• Title/Summary/Keyword: Smart Phone Loss

Search Result 41, Processing Time 0.021 seconds

Mobile application for preventing card loss using the NFC technology (NFC 기술을 이용한 카드 분실을 방지하기 위한 모바일 앱)

  • Kang, Ki-Beom;Jwa, Jeong-Woo;Kim, Soon-Whan;Kim, Heung-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.181-188
    • /
    • 2017
  • As smart phone users increase the number of users who insert credit cards into wallet type smart phone cases is increasing. In this paper, we developed an Android application for preventing credit card loss in a wallet type smart phone case using the NFC (Near Field Communication) technology of smart phone. The developed android application uses the NFC reading and writing functions of the smart phone. When the credit card is inserted into the wallet type smart phone case, the android application detects the NFC tag in the credit card and registers credit card information. When the credit card is removed from the smart phone case, the Android application automatically detects the credit card loss and notifies to the user. The user can check and finds the location information of the lost credit card on the map of the Android application. We can easily develop the Android application for preventing credit card loss when a function that automatically detects an leaving NFC tag is added to Android.

Management Mechanism for the Protection of Information in Smart Phone

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.6
    • /
    • pp.43-50
    • /
    • 2015
  • In order to protect important information of smart phone from these security threats, this paper has studied a mechanism for protecting information from the leakage of various information and personal information stored in the smart phone. This paper has configured the basic protection scope for the information protection and applied real time encodement when new contents were created. Also, this paper has applied a security function so that the content of the protected scope can be managed and erased remotely in preparation for loss and burglary.

Water loss Control in DMA Monitoring System Used Wireless Technology

  • Malithong, P.;Gulphanich, S.;Suesut, T.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.773-777
    • /
    • 2005
  • This article is about using information technology to apply with water loss inspection system in District Metering Area (DMA). Inspector can check Flow rate and Minimum Night Flow; NMF via Smart Phone or PDA include sending SMS Alert in case the Pressure, Flow rate and NMF is over the range of controlling. This will be used as equipment to implement water loss in international proactive and can keep on water loss reduction more efficiency. The system consists of Data Logger which collects data of Flow rate from DMA Master Meter. PC is Wap Server which dial via modem in order to get data through FTP Protocal that will convert text file to Microsoft Access Database. Wappage will use xhtml language to show database on Wapbrowser and can show the result on Smart Phone or PDA by graph and table for system analysis.

  • PDF

A new password authentication scheme using two-way password in Smartphone Banking (이중 패스워드 방식을 이용한 스마트폰 뱅킹 관리)

  • Song, Jong-Gun;Kim, Tae-Yong;Lee, Hoon-Jae;Jang, Won-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.195-200
    • /
    • 2012
  • Smart Phone devices offer convenience for users, but present a new set of security issues due to loss or malicious code. In this paper, a mobile cloud system environment is used with existing smart phones in an attempt to solve the problems in a banking environment. In order to prevent financial damages due to loss or personal information leakage by malicious code, a mobile cloud computing service that provides control and protection of personal information in environment that ensures individual authentication is used. Existing ID / Password with certificate, with the way smart phone dual password authentication scheme using the gyro sensors proposed.

Effects of Korean Medicine Music Therapy on Anxiety, Anger Expression, and Concentration of Smart phone Addicted Adolescents (한방음악치료가 스마트폰 중독 청소년의 불안과 분노표현 및 주의집중력 향상에 미치는 영향)

  • Lee, Mi-hee;Lee, Seung-hyun
    • Journal of Korean Medical classics
    • /
    • v.30 no.3
    • /
    • pp.133-141
    • /
    • 2017
  • Objectives : As of 2013, South Korea ranked number one in the world in smartphone penetration rate with 67.6%. Unfortunately, with the rise of smart phone use, side effects such as fraud, loss of personal information, identity theft, formation and widening of a mobile information gap, and last, but not least, smart phone addiction, also increased. Methods : Seventh (7th)graders from a girls' junior high school in Seoul, the capital of South Korea, we reevaluated the Smart phone Addiction Proneness Scale (S-scale). Among the 9 students classified as high risk users, 5 were randomly selected for a study group, and the remaining 4 students, meanwhile, were designated as a control group. The study group received Korean medicine music therapy (KMMT) in a total of 8 sessions, each session lasting 50 minutes. Both pre- and post-interventions, the two groups completed the S-scale, Harris and Harris' concentration grid exercise, STAI, and STAXI-K. We analyzed the data by t-test and paired t-test using IBM SPSS Statistics. Results : KMMT had a significant influence on proneness to smart phone addiction (t=3.130, p=.035). KMMT had positive effects on concentration improvement (t=-2.935, p=.043), trait-anxiety symptoms improvement (t=2,992, p=.040), and anger-expression control (t=4.416, p=.012). Conclusions : KMMT had positive, improving effects on trait anxiety and anger expression, which in turn enhanced the improvement of concentration as well as the decrease of smart phone-addiction proneness.

An Integrative Method of FTA and FMEA for Software Security Analysis of a Smart Phone (스마트 폰의 소프트웨어 보안성 분석을 위한 FTA와 FMEA의 통합적 방법)

  • Kim, Myong-Hee;Toyib, Wildan;Park, Man-Gon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.541-552
    • /
    • 2013
  • Recently software security of the smart phone is an important issue in the field of information science and technology due to fast propagation of smart technology in our life. The smart phone as the security critical systems which are utilizing in terminal systems of the banking, ubiquitous home management, airline passengers screening, and so on are related to the risk of costs, risk of loss, risk of availability, and risk by usage. For the security issues, software hazard analysis of smart phone is the key approaching method by use of observed failures. In this paper, we propose an efficient integrative framework for software security analysis of the smart phone using Fault Tree Analysis (FTA) and Failure Mode Effect Analysis (FMEA) to gain a convergence security and reliability analysis technique on hand handle devices. And we discuss about that if a failure mode effect analysis performs simpler, not only for improving security but also reducing failure effects on this smart device, the proposed integrative framework is a key solution.

Development and Its Characterization of a Worker's Safety Activity Detection Apparatus using Smart Phone (스마트폰을 활용한 근로자 안전활동 감지장치 개발 및 특성)

  • Choi, Sang-Won
    • Journal of the Korean Society of Safety
    • /
    • v.30 no.3
    • /
    • pp.20-25
    • /
    • 2015
  • It is predicted the mass retirement of the post-war generation and the lack of young people according to reduces the recruitment. Therefore, industry fields are concerned by the low level of occupational safety and health from issued problem in a variety of industries; the charge of expanding business range/multi-functional, black box of technology, difficulty of systematic training, relative decrease in the skill of workers, loss of know-how in the field of information followed restricted site information. In response to these problems, it is necessary to establish the long-termly and actively based on for the adoption of a safety and health management techniques utilizing IT, which is digital assistant(tablet PC, PDA, etc.), RFID/USN/ICT, database systems, and etc. In this study, we developed and evaluated a worker's safety sensing apparatus using smart phone. The apparatus may be useful to prevent accidents in the construction industry as well as confined space work.

Study on the Camera Image Frame's Comparison for Authenticating Smart Phone Users (스마트폰 사용자 인증을 위한 카메라 영상 프레임 비교에 관한 연구)

  • Jang, Eun-Gyeom;Nam, Seok-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.155-164
    • /
    • 2011
  • APP based on the smart phone is being utilized to various scopes such as medical services in hospitals, financing services at banks and credit card companies, and ubiquitous technologies in companies and homes etc. In this service environment, exposures of smart phones cause loss of assets including leaks of official/private information by outsiders. Though secret keys, pattern recognition technologies, and single image authentication techniques are being applied as protective methods, but they have problems in that accesses are possible by utilizing static key values or images like pictures. Therefore, this study proposes a face authentication technology for protecting smart phones from these dangerous factors and problems. The proposed technology authenticates users by extracting key frames of user's facial images by real time, and also controls accesses to the smart phone. Authentication information is composed of multiple key frames, and the user' access is controlled by distinction algorism of similarity utilizing DC values of image's pixel and luminance.

A Design of Access Control Method for Security Enhance based Smart Device (스마트 디바이스 기반의 보안성 강화를 위한 접근제어 기법 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.11-20
    • /
    • 2018
  • Smart devices refer to various devices and control equipment such as health care devices, imaging devices, motor devices and wearable devices that use wireless network communication (e.g., Wi-fi, Bluetooth, LTE). Commercial services using such devices are found in a wide range of fields, including home networks, health care and medical services, entertainment and toys. Studies on smart devices have also been actively undertaken by academia and industry alike, as the penetration rate of smartphones grew and the technological progress made with the fourth industrial revolution bring about great convenience for users. While services offered through smart devices come with convenience, there is also various security threats that can lead to financial loss or even a loss of life in the case of terrorist attacks. As attacks that are committed through smart devices tend to pick up where attacks based on wireless internet left off, more research is needed on related security topics. As such, this paper seeks to design an access control method for reinforced security for smart devices. After registering and authenticating the smart device from the user's smart phone and service provider, a safe communication protocol is designed. Then to secure the integrity and confidentiality of the communication data, a management process such as for device renewal or cancellation is designed. Safety and security of the existing systems against attacks are also evaluated. In doing so, an improved efficiency by approximately 44% compared to the encryption processing speed of the existing system was verified.

Design and Implementation of an Android Application for Protecting the Personal Information on Smart Phones (스마트폰의 개인 정보 보호를 위한 안드로이드용 어플리케이션 설계 및 구현)

  • Lim, Hun-Jin;Choi, Do-Jin;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.12
    • /
    • pp.266-277
    • /
    • 2020
  • As users' convenience increases, the issue of personal information leakage about smartphones is also becoming serious. Since all of the user's personal information needed to provide functions such as electronic banking services and personal file storage is stored in the smartphone, the user's important personal information may be exposed if the smartphone is lost or stolen. In order to protect this privacy, governments and telecommunications companies offer smartphone locking or initialization services, but there are many loopholes and problems. In this paper, we design and implement applications that prevent malicious use of a user's personal information stored on a smartphone when a smartphone is lost or stolen, and that automatically initializes the smartphone used after removing or altering the USIM chip and destroys the user's personal information stored within the phone. The proposed application prevents users from maliciously using their personal information when a smartphone is lost or stolen.