• Title/Summary/Keyword: mobile users

Search Result 3,000, Processing Time 0.032 seconds

Proposal for a Peer Decentralized Identity System Using Short-Range Wireless Communications (단거리 무선 통신을 이용한 개인 간 분산 신원증명 시스템 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.959-972
    • /
    • 2021
  • Decentralized Identity is based on the concept of self-sovereign identity, in which holders manage and provide their own credentials. However, a procedure is required to obtain credentials from issuers, and there is a risk of mess personal information leaking due to negligence of the issuers. In this paper, we propose a peer decentralized identity system based on Peer DID technology that allows only participants to verify their identity in 1:1 or 1:N small groups by matching the holder with the issuer. It is directly connected to a mobile device using short-range wireless communications such as bluetooth, and the holders create and provide their own credentials in person to the other party, thus fully realizing the self-sovereignty identity. The proposed system can simplify the identification process, improve security and privacy, and reduce costs. Furthermore, an extended architecture is possible to connect the proposed system and the distributed ledger to identify users in other domains. In the future, based on various technologies, it is also necessary to expand research on identity systems that can be utilized for human-to-thing and things-to-things authentication.

A Study on User Experience of the Security in Online Trading of used goods -Focused on Danggeun Market and Bungae Jangter- (중고거래 온라인 플랫폼의 보안을 위한 사용자 경험 연구 -당근마켓, 번개장터 중심으로-)

  • Park, Ga-Young;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.19 no.7
    • /
    • pp.313-318
    • /
    • 2021
  • The purpose is to measure user experience in security-related services, focusing on Danggeun Market and Bungae Jangter, which are representative services in Korea among online trading of used goods. Using mobile applications, qualitative and quantitative research by conducting task experiments and surveys and in-depth interviews. As a result of the study, active interfaces are needed to make it easier for users to recognize safety and security services within current used trading platforms, a secure settlement method that benefits sellers, and services being provided to enhance security also need to consider graphical elements. This study is expected to help the continued development of safe used trading platforms considering security aspects on C2C-type platforms where buyers become sellers.

Proposal of Network Security Solution based on Software Definition Perimeter for Secure Cloud Environment (안전한 클라우드 환경을 위한 소프트웨어 정의 경계 기반의 네트워크 보안 솔루션 제안)

  • Cha, Wuk-Jae;Shin, Jae-In;Lee, Dong-Bum;Kim, Hyeob;Lee, Dae-Hyo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.61-68
    • /
    • 2018
  • As the smartphone and mobile environment develop, the time and space constraints for individual work performance are disappearing. Companies can reduce costs and expand their business quickly through cloud computing. As the use of various cloud expands, the boundaries of users, data, and applications are disappearing. Traditional security approaches based on boundaries (Perimeter) are losing their utility in the cloud environment. This paper describes the limitations of existing network access control (NAC) in a cloud environment and suggests network security technology that complements it. The study explains the SDP and combines SDP(Software Defined Perimeter) to overcome the limitations of NAC, while at the same time explaining its role as a new framework for supporting the cloud environment. The new framework proposed in this paper suggests a software-based network security solution that supports physical and software parts, providing identity-based access control, encrypted segment management, and dynamic policy management, not IP-based.

A Classification of Medical and Advertising Blogs Using Machine Learning (머신러닝을 이용한 의료 및 광고 블로그 분류)

  • Lee, Gi-Sung;Lee, Jong-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.730-737
    • /
    • 2018
  • With the increasing number of health consumers aiming for a happy quality of life, the O2O medical marketing market is activated by choosing reliable health care facilities and receiving high quality medical services based on the medical information distributed on web's blog. Because unstructured text data used on the Internet, mobile, and social networks directly or indirectly reflects authors' interests, preferences, and expectations in addition to their expertise, it is difficult to guarantee credibility of medical information. In this study, we propose a blog reading system that provides users with a higher quality medical information service by classifying medical information blogs (medical blog, ad blog) using bigdata and MLP processing. We collect and analyze many domestic medical information blogs on the Internet based on the proposed big data and machine learning technology, and develop a personalized health information recommendation system for each disease. It is expected that the user will be able to maintain his / her health condition by continuously checking his / her health problems and taking the most appropriate measures.

Design and Implementation of Hybrid Apps Design based on Spring MVC (스프링 MVC 기반에서 하이브리드 앱 디자인 설계 및 구현)

  • Lee, Myeong-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.395-400
    • /
    • 2019
  • The Web environment of the frontend domain is increasingly competitive to preempt the new standard of presentation layer. N-Screen, a service that enables users to seamlessly use one content in various devices in Korea, is competing for market preemption by recognizing it as a core service of the future. In the cloud computing, N-screen is a typical service type. However, most of the frontend research required for groupware in enterprise environments has been limited to responsive web design for the web and native apps for mobile. Gradually, the need for MVC design patterns is increasingly widening in enterprise environments to overcome the cultural differences of companies and to support one source multi-use strategy supporting multiple devices and development productivity. Therefore, in this study, we will analyze and design JPetStore with hybrid application design based on Spring MVC, e-government standard framework environment of next generation web standard, and provide reference model of frontend hybrid apps design in future enterprise environment.

Convergence and integration study related to development of digital contents for radiography training using dental radiograph and augmented reality (치과방사선사진과 증강현실을 활용한 방사선촬영법 숙련용 디지털 콘텐츠 개발에 대한 융복합 연구)

  • Gu, Ja-Young;Lee, Jae-Gi
    • Journal of Digital Convergence
    • /
    • v.16 no.12
    • /
    • pp.441-447
    • /
    • 2018
  • This study aims to develop digital techniques that enable repeated practice of dental radiography using augmented reality technology. A three-dimensional object was fabricated by superimposing a photograph of an adult model and a computed tomography image of a manikin phantom. The system was structured using 106 radiographs such that one of these saved radiographs is opened when the user attempts to take a radiograph on a mobile device. This system enabled users to repeatedly practice at the pre-clinical stage without exposure to radiation. We attempt to contribute to enhancing dental hygienists' competency in dental radiography using these techniques. However, a system that enables the user to actually take a radiograph based on face recognition would be more useful in terms of practice, so additional studies are needed on the topic.

A Study on the Proposal of the Affordance Applied to GUI Design: Focused on the SNS Application (어포던스 이론이 적용된 GUI 디자인 제언에 관한 연구 -SNS 앱을 중심으로-)

  • Lu, Han-Yi;Seo, Han-Sok
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.11
    • /
    • pp.113-122
    • /
    • 2018
  • Mobile GUI design is changing from an existing design that emphasizes intuitive cognitive effects to an affordance design that naturally triggers users' behaviors. However, in the GUI design, the current affordance only uses some partial design elements and cannot achieve effective design, and the concept of affordance design still has confusion and uncertainty. For this reason, this paper redefines affordance by examining the concepts and types of it in the pre-research. In addition, through questioning the type of affordance, a questionnaire was designed for the GUI elements of social software. According to the results of the survey, the evaluation of the affordance of the GUI design elements was derived, and the GUI design of the social software was compared and analyzed. Then according to the deep interviews, a GUI design proposal that can effectively use affordance was proposed.

A study to detect and leaked personal information on the smartphone. (스마트폰 상에서의 개인정보 유출 탐지 모니터링 연구)

  • Kim, Wung-Jun;Park, Sang-Hwi;Park, Sang-No;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.606-608
    • /
    • 2014
  • Recent smartphone users constantly increases, an increase in malicious applications smartphones indiscretions exists within the Terminal, through the deployment of privacy disclosure, Singh and other victims also are on the rise. A typical personal way to malicious code masquerading as a normal application and install it on the handset of my text message or a personal note, such as personal information, the certificate directory, is the way that leaked. Therefore, to obtain permission to attack the root Terminal event by collecting malware infections and respond to determine whether it is necessary for the technique. In this paper, check the features of a Smartphone in real time systems, to carry out a study on the application throughout the Terminal to collect my attack event analysis, malware infection can determine whether or not the mobile security monitoring system. This prevents a user's personal information and take advantage of the top and spill are expected to be on the field.

  • PDF

Medical Service Based on AR and VR (가상 증강현실 기반의 의료서비스)

  • Yeon, YunMo;Woo, SungHee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.803-806
    • /
    • 2016
  • 'Pokemon Go',which is game program, provides a clue to solve the problem of healthcare in the sense of leading changes in behavior of the users. 'Pokemon Go'is a spin-off of the $Pok{\acute{e}}mon$ game series and uses Augmented Reality(AR) technology. AR, which can be said to complement the real world, has been used in many fields such as medical applications, broadcasting, manufacturing, the mobile sector as a wide range of technologies. In particular, the medical field as area of the active application from the start of AR, provides a great help in medical fields, that is accurate medical diagnosis and prevention of unnecessary dissection by synthesizing the patient information and the image of actual patient on three-dimensional data of the sensor such as MRI or ultrasonic wave. In this study, we analyze the VR technology trends, application examples, and the future of VR and AR based medical services in healthcare.

  • PDF

Proposal of Used Books Shared Platform Service for Small-sized Stores (소규모 점포기반 중고서적 공유플랫폼 서비스 제안)

  • You, Seung-Hee
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.89-95
    • /
    • 2019
  • he purpose of this study is to propose a shared platform service that can deal with used books based on small stores. The volume of used book market has more than doubled since the book price system, and large bookstores are actively participating in the used book market. Used book sharing platform is an advanced form of online used book direct trade and can be easily used by installing applications on the user's mobile phone. The second-hand book sharing platform is not a shared platform that creates a huge profit-making enterprise, but a future-oriented shared platform that can benefit all users of the platform. If the shared platform, which is the core of the fourth industrial revolution, is applied to almost all small stores and utilized as a hub for second-hand book transactions, it will establish itself as a more reasonable market for second-hand book transactions.