• Title/Summary/Keyword: personal communication services

Search Result 353, Processing Time 0.028 seconds

Personal Environment Service and Technology Based on Smart Phone (스마트폰 기반의 개인 환경 서비스 및 기술)

  • Oh, Jong-Taek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.5
    • /
    • pp.454-463
    • /
    • 2013
  • The smart phone has already proliferated, and the smart devices of the living appliances and vehicles embedded with communication device, sensors and connected with the smart phone have been developed. Currently it can provide simple remote controller and user interfaces, it could be envisaged that intelligent technology is converged with the smart phone, and Personal Environment Service in which the smart devices are configured automatically as reflecting personal preference, device attribute, and living environment condition would be activated in the future. In this paper PES services, system architecture, and core technology are described.

Analysis of Personal Information Protection System in Korea - Focus on Certification & Evauation System and Personal Identification Number - (우리나라의 개인정보 보호제도 분석 - 인증 및 평가제도와 개인식별번호를 중심으로 -)

  • Kim, Min-Chen
    • Informatization Policy
    • /
    • v.23 no.4
    • /
    • pp.38-58
    • /
    • 2016
  • The ever-evolving Internet environment along with changes in the mass media has been creating a new way of communicating in the virtual cyber world. The Internet users have more services at their disposal to communicate with ease. Such a new way of communication styles, however, makes them vulnerable to personal information leakage, increasing the concerns of cyber security. A thorny issue is how we can control the disclosure of personal information. Lately, the Korean government implemented privacy policies to resolve and prevent personal information leakage incidents that incur social problems. Here, we seek to identify problems in the privacy policies for better solutions.

A Study on Strengthening Personal Information Sovereignty through Analysis of Domestic Service Cases and Research Projects of Self-Sovereign Identity Technology (자기주권신원기술의 국내 서비스 사례 및 연구 과제 분석을 통한 개인정보 주권 강화 방안연구)

  • Lee, Jeong-Hyeon;Kim, Ji-Won;Kim, Chul-Soo;Yang, Jin-hong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.575-589
    • /
    • 2020
  • Along with the exponential growth of data businesses, the importance of data containing personal information of use have also increaseing. Particularly, in Korea, as the Data 3 Act was implemented, companies can use personal information more actively through regulatory improvement and stipulation in case of using data containing personal information. In this situation as per the service use, self-sovereign identity technology has emerged that can minimize the provision of personal information in relation to real name authentication and provision of personal information. Recently, services and studies using blockchain have been actively conducted in case of using the self-sovereign identity function for clarity and verification of records according to the use of personal information. In this thesis, by analyzing the characteristics of domestic self-sovereign identity service and the current status and contents of research related to blockchain-based self-sovereign identity technology and we suggest a research direction based on self-sovereign identity technology to reinforce the sovereignty of personal information in the era of the 3rd Data Act do.

Design of a Multiband Frequency Selective Surface

  • Kim, Dong-Ho;Choi, Jae-Ick
    • ETRI Journal
    • /
    • v.28 no.4
    • /
    • pp.506-508
    • /
    • 2006
  • A frequency selective surface (FSS), whose unit cell consists of a ternary tree loop loaded with a modified tripole, is proposed to block multiple frequency bands. Target frequency bands correspond to Korean personal communication services, cellular mobile communication, and 2.4 GHz industrial, scientific, and medical bands. Through the adjustment of inter-element and inter-unit cell gaps, and adjustment of the length of elements, we present an FSS design method that makes the precise tuning of multiple resonance frequencies possible. Additionally, to verify the validity of our approach, simulation results obtained from a commercial software tool and experimental data are also presented.

  • PDF

Analysis of Low Power and Channel Interferences for Zigbee (Zigbee의 저전력화와 채널간섭 분석)

  • Kang, Min-Goo;Shin, Ho-Jin
    • Journal of Internet Computing and Services
    • /
    • v.11 no.3
    • /
    • pp.33-41
    • /
    • 2010
  • The battery consumption and the wireless communication pattern were analyzed for the low power and the improvement of channel interferences between of Zigbee networks and WPAN(Wireless Personal Area Network). The communication patterns considering end device's battery saving during channel searching period were analyzed for low power consumption topology of Zigbee dynamic ad-hoc characteristics. And, the communication patterns were analyzed due to channel interferences between WLAN and Random Back off of Zigbee, too. As a result, the communication patterns of Zigbee's coordinator and end devices is alleviated for the longer battery life time of Zigbee's end device due to Zigbee's end device setting techniques.

Method to Analyze Information Leakage Malware using SSL Communication in Android Platform

  • Cho, Gilsu;Kim, Sangwho;Ryou, Jaecheol
    • Journal of Internet Computing and Services
    • /
    • v.19 no.3
    • /
    • pp.1-6
    • /
    • 2018
  • Widely used around the world, smartphones contain many features and can store content such as contacts, photos, and videos. Information that can be leaked in proportion to the information that the smartphone can store has also been increased. In recent years, accidents such as personal information leakage have occurred frequently. Personal information leakage is happening in the Android environment, which accounts for more than half of the smartphone operating system market share. Analyzing malicious apps that leak information can tell you how to prevent information leakage. Malicious apps that leak information will send importantinformation to the hacker's (C & C) server, which will use network communication. Malicious apps that are emerging nowadays encrypt and transmit important information through SSL communication. In this case, it is difficult to knowwhat kind of information is exposed to network. Therefore, we suggest a method to analyze malicious apps when leak important information through SSL communication. In this paper, we identify the way malicious apps leak information. And we propose a method for analyzing information leaked by SSL communication. Data before encryption was confirmed in the device through SSL hooking and SSL Strip method.

Effect of Movile Communication during Non-Worktime: Increasing Worker's Stress in the IT Industry

  • Hahm, SangWoo
    • Journal of Internet Computing and Services
    • /
    • v.19 no.4
    • /
    • pp.95-105
    • /
    • 2018
  • As the IT industry has developed, the frequency of mobile communication usage has increased sharply. Mobile communication has many advantages such as improving work performance, communication beyond time and local constraints, and rapid and vast amounts of information exchange. However, mobile communication also allows supervisors to give their subordinates work at any time. Thus, mobile communication may also have a negative impact on workers' stress levels during non-work time. This study examined required time, urgent business, personal engagement, and trivial matters as sub-dimensions of mobile communication messages that workers could receive during non-work time. Further, the nature of the relationship between team leaders and members explains how these messages may increase the stress levels of workers. Supervisors should prohibit the use of such mobile communication, and efforts should be made at the enterprise level. Through this research, we aim to explain the dual nature of mobile communication, and understand how to optimize the usage of this innovative technology

A Monitoring Tool for Personal Information Leakage Prevention in Network Packets (네트워크 패킷 내 개인정보 유출 방지를 위한 모니터링 도구 개발)

  • Ju, Tea Kyung;Hong, Chong Min;Shin, Weon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.489-494
    • /
    • 2013
  • Personal information has been transmitted in a variety of services of Internet environment, but individual users do not know what information is sent. In this paper, we aim to develop a monitoring tool that continuously monitors personal sensitive information in network packets and informs the user whether or not to leak. So we implement a monitoring tool of personal information and analyze the experiment results. In addition, we introduce a prevention of confidential information in company and a leakage prevention of medical information, for applications that take direct advantage. The results of this study, by contributing to prevent leakage of personal information, can help reduce cyber threats variously targeting personal information of users.

A Study on Development Plan, Comparison & Analysis of Digital CATV and IPTV (디지털 CATV와 IPTV의 수신제한시스템 비교분석 및 발전방안 연구)

  • Park, Jiun;Shin, Seung-Jung;You, Hee-kyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.6
    • /
    • pp.173-178
    • /
    • 2008
  • With the discontinuation of analog broadcasting in 2012, the cable broadcasters are investing in the conversion to DCATV (Digital Cable TV). DCATV is providing various broadcast of high quality to audiences through paid broadcasting called PPV (Pay Per View). Such services are using various kinds of CASs (Conditional Access System) in order to verify the viewing rights of subscriber. In addition, to respond to the fast changing environment of digital broadcast, not only simple digitalization of broadcast but also services such as PVR (Personal Video Recorder) and VOD (Video On Demand) are provided to subscribers. Because these additional services have many difficult areas to cover with traditional CAS alone, a new plan has become necessary. With the improvement of related regulations in 2008, the test service of IPTV (Internet Protocol TV) which is a broadcast service through the internet started. Because like DCATV, IPTV also sets the real time broadcast and the VOD service as the basic services, the use of appropriate CAS is required. In this study, the CASs for DCATV and IPTV undergo comparative analysis, and the development direction which will benefit both subscribers and broadcasting companies is suggested.

  • PDF

Design and Implementation of a Band Pass Filter of Personal Communication System for information facilities (정보 설비용 통신장치의 대역통과 필터의 설계 및 구현)

  • 이헌용;김영달;윤중락;강명식
    • The Proceedings of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.10 no.3
    • /
    • pp.47-54
    • /
    • 1996
  • In this paper, the band pass filter was designed and constructed for personal communication services of information facilities. For the band pass filter design, after dielectric resonator structures were analyzed. J-inverter design theory and its simulation method were studied. The parameters obtained from design theory were practically applied to filter construction. The simulation results are well agreed with the measured result of constructed filter after fine tunings.

  • PDF