• 제목/요약/키워드: mobile communication services

검색결과 1,321건 처리시간 0.03초

Diffusion of Broadband Mobile Services in Korea: The Role of Standards and Its Impact on Diffusion of Complex Technology System

  • Yang, Hee-Dong;Yoo, Young-Jin;Kalle-Lyytinen;Ahn, Joong-Ho
    • 한국전자거래학회:학술대회논문집
    • /
    • 한국전자거래학회 2004년도 e-Biz World Conference
    • /
    • pp.271-284
    • /
    • 2004
  • Rapid developments in computing and communication technology have made broadband Internet service over the wireless phone networks possible. This so-called 3G (third generation) mobile services promise to usher us into an era of a seamless marriage between Internet data and mobile phone services. However,

  • PDF

유비쿼터스 환경의 위치 기반 모바일 전자상거래 서비스 통합 구조에 관한 연구 (An Integrated Architecture for Location-Based Mobile Commerce Service in Ubiquitous Environment)

  • 이민석;이훈일;이미영
    • Journal of Information Technology Applications and Management
    • /
    • 제12권3호
    • /
    • pp.97-109
    • /
    • 2005
  • The internet and wireless communication technologies are creating ubiquitous environments in which various services are expected anytime and anywhere. Many hardware facilities have been developed and system structures are suggested for mobile services to realize a ubiquitous computing environment with appropriate quality. But these applications are not designed in the consideration of the general capabilities to perform user's wireless and mobile communication/transaction. Consequently, different needs from users are not sufficiently satisfied yet. In this study, we suggest structure of the emerging network system for mobile commerce that provides users with seamless and ubiquitous environments using location information which exploit context-aware technology.

  • PDF

음성 지원 WML 브라우져의 설계 (Design of Voice Supported WML Browser)

  • 염세훈;유재우
    • 한국컴퓨터정보학회논문지
    • /
    • 제9권3호
    • /
    • pp.7-11
    • /
    • 2004
  • 이동 통신 기기의 발달과 확산에 따라 이동 통신을 이용한 인터넷의 사용의 요구가 증가하고 있다. 따라서 인터넷을 이동 통신기기에 적용하는 새로운 서비스가 요구되고 있다. 이에 많은 이동 통신 장치들을 위한 새로운 방법의 인터넷 접근 기술을 연구하고 있으며 WML과 WAP을 이용한 이동 통신 장치와 인터넷과의 연결이 모색되고 있다. 그러나 이동 통신 장치의 작은 디스플레이는 인터넷 사용에 제약점이 있다. 이에 본 논문에서는 음성 지원을 지원하는 WML 브라우져를 설계하여 제약점을 극복하고자 한다.

  • PDF

외국 관광객을 위한 마이크로웹페이지 기반 모바일 정보 시스템 사례 (A Case Study on Mobile Information Systems for Foreign Tourists based on Micro Webpages)

  • 한상숙;소선섭;은성배
    • 한국IT서비스학회지
    • /
    • 제15권1호
    • /
    • pp.289-298
    • /
    • 2016
  • There are continuos tendencies toward that foreign tourists increase. Since 55% of them visit Korea without data communication for saving the communication costs, they can not utilize a variety of O2O services through QR/NFC/Beacon. There have been some researches to provide a smart map service based on the micro webpage technology even without data communication. But, they do not suggest how the templates are retrieved into their smart-phones. In this paper, we describe a mobile tourist information system for those who have no data communication. We utilize the micro webpage technology to develop a system for market promotion, shopping goods, and tourist maps. What matters in the micro webpage techniques is that the templates should be already downloaded to the users' smart phones before using it. The preceeded research did not mention the problem. We suggest a scheme that tourists obtain the tremplates in the information offices on the spot through Wi-Fi. We describe the details of the system, and evaluate the data overhead of templates and the time to be downloaded. We show that the overheads are endurable, which means that the system would be working well.

중국 2G(GSM) SIM카드 복제로 인한 보안 취약성 연구 (A Study of Security Vulnerability by Cloning 2G(GSM) SIM Card in China)

  • 김완수;김식
    • 정보학연구
    • /
    • 제12권2호
    • /
    • pp.1-12
    • /
    • 2009
  • China first started its mobile phone services in 1987, and the number of users has exponentially increased so that it reached 700 millions in January 2009. Currently China's 2G(GSM) users is 650 millions. These 2G (GSM) services have an advantage of the capability to use the mobile phone with a SIM (Subscriber Identity Modul) card, one kind of smart cards, inserted into it. However, due to the security vulnerability of SIM cards being used within China's 2G (GSM) services, SIM cards cloning. Problems concerning mobile phone surveillance towards a designated person by illegal cloning ESN and IMSI have recently risen to be a massive social issue within Korea as well. These studies have experimented the possibility of SIM cards clone in various mobile communication corporations using 2G (GSM) in China, and hence discovered the security vulnerability such as the incoming outgoing, SMS service and additional services on mobile phones using clone SIM cards.

  • PDF

병원 간 전원 상황에서 이동통신망을 이용한 음성화상정보통신 애플리케이션의 유용성에 관한 연구 (A feasibility study of audio-video communication application using mobile telecommunication in inter-hospital transfer situations)

  • 정주;김태한;강샛별
    • 한국응급구조학회지
    • /
    • 제23권1호
    • /
    • pp.125-134
    • /
    • 2019
  • Purpose: The aim of this study was to evaluate the usefulness of video communication with medical staff located at a remote location, through a communication application connected to a long term evolution (LTE) mobile communication network in a moving ambulance. Methods: In this study, we recruited patients who were transferred by mobile intensive care unit ambulance from one hospital to another. In the moving ambulance, the information of the patient was transferred to a physician using the application in real time. Recorded video files were evaluated by emergency physicians with experience in video direct medical control. Results: A total of 18 patients were evaluated, and the average score was 5.9 out of a possible 9. It was expected that applying the use of the technology to actual clinical sites would enable the sites to provide assistance. Conclusion: In this study, we confirmed the possibility of benefiting from the clinical field when using the video-audio communication application which is connected to the remote location in real time through the current LTE mobile communication network in the ambulance.

M2M 통신에서 서비스의 효과적인 처리 방안에 대한 연구 (A Study about effective handling method of service in M2M Communications)

  • 이순식;송민섭;남재현;장종욱
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 춘계학술대회
    • /
    • pp.325-328
    • /
    • 2013
  • 최근 국내 이동통신사들의 차세대 성장 동력으로 사물지능통신 (Machine to Machine, M2M)이 주목받고 있다. 따라서 그 쓰임새와 활용도가 각종 분야로 점점 넓어지고 있으며, 기존의 통신에 비해 사용되는 단말의 수가 점점 증가하게 되면서 사물마다 전송되는 정보들의 수도 증가하고 있다. 대량의 단말로부터 전송하는 각각의 데이터가 이동통신망을 이용하는데 있어 트래픽이 한계상황에 도달하게 된다면 M2M 통신의 서비스 처리를 원활하게 하지 못하는 상황이 발생 할 수 있다. 본 연구는 M2M 통신에서 사용하게 될 이동통신망이 한계점에 도달했을 때 M2M 서비스의 원활한 처리를 위한 방안을 제시한다. 이러한 방안은 데이터 트래픽이 한계점에 도달하게 된 이동통신망에서 우선적으로 처리해야 될 M2M 통신의 서비스 순위를 결정짓는데 사용 될 것이며, M2M 기술이 더욱 발전하게 되어 점차 소형화 되는 사물들이 많아짐에 따라, 폭증하게 될 이동통신망에서 M2M 서비스를 처리하는 것이 원활하도록 도움을 줄 것이다.

  • PDF

A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication

  • DongGyun Chu;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • 제20권1호
    • /
    • pp.38-52
    • /
    • 2024
  • The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multi-access edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.

The Design of an Efficient Proxy-Based Framework for Mobile Cloud Computing

  • Zhang, Zhijun;Lim, HyoTaek;Lee, Hoon Jae
    • Journal of information and communication convergence engineering
    • /
    • 제13권1호
    • /
    • pp.15-20
    • /
    • 2015
  • The limited battery power in the mobile environment, lack of sufficient wireless bandwidth, limited resources of mobile terminals, and frequent breakdowns of the wireless network have become major hurdles in the development of mobile cloud computing (MCC). In order to solve the abovementioned problems, This paper propose a proxy-based MCC framework by adding a proxy server between mobile devices and cloud services to optimize the access to cloud services by mobile devices on the network transmission, application support, and service mode levels. Finally, we verify the effectiveness of the developed framework through an experimental analysis. This framework can ensure that mobile users have efficient access to cloud services.

WIPI 플랫폼에서 모바일 맵 서비스의 설계 및 구현 (Design and Implementation of Mobile Map Service on the WIPI Platform)

  • 최진오
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2006년도 춘계종합학술대회
    • /
    • pp.457-460
    • /
    • 2006
  • 각 이동 통신 업체들의 독립적 모바일 플랫폼 구축에 따른 비용 낭비를 방지하기 위해 한국무선 인터넷표준화포럼(KWISF)에서 WIPI 플랫폼을 제안하였다. 기존의 각 이동 통신사의 플랫폼에 맞춰진 모바일 맵 서비스가 실시되고 있으나 향후 WIPI('Wireless Internet Platform for Interoperability) 플랫폼으로 통합이 이루어지면 플랫폼과 컴퍼넌트 API 변화에 따른 모바일 맵 서비스 환경 변화가 불가피할 것이다. 본 연구에서는 WIPI 환경에 적합한 모바일 맵 서비스 기법을 설계하고 구현 결과를 제시한다.

  • PDF