Design of the Architecture for Agent of the Personality Security in the Ubiquitous Environment

Many programs are exposed a threat in the ubiquitous system. In the result, we are attacked and discharge personal information from the many factors. When executing the various application programs of a computer generally or connecting with a specific sit

  • PDF / 246,589 Bytes
  • 10 Pages / 430 x 660 pts Page_size
  • 104 Downloads / 201 Views

DOWNLOAD

REPORT


Computer Engineering, Andong National University [email protected] 2 College of Information Science School of Computing, Soongsil University [email protected]

Abstract. Many programs are exposed a threat in the ubiquitous system. In the result, we are attacked and discharge personal information from the many factors. When executing the various application programs of a computer generally or connecting with a specific site through the Internet A place with many examples into which carry out a user and the user-identification child (ID) and the password are made to enter in order to check a user's identity, If in agreement as compared with the identifier which a user inputs, ID which had the password registered, and a password, the authority to perform an applicable program, and the authority to use the various contents of an applicable site will be granted to the user. In this paper is provided the design of the user identification method in the ubiquitous environment. Also, We are make use of grid computing between host and targets. Therefore, This system is provide for the flexibility in the heterogeneous system.

1 Introduction In 1991, Mark Weiser, then chief technology officer for Xerox’s Palo Alto research Center, described a vision for 21st computing that countered the ubiquity of personal computers. “The most profound technologies are those that disappear, “he wrote.” They weave themselves into the fabric of everyday life until they are indistinguishable from it”[14]. Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical environment, but making them effectively invisible to the user. Since we started this work at Xerox PAPC in 1988, a number of researchers around the world have begun to work in the ubiquitous computing framework[15]. We still view computers primarily as machines that run programs in a virtual environment that we enter to perform a task and leave when we finish. Pervasive computing presumes an altogether different vision. *

In this paper of data was provided by PassHUB CO.,LTD. This work was supported by

the Korea Research Foundation Grant funded by Government (MOEHRD) (KRF2006-0050J03803). N.T. Nguyen et al. (Eds.): KES-AMSTA 2008, LNAI 4953, pp. 444–453, 2008. © Springer-Verlag Berlin Heidelberg 2008

Design of the Architecture for Agent of the Personality Security

445

When executing the various application programs of a computer generally or connecting with a specific site through the Internet A place with many examples into which carry out a user and the user-identification child (ID) and the password are made to enter in order to check a user's identity, If in agreement as compared with the identifier which a user inputs, ID which had the password registered, and a password, the authority to perform an applicable program, and the authority to use the various contents of an applicable site will be granted to the user[1]. However, it sets to a bank, a card issuer, etc. who the correlation of the aforementioned Prior a