• Title/Summary/Keyword: third party application

Search Result 107, Processing Time 0.027 seconds

Third Party Application Analysis For Mobile Forensics Study (모바일 포렌식 연구를 위한 서드 파티 어플리케이션 분석)

  • Ryu, Jung Hyun;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.336-339
    • /
    • 2017
  • 스마트폰 서드 파티 애플리케이션에 대한 포렌식 분석은 최근 수 년 간 탐구되어야 할 새로운 영역으로 떠올랐다. 현재 스마트폰 시장은 그 규모를 측정하는 것이 무의미할 만큼 커졌으며 각 스마트폰 플랫폼의 앱(App)마켓에는 셀 수 없이 많은 서드 파티 애플리케이션이 존재한다. 모바일 포렌식 소프트웨어 도구들은 일반적으로 연락처, 문자메시지, 통화기록 등의 전형적인 데이터를 수집한다. 이러한 도구들은 서드 파티 애플리케이션이 기기 내부에 저장하는 정보들을 간과하기 쉽다. 여러 제조사 중, 애플사의 모바일 기기에 설치된 많은 서드 파티 애플리케이션은 수사에 도움이 되는 많은 정보와 관련있는 디지털 증거를 남긴다. 이런 잠재적 증거들은 기기 내부에 저장되기도 하며, 비교적 손쉬운 방법으로 법정에 제출 가능하다. 스마트폰으로 이루어지는 많은 활동은 상당 부분 서드 파티 애플리케이션으로 이루어지며, 사이버 범죄 사건의 중심에 스마트폰이 있다면 서드 파티 애플리케이션 분석을 통한 핵심 증거 획득이 사건을 해결할 가능성이 높아진다. 본 논문에서는 스마트폰에서 널리 쓰이고 있는 소셜네트워크 애플리케이션인 '인스타그램(Instagram)'에서 행해진 포렌식 분석에 초점을 맞추고, 기기는 전 세계 적으로 가장 사용자 점유율이 높은 스마트폰인 아이폰에서 이루어졌다.

A Study on Some Issue of Application of Art. 35(1).(2) CISG (CISG 제35조(1).(2)항의 실무적 적용상의 유의점에 관한 소고)

  • Heo, Kwang-Uk
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.43
    • /
    • pp.75-97
    • /
    • 2009
  • Article 35 of the CISG defines standards for determining whether goods delivered by the seller conform to the contract in terms of type, quantity, quality, and packaging. When we apply these article 35(1), (2) of the CISG to the business connection, we will face several issues in the business connection. Fist, we will face the interpretation of contracts. When we interpret the contract, we must remember the article 8 of the CISG. Statements made by and other conduct of a party are to be interpreted according to the intent of parties. Therefore parties of contract must describe their intent correctly. Second, we must make out a contract in written about the promised contents. And it is needed to insert a merger clause in order to prevent part of contract from disagreeing with each other. Third, there are several interpretation of fitness for the purpose for which the goods would ordinarily be used. So it is important to describe the quality standard to be applied. If it does not describe the standard, it is helpful to apply the reasonable quality test. Fourth, there may be some doubt regarding the question of whose standard-that of the seller's or that of the buyer's state-is relevant in order to determine which characteristics the goods must have in order to be fit for their ordinary purpose. Ultimately, the question of the relevant standard is a matter of the interpretation of the contract.

  • PDF

Design of Bi-directional Recommend Calligraphy Contents Open-market Platform (양방향 추천 캘리콘텐츠 오픈마켓 플랫폼 설계)

  • So, Kyoungyoung;Lee, Yoonhan;Moon, Kyounghee;Ko, Kwangman
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.12
    • /
    • pp.1586-1593
    • /
    • 2015
  • Calligraphy contents(shortly called, CalliContents) depict the feature of communication media with artistic sentences or drawings before being processed into digital contents to become printed advertisement, visual design and entertainment products. As a fast growing business model, they can be applied to every single scope of all fields these days and each application case presented excellent effects to grab consumers' attention immediately. In this paper, we designed and produced an emotional bi-directional recommendation DIY calligraphy contents platform to consume created cultural contents and boost personalized contents industry that meets consumer's needs through both wired and wireless-based software with convergence of artistic and emotional calligraphy contents and ICT. For this works, we established for DIY calligraphy consumers a foundation of a virtuous circle of the CalliContents where various CalliContents are provided in on and offline environment and a third party target is opened at the CalliContents platform

Research of specification development & application methods for Occupational Health and Safety management System in industry (산업안전 및 보건(OH&S)경영체제 인증규격 개발과 적응 방법에 관한 연구)

  • 문재승;유왕진;우태희
    • Journal of Korean Society for Quality Management
    • /
    • v.29 no.1
    • /
    • pp.184-190
    • /
    • 2001
  • Industrial structure is more developed, the economical value of human resources and the cases which risks worker's Health & Safety is expended. The Safety & Health issues are focused on elements of control for management activity simultaneously with work environment as well as the risk elements which risks worker's life and body. The activity for combination of basic management System and Safety & Health management is progressing with active discussion in ILO, BS 8800 is specified the guidance of Occupational Safety & Health Management System in UK. 1996. This research refers to BS 8800:1996, specification as a basic model, and introduce of the result of certification development result in Occupational Safety & Health management System with in ISO 14001 Environmental System Standards & ISO 9001 Quality Management System Standards and Systemic Factors. Through this applicability and efficiency evaluation, we make an effort to support and to improve the specification. Also applicability evaluation of Occupational Safety & Health management System and the specification developed for the purpose of the third party certification is applied with expending in industry, and the method is presented through the case which is required to support for method review and activities.

  • PDF

Fair Private Block Encryption Protocol with Proactive Secret Sharing for Delegated Node of Public Blockchain (동등한 권한을 가진 대표노드를 위한 능동적 비밀 분산을 이용한 비공개 블록 암호화 기법)

  • Jung, Seung Wook
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.177-186
    • /
    • 2020
  • In current public blockchain, any node can see every blocks, so that public blockchain provider transparent property. However, some application requires the confidential information to be stored in the block. Therefore, this paper proposes a multi-layer blockchain that have the public block layer and the private block for confidential information. This paper suggests the requirement for encryption of private block. Also, this paper shows the t-of-n threshold cryptosystem without dealer who is trusted third party. Moreover, the delegated node who has key information can be withdraw the delegated node group or a new delegated node can join in the delegated node group. Therefore, the paper proposes an efficient key information resharing scheme for withdraw and join. Finally proposed scheme satisfies the requirements for encryption and fairness.

Agricultural Irrigation Control using Sensor-enabled Architecture

  • Abdalgader, Khaled;Yousif, Jabar H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3275-3298
    • /
    • 2022
  • Cloud-based architectures for precision agriculture are domain-specific controlled and require remote access to process and analyze the collected data over third-party cloud computing platforms. Due to the dynamic changes in agricultural parameters and restrictions in terms of accessing cloud platforms, developing a locally controlled and real-time configured architecture is crucial for efficient water irrigation and farmers management in agricultural fields. Thus, we present a new implementation of an independent sensor-enabled architecture using variety of wireless-based sensors to capture soil moisture level, amount of supplied water, and compute the reference evapotranspiration (ETo). Both parameters of soil moisture content and ETo values was then used to manage the amount of irrigated water in a small-scale agriculture field for 356 days. We collected around 34,200 experimental data samples to evaluate the performance of the architecture under different agriculture parameters and conditions, which have significant influence on realizing real-time monitoring of agricultural fields. In a proof of concept, we provide empirical results that show that our architecture performs favorably against the cloud-based architecture, as evaluated on collected experimental data through different statistical performance models. Experimental results demonstrate that the architecture has potential practical application in a many of farming activities, including water irrigation management and agricultural condition control.

A PERFORMANCE IMPROVEMENT OF ANEL SCHEME THROUGH MESSAGE MAPPING AND ELLIPTIC CURVE CRYPTOGRAPHY

  • Benyamina Ahmed;Benyamina Zakarya
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.169-176
    • /
    • 2023
  • The vehicular ad hoc network (VANET) is currently an important approach to improve personal safety and driving comfort. ANEL is a MAC-based authentication scheme that offers all the advantages of MAC-based authentication schemes and overcomes all their limitations at the same time. In addition, the given scheme, ANEL, can achieve the security objectives such as authentication, privacy preservation, non-repudiation, etc. In addition, our scheme provides effective bio-password login, system key update, bio-password update, and other security services. Additionally, in the proposed scheme, the Trusted Authority (TA) can disclose the source driver and vehicle of each malicious message. The heavy traffic congestion increases the number of messages transmitted, some of which need to be secretly transmitted between vehicles. Therefore, ANEL requires lightweight mechanisms to overcome security challenges. To ensure security in our ANEL scheme we can use cryptographic techniques such as elliptic curve technique, session key technique, shared key technique and message authentication code technique. This article proposes a new efficient and light authentication scheme (ANEL) which consists in the protection of texts transmitted between vehicles in order not to allow a third party to know the context of the information. A detail of the mapping from text passing to elliptic curve cryptography (ECC) to the inverse mapping operation is covered in detail. Finally, an example of application of the proposed steps with an illustration

3D Facial Scanners: How to Make the Right Choice for Orthodontists

  • Young-Soo Seo;Do-Gil Kim;Gye-Hyeong Lee;Kyungmin Clara Lee
    • Journal of Korean Dental Science
    • /
    • v.17 no.1
    • /
    • pp.1-13
    • /
    • 2024
  • With the advances of digital scanning technology in dentistry, the interests in facial scanning in orthodontics have increased. There are many different manufacturers of facial scanners marketing to the dental practice. How do you know which one will work best for you? What questions should you be asking? We suggest a clinical guideline which may help you make an informed decision when choosing facial scanners. The characteristics of 7 facial scanners were discussed in this article. Here are some considerations for choosing a facial scanner. *Accuracy: For facial scanners to be of real value, having an appropriate camera resolution is necessary to achieve more accurate facial image representation. For orthodontic application, the scanner must create an accurate representation of an entire face. *Ease of Use: Scanner-related issues that impact their ease of use include type of light; scan type; scan time; file type generated by the scanner; unit size and foot print; and acceptance of scans by third-party providers. *Cost: Most of the expenses associated with facial scanning involve the fixed cost of purchase and maintenance. Other expenses include technical support, warranty costs, transmission fees, and supply costs. This article suggests a clinical guideline to make the right choice for facial scanner in orthodontics.

Study on Remote Data Acquisition Methods Using OAuth Protocol of Android Operating System (안드로이드 환경의 OAuth 프로토콜을 이용한 원격지 데이터 수집 방법 연구)

  • Nam, Gi-hoon;Gong, Seong-hyeon;Seok, Byoung-jin;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.111-122
    • /
    • 2018
  • Using OAuth protocol, third-party applications on the Android operating system use user's credentials or access tokens that have access authority on user's resources to gain user's account and personal information from account information providers. These credentials and token information are stored in the device by the OAuth data management method provided by the Android operating system. If this information is leaked, the attacker can use the leaked credential and token data to get user's personal data without login. This feature enables the digital forensic investigator to collect data directly from the remote server of the services used by the target of investigation in terms of collecting evidence data. Evidence data collected at a remote location can be a basis for secondary warranties and provide evidence which can be very important evidence when an attacker attempts to destroy evidence, such as the removal of an application from an Android device. In this paper, we analyze the management status of OAuth tokens in various Android operating system and device environment, and show how to collect data of various third party applications using it. This paper introduces a method of expanding the scope of data acquisition by collecting remote data of the services used by the subject of investigation from the viewpoint of digital forensics.

An Approach to Conceal Hangul Secret Message using Modified Pixel Value Decomposition (수정된 화소 값 분해를 사용하여 한글 비밀 메시지를 숨기는 방법)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.4
    • /
    • pp.269-274
    • /
    • 2021
  • In secret communication, steganography is the sending and receiving of secret messages without being recognized by a third party. In the spatial domain method bitwise information is inserted into the virtual bit plane of the decomposed pixel values of the image. That is, the bitwise secret message is sequentially inserted into the least significant bit(LSB) of the image, which is a cover medium. In terms of application, the LSB is simple, but has a drawback that can be easily detected by a third party. If the upper bit plane is used to increase security, the image quality may deteriorate. In this paper, I present a method for concealing Hangul secret messages in image steganography based on the lo-th bit plane and the decomposition of modified pixel intensity values. After decomposing the Hangeul message to be hidden into choseong, jungseong and jongseong, then a shuffling process is applied to increase confidentiality and robustness. PSNR was used to confirm the efficiency of the proposed method. It was confirmed that the proposed technique has a smaller effect in terms of image quality than the method applying BCD and Fibonacci when inserting a secret message in the upper bit plane. When compared with the reference value, it was confirmed that the PSNR value of the proposed method was appropriate.