• Title/Summary/Keyword: Security Devices

Search Result 1,603, Processing Time 0.029 seconds

Public Electric Car Charging Locations Based on Car Navigation Data in Seoul (네비게이션 데이터를 바탕으로 한 서울시의 공공 전기차 충전소 위치)

  • Taekyung Kim;Jangyoung Kim;Yoon Gi Yang
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.1-15
    • /
    • 2016
  • Electric cars are expected to increase quality of life by reducing air pollution and to contribute to economic growth by creating new businesses. However, electric car adoption has lagged and has not satisfied public expectation. One of the primary reasons for this outcome is the slow charging speed or inconvenience of charging a battery. Under the insufficient diffusion of electric cars, pushing business entities to construct charging facilities is undesirable for a policy maker to increase the adoption rate because of cost and management issues. This study adopts the design science methodology to interpret the problem of deploying electric car charging stations in the view of information systems. A trip planning algorithm is suggested on the basis of the theory of range anxiety. We investigate issues related to the current charging locations using data from drivers' car navigation devices. We also review its applicability to trip planning to obtain insights.

The information of the businesses and the protection of information human rights (기업정보화와 정보인권보호)

  • 하우영
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.543-559
    • /
    • 2003
  • The information drive of the businesses requires new alternatives in that the promotion of business efficiency through information process technologies ends up conflicting with the protection of information human rights on laborers’side. Nevertheless, apathy on information protection has a tendency to be distorted by the efficiency of the businesses. Should the capital and mass media warn economic red lights, political circles with uneasiness would ignore the significance of information protection on the behalf of business efficiency. Therefore, the importance of information protection is considered a smaller interest than that of business efficiency with the infringements of human rights on laborers’side arising. Informatization of the businesses along with the developments of information process technologies has enabled the management to monitor and control the behaviors of laborers. This new problem needs to establish both information protection mechanism and institutional devices to regulate those labor controls. The security of business activity without human rights infringement warrants both basic rights of the public and spirit of the Constitution. The study suggests the establishment and revision of laws suitable to the period of information human rights. On top of that, the establishment of the basic law for information protection of individuals’with the common principle that integrates the related laws and rules on-off line is needed. This will warrant the active participation of labor unions and create specific alternatives for information protection.

  • PDF

Android Based Mobile Combination Login Application (안드로이드 기반 모바일 통합로그인 애플리케이션)

  • Lim, Jung-Gun;Choi, Chang-Suk;Park, Tae-Eun;Ki, Hyo-Sun;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.151-156
    • /
    • 2013
  • Android that was made by Google and Open Handset Alliance is the open source software toolkit for mobile phone. In a few years, Android will be used by millions of Android mobile phones and other mobile devices, and become the main platform for application developers. In this paper, the integrated login application based on Google's Android platform is developed. The main features of the mobile combination login application content based on Android are as follows. First, the application has more convenient login functionality than the functionality of general web browser as the web browser of the mobile-based applications(web browser style applications) as well as security features and faster screen(view) capability by reducing the amount of data transfer. Second, the application is so useful for management of ID and Password, and it can easily manage multiple ID information such as message, mail, profile. The results of performance evaluation of the developed application show the functionality that can login many kinds of portal sites simultaneously as well as the ability that can maintain login continuously. Currently, we are trying to develope a couple of the technologies that can insert multiple accounts into one ID and check all information on one screen.

QR-Code Based Mutual Authentication System for Web Service (웹 서비스를 위한 QR 코드 기반 상호 인증 시스템)

  • Park, Ji-Ye;Kim, Jung-In;Shin, Min-Su;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.207-215
    • /
    • 2014
  • Password based authentication systems are most widely used for user convenience in web services. However such authentication systems are known to be vulnerable to various attacks such as password guessing attack, dictionary attack and key logging attack. Besides, many of the web systems just provide user authentication in a one-way fashion such that web clients cannot verify the authenticity of the web server to which they set access and give passwords. Therefore, it is too difficult to protect against DNS spoofing, phishing and pharming attacks. To cope with the security threats, web system adopts several enhanced schemes utilizing one time password (OTP) or long and strong passwords including special characters. However there are still practical issues. Users are required to buy OTP devices and strong passwords are less convenient to use. Above all, one-way authentication schemes generate several vulnerabilities. To solve the problems, we propose a multi-channel, multi-factor authentication scheme by utilizing QR-Code. The proposed scheme supports both user and server authentications mutually, thereby protecting against attacks such as phishing and pharming attacks. Also, the proposed scheme makes use of a portable smart device as a OTP generator so that the system is convenient and secure against traditional password attacks.

A Framework of N-Screen Session Manager based N-Screen Service using Cloud Computing in Thin-Client Environment (씬클라이언트 환경에서 클라우드 컴퓨팅을 이용한 N-Screen 세션 관리 기반의 N-Screen 서비스 프레임워크)

  • Alsaffar, Aymen Abdullah;Song, Biao;Hassan, Mohammad Mehedi;Huh, Eui-Nam
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.21-32
    • /
    • 2012
  • We develop architecture of a virtual aggregation gateway (VAG) which enables composite application streaming based on N-Screen-as-a-Service (NaaS) using cloud computing in thin-client environment. We also discuss the problem of server computing burden in large scale multi-client case for screens sharing with composite application streaming over the internet. In particular, we propose an efficient Framework of N-Screen Session Manager which manages all media signaling that are necessary to deliver demanded contents. Furthermore, it will provides user with playback multimedia contents method (TV Drama, Ads, and Dialog etc) which is not considered in other research papers. The objectives of proposing N-Screen Session Manager are to (1) manage session status of all communication sessions (2) manage handling of received request and replies (3) allow users to playback multimedia contents anytime with variety of devices for screen sharing and (4) allow users to transfer an ongoing communication session from one device to another. Furthermore, we discuss the major security issues that occur in Session Initiation Protocol as well as minimizing delay resulted from session initiations (playback or transfer session).

Monitoring Method Using Moving CCTV in Common Duct (이동형 CCTV 장치를 이용한 공동구 모니터링 방법)

  • Kang, Jin-A;Kim, Tae-Hoon;Oh, Yoon-Seuk;Choi, Hyun-Sang
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.14 no.4
    • /
    • pp.1-12
    • /
    • 2011
  • There has been the increasing concern with the safety of seven major urban infrastructure such as road, electricity, water supply, sewerage and so on due to urban expansion and new town development. However, high technology development for the common duct which can be an alternative for the safety issue has not been completed due to the law of the national security area. Existing management method of the common duct by people could not respond to the urgent accidents adequately and immediately since it is impossible for us to get access to that in case of fire or gas leak. This study suggests to the method of installing monitoring devices and processing CCTV images with a water supply in a TestLab(a variety of the USN(Ubiquitous Sensor Network) equipment was tested in the TestLab in KICT). The suggested management method of common duct facilities make it possible to do real-time monitoring and prompt access and response to an accident inside the common duct.

Design of Secure Scheme based on Bio-information Optimized for Car-sharing Cloud (카 쉐어링 클라우드 환경에서 최적화된 바이오 정보 기반 보안 기법 설계)

  • Lee, Kwang-Hyoung;Park, Sang-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.469-478
    • /
    • 2019
  • Car-sharing services have been settled on as a new type of public transportation owing to their enhanced convenience, expanded awareness of practical consumption patterns, the inspiration for environmental conscientiousness, and the diffusion of smart phones following the economic crisis. With development of the market, many people have started using such services. However, security is still an issue. Damage is expected since IDs and passwords are required for log-in when renting and controlling the vehicles. The protocol suggested in this study uses bio-information, providing an optimized service, and convenient (but strong) authentication with various service-provider clouds registering car big data about users through brokers. If using the techniques suggested here, it is feasible to reduce the exposure of the bio-information, and to receive service from multiple service-provider clouds through one particular broker. In addition, the proposed protocol reduces public key operations and session key storage by 20% on mobile devices, compared to existing car-sharing platforms, and because it provides convenient, but strong, authentication (and therefore constitutes a secure channel), it is possible to proceed with secure communications. It is anticipated that the techniques suggested in this study will enhance secure communications and user convenience in the future car-sharing-service cloud environment.

Implementation of Web Services Framework for Web Services on Universal Networks (유니버설 네트워크 상에서 웹서비스 프레임워크 구현)

  • Yim, Hyung-Jun;Oh, Il-Jin;Hwang, Yun-Young;Lee, Kyong-Ha;Lee, Kang-Chan;Lee, Seung-Yun;Lee, Kyu-Chul
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.143-157
    • /
    • 2008
  • Ubiquitous Web Services is able to be specified future Web Services technology for connecting with various application services in any device and network environments. The devices, in ubiquitous environment, have dynamic characteristic such as location and statuse. So, we must support methods of dynamic service discovery in ad-hoc network. There are many related works at transaction, security, QoS, semantic and Web Services composition with various fields. Recently, the studies are interested in the Ubiquitous by development of computing and network technology. However, they are an early stage. For this reason, in this paper, we propose a WSUN(Web Services on Universal Networks) for Ubiquitous Web Services. It is a SOA based framework. And this paper extracts necessity of WSUN environment from scenario. The framework is composed of US Broker(Universal Service Broker). It is designed for satisfying the conditions and supports dynamic service discovery using a US Registry (Universal Service Registry). Consequently. clients are able to discover and use Universal Service by protocol stack of the US Broker for Web Services. And it is a strong point which supports interoperability between heterogeneous networks.

Mobile phone payment system using a light signal (휴대폰의 광원을 이용한 디지털 카드 시스템)

  • Hu, Moon-Heang;Shin, Moon-Sun;Ryu, Kuen-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.6
    • /
    • pp.1237-1244
    • /
    • 2009
  • In this paper, we proposed a mobile phone payment system using light signal containing payment related information. The digicard system we proposed creates virtual mobile card such as credit numbers and the created information is loaded in mobile phone. The virtual card information should be changed to pulse signal by light signal devices of mobile phone and the specific digicard system reader is able to read light signal. In recent years, a mobile phone payment system has been developed in order to provide user's convenience. But the mobile phone payment system has problems such as the production costs and complex and large size. In order to solve the aforementioned problems, we proposed mobile phone payment system being implemented by updating software without additional hardware modules. Therefore it is possible to apply the proposed digicard system to all kinds of mobile phone. Also encryption module is implemented to solve the problem of the security and privacy. According to an aspect of the present invention, there is provided a mobile phone payment system using a light signal containing payment-related information, comprising: a mobile phone; a photo receiver: and a control server.

A Reliability Enhancement Technique of Mobile Payment (모바일 결제의 신뢰성 향상 방안)

  • Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.319-325
    • /
    • 2016
  • A variety of services for mobile payments by the activation of FinTech have been developed. Various payment methods were developed, and an authentication method was developed to improve the reliability of the payment. On the other hand, when mobile easy payment services are used, they have weak security because the authentication by phone number. Therefore, this paper proposes a technique for increasing the reliability of the authentication process using the unique device ID of the mobile device to improve the authentication process based on the telephone number. The core research contents are the architecture and process for the authentication of mobile payments based on the mobile device ID. The mobile payment architecture consists of a mobile device, authentication service, and mobile payment application. The mobile device consists of mobile device ID and phone number, and the authentication server consists of authentication module and encryption module. The mobile payment service consists of a pre-authentication module and decryption module. The process of mobile payment service is processed by the encrypted authentication information (device ID, phone number, and authentication number) among mobile devices, authentication server, and mobile payment application. The mobile device sends the telephone number and the device ID to the authentication server and the authentication server authenticates the user through an authentication process and encryption process. The mobile payment application performs the pre-authentication process by decrypting the received authentication number. This paper reports a difference that can prevent the risk of leakage of the authentication number in existing payment services through the authentication process of the authentication server and the pre-authentication process of the mobile payment service of this paper.