• Title/Summary/Keyword: mobile platform security

Search Result 145, Processing Time 0.027 seconds

A Study on Security Technology using Mobile Virtualization TYPE-I (모바일 가상화 TYPE-I을 이용한 보안 기술 연구)

  • Kang, Yong-Ho;Jang, Chang-Bok;Kim, Joo-Man
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.1-9
    • /
    • 2015
  • Recently, with smart device proliferation and providing the various services using this, they have interested in mobile and Smart TV security. Smartphone users are enjoying various service, such as cloud, game, banking. But today's mobile security solutions and Study of Smart TV Security simply stays at the level of malicious code detection, mobile device management, security system itself. Accordingly, there is a need for technology for preventing hacking and leakage of sensitive information, such as certificates, legal documents, individual credit card number. To solve this problem, a variety of security technologies(mobile virtualization, ARM TrustZone, GlobalPlatform, MDM) in mobile devices have been studied. In this paper, we propose an efficient method to implement security technology based on TYPE-I virtualization using ARM TrustZone technology.

Design of Middleware for Face Recognition based on WIPI Platform (WIPI 플랫폼 기반 얼굴인식 미들웨어 설계)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.3
    • /
    • pp.117-127
    • /
    • 2005
  • Proportionately with a rapid development of mobile instrument technology, the number of mobile contents utilizing computing environment's graphic technology or image processing is increasing. In this paper, I designed a middleware which supports facial detection and recognition system based WIPI(Wireless Internet Platform for Interoperability), the Korean standard mobile platform. The facial recognition middleware introduced the object oriented concepts, to apply to recognition security and other contents by using mobile camera. This can reduce the development time and cost by dividing process while developing software. Therefore, it would be applied to content security or technology transfer with other company. Facial recognition middleware system is composed of face detection module and face recognition module, and proposes the application contents design method based on WIPI platform.

  • PDF

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.

OPEN LBS PLATFORM ARCHITECTURE

  • Choi, Hae-Ock
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.854-859
    • /
    • 2002
  • Location Based Services, or LBS refers to value-added service by processing information utilizing mobile user location. With the rapidly increasing wireless internet subscribers and world LBS market, the various location based applications are introduced such as buddy finder, proximity and security services. As the killer application of the wireless internet, the LBS has preconsidered technology about location determination technology, LBS middleware server for various application, and diverse contents processing technology. This paper describes the open architecture for LBS platform ensuring interoperability among the wireless networks and various location-based application services and the functional requirements for the LBS platform. The LBS platform in a narrow sense provides a standard interfaces for location management and network management for location services as follows, positioning (location acquisition through network or/and handset), location managing, location based functions, profile management, authentication and security, location based billing, information roaming between carriers and the system monitoring independent to specific network or ISP/CPs(Content Providers).

  • PDF

Proposed of Intrusion detection model using the Mobile agent (이동에이전트를 이용한 침입탐지 모델의 제안)

  • 황인선;박경우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.55-62
    • /
    • 2004
  • The computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of internet. Therefore, Intrusion detection system has been an active research area to reduce the risk from intruders. A number of advantages of using mobile agent computing paradigms have been Proposed. These advantages include : overcoming network latency, reducing network load, executing asynchronously and autonomously, adapting dynamically, and operating in heterogeneous environments. Many information security models have been proposed to mitigate agent-to-agent. agent-to-platform, and platform-to-agent element risks . In these paper, We have an object which is that through intrusion detection system development, the mobile agent is managed and through the analysis of performance data. the best environment is served.

  • PDF

Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment

  • Park, Woo-Ram;Park, Chan-Ik
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.4
    • /
    • pp.331-337
    • /
    • 2011
  • Recently, Virtual Desktop Infrastructure (VDI) has been widely adopted to ensure secure protection of enterprise data and provide users with a centrally managed execution environment. However, user experiences may be restricted due to the limited functionalities of thin clients in VDI. If thick client devices like laptops are used, then data leakage may be possible due to malicious software installed in thick client mobile devices. In this paper, we present Data Firewall, a security framework to manage and protect security-sensitive data in thick client mobile devices. Data Firewall consists of three components: Virtual Machine (VM) image management, client VM integrity attestation, and key management for Protected Storage. There are two types of execution VMs managed by Data Firewall: Normal VM and Secure VM. In Normal VM, a user can execute any applications installed in the laptop in the same manner as before. A user can access security-sensitive data only in the Secure VM, for which the integrity should be checked prior to access being granted. All the security-sensitive data are stored in the space called Protected Storage for which the access keys are managed by Data Firewall. Key management and exchange between client and server are handled via Trusted Platform Module (TPM) in the framework. We have analyzed the security characteristics and built a prototype to show the performance overhead of the proposed framework.

Developing a Platform of Platform for Disaster Technology and Information Sharing (재난기술·정보 공유를 위한 글로벌체계 플랫폼 개발)

  • Lee, Young Jai
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.1
    • /
    • pp.13-19
    • /
    • 2012
  • This paper introduces platform of platform (POP) for global network on climate adaptation change and disaster risk reduction (CCA/DRR). The POP consists of disaster prevention technology e-market platform, e-learning platform, information sharing platform, and monitoring platform for AMCDRR action plan. The POP is developing based on Korean e-Government standard framework and supports Web and mobile service. Additionally the POP uses special product and technology to search and classify data about CCA/DRR.

A Study on Providing Secure Storage and User Authentication Using MTM on Mobile Platform (모바일 플랫폼에서 MTM을 이용한 보안영역 제공 및 인증에 관한 연구)

  • Lee, Sun-Ho;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.293-302
    • /
    • 2011
  • The various information services can be delivered by smartphone through advanced high-speed mobile communication. A smartphone is a mobile device that offers more powerful computing capacity than feature phone. Therefore this device can provide such as web surfing, editing documents, playing video, and playing games. A lot of personal information stored on smartphone. Because it has High usability. Personal information Leaks if the smart phone is lost or stolen may become a big problem. In this paper we have analyzed existing method for providing secure storage and user authentication on mobile platform and derived security requirement. Therefore we propose the following scheme that satisfy security requirement. Proposed scheme providing secure storage with preventing authentication bypass, and availability from damaged data to access secure area.

A Study on Secure Key Backup/Recovery Scheme for Device based on Mobile Trusted Module (Mobile Trusted Module 기반 단말에서의 안전한 키 백업 및 복구 방안에 대한 연구)

  • Kang, Dong-Wan;Jun, Sung-Ik;Lee, Im-Yeoung
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.335-346
    • /
    • 2009
  • Mobile environments are evolving the main communication environment as a develops of communication technology. In mobile environments, sensitive information can be compromised on-line, so demand for security has increased. Also, mobile devices that provide various services are in danger from malware and illegal devices, phishing and sniffing etc, and the privacy. Therefore, MTM(Mobile Trusted Module) is developed and promoted by TCG(Trusted Computing Group), which is an industry standard body to enhance the security level in the mobile computing environment. MTM protects user privacy and platform integrity, because it is embedded in the platform, and it is physically secure. However, a security approach is required when secret data is migrated elsewhere, because MTM provides strong security functions. In this paper, we analyze the TCG standard and migration method for cryptographic key, then we propose a secure migration scheme for cryptographic key using key Backup/Recovery method.

The Model Proposal of Mobile Cloud Security Technology (모바일 클라우드 보안기술의 모델 제안)

  • Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.151-156
    • /
    • 2011
  • The Korean domestic cloud market will reach a value of 2 trillion Korean won by 2014. The domestic market is expected to grow rapidly in size despite the fact that there exist activation barriers in mobile cloud services, concerns about the reliability of service, and concerns about security and confidentiality of data. Under these circumstances, existing IT security technologies may be be utilized to provide sufficient response characteristics. Despite this, they must be optimized for mobile cloud computing and enhanced to mitigate inherent security flaws. In this study, mobile cloud security is covered along with use cases that cover the cases where mobile devices are particularly vulnerable and suggest ways to mitigate security vulnerabilities.