• Title/Summary/Keyword: Phone Number

Search Result 517, Processing Time 0.031 seconds

Mobile Number Portability system in Korea

  • Jeong Young Sic;Lee Hyeong Ho;Kim Whan Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1B
    • /
    • pp.47-51
    • /
    • 2005
  • Mobile number portability(MNP) means currently number portability among the 2G cellular phone in Korea and subscriber can change his mobile phone system operator without change his phone number. MNP system use QoR(Query on Release) method in call processing. We shows that the realization and performance of MNP system and the problems that is related with MNP system.

Trends and Prospects of SmartPhone Malware (스마트폰 악성코드 동향 및 전망)

  • Kim, Sang-Su;Choi, Yeon-Sung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.127-130
    • /
    • 2013
  • Apple's iPhone was released and the SmartPhone craze started in the world. Then, Many kind of SmartPhone released on the market, the number of subscribers increased explosively for the convenience of SmartPhone. By SmartPhone users increases rapidly, the number of Malware targeting SmartPhones increased explosively. The SmartPhone Malware, tend to increase explosively in 2012 beginning to be discovered in earnest from the second half of 2011, and is continuously increasing even now. In this paper, describes the status and trends of SmartPhone Malware, through the analysis of trends in the SmartPhone Malware, we describe the future prospects of SmartPhone Malware.

  • PDF

Change of Cervical Angle According to Smartphone using Time (스마트폰 사용 시간이 목뼈 각도 변화에 미치는 영향)

  • Kim, Soo-Han;Kim, Ko-Un
    • Journal of the Korean Society of Physical Medicine
    • /
    • v.9 no.2
    • /
    • pp.141-149
    • /
    • 2014
  • PURPOSE: This study uses X-rays investigate how university students' smart phone use affects the cervical vertebral angle. METHODS: Ninety-two randomly selected students agreed to participate in this study. The participants' number of hours of smart phone use was gathered using a questionnaire. An X-ray of the participants' cervical vertebrae was taken, and the cervical vertebral angle was measured using the Cobb and the absolute rotation angle (ARA) method. Also, the relation between pain and hours of smart phone use was identified using a visual analog scale (VAS). Using SPSS ver18, the relationships among the cervical vertebral angle and the items in the questionnaire were identified and a frequency analysis, an independent t-test, and the analysis of variance (ANOVA) were calculated. RESULTS: The study showed that an increase in the number hours of smart phone per day led to cervical lordosis(p<0.05). The relationships between points of smart phone addiction and cervical vertebral angle have a negative correlation (p<0.05). Therefore, there are the higher smart phone addiction points, the decrease the cervical vertebral angle. CONCLUSION: The results of the study showed that increase in smart phone use lead to cervical lordosis, and smart phone addiction scores resulted in decreased in the cervical vertebral angle.

Wireless Multimedia Service Interacting with the Key Input of a Phone Number (휴대용 단말기 전화 번호 키 입력과 상호작용하는 멀티미디어 서비스)

  • Jeong Gu-Min;Ahn Hyun-Sik
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.2
    • /
    • pp.72-74
    • /
    • 2006
  • In this paper, a wireless multimedia service interacting with key input of a phone number is Presented. In the conventional handset, when the key button is pressed, numbers are displayed or the embedded sound is played. Also, the contents are fixed and cannot be changed. In this paper, we propose a wireless multimedia service playing multimedia contents in accordance with the key input of a phone number. The contents can be downloaded from the wireless internet server. To implement this service, file format, fast codec and download structure are proposed. Using the presented structure, this service is being provided by a telecommunication company in Korea. Various applications based on this service are being expected.

Value of Number Portability on Internet Phones

  • Ku, Jung-Eun;Lee, Sang-Woo;Hyun, Tchang-Hee
    • ETRI Journal
    • /
    • v.32 no.1
    • /
    • pp.169-171
    • /
    • 2010
  • Even though Internet phone service (IPS) continues to evolve in terms of quality and competitive pricing compared with the public switched telephone network (PSTN), the number of Internet phone subscribers is still low in South Korea. The Korean government decided to apply number portability to the IPS market in 2008. This study expresses its value in monetary terms with a contingent valuation approach. With this methodology, this study investigates the willingness of 316 current PSTN subscribers to pay for IPS, using a specific survey method called double-bounded dichotomous choices, to obtain more accurate data. The results show that the calculated value of Internet phone number portability positively impacts consumer welfare.

A Countermeasures on the Hacking for the Internet Shopping Mall (인터넷 쇼핑몰의 해킹 사고에 대한 대응방법)

  • Lee, Young Gyo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.33-43
    • /
    • 2008
  • As internet is spreaded widely, the number of cyber terror using hacking and virus is increased. Also the hacking to the internet shopping mall go on increasing. If the large shopping mall is attacked by the hacker, a number of user's information are exposed to the hacker. The private information as like a resident registration number, user's real name, the date of user's birth, the mobile phone number, the office phone number / address, the home phone number / address and so on include the information. These information are used in the phishing e-mails / call and spam. And them are selling and buying maliciously. The large internet shopping mall 'auction' was hacked in April, 2008. After the incident, this paper suggested a countermeasures on the hacking for the internet shopping mall. The technical item and political item are included among the countermeasures. The countermeasures can protect the hacking not only the internet shopping mall but also the web sites basically.

A Study on Hacking Attack of Wire and Wireless Voice over Internet Protocol Terminals (유무선 인터넷전화 단말에 대한 해킹 공격 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.299-302
    • /
    • 2011
  • Recently, Voice over Internet protocol(VoIP) in IP-based wired and wireless voice, as well as by providing multimedia information transfer. Wired and wireless VoIP is easy on illegal eavesdropping of phone calls and VoIP call control signals on the network. In addition, service misuse attacks, denial of service attacks can be targeted as compared to traditional landline phones, there are several security vulnerabilities. In this paper, VoIP equipment in order to obtain information on the IP Phone is scanning. And check the password of IP Phone, and log in successful from the administrator's page. Then after reaching the page VoIP IP Phone Administrator Settings screen, phone number, port number, certification number, is changed. In addition, IP Phones that are registered in the administrator page of the call records check and personal information is the study of hacking.

  • PDF

iVisher: Real-Time Detection of Caller ID Spoofing

  • Song, Jaeseung;Kim, Hyoungshick;Gkelias, Athanasios
    • ETRI Journal
    • /
    • v.36 no.5
    • /
    • pp.865-875
    • /
    • 2014
  • Voice phishing (vishing) uses social engineering, based on people's trust in telephone services, to trick people into divulging financial data or transferring money to a scammer. In a vishing attack, a scammer often modifies the telephone number that appears on the victim's phone to mislead the victim into believing that the phone call is coming from a trusted source, since people typically judge a caller's legitimacy by the displayed phone number. We propose a system named iVisher for detecting a concealed incoming number (that is, caller ID) in Session Initiation Protocol-based Voice-over-Internet Protocol initiated phone calls. Our results demonstrate that iVisher is capable of detecting a concealed caller ID without significantly impacting upon the overall call setup time.

Jamming Vulnerability on Aviation Communication System by Smart-phone with Frequency Modulation (스마트폰 주파수 변조를 이용한 항공 통신 시스템 전파교란 취약점)

  • Kim, In-Bum;Kim, Yoon-Young;Park, Won-Hyung
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.49-59
    • /
    • 2010
  • Recently, As smart phone offers rather superior functionality and interface than normal phone, the number of user increase rapidly. for the convenience of user, there are so many case of customize the system. Simultaneously a number of smart phones which vulnerable to security increase Exponentially. The number of malware which targets smartphone increases Annually, namely Threats have intensified. In this thesis, we suggest the Techniques and countermeasures of the vulnerability which targets aviation communication system by Smart-phone RF module with frequency modulation.

A Study on Counter strategy of mobile communication enterprise and Customer satisfaction for Introduction Plan of Number Portability (번호이동성제도의 도입에 따른 이동통신업자의 대응전략과 고객서비스만족에 관한 연구)

  • Jung Kyung-Hee;Cho Jai-Rip
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2004.04a
    • /
    • pp.31-37
    • /
    • 2004
  • This study analyzes strategy and main contents between each business market by mobile phone Number Portability. And, grasps what each mobile company customer satisfaction factors is effected on mobile phone Number Portability and estimates relative importance about the factors and understand counter strategies by these factors. Therefore, purpose of this study investigate weather the mobile phone Number Portability can specific function to promote competition in mobile Number Portability and present proper policy introduction direction examining factors to succeed

  • PDF