• Title/Summary/Keyword: Two-way Communication

Search Result 780, Processing Time 0.032 seconds

Design for Story-making: Conceptual Exploration on Emotionally Sustainable Design

  • Hong, Min-Jung
    • Journal of the Korea Furniture Society
    • /
    • v.19 no.2
    • /
    • pp.141-150
    • /
    • 2008
  • Exploring on two major questions: 'Why do we feel more love for certain objects?' and 'How can design use this knowledge to realize design sustainability?', this article presents an alternative way of approaching the problem of design sustainability from the perspective that our relationships with design objects are of an extended mode of social relations. Recent discussions on design sustainability have transformed the notion of the problem by seeing it as a problem of our basic perception of design objects and our relationships with them. In this light, I propose that design sustainability could not be achieved solely by approaching from a mechanistic perspective, but by re-framing the way we see and relate things around us and by supporting our changes and actions to move forward a more sustainable notion of our relationships with the objects. As a way to realize design sustainability, I propose that design should involve story-making quality that supports our initiatives to build more affectional relations with objects by seeing the objects as entities of communication that tell stories of us, thus reflect our identities and meanings of our lives. Proceeding on the exploration of the subject, I present some of conceptual outlines in forms of an image diary, an interplay-able furniture unit, and a performance instruction that suggest a way for a special story-making process and thus a stronger emotional tie with the objects.

  • PDF

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

  • Hu, Liang;Chi, Ling;Li, Hong-Tu;Yuan, Wei;Sun, Yuyu;Chu, Jian-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.131-146
    • /
    • 2012
  • As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.

A new password authentication scheme using two-way password in Smartphone Banking (이중 패스워드 방식을 이용한 스마트폰 뱅킹 관리)

  • Song, Jong-Gun;Kim, Tae-Yong;Lee, Hoon-Jae;Jang, Won-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.195-200
    • /
    • 2012
  • Smart Phone devices offer convenience for users, but present a new set of security issues due to loss or malicious code. In this paper, a mobile cloud system environment is used with existing smart phones in an attempt to solve the problems in a banking environment. In order to prevent financial damages due to loss or personal information leakage by malicious code, a mobile cloud computing service that provides control and protection of personal information in environment that ensures individual authentication is used. Existing ID / Password with certificate, with the way smart phone dual password authentication scheme using the gyro sensors proposed.

A Study on Disaster Evacuation System in Busan Urban Transit using LoRa Wireless Network (LoRa 무선네트워크 기반 부산도시철도 재난대피 시스템 적용에 관한 연구)

  • Lee, Moo-Hyun;Park, Hee-Chul;Kim, Nam-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.417-419
    • /
    • 2016
  • Internet of things(IoT) services should be available to provide unattended operation in a remote area, long battery life, low-cost infrastructure, two-way communication platform. Urban transit in Busan is made up of the wire-based infrastructure except for voice infrastructure of transmit/receive and new data infrastructure is required for Internet of things(IoT) services. Urban transit environments in Busan were analyzed in order to apply LoRa Wireless Network(the standard communication way of IoT) and proposes a building after a Disaster Evacuation System.

  • PDF

A Study on Public Key Distribution System (공개키 분배방식에 관한 연구)

  • 권창영;원동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.12
    • /
    • pp.981-989
    • /
    • 1990
  • Thos paper summarized previously proposed several public key distribution systems and proposes a new public key distribution system to generate an common secret conference key for public key distribution systems three or more user. The now system is based on discrete exponentiation, that is all operations involve reduction modulo p for large prime p and we study some novel characteristics for computins multiplicative inverse in GF(p). We use one-way communication to distribute work keys, while the other uses two-way communication. The security of the new system is based on the difficulty of determining logarithms in a finite field GF(p) and stronger than Diffie-Hellman public key distribution system.

  • PDF

STB Virtualization based Enhanced IPTV User Authentication System (셋톱박스 가상화를 통한 향상된 IPTV 사용자 인증 시스템)

  • Go, Woong;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.137-147
    • /
    • 2011
  • Because of the convergence between Internet and broadcast communication, users are able to use multimedia contents anytime. In addition, with the change of existing one-way service to two-way service, the provider can offer efficient and useful broadcast communication. However, As multimedia contents is provided by STB, it can validate only end-node STB. Thus, this method is limiting possibilities of individual service. Also, providers' STB are different, so problem of compatibility is emerging as an issue. Therefore, in this paper we proposed STB virtualization based enhanced IPTV user authentication system to improve individual authentication and compatibility of services.

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.

Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication

  • Vijayakumar, P.;Bose, S.;Kannan, A.;Jegatha Deborah, L.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.878-894
    • /
    • 2013
  • Secure multimedia multicast applications involve group communications where group membership requires secured dynamic key generation and updating operations. Such operations usually consume high computation time and therefore designing a key distribution protocol with reduced computation time is necessary for multicast applications. In this paper, we propose a new key distribution protocol that focuses on two aspects. The first one aims at the reduction of computation complexity by performing lesser numbers of multiplication operations using a ternary-tree approach during key updating. Moreover, it aims to optimize the number of multiplication operations by using the existing Karatsuba divide and conquer approach for fast multiplication. The second aspect aims at reducing the amount of information communicated to the group members during the update operations in the key content. The proposed algorithm has been evaluated based on computation and communication complexity and a comparative performance analysis of various key distribution protocols is provided. Moreover, it has been observed that the proposed algorithm reduces the computation and communication time significantly.

A Development of Image Transfer Remote Maintenance Monitoring System for Hand Held Device (휴대용 화상전송 원격정비 감시시스템의 개발)

  • Kim, Dong-Wan;Park, Sung-Won
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.58 no.3
    • /
    • pp.276-284
    • /
    • 2009
  • In this paper, we develop the image transfer remote maintenance monitoring system for hand held device which can compensate defects of human mistake. The human mistakes always happen when the worker communicate information each other to check and maintenance the equipment of the power plant under bad circumstance such as small place and long distance in power plant. A worker couldn't converse with other when in noisy place like Power plant. So, we make some hand device for handy size and able to converse in noisy place. The developed system can have improvement of productivity through increasing plant operation time. And developed system is composed of advanced H/W(hard ware) system and S/W(soft ware)system. The H/W system consist of media server unit, communication equipment with hand held device, portable camera, mike and head set. The advanced s/w system consist of data base system, client pc(personal computer) real time monitoring system which has server GUI(graphic user interface) program, wireless monitoring program and wire ethernet communication program. The client GUI program is composed of total solution program as pc camera program, and phonetic conversation program etc.. We analyzed the required items and investigated applicable part in the image transfer remote maintenance monitoring system with hand held device. Also we investigated linkage of communication protocol for developed prototype, developed software tool of two-way communication and realtime recording skill of voice with image. We confirmed the efficiency by the field test in preventive maintenance of plant power.

A Study of the Relationship between Communication Patterns and Conflict between Old Parents and Adult Children (노부모와 성인자녀간의 의사소통 유형과 갈등에 관한 연구)

  • Shin, Il-Jin;Kim, Tae-Hyun
    • Journal of Families and Better Life
    • /
    • v.9 no.1 s.17
    • /
    • pp.27-44
    • /
    • 1991
  • The purpose of this study is to investigate the relationship between communication pattern and conflict between old parents and their adult children. For this purose, 380 adult children are surveyed therefore the answers of survey are described by adult children only. The number of old parents turn to be 230 old fathers and 301 old mothers respectively, there numbers have included the case both parents are alive. The data were analysed several method with SPSS and the methods used for the analysis are Factor analysis, one way ANOVA, Scheffe-Test, Pearson's Correlation, Multple Regression. The results of this study are summarizd as follows ; 1) Old parents's communication patterns differ each other and under many variables. 2) In the conflicts between old parents and adult children differ each other and under many variables, too. 3) The relationship between communication patterens and conflict between old parent and adult children turn to be as follows : Two communication styles ie, the autoritarian style and insincere style increse conflicts. Frendly style have negatve affect to conflicts and decreses the conflicts. Sacrifice style is turn to have slightly affect the conflict.

  • PDF