• Title/Summary/Keyword: SMS Server

Search Result 70, Processing Time 0.032 seconds

The Design and Implementation of Messenger Authentication Protocol to Prevent Smartphone Phishing (스마트폰 피싱에 안전한 메신저 인증 프로토콜 설계 및 구현)

  • Yu, Byung-Seok;Yun, Sung-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.4
    • /
    • pp.9-14
    • /
    • 2011
  • Phishing is an attack to theft an user's identity by masquerading the user or the device. The number of phishing victims are sharply increased due to wide spread use of smart phones and messenger programs. Smart phones can operate various wi-fi based apps besides typical voice call and SMS functions. Generally, the messenger program such as Kakao Talk or Nate On is consisted of client and server functions. Thus, the authentication between the client and the server is essential to communicate securely. In this paper, we propose the messenger authentication protocol safe against smart phone phishing. To protect communications among clients, the proposed method provides message encryption and authentication functions.

Design of Data Center Environmental Monitoring System Based On Lower Hardware Cost

  • Nkenyereye, Lionel;Jang, Jongwook
    • Journal of Multimedia Information System
    • /
    • v.3 no.3
    • /
    • pp.63-68
    • /
    • 2016
  • Environmental downtime produces a significant cost to organizations and makes them unable to do business because what happens in the data center affects everyone. In addition, the amount of electrical energy consumed by data centers increases with the amount of computing power installed. Installation of physical Information Technology and facilities related to environmental concerns, such as monitoring temperature, humidity, power, flood, smoke, air flow, and room entry, is the most proactive way to reduce the unnecessary costs of expensive hardware replacement or unplanned downtime and decrease energy consumed by servers. In this paper, we present remote system for monitoring datacenter implementing using open-source hardware platforms; Arduino, Raspberry Pi, and the Gobetwino. The sensed data displayed through Arduino are transferred using Gobetwino to the nearest host server such as temperature, humidity and distance every time an object hitting another object or a person coming in entrance. The raspberry Pi records the sensed data at the remote location. The objective of collecting temperature and humidity data allows monitoring of the server's health and getting alerts if things start to go wrong. When the temperature hits $50^{\circ}C$, the supervisor at remote headquarters would get a SMS, and then they would take appropriate actions to reduce electrical costs and preserve functionality of servers in data centers.

Realtime Monitoring System using AJAX + XML (AJAX+XML 기반의 모니터링 시스템)

  • Choi, Yun Jeong;Park, Seung Soo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.39-49
    • /
    • 2009
  • Nowadays, according to rapid development of computing environments, information processing and analysis system are very interesting research area. As a viewpoint of data preparation-processing-analysis in knowledge technology, the goal of automated information system is to satisfy high reliability and confidence and to minimize of human-administrator intervention. In addition, we expect the system which can deal with problem and abnormal error effectively as a fault detection and fault tolerance. In this paper, we design a monitoring system as follows. A productive monitoring information from various systems has unstructured forms and characteristics and crawls informative data by conditions and gathering rules. For representing of monitering information which requested by administrator, running-status can be able to check dynamically and systematic like connection/closed status in real-time. Our proposed system can easily correct and processing for monitoring information from various type of server and support to make objective judgement and analysis of administrator under operative target of information system. We implement semi-realtime monitering system using AJAX technology for dynamic browsing of web information and information processing using XML and XPATH. We apply our system to SMS server for checking running status and the system shows that has high utility and reliability.

Water loss Control in DMA Monitoring System Used Wireless Technology

  • Malithong, P.;Gulphanich, S.;Suesut, T.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.773-777
    • /
    • 2005
  • This article is about using information technology to apply with water loss inspection system in District Metering Area (DMA). Inspector can check Flow rate and Minimum Night Flow; NMF via Smart Phone or PDA include sending SMS Alert in case the Pressure, Flow rate and NMF is over the range of controlling. This will be used as equipment to implement water loss in international proactive and can keep on water loss reduction more efficiency. The system consists of Data Logger which collects data of Flow rate from DMA Master Meter. PC is Wap Server which dial via modem in order to get data through FTP Protocal that will convert text file to Microsoft Access Database. Wappage will use xhtml language to show database on Wapbrowser and can show the result on Smart Phone or PDA by graph and table for system analysis.

  • PDF

An Approach to the DirectX Based Wireless Real-time Mobile-Fixed Station System (무선 환경에서의 고정연결 이동-고정 시스템 구현)

  • Park, Jung-Hoon;Park, Jin-Bae;Yoon, Tae-Sung;Yoo, Sun-Kook
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2093-2095
    • /
    • 2002
  • Nowadays, there are actually lots of changes in wireless communications of Korea. But it is not an exact PTP(Peer to Peer) Communication. In other words, a mobile station which can find fixed station can be connected with wireless internet server or other services, oppositely fixed station cannot approach to mobile station. Even though it exists, it is difficult to communicate with full duplex. We can service using CDMA 1X techniques such as cellular based SMS (Short Message Service) service or very simple MPRG Services. In this paper, we propose a system, using DirectX based mobile/fixed station stand alone program, depending on bandwidth of wireless service provider, tranceiving high resolution moving picture or reliable data regularly by a fixed connection each other.

  • PDF

Design of EPICS based Control System for RCCS Cooling Water System in PEFP DTL (양성자 가속장치 냉각계통의 제어시스템의 EPICS 구현에 대한 연구)

  • Yoon, J.C.;Kim, K.R.;Kim, H.S.;Kwon, S.J.;Kim, Hui-Seop;Hwang, W.H.;Park, J.
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.1599-1600
    • /
    • 2007
  • The DTL water skid cooling system and Resonant Control Cooling Systems (RCCS) will employ a control system that can be operated by a local, programmable logic controller (PLC), interfaced through a touch screen interface, mobile alarm SMS server system, or it can be operated through the PEFP global control system network. The RCCS is implemented using Experimental Physics and Control System (EPICS) based hardware and software and is integrated with other networked PEFP EPICS systems. This presentation discusses the features of the local control system.

  • PDF

Efficient Three-Party Password Authenticated Key Exchange for Client-to-Client Applications

  • Yang, Yanjiang;Bao, Feng
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6B
    • /
    • pp.249-257
    • /
    • 2008
  • Nowadays, client-to-client applications such as online chat (e.g. MSN) and SMS (Short Message Services) are becoming increasingly prevalent. These client-to-client applications are revolutionizing the way we communicate. Three-party PAKE (password authenticated key exchange) protocols provide a means for the two communicating parties holding passwords to establishment a secure channel between them with the help of a common server. In this paper, we propose an efficient three-party PAKE protocol for the client-to-client applications, which has much better performance than the existing generic constructions. We also show that the proposed protocol is secure in a formal security model.

Logging Based System Design and Implementation of Business Transaction Management for a Distributed Network Environment (분산네트워크 환경에서의 Logging 기반 BTM 설계 및 구현)

  • Kim, Yong-Ok;Choi, Yong-Lak;Sung, Ki-Bum;Lee, Nam-Yong;Kim, Jong-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.12
    • /
    • pp.976-983
    • /
    • 2013
  • The targets for the traditional IT management solutions has been mostly systems (server) and networks. Such that management system for system and network, SMS and NMS respectively, used be the IT management solutions. Now the speed of hardware improvement is faster than ever, the performance improvement scope is shifting from hardware towards software. Therefore, it is not arguable that the business success depends on the efficient and optimized application performance management. There are many different approaches are developed in the application performance management, but in this study, API-based logging system that most efficiently visualizes the correlation of call and response between Components and enables active performance management for monitoring real-time applications operation status and resolving the problems and failures quickly.

A Life Browser based on Probabilistic and Semantic Networks for Visualization and Retrieval of Everyday-Life (일상생활 시각화와 검색을 위한 확률망과 의미망 기반 라이프 브라우저)

  • Lee, Young-Seol;Hwang, Keum-Sung;Kim, Kyung-Joong;Cho, Sung-Bae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.3
    • /
    • pp.289-300
    • /
    • 2010
  • Recently, diverse information which are location, call history, SMS history, photographs, and video can be collected constantly from mobile devices such as cellular phone, smart phone, and PDA. There are many researchers who study services for searching and abstraction of personal daily life with contextual information in mobile environment. In this paper, we introduce MyLifeBrowser which is developed in our previous work. Also, we explain LPS and correction of GPS coordinates as extensions of previous work and show LPS performance test and evaluate the performance of expanded keywords. MyLifeBrowser which provides searching personal information in mobile device and support of detecting related information according to a fragmentary keyword and common knowledge in ConceptNet. It supports the functionality of searching related locations using Bayesian network that is designed by the authors. In our experiment, we visualize real data through MyLifeBrowser and show the feasibility of LPS server and expanded keywords using both Bayesian network and ConceptNet.

Design and Implementation of Malicious Application Detection System Using Event Aggregation on Android based Mobile Devices (안드로이드 모바일 단말에서의 이벤트 수집을 통한 악성 앱 탐지 시스템 설계 및 구현)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.35-46
    • /
    • 2013
  • As mobile terminal environment gets matured, the use of Android platform based mobile terminals has been growing high. Recently, the number of attacks by malicious application is also increasing as Android platform is vulnerable to private information leakage in nature. Most of these malicious applications are easily distributed to general users through open market or internet and an attacker inserts malicious code into malicious app which could be harmful tool to steal private data and banking data such as SMS, contacts list, and public key certificate to a remote server. To cope with these security threats more actively, it is necessary to develop countermeasure system that enables to detect security vulnerability existing in mobile device and take an appropriate action to protect the system against malicious attacks. In this sense, this paper aggregates diverse system events from multiple mobile devices and also implements a system to detect attacks by malicious application.