• Title/Summary/Keyword: Remote service

Search Result 1,053, Processing Time 0.038 seconds

Development of Smart App to Support the Paramedics Activities (구급 활동을 지원하는 스마트 앱 개발)

  • Eum, Sang-Hee;Kim, Gwang-Nyeon;Kim, Gi-Ryon;Nam, Jae-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.49-53
    • /
    • 2018
  • In the recent years, an attempts have been made to convergence medical technology and IT technology to overcome the limitations of temporal, spatial in the medical technology applications. Emergency care is primarily intended to provide primary care and stabilization to the patient, thereby saving the patient's life and minimizing the risk until hospital care. In this study, we developed an application S/W to support emergency services for emergency medical services. Paramedics can easily keep a log of emergency activities and monitor the patient's condition in real time with this application S/W on smart devices. In particular, medical signals and information emergency status of emergency patients can be measured or photographs of affected areas can be taken. In addition, this report can be delivered to remote medical doctors for rapid emergency measures and immediate hospital response.

Personal Information Leakage Prevention Scheme of Smartphone Users in the Mobile Office Environment (모바일 오피스 환경에서 스마트폰 사용자의 개인정보 유출 방지 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.205-211
    • /
    • 2015
  • Recently, a mobile communication network and the wireless terminal is suddenly develop, mobile office service is more and more the sportlight. However, the user may receive an attack from a malicious third party if the up/download the data in the remote to perform the work in a mobile office environment. In this paper, we propose scheme to manage the information lost due to theft smartphone that contain spill prevention personal information and company information from the mobile office environment (call history, incoming messages, phonebook, calendar, location information, banking information, documents, etc.). The proposed scheme using the number of triangular fuzzy information about the state of the personal information and business intelligence to implement a pair-wise comparison matrix. In particular, the proposed scheme is to prevent the value obtained by constructing a pair-wise comparison matrix for personal information and business intelligence and pair your smartphone is lost when a third party not allow access to personal information and corporate information is leaked to the outside.

Web Based Tele-Medicine System including Security Scheme (웹기반 원격진료시스템에서 암호화인증방식이 적용된 회원관리기법)

  • Kim, Seok-Soo
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.19-27
    • /
    • 2005
  • This paper presents the content regarding electronic medical examination chart and data processing for efficient medical examination and fast treatment by realizing remote medical examination system of mutual conversation type among 3 parties(patient, doctor, pharmacist) on internet base, and establishment of database enabled system integration for efficient data processing in both on-line and off-line mode by interconnecting ASP and SQL on IIS 4.0 web server, consultation between patient and doctor, medical examination on off-line mode, transmission of prescription sheet to the pharmacist designated by patient, preparation of medicine, semieternal storage of medical examination data owing to storage and check of medical examination data, more accurate medical examination and prescription using this medical examination data by patient and doctor, and so on. And, data processing between doctor and pharmacist is differently performed based on class such as general member and charge member, and service access right pursuant to this is endowed, so that certification of each member must follow by all means.

  • PDF

A Study of Security Threats in Bluetooth v4.1 Beacon based Coupon Convergence Service (블루투스 v4.1 비콘 기반 쿠폰 융합서비스에서의 보안위협 연구)

  • Lee, Kwang-Jae;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.2
    • /
    • pp.65-70
    • /
    • 2015
  • As the new technologies like IoT and Fintech appear which have not existed before, security threat ranges in existing system are increasing. Especially, IoT has increasing ranges to cause malicious behaviors in specific systems because related IT infrastructure ranges are increasing. Fintech also requires the innovation of traditional security system because it has new structure which didn't exist in the past. As IoT and Fintech technologies are commercialized and related markets are developing in the future, structural security threats could be connected to actual attacks and secondary attacks by the attackers' imbedding of back door in IoT internet devices through remote access. Customer's device cannot be compulsively controlled for security in new system where these various security threats exist. Therefore, these services should minimize the collected information, and now is the time to politically control the utilizing methods of the collected information. In this thesis, security threats are to be suggested which could occur in newly appearing mobile services like IoT and Fintech.

Development of Intelligent Green Fountain Culture System for Healthy Emotional Self-Concept (건강한 정서 자아를 위한 지능형 녹색경관 제어시스템 개발)

  • Park, Seung-Min;Lee, Young-Hwan;Kim, Jun-Yeup;Ko, Kwang-Eun;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.3
    • /
    • pp.281-286
    • /
    • 2012
  • In the growing standard of people's lives, we want desire to create eco-friendly water space what is called the Green Technology that is in the limelight. These green space is introduced the cultural contents and we use the water, music, and nature as tool of emotional verbalism. Presently, when we want to make scenario, water landscape scenario is made by director. but these systems have some disadvantages as the cost and limitation of direction. There is a growing interest in the integrated control system based on PC and Internet. In this paper, it is about fountain control system. Previous research area was only one using programmable logic controller or industrial PC. we proposed the development of intelligent green fountain culture system for healthy emotional self-concept. And we made automatic weather sensing system that is designed by the intelligent green fountain culture system to estimate the time-variant system.

Mutual Anonymous Authentication Using Smart Cards in Multi-server Environments (다중서버 환경에서의 스마트카드를 이용한 상호 익명 인증)

  • Yoo, Hye-Joung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.12C
    • /
    • pp.1021-1028
    • /
    • 2008
  • In a network environment, when a user requests a server's service, a remote user authentication system using smart cards is a very practical solution to validate the eligibility of a user and provide secure communication. In these authentication schemes, due to fast progress of networks and information technology, most of provided services are in multi-server environments. However, there are no studies in multi-server authentication schemes using smart cards providing mutual anonymity so far. In this paper, we propose a novel user authentication scheme using smart cards providing mutual authentication and mutual anonymity for multi-server environments. Our proposed scheme achieves the low-computation requirement for smart cards and a user can use permitted various services in eligible servers by only one registration. Also, this scheme guarantees perfect mutual anonymity of participants.

Developments in Space Law in regulating commercial space activities (우주(宇宙) 상업활동(商業活動) 규율(規律)에 있어서의 우주법(宇宙法)의 발전적(發展的) 위상(位相))

  • Shin, Hong-Kyun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.3
    • /
    • pp.233-258
    • /
    • 1991
  • This paper examines current developing status of space law as defined in terms of its unique principle that "the utilization of outer space for all mankind's interest". As commercialization of space activities has brought about heated debate on its legitimacy with respect to that principle, space law has come to witness a dual situation. One is the realization of that principle in establishing commercial space activities system where all mankind's interest is respected through the non-discriminatory distribution mode of space benefit. In satellite telecommunication system, the INTELSAT Organization assures its public service policy while protecting itself against a competition from separate systems. For remote sensing, commercialization of LANDSAT Systems promoted since 1984 seems not to affect present non-discriminatory distribution of data and information obtained. On the other hand, active participation of private entity aiming at commercial profit enables national government to manage more effective control and supervision of those activities with a view to promoting national interests. Also, newly developed private rules and regulations are emerging in business relations about commercial space activities. Extended capacity of national government assuring its national interest in production and distribution of international resources that is outer space, and regulation of space activities by newly developed rules and customs provoke a concern about a identity problem of space law. The best way to summarize this perspective might consist in saying that non space law regulations, which are not assumed as aiming at the promotion of all mankind's interest, are confirming their role about space related activities. For those reasous, we are now facing a developing status of space law as developments of commercial space activities continues.

  • PDF

A Study of File Format-Aware Fuzzing against Smartphone Media Server Daemons (스마트폰 미디어 서버 데몬에 대한 파일 포맷 인식 기반의 퍼징 연구)

  • Shin, MinSik;Yu, JungBeen;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.541-548
    • /
    • 2017
  • The smartphone operates the media server daemon to handle audio service requests. Media server daemons, running with a high privilege in the background, caused many vulnerabilities to applications most frequently used in smart devices including smartphones. Fuzzing is a popularly used methodology to find software vulnerabilities. Unfortunately, fuzzing itself is not much effective in such format-strict environments as media services. In this paper, we propose a file format-aware fuzzing in order to efficiently detect vulnerabilities of media server daemon. We acquired a remote arbitrary code execution vulnerability on iOS/tvOS/MacOS/watchOS, and we verified the effectiveness by comparing our methodology with the fuzzers FileFuzz and ZZUF.

Development of the Educational Database of Picture Data for the Korean Geography Course of High School (고등학교 한국지리 교육용 영상자료 데이터베이스 개발)

  • Kwon, Dong-Hi
    • Journal of the Korean association of regional geographers
    • /
    • v.4 no.2
    • /
    • pp.65-77
    • /
    • 1998
  • One of the fundamental, important preconditions for effective teaching of geography is to collect a variety of picture data available for class and to manage the data systematically. The purpose of this study is to present one method about how to supply basic picture data available for class of Korean geography for the high school program to teachers in service and how to collect, manage and utilize the data. A total of 233 picture data related to contents of the textbook of Korean Geography have been gathered through this study, and a database has been constructed for the data. Directories were generated for individual units of the textbook, and the collected picture data was stored in the image file of each directory. This data was recorded in a CD and attached as an appendix. Since the primary purpose of this study is to suggest one method, the picture data in a database for the present study is just a fraction of lots of data available for class of Korean geography. If the user persistently enlarges and manages data based on the results of this study, the data will become a good instructional aid. The picture data can be printed over the transparent film and used for class by using the overhead protector (OHP), or it can be also used as a remote self-study tool through the computer telecommunications network (e.g., LAN or INTERNET. etc,). Most desirable, however, is to develop teachers' own method by taking account of separate units of the textbook or diverse educational environments.

  • PDF

The encryption research of the sensor gateway for traffic surveillance and control system (교통감시.제어시스템을 위한 센서게이트웨이 암호화 연구)

  • Lim, Il-Kwon;Kim, Young-Hyuk;Park, So-Ah;Gui, Li Qi;Lee, Jae-Kwang;Park, Woo-Jun;Cheon, Byeong-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.477-480
    • /
    • 2010
  • This paper develops a sensor gateway for using Internet for traffic flow control and remote monitoring, it suggest the required protocol with authentication and encryption. The traffic Surveillance and Control System is an important service to the ITS(Intelligent Transportation System). The traffic surveillance and control system's TCP / IP and the Internet network using is may cause damage means accessing from unauthorized users, Subsequent authentication and encryption of data is essential.

  • PDF