Abstract:
Disclosed is a vehicle network access control method and infotainment apparatus thereof. According to one aspect of the present disclosure, a vehicle network access control method comprises: checking an access subject on the basis of at least one among an ID of the terminal device, an application ID, and a user ID of the infotainment apparatus; determining an access right on the basis of at least one among the access subject, state information of the terminal device, and vehicle state information; and controlling vehicle network access of the infotainment apparatus according to the determined access right, wherein the access right comprises at least one among access permission, access denial, and access permission within a preset time.
Abstract:
A vessel location validation method and apparatus are provided. The vessel location validation method includes receiving a wireless signal from a vessel, acquiring location information of the vessel from the received wireless signal, and determining whether the acquired location information is valid based on the acquired location information and a signal strength of the received wireless signal.
Abstract:
Provided is a healthcare device including a sensor unit configured to collect patient's biometric information or perform medical treatment on the patient; a communication unit configured to communicate with a healthcare gateway; a control unit configured to receive a control command from the healthcare gateway through the communication unit and control the sensor unit according to the received control command; and a device verification unit configured to receive a verification request from the healthcare gateway, verify an error of the control unit or the sensor unit in response to the received verification request, and transmit results of the verification to the healthcare gateway.
Abstract:
A method controls the management of a mobile device using a security event. The method includes acquiring, by a wireless intrusion prevention server, security threat information by monitoring RF signals generated from an access point (AP) and the mobile device, transmitting the security threat information to a mobile device management server, and executing, by the mobile device management server, a device management policy for the mobile device based on the security threat information.