• Title/Summary/Keyword: internet phone

Search Result 998, Processing Time 0.028 seconds

Homomorphic Encryption as End-to-End Solution for Smart Devices

  • Shanthala, PT;Annapurna, D;Nittala, Sravanthi;Bhat, Arpitha S;Aishwarya, Aishwarya
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.57-62
    • /
    • 2022
  • The recent past has seen a tremendous amount of advancement in the field of Internet of Things (IoT), allowing the influx of a variety of devices into the market. IoT devices are present in almost every aspect of our daily lives. While this increase in usage has many advantages, it also comes with many problems, including and not limited to, the problem of security. There is a need for better measures to be put in place to ensure that the users' data is protected. In particular, fitness trackers used by a vast number of people, transmit important data regarding the health and location of the user. This data is transmitted from the fitness device to the phone and from the phone onto a cloud server. The transmission from device to phone is done over Bluetooth and the latest version of Bluetooth Light Energy (BLE) is fairly advanced in terms of security, it is susceptible to attacks such as Man-in-the-Middle attack and Denial of Service attack. Additionally, the data must be stored in an encrypted form on the cloud server; however, this proves to be a problem when the data must be decrypted to use for running computations. In order to ensure protection of data, measures such as end-to-end encryption may be used. Homomorphic encryption is a class of encryption schemes that allow computations on encrypted data. This paper explores the application of homomorphic encryption for fitness trackers.

Smart phone dependence Intervention Program meta-analysis for elementary school students (스마트폰 중독 초등학생을 위한 개입프로그램 메타분석)

  • Zheng, Song-Hua;Lee, Keung-Eun;Kim, Mi-Jung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.144-152
    • /
    • 2019
  • Reckless use of the Internet by children is a barrier to daily life and has a negative impact on children's physical, psychological and relational aspects. But more and more children depend on the Internet. Thus, the study conducted a meta-analysis to examine the effectiveness of group programs that involve Internet addiction among elementary school students. The study analyzed 18 studies of a local Internet group counseling program. First, the overall effectiveness of Internet-dependent group programs that cause Internet addiction reduction in elementary school students is shown to be g=0.90, indicating that group counseling programs are effective in reducing Internet addiction and changing related variables. Second, as a result of verifying differences between groups, there were differences in effectiveness in voluntary participation motivations. Therefore, intervention by elementary school students requires preventive training for smart phones so that voluntary participation can occur, and education for parents to develop autonomy for children to use smartphones properly. And rather than making these efforts limited to smart phones, IT retriever education needs to be organized.

Apple eases up on SDK policy: Avoiding antitrust? or strategic decision? (Apple의 폐쇄적 SDK정책 포기의 함의: 반독점성 시비의 회피와 전략적 결정)

  • Kim, Joon-Young;Park, Jin-Kyung;Lee, Bong-Gyou
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.135-144
    • /
    • 2010
  • Apple recently announced a new policy about software development kit that banned the use of tools that convert apps built on other platforms into iPhone apps. Therefore, Adobe cannot develop their software to AppStore that inquire to the Department of Justice and the Federal Trade Commission about antitrust actions. Someone argue that Apple try to exclusive smartphone market such as the Microsoft antitrust lawsuit in 1998, but this case is essentially different. First, it need to define Apple's software development kit for iPhone and iPad is whether antitrust or not. Because of the characteristics of two-sided market in Smartphone Apple's iPhone cannot monopoly in cellphone or smartphone market, but it can be an antitrust in application store market. However, Apple re-announced new software development kit policy that shows positive results. Instead of hastily intervened regulatory agencies, the DOJ or the FTC, it is quite desirable that watching the interaction between companies that whether market failures or not and if it's harmful for consumer's benefit. Adobe attack Apple to advocate consumers and developers freedom of choice, but the most important thing is conclusion based on a comprehensive analysis need to objective point of view that Apple do whether antitrust act or not and damage to developers and consumers who are both side of platform.

Development of Android Smartphone App for Camera-based Remote Monitoring System (카메라 기반의 원격 모니터링 시스템을 위한 안드로이드 스마트폰 앱 개발)

  • Lee, Seong-Kyu;Kim, Jin-Soo;Kim, Young-Seup;Choi, Chul-Uong
    • Spatial Information Research
    • /
    • v.19 no.5
    • /
    • pp.87-96
    • /
    • 2011
  • Recently mobile users can access to internet using smart phone at any place and any time, through which they can search and share information. In addition, as the sensors with high-tech functions become cheaper and miniaturized along with the development of MEMS (micro-electo mechanical systems) technology, the extent to utilize smart phone is increasing. Smart phone is equipped with various sensors such as high-resolution camera, GPS, gyroscope and magnetic sensor, which is an appropriate system configuration for remote monitoring research using camera. The remote monitoring system requires camera for video and internet network to send video, for which it has a limitation that it is influenced by the monitoring location. This study is aimed to design and develop the monitoring app. which can be remotely monitored using smart phone technology. The developed monitoring app was designed to take images of ROI (region of interest) within the specified time and to automatically send the images to the server. The developed app. is also possible to be remotely controlled by SMS (short message service). The monitoring proposed in this study can take high-resolution images using CMOS built in the smart phone and send the images and information to the server automatically at any place and any time using 3G and Wi-Fi networks.

Design and Implement of Secure helper using Smart-phone Auto recording App (스마트폰 자동 녹음 앱을 이용한 생활 안전 도우미 설계 및 구현)

  • Moon, Jeong-Kyung;Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.111-118
    • /
    • 2015
  • The violent crime has increased dramatically in our society. This is because our society has to change quickly. Strong police force, but this is not enough to solve the crime. And there are a lot of police to investigate the situation difficult to go out to the crime scene. So inevitably increase in the risk of crime. Researchers have conducted a number of studies to solve this problem. However, the proposed study how realistic are many points still lacking. herefore, we to take advantage of smartphones and high-speed Internet access technology to provide security services using the push service for rapid identification and crime situation in this study. Therefore, we would like to provide rapid service to identify criminal security situation using smart-phone app and push services on the high speed internet environments. The proposed system is to record the voice information received from the smart phone near the user presses the hot key is set in advance in real-time, and stores the audio information stored in the LBS information to the server through the authentication procedure. And the server uses the stored voice data and LBS Push service information to inform their families. We have completed the design of the proposed system. And it has implemented a smart phone app, the user authentication server. And using the state in which the push service from the authentication server by transmitting a message to a user to inform a family. But more must examine whether the proposed research is relevant in future studies.

A Survey on Aware of University Students for Internet Ethics and Malicious Replay (인터넷 윤리와 악성댓글에 대한 대학생들의 인식에 관한 조사)

  • Park, Hee-Sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.2043-2049
    • /
    • 2012
  • Because of the growth of internet and development of smart phone technology, peoples are able to connect the internet easily and convenient at anytime, and anywhere. The other hand, that take place many serious social side-effect and one of a typical cases is the problem of malicious replay in weaken of netizen's internet ethics. The problem of malicious replay is increasing more and more the seriousness of the problem and the victims are suffering from much the pains of the trauma by a malicious replay. Therefore, in this paper, we investigate and analyze actual on aware of internet ethics and malicious replay for university students and then we propose the improvement of the problem.

Book Management Program Using Smart Phones (스마트폰을 이용한 도서관리 프로그램)

  • Jeong, Kil-Hyun;Lee, Jong-Jin;Kim, Jong-Young;Kim, So-Hee;Kim, Ho-Hun;Um, Yi-Seul
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.01a
    • /
    • pp.93-96
    • /
    • 2011
  • 스마트폰(Smart Phone)은 휴대폰과 개인휴대단말기(PDA)의 장점을 결합한 인터넷 통신과 정보검색 등 컴퓨터 지원 기능을 추가한 지능형 단말기이다. 이것은 사용자가 원하는 어플리케이션을 설치할 수 있는 특징이 있다. 본 논문에서는 대중화 되어가고 있는 스마트폰과 QR(Quick Response) Code를 이용하여 대학 내의 학생들이 도서를 간편하게 관리할 수 있는 프로그램을 구현하였다. 이 프로그램은 로그인을 위한 고객등록, 로그인을 통한 도서정보 등록, 등록된 도서 검색으로 구성되었고, 도서정보가 스마트폰 내에 있는 DB에 저장된다. 도서 등록 시에는 도서의 ISBN 번호와 웹뷰를 이용한 도서 최저가 확인 및 저장이 가능하다. 이와 같은 도서 정보관리가 ISBN 번호와 QR code로 나타남으로서 사용자에게 스마트폰을 이용한 편리한 서비스를 제공할 수 있게 하였다.

  • PDF

Design of Intrusion Detection System Using the Circuit Patrol to protect against information leakage through Mobile access (모바일 접근에 의한 정보 누출을 막기 위한 Circuit Patrol 침입탐지 시스템 설계)

  • 장덕성
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.2
    • /
    • pp.46-52
    • /
    • 2002
  • Trend of wire internet has been transferred to wireless internet gradually due to the spread of mobile phone which made Possible Mobility and portability which wire internet could not afford. Not only front line of business part can access business information but also people can use government information for their daily life without limit of place. The frequent report of larceny and misuse of information has been issued to social sector that the need for IDS considering wire wireless internet. In this paper to design IDS to protect information first, searched wire internet intrusion type, intrusion detection method, and wireless intrusion type. In this paper, first, separate abnormal access at the point of system landing and detect intrusion attack with disguise through mobile wireless internet. Due to the intruder can access system normally with disguise, Circuit Patrol model has been suggested to monitor from intrusion attack.

  • PDF

Analysis of Termination Capacity in IEEE 802.16 Broadband Wireless Access Environments (IEEE 802.16 BWA 환경에서의 가입자 수용용량 분석)

  • Lim Seog-Ku
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.65-73
    • /
    • 2005
  • Request about fast diffusion of internet and high-capacity multimedia service is increasing day after day. Because existent wireless LAN is short range, if subscriber is far away in base station transceiver system(Base Station), subscriber's quality of service becomes low, and wileless internet is expensive. Lately, WiBro(Wireless Broadband Internet) system that is developed in domestic by world first, is high-speed portable internet service that is situated in middle area of mobile phone and wireless LAN. In this paper, service traffic model and characteristics are analyzed to provide multimedia service based on IEEE 802.16 BWA accomplishes base of WiBro and simulation is conducted according to various traffic mixing ratio. Finally, on the basis of these simulation results, maximum allowable number of subscriber per cell is calculated.

  • PDF

Design and Implementation of a M-commerce Content Provider System by Extracting the Internet Product Information (인터넷 상품정보 추출을 통한 M-commerce 콘텐츠 제공자 시스템의 설계 및 구현)

  • Ha, Sang-Ho
    • The KIPS Transactions:PartA
    • /
    • v.19A no.4
    • /
    • pp.195-204
    • /
    • 2012
  • M-commerce services are rapidly emerging with recent advances in mobile devices and wireless communications. Internet Shopping mall managers provide mobile phone users with their mobile shopping malls for m-commerce. However, these mobile shopping malls usually have their own sites which are not compatible with their Internet shopping malls, thus resulting in inefficiency to manage the two kinds of shopping malls. In this paper, we develop a M-commerce content provider system to effectively bring Internet shopping malls to mobile phones by extracting items only concerned to users from product documents. We then apply and evaluate the system over a specific internet shopping mall site. The results show that the system reduces considerably the amount of data transferred to user's mobile phones compared with using general web browsers.