• 제목/요약/키워드: Smartphone User

Search Result 719, Processing Time 0.026 seconds

A Book Retrieval System to Secure Authentication and Responsibility on Social Network Service Environments (소셜 네트워크 서비스 환경에서 안전한 사용자 인증과 효과적인 응답성을 제공할 수 있는 도서 검색시스템)

  • Moon, Wonsuk;Kim, Seoksoo;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.33-40
    • /
    • 2014
  • Since 2006, social networking services such as Facebook, Twitter, and Blog user increasing very rapidly. Furthermore demand of Book Retrieval Service using smartphone on social network service environment are increasing too. This service can to easy and share information for search book and data in several university. However, the current edition of the social services in the country to provide security services do not have the right. Therefore, we suggest a social book Retrieval service in social network environment that can support user authentication and partial filter search method on smartphone. our proposed system can to provide more speed responsiveness, effective display result on smartphone and security service.

A Study on The Improvement of User Authentication using the Facial Recognition and OTP Technique in the Mobile Environment (모바일 환경에서 OTP기술과 얼굴인식 기술을 이용한 사용자 인증 개선에 관한 연구)

  • Huh, Seung-Pyo;Lee, Dae-Sung;Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.75-84
    • /
    • 2011
  • With the rapid development of mobile technology the use of smartphone is spreading. In order to activate mobile banking and market in the future, the most important key is a secure financial transactoin. However, because many apps are developed without security check in proportional to the spread of smartphone, security threat is inevitably high. Current smartphone banking is processed as the way of the existing public certificate or OTP technique in the mobile environment, but many security hole about current technology is pointed out steadily. Therefore, in this paper we are to improve a existing security hole by reinforcing the security through multi-factor authentication and providing a physical non-repudiation.

A Study on Improving the Trasferring Efficiency of Information in the Smartphone Icons (스마트폰 아이콘의 효율적인 정보 전달 방안에 관한 연구)

  • Park Soo-Kwan;Choi Byung-Youb
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.11a
    • /
    • pp.959-962
    • /
    • 2004
  • 스마트폰(Smartphone)은 휴대 전화(Mobilephone) 기반에 개인용 정보 단말기(PDA: Personal Digital Assistance)의 장점을 합친 고기능, 다기능의 신개념 휴대 정보통신기기이며, 현재 계속하여 데이터 통신 기능은 물론 카메라, MP3 플레이어 기능 등 기존 휴대폰의 영역을 훨씬 넘어 PC의 영역에 범접하는 다양한 디지털 컨버전스가 이루어지고 있다. 이런 이유로 스마트폰 제조사예서는 기존 휴대 전화기에 비해 훨씬 많아진 정보의 양에 비해 상대적으로 좁은 크기의 액정 화면에 다양한 기능을 표시할 수밖에 없게 되었고, 그 결과 최종 사용자들은 화면 구성이 복잡한 스마트폰을 경험하게 되었다. 본 연구의 목적은 기존 스마트폰의 복잡한 기능중심 화면 표시 중에서 특히 아이콘(Icon)의 형태를 사용자 중심(User Oriented)의 아이콘으로 개선하는 방안을 제안하고, 이의 정략적 개선 효과를 검증하는데 있다. 본 연구는 2 단계의 실험 과정을 거쳐 수행되었으며, 첫 번째 실험에서는 스마트폰의 최종 사용자들 대상으로 평면적인 아이콘과 입체적인 아이콘의 정보 전달 효율성을 비교 측정하고, 두 번째 실험에서는 아이콘과 텍스트의 결합 유무에 따른 정보 전달 효율성을 측정하여, 2 단계의 실험 과정을 통해 분석한 아이콘의 최적 형태를 도출하였다. 본 연구에서는 측정한 실험 결과를 통하여 텍스트와 그래픽의 형식이 결합된 입체적인 아이콘의 형태가 최종 사용자를 위한 정보 전달에 있어 가장 효율적인 아이콘 형태임을 알 수 있었다.

  • PDF

A Study on FIDO UAF Federated Authentication Using JWT Token in Various Devices (다양한 장치에서 JWT 토큰을 이용한 FIDO UAF 연계 인증 연구)

  • Kim, HyeongGyeom;Kim, KiCheon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.4
    • /
    • pp.43-53
    • /
    • 2020
  • There are three standards for FIDO1 authentication technology: Universal Second Factor (U2F), Universal Authentication Framework (UAF), and Client to Authenticator Protocols (CTAP). FIDO2 refers to the WebAuthn standard established by W3C for the creation and use of a certificate in a web application that complements the existing CTAP. In Korea, the FIDO certified market is dominated by UAF, which deals with standards for smartphone (Android, iOS) apps owned by the majority of the people. As the market requires certification through FIDO on PCs, FIDO Alliance and W3C established standards that can be certified on the platform-independent Web and published 『Web Authentication: An API for Accessing Public Key Credentials Level 1』 on March 4, 2019. Most PC do not contain biometrics, so they are not being utilized contrary to expectations. In this paper, we intend to present a model that allows login in PC environment through biometric recognition of smartphone and FIDO UAF authentication. We propose a model in which a user requests login from a PC and performs FIDO authentication on a smartphone, and authentication is completed on the PC without any other user's additional gesture.

A Study on the Correlation between Atypical Form Factor-based Smartphones and Display-dependent Authentication Methods (비정형 폼 팩터 기반 스마트폰과 디스플레이 의존형 사용자 인증기법의 상관관계 연구)

  • Choi, Dongmin
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1076-1089
    • /
    • 2021
  • Among the currently used knowledge-based authentication methods for smartphones, text and graphic-based authentication methods, such as PIN and pattern methods, use a display unit and a touch function of the display unit for input/output of secret information. Recently released smartphone form factors are trying to transform into various forms, away from the conventional bar and slate types because of the material change of the display unit used in the existing smartphone and the increased flexibility of the display unit. However, as mentioned in the study of D. Choi [1], the structural change of the display unit may directly or indirectly affect the authentication method using the display unit as the main input/output device for confidential information, resulting in unexpected security vulnerabilities. In this paper, we analyze the security vulnerabilities of the current mobile user authentication methods that is applied atypical form factor. According to the analysis results, it seems that the existing display-dependent mobile user authentication methods do not consider emerging security threats at all. Furthermore, it is easily affected by changes in the form factor of smartphones. Finally, we propose countermeasures for security vulnerabilities expected when applying conventional authentication methods to atypical form factor-based smartphones.

Design and Implementation of Context-aware Application on Smartphone Using Speech Recognizer

  • Kim, Kyuseok
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.10 no.2
    • /
    • pp.49-59
    • /
    • 2020
  • As technologies have been developing, our lives are getting easier. Today we are surrounded by the new technologies such as AI and IoT. Moreover, the word, "smart" is a very broad one because we are trying to change our daily environment into smart one by using those technologies. For example, the traditional workplaces have changed into smart offices. Since the 3rd industrial revolution, we have used the touch interface to operate the machines. In the 4th industrial revolution, however, we are trying adding the speech recognition module to the machines to operate them by giving voice commands. Today many of the things are communicated with human by voice commands. Many of them are called AI things and they do tasks which users request and do tasks more than what users request. In the 4th industrial revolution, we use smartphones all the time every day from the morning to the night. For this reason, the privacy using phone is not guaranteed sometimes. For example, the caller's voice can be heard through the phone speaker when accepting a call. So, it is needed to protect privacy on smartphone and it should work automatically according to the user context. In this aspect, this paper proposes a method to adjust the voice volume for call to protect privacy on smartphone according to the user context.

The Effects of Pre-service Early Childhood Teacher's Adult-Attachment, Mental-Health and Resilience on Smartphone Addiction Tendency (예비유아교사의 성인애착, 정신건강, 회복탄력성이 스마트폰 중독경향성에 미치는 영향)

  • Kim, Min Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.353-361
    • /
    • 2020
  • This study examined the effects of pre-service early childhood teacher's adult-attachment, mental-health and resilience on smartphone addiction tendency. The participants were 283 pre-service early childhood teachers in Seoul and Kyungkido. Collected self-report data were analyzed by correlation analysis and hierarchical regression analysis. The results were as follows. First, there were 228 people (81 percent) in the regular user group and 55 people(19 percent) in the risk user group. Second, there were significant differences in adult-attachment, mental-health and resilience according to smartphone addiction tendency. Third, anxiety(adult-attachment) and mental-health had a positive correlation, and control and affirmation(resilience) had a negative correlation with pre-service early childhood teachers' smartphone addiction tendency. Fourth, all variables influenced pre-service early childhood teachers' smartphone addiction tendency. This study provides practical suggestions for smartphone usage and preventive measures for pre-service early childhood teachers' smartphone addiction.

A Study of Receptive Factors of Smartphone Service from the User's Perspective (스마트폰 서비스의 수용적 요인에 관한 연구 : 사용자 관점에서)

  • Choi, Junhyeog;Baek, Yeongtae;Han, Seungjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.181-190
    • /
    • 2013
  • This study first aims to investigate from the users' perspective what service is the most efficient to users and what service is relatively the most effective in contrast to investment among a variety of services provided by smartphone manufacturers, telecommunication companies, and related corporations. In addition, this research suggests implicatively important elements for making the future model of smartphone services. For this end, this study finds out the factors which generate users' positive or negative attitudes towards smartphone use through a questionnaire of those who are using smartphones at present. In particular, by applying Theory of Planned Behavior, this study analyzes the influence exerted by the user's belief towards the kinds of services by setting up Attitudinal Belief, Subjective Norms, and Control Belief which have an influence on attitude from the perspective of smartphone providing detailed services. The results of this study will eventually help the smartphone manufacturers, telecommunication companies, and related corporations to establish smartphone marketing strategy as well as to select the smartphone services which will have popular appeal to their users.

Development of Digilog-type Contents using Augmented Reality

  • Lee, Sang-Hyun
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.126-133
    • /
    • 2019
  • Recently, the development of ICT technology and the spread of smart devices have been applied to various industries using real world and augmented reality technologies. Currently, smartphone photography programs are always using fixed content. Augmented reality technology was used to capture the new concept and real-time situational picture of the young generation. Photographing technology using such augmented reality can cope with various concepts and the position and pose of the user. This paper aims to develop photography contents using augmented reality. In this paper, using augmented reality, combining past photographs with real world, and developing content that can be photographed are reviewed.

A Study on the Influence of Information Security on Consumer's Preference of Android and iOS based Smartphone (정보보안이 안드로이드와 iOS 기반 스마트폰 소비자 선호에 미치는 영향)

  • Park, Jong-jin;Choi, Min-kyong;Ahn, Jong-chang
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.105-119
    • /
    • 2017
  • Smartphone users hit over eighty-five percentage of Korean populations and personal private items and various information are stored in each user's smartphone. There are so many cases to propagate malicious codes or spywares for the purpose of catching illegally these kinds of information and earning pecuniary gains. Thus, need of information security is outstanding for using smartphone but also user's security perception is important. In this paper, we investigate about how information security affects smartphone operating system choices by users. For statistical analysis, the online survey with questionnaires for users of smartphones is conducted and effective 218 subjects are collected. We test hypotheses via communalities analysis using factor analysis, reliability analysis, independent sample t-test, and linear regression analysis by IBM SPSS statistical package. As a result, it is found that hardware environment influences on perceived ease of use. Brand power affects both perceived usefulness and perceived ease of use and degree of personal risk-accepting influences on perception of smartphone spy-ware risk. In addition, it is found that perceived usefulness, perceived ease of use, degree of personal risk-accepting, and spy-ware risk of smartphone influence significantly on intention to purchase smartphone. However, results of independent sample t-test for each operating system users of Android or iOS do not present statistically significant differences among two OS user groups. In addition, each result of OS user group testing for hypotheses is different from the results of total sample testing. These results can give important suggestions to organizations and managers related to smartphone ecology and contribute to the sphere of information systems (IS) study through a new perspective.