• Title/Summary/Keyword: Smartphone Technologies

Search Result 181, Processing Time 0.028 seconds

Designing of Assessment System using Multiple Devices based on NCS Professional Basic

  • Chang, Young-Hyun;Ko, Chang-Bae
    • International journal of advanced smart convergence
    • /
    • v.5 no.4
    • /
    • pp.48-53
    • /
    • 2016
  • In this paper, all elements used in integrated infrastructure for job competency assessments of NCS (National Competency Standards) will be merged into assessment system using multiple devices(ASMD). NCS is a systematic approach on required abilities (knowledge, technical expertise, attitude) to process the tasks in the fields by industry. Competiveness of ASMD design is that no limitation of time and space using personal devices like PC, laptop, smartphone, and tablet, while seeing screen, hearing, touching, speaking, and writing. Question type can be limitless to express the situation. To lead technologies and market for domestic and oversea assessment system, supporting on multiple devices with connectivity that will eliminate limitation of time and space is the key feature for design competitiveness. Design of integrated assessment system proposed in this paper can be applied to NCS, fundamental competency evaluation, online test, job aptitude test, and foreign language test which involve listening, reading, writing, and speaking. Compared with existing evaluation method, reduction of investment and operating cost will be greater. Along with development of ICT technologies, the next generation of integrated assessment system will be quickly changed to ASMD, which already involves connected service between internet and smart devices.

Shuffling of Elliptic Curve Cryptography Key on Device Payment

  • Kennedy, Chinyere Grace;Cho, Dongsub
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.4
    • /
    • pp.463-471
    • /
    • 2019
  • The growth of mobile technology particularly smartphone applications such as ticketing, access control, and making payments are on the increase. Elliptic Curve Cryptography (ECC)-based systems have also become widely available in the market offering various convenient services by bringing smartphones in proximity to ECC-enabled objects. When a system user attempts to establish a connection, the AIK sends hashes to a server that then verifies the values. ECC can be used with various operating systems in conjunction with other technologies such as biometric verification systems, smart cards, anti-virus programs, and firewalls. The use of Elliptic-curve cryptography ensures efficient verification and signing of security status verification reports which allows the system to take advantage of Trusted Computing Technologies. This paper proposes a device payment method based on ECC and Shuffling based on distributed key exchange. Our study focuses on the secure and efficient implementation of ECC in payment device. This novel approach is well secure against intruders and will prevent the unauthorized extraction of information from communication. It converts plaintext into ASCII value that leads to the point of curve, then after, it performs shuffling to encrypt and decrypt the data to generate secret shared key used by both sender and receiver.

The Design of Extensible Transport Protocol (확장 가능한 전송 프로토콜의 설계)

  • Park, Kihyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.142-146
    • /
    • 2014
  • The mobile computing has been a main mean of computing, because of recent development of smartphone and mobile communication network. The new service technologies, such as cloud computing, big data, SDN (Software Defined Network), and NFV (Network Function Virtualization), are appearing due to activating of the data center. These changes have brought various requirements for transport layer protocol. In addition, the transport protocol should have a extensible function to adapt additional technologies. This paper proposed that transport layer divide into three layer structure for extensible function, and designed the ETP(Extensible Transport Protocol) which is located in the bottom layer.

  • PDF

Study on Usable Security of Facebook (Facebook의 Usable Security에 관한 연구)

  • Kim, Chung-han;Park, Min-su;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.285-296
    • /
    • 2016
  • Recently, as the widespread use of Facebook through a smartphone or tablet PC, it has increased the threat that contains the malicious code to post a social attacks and comments that use personal information that has been published of Facebook. To solve these problems, Facebook is, by providing a security function, but would like to address these threats, in setting the security function, the security function of the user's convenience is not considered a properly there is a problem that is not in use. Thus, in this paper, on the basis of the information obtained via the cogTool, on Facebook security features, the user experience by presenting a method that can be quantitatively measured by this, the user convenience It classifies about Facebook security features to decrease.

A Study on Smishing Block of Android Platform Environment (안드로이드 플랫폼 환경에서의 스미싱 차단에 관한 연구)

  • Lee, Si-Young;Kang, Hee-Soo;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.975-985
    • /
    • 2014
  • As financial transactions with a smartphone has become increasing, a myriad of security threats have emerged against smartphones. Among the many types of security threats, Smishing has evolved to be more sophisticated and diverse in design. Therefore, financial institutions have recommended that users doesn't install applications with setting of "Unknown sources" in the system settings menu and install application which detects Smishing. Unfortunately, these kind of methods come with their own limitations and they have not been very effective in handling Smishing. In this paper, we propose a systematic method to detect Smishing, in which the RIL(Radio Interface Layer) collects a text message received and then, checks if message databases stores text message in order to determine whether Smishing malware has been installed on the system. If found, a system call (also known as a hook) is used to block the outgoing text message generated by the malware. This scheme was found to be effective in preventing Smishing as found in our implementation.

Design of Coordinator Based on Android for Data Collection in Body Sensor Network

  • Min, Seongwon;Lee, Jong-Yong;Jung, Kye-Dong
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.2
    • /
    • pp.98-105
    • /
    • 2017
  • Smartphones are fast growing in the IT market and are the most influential devices in our daily life. Smartphones are being studied for their use in body sensor networks with excellent processing power and wireless communication technology. In this paper, we propose a coordinator design that provides data collection, classification, and display using based on Android-smartphone in multiple sensor nodes. The coordinator collects data of sensor nodes that measure biological patterns using wireless communication technologies such as Bluetooth and NFC. The coordinator constructs a network using a multiple-level scheduling algorithm for efficient data collection at multiple sensor nodes. Also, to support different protocols between heterogeneous sensors, a data sheet recording wireless communication protocol information is used. The designed coordinator used Arduino to test the performance of multiple sensor node environments.

Improved IEEE 802.11 RSSI Attenuation Log Model by Weighted Fitting Method (가중치 적합 기법을 이용한 개선된 IEEE 802.11 RSSI 감쇠 로그 모델)

  • Shin, Seokhun;Park, Joon Goo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.21 no.1
    • /
    • pp.70-75
    • /
    • 2015
  • With the development of communication technologies and smartphone, requirements of positioning accuracy for LBS (Location Based Service) are becoming increasingly important. LBS is a service which offers the information or entertainment based on a location to users. Therefore, positioning is very important for LBS. Among many positioning methods, IEEE 802.11 WLAN positioning measures the distance using the RSSI (Received Signal Strength Indicator) attenuation log model. Thus in order to enhance positioning, we modify the IEEE 802.11 RSSI attenuation log model by adaptive weighting method. In this paper, we propose improved IEEE 802.11 RSSI attenuation log model for enhanced indoor positioning.

MOBILE PLATFORM FOR PRICING OF EQUITY-LINKED SECURITIES

  • JIAN, WANG;BAN, JUNGYUP;HAN, JUNHEE;LEE, SEONGJIN;JEONG, DARAE
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.21 no.3
    • /
    • pp.181-202
    • /
    • 2017
  • In this paper, we develop a mobile platform for pricing equity linked securities(ELS) using Monte Carlo simulation. Mobile phone or smartphone is an important part of most people's lives and has become an everyday item at the present day. Moreover, importance of technologies for anytime and anywhere is increasing daily. Thus, we construct a mobile computing environment for pricing ELS instead of desktops or laptop computers. We provide a detailed Java programming code and a process manual to easily follow up all processes of this paper.

Design of Food Management System Using NFC Tag

  • Lee, Jong-Chan;Bahk, Gyung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.5
    • /
    • pp.25-29
    • /
    • 2018
  • As society advances and consumers' perception of food safety changes, the demand for the safety of refrigerated and distributed foods is spreading. In this paper, we build an ICT system that can collect the TTH data from the NFC tag, store it, analyze the food safety level using it. This service platform consists of the temperature monitoring NFC tag attached to individual packaged food, the smartphone with NFC sensor, and the monitoring server with a big data system. Consumers and administrators in this system can easily identify and predict the safety level of individual packaged foods in real time using the provided app on smartphones. In the field of food safety, the use of new technologies such as ICT can create new value by combining with existing food industry in addition to creating new market by new service.

A Study on the Global Competitiveness and Way of Coexistence of Korean ICT Industries

  • Chang, Young-Hyun
    • International journal of advanced smart convergence
    • /
    • v.4 no.2
    • /
    • pp.124-130
    • /
    • 2015
  • Infinite competition on ICT industries is starting again. The basis of competence over global dominance will be human resource, a global ecosystem for products and national agenda for science and technology, etc.. This paper presents the six solution for the Global Competitiveness and Coexistence of Korean ICT Industries. Korea should nurture the brand of "World Best Korean ICT Forever" to secure technical competency of ICT related fields in global market. All ICT technologies should be aligned to global standard and market demand from beginning and the ecosystem around product needs to be established. System framework for utilizing the resource of core SW experts must be established. Through global partnership with China as manufacturing base for Korea-developed products, technical competency can be maintained including product planning. Security measure for technical assets is mandatory. Finally, core technology that will drive the future of ICT industries in Korea should be regarded as core subjects.