate that the production rates of various equipment usage scenarios (e.g., the different numbers of trucks) can be estimated through simulation, and then, the optimal number of tucks for the equipment fleet can be determined, thus supporting the practical potential of real-time sensing and simulation for onsite equipment management.

Combination Key Generation Scheme Robust to Updates of Personal Information (결합키 생성항목의 갱신에 강건한 결합키 생성 기법)

  • Jang, Hobin;Noh, Geontae;Jeong, Ik Rae;Chun, Ji Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.915-932
    • /
    • 2022
  • According to the Personal Information Protection Act and Pseudonymization Guidelines, the mapping is processed to the hash value of the combination key generation items including Salt value when different combination applicants wish to combine. Example of combination key generation items may include personal information like name, phone number, date of birth, address, and so on. Also, due to the properties of the hash functions, when different applicants store their items in exactly the same form, the combination can proceed without any problems. However, this method is vulnerable to combination in scenarios such as address changing and renaming, which occur due to different database update times of combination applicants. Therefore, we propose a privacy preserving combination key generation scheme robust to updates of items used to generate combination key even in scenarios such as address changing and renaming, based on the thresholds through probabilistic record linkage, and it can contribute to the development of domestic Big Data and Artificial Intelligence business.

Development of Intelligent CCTV System Using CNN Technology (CNN 기술을 사용한 지능형 CCTV 개발)

  • Do-Eun Kim;Hee-Jin Kong;Ji-Hu Woo;Jae-Moon Lee;Kitae Hwang;Inhwan Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.99-105
    • /
    • 2023
  • In this paper, an intelligent CCTV was designed and experimentally developed by using an IOT device, Raspberry Pi, and artificial intelligence technology. Object Detection technology was used to detect the number of people on the CCTV screen, and Action Detection technology provided by OpenPose was used to detect emergency situations. The proposed system has a structure of CCTV, server and client. CCTV uses Raspberry Pi and USB camera, server uses Linux, and client uses iPhone. Communication between each subsystem was implemented using the MQTT protocol. The system developed as a prototype could transmit images at 2.7 frames per second and detect emergencies from images at 0.2 frames per second.

A Distribution Key Management Protocol for improving Security of Inner Attack in WiMAX Environment (WiMAX 환경에서 내부 공격의 안전성을 향상시킨 분산 키 관리 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.1
    • /
    • pp.107-115
    • /
    • 2009
  • The cryptological key which is used in WiMAX environment is used at regular intervals by mobile nodes (laptop computer, PDA, cell-phone) which is in the range of base station coverage. But it is very weak at local attack like man-in-the-middle when the mobile node is off the range of base station or enters into the range to communicate with base station because the communication section is activated wirelessly. This paper proposes a distribution key building protocol which can reuse security key used by nodes to reduce cryptological security attack danger and communication overhead which occurs when mobile node tries to communicate with base station. The proposed distribution key establishing protocol can reduce overhead which occurs between base station and mobile node through key reusing which occurs during the communication process and also, makes security better than IEEE 802.16 standard by creating shared key which is required for inter-certification through the random number which node itself creates.

Analysis of Online Educational Videos for Patients with Radiation Therapy (방사선치료 환자를 위한 온라인 교육 동영상 분석)

  • Kim, Dae-Gun;Jeong, Jae-Hong
    • Journal of radiological science and technology
    • /
    • v.45 no.1
    • /
    • pp.31-39
    • /
    • 2022
  • This study aimed to analyze educational understanding and satisfaction by survey including for the online educational videos by used online platform (YouTube) which provide resolve patient's questions, require attention and treatment information for a patient with radiation therapy. Video viewing analysis was used by YouTube studio. The survey was analyzed general properties (age, academic ability, disease, and watched of no watched videos) and educational understanding and satisfaction for two groups as no watched and watched patients. The views number was 60% at the female higher than 40% at the male. Based on the standard viewing time (hours), the non-subscription rate was 86.7%. The device type mostly used the mobile phone (82.8%). The viewership of educational videos was lower as the age increased and the academic ability decreased in the survey. The educational understanding increased by 22% at watched group as 4.15 point from at no watched group as 3.4 point (p<0.001), and the educational satisfaction increased by 15.8% at watched group as 4.25 point from at no watched group as 3.67 point (p<0.01). The correlation of understanding (r=0.761) and satisfaction (r=0.767) was high for both no watched and watched groups (p<0.01). The online educational videos increased educational understanding and satisfaction for the patient with radiation therapy. Our study could be used references data for improving the quality of medical services.

A Case Study on Learning Behavior in Online English Reading Class of an On-off Course (온·오프 강의에서 온라인 영어읽기 수업의 학습행태 사례 연구)

  • Mi Yang Choi
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.142-151
    • /
    • 2023
  • This study is a case study on investigating students' learning behavior in the online English reading class of an on-off course. For this purpose, a survey was conducted on a total of 77 students from an English listening and reading course and phone interview with 5 students was implemented. The findings revealed that regularity of learning interval and learning sequence need to be improved through student management in order to increase the effect of online learning. In case of lecture watching, the students are good at utilizing the strengths of taped lecture, such as using pause and repeating watching. However, more research need to be done on how to develop online lecture to enhance students' understanding of the lecture. Regarding the offline review quiz that is supposed to stimulate students into their more positive watching of the lecture, it is suggested that a few of its related elements such as the online learning period and the number of quiz questions be corrected for its better effect.