• Title/Summary/Keyword: User Private Information

Search Result 360, Processing Time 0.024 seconds

A private cloud gateway for smart homes (스마트 홈을 위한 프라이빗 클라우드 게이트웨이)

  • Hussain, Shujaat;Amin, Muhammad Bilal;Ahmad, Mahmood;Lee, Sungyoung;Chung, Tae Choong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.478-479
    • /
    • 2013
  • Smart home is one of the emerging domains to come up after advances in home appliances and automation technologies. There are many commercial solutions for smart homes yet many of them have yet to truly exploit the potential of private cloud for low level contextual services and ability to migrate to public cloud for more processing and storage. We propose a private cloud gateway for smart home which will have the ability to sense the new devices, ability to detect context of the situation and act in an appropriate way. It will also record the user logs which will be audited for improvement of the overall system.

Implementation and Design of Smart Reading Room Desk using IoT (IoT를 활용한 스마트 독서실 책상의 설계 및 구현)

  • Ha, Hye-Ju;Lee, Ki-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.71-76
    • /
    • 2020
  • Recently, the market of private study room continues to grow due to increased usage of private study room. However, old study room operators often have problems with cleanliness and theft, and cannot handle them in real time. Also, there is a problem of wasting power since users usually leave their desk for a long time with the lights on. Thus, in this paper, we intended to design a service which can prevent theft, clean up the user's desk, and adjust lighting system according to the user's condition based on Arduino system. Also, we tried to design a system which sends notifications from information of android-based IoT(Internet of Things), to the terminal when other people approach to the user's desk or try to steal user's item.

DDoS Attack Application Detection Method with Android Logging System (안드로이드 로깅 시스템을 이용한 DDoS 공격 애플리케이션 탐지 기법)

  • Choi, Seul-Ki;Hong, Min;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1215-1224
    • /
    • 2014
  • Various research was done to protect user's private data from malicious application which expose user's private data and abuse exposed data. However, a new type of malicious application were appeared. And these malicious applications use a smart phone as a new tools to perform secondary attack. Therefore, in this paper, we propose a method to detect the DDoS attack application installed inside the mobile device using the Android logging system.

Untact-based elevator operating system design using deep learning of private buildings (프라이빗 건물의 딥러닝을 활용한 언택트 기반 엘리베이터 운영시스템 설계)

  • Lee, Min-hye;Kang, Sun-kyoung;Shin, Seong-yoon;Mun, Hyung-jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.161-163
    • /
    • 2021
  • In an apartment or private building, it is difficult for the user to operate the elevator button in a similar situation with luggage in both hands. In an environment where human contact must be minimized due to a highly infectious virus such as COVID-19, it is inevitable to operate an elevator based on untact. This paper proposes an operating system capable of operating the elevator by using the user's voice and image processing through the user's face without pressing the elevator button. The elevator can be operated to a designated floor without pressing a button by detecting the face of a person entering the elevator by detecting the person's face from the camera installed in the elevator, matching the information registered in advance. When it is difficult to recognize a person's face, it is intended to enhance the convenience of elevator use in an untouched environment by controlling the floor of the elevator using the user's voice through a microphone and automatically recording access information.

  • PDF

Private information protection method and countermeasures in Big-data environment: Survey (빅데이터 환경에서 개인민감정보 보호 방안 및 대응책: 서베이)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.10
    • /
    • pp.55-59
    • /
    • 2018
  • Big-data, a revolutionary technology in the era of the 4th Industrial Revolution, provides services in various fields such as health, public sector, distribution, marketing, manufacturing, etc. It is very useful technology for marketing analysis and future design through accurate and quick data analysis. It is very likely to develop further. However, the biggest problem when using Big-data is privacy and privacy. When various data are analyzed using Big-data, the tendency of each user can be analyzed, and this information may be sensitive information of an individual and may invade privacy of an individual. Therefore, in this paper, we investigate the necessary measures for Personal private information infringement that may occur when using Personal private information in Big-data environment, and propose necessary Personal private information protection technologies to contribute to protection of Personal private information and privacy.

On Research of Certificates Management on Mobile Device (모바일 기기를 이용한 인증서 관리 연구)

  • Nam, Yong-su;Kim, Tae Yong;Jang, Won Tae;Lee, Hun Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.359-362
    • /
    • 2009
  • Qualified certificates in online financial and security transaction area are currently used for authentication of the user. The authorized user's public key certificates are stored in binary; the private key corresponding to the user's public key certificates is encrypted by the user password, and then is stored in a file. But the present management system to access the public certificates in local has some problems. In this study, we propose that the mobile public certificate management application to avoid the exist problems.

  • PDF

A Study on Establishment of Connecting Information Conversion Criteria for Mobile Electronic Notification Service of Private Institutions (민간기관 모바일 전자고지서비스를 위한 연계정보 변환기준 수립에 대한 연구)

  • Kim, JongBae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.735-743
    • /
    • 2021
  • The mobile electronic notice service (MENS) is a service that delivers a mobile electronic notice to a smartphone in the person's name through an authorized electronic document intermediary instead of a bill that was delivered by mail using paper. In order to provide the MENS, information is needed to identify the same user between the sending agency and the authorized electronic document relay. In this paper, we propose a standard for safe conversion and utilization of Connecting Information (CI) used as user identification information for MENS. In the proposed method, it is necessary for the requesting institution to send the electronic notice to provide the resident registration number to the identity verification institution and convert it into the CI. In this case, a safe and efficient MENS will be possible by proposing a review standard and processing method to verify the appropriateness of the conversion of CI. By applying the proposed method to the MENS, it can contribute to service activation and reinforcement of user privacy protection.

User Authentication Method Using Smartphone and Smartwatch (스마트폰과 스마트워치를 활용한 사용자 인증 기법)

  • Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2109-2114
    • /
    • 2017
  • Personal Identification Number (PIN) is the most common user-authentication method for the access control of private and commercial applications. The users need to enter PIN information to the applications whenever the users get access to the private services. However, the process imposes a burden on the users and is vulnerable to the potential shoulder-surfing attacks. In order to resolve both problems, we present a continuous authentication method for both smartphone and smartwatch, namely, synchronized authentication. First we analyze the previous smartwatch based authentication and point-out some shortcomings. In the proposed method, we verify the validity of user by analyzing the combined acceleration data of both smartphone and smartwatch. If the monitored sensor data shows the high correlations between them, the user is successfully authenticated. For the authentication test, we used the Samsung Galaxy Note5 and Sony Smartwatch2.

The NNI Interface Model of the ATM-Based Information Infra-Network of Korea (국내 ATM 기반 초고속정보통신망의 NNI 적용 모델 연구)

  • Yang, Seon-Hui;Jeong, Tae-Su;Kim, Eun-A;Choe, Jun-Gyun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.729-741
    • /
    • 1999
  • ATM networks are widely deployed as the network that is capable of supporting multimedia services efficiently now. To date, a large portion of ATM connections, particularly in the WAN environment, have been of a permanent virtual circuits-requiring management intervention for set-up and tear-down. However, switched virtual circuits are required to support a range of desired characteristics on demand, to a reachable end user. To establish, maintain and release on-demand call/connections, the user-network interface(UNI) and node-node interface(NNI) signalling capabilities are required. Two protocols have been specified for NNI signalling within a public network: the broadband integrated-services user part(B-ISUP) protocol specified by the ITU-T, and the private network-network interface(PNNI) protocol specified by the ATM Forum. PNNI offers different type of internetwork or internodal interface from the traditional B-ISUP approach favored to date public network operators. In spite of its name, PNNI may find its place in network service provide networks as well as in private networks. Thus many public network operators and ATM equipment manufacturers are still unable to choose the NNI interface architecture of their system. In this paper, we survey the characteristics of the B-ISUP and PNNI protocols, and investigate the applicability issue of these specifications to the ATM-based Information Infra-Network of Korea. Analyzing the characteristics of the two protocols and clarifying the NNi requirements of the ATM-based Information Infra-Network of Korea, we propose that the B-ISUP protocol is more suitable than PNNI.

  • PDF

Information Cascade and Individual Characteristics in Adopting Blogging (정보 캐스케이드와 개인특성이 블로깅 의도에 미치는 영향)

  • Yang, Kwang-Min;Lim, Byung-H.;Kim, Yong-Kyun
    • Asia pacific journal of information systems
    • /
    • v.15 no.4
    • /
    • pp.89-107
    • /
    • 2005
  • As new information technology(IT) adoption continues to produce many investment opportunities, imperfectly informed IT managers keep trying to acquire credible external signals to update their knowledge on new technologies. Such learning processes usually help them to reach better IT adoption decisions. In some cases, however, the opposite of the goal is achieved. Most IT managers quickly converge to the same adoption decision independent of their private information. Interestingly, such information cascade is the outcome of each individual decision maker's rational choice. A technology acceptance model(TAM) is adopted that has been widely used to predict the end-user's acceptance of a new technology. A model with individual charact-eristics and information cascade variables is constructed to explain user's intention in adopting blogging. The model is empirically tested with surveyed data. The results show that individual characteristics and information cascades have significant impacts in the case of blogging.