Fig. 1. User’s location record using Google Map
Fig. 2. Screenshot of the user logging into the location-gathering application
Fig. 3. Location Permission Setting Screen
Fig. 4. Example of location information collect
Fig. 5. Location data in collected JSON format
Table 1. Verification attribute information by LoIP
References
- H.Y. Youm, K. H. Kim, and S. H. Kim, "Guideline on Identity Proofing Management", TTA Journal, Vol. 167, pp.78-82, 2016
- K. H. Kim, D. H. Yoo, S. H. Kim, B. J. Yoon, and H. Y. Youm, Gap Analysis of ISO/IEC 29115 and ISO/IEC 29003 for Electronic Financial Services Environment in Korea, Review of Korean Society for Internet Information, Vol. 16, pp.65-69. 2015
- Y.J. Shin, S. H. Shin, J. Lee, and W. Han, "A Study on Improvement of Identification Means in R.O.K.", Journal of Korean Association forRegional Information Society, Vol.18, No. 4, pp.59-88, 2015.
- E. M. Underwood, J. E. Sullivan, and R. McGeehan, "Social age verification engine", U.S. Patent 8 671 453, Mar. 11, 2014.
- L. Li, X. Zhao, and G. Xue, "Searching in the dark: A framework for authenticating unknown users in online social networks", in Proc. Glob. Commun. Conf. (GLOBECOM), Anaheim, CA, USA, pp. 714-719. 2012
- James Clause, Wanchun Li, and Alessandro Orso. Dytan: A Generic Dynamic Taint Analysis Framework. In Proceedings of the 2007 International Symposium on Software Testing and Analysis, ISSTA '07, pages 196-206, New York, NY, USA, 2007. ACM.
- Manuel Egele, Christopher Kruegel, Engin Kirda, and Giovanni Vigna. PiOS: Detecting Privacy Leaks in iOS Applications. In Proceedings of the Network and Distributed System Security Symposium, NDSS '11, San Diego, CA, February 2011.
- Maxwell Krohn, Alexander Yip, Micah Brodsky, Natan Clier, M. Frans Kaashoek, Eddie Kohler, and Robert Morris. Information Flow Control for Standard OS Abstractions. In Proceedings of 21st ACM SIGOPS Symposium on Operating Systems Principles, SOSP '07, pages 321{334, New York, NY, USA, 2007.
- Lok Kwong Yan and Heng Yin. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. In Proceedings of the 21st USENIX Conference on Security Symposium, Security '12, pages 29{29, Berkeley, CA, USA, 2012.
- Rolland, C., Prakash, C., "Bridging the Gap Between Organisational Needs and ERP Functionality", RE Journal 5(3):180-193, Springer, 2000.