Filter
-
Content Type
-
Category
Mobile/Wearable
Visual Display
Digital Appliance
Platform
Recommendations
Filter
events
blogthe 10th anniversary of the samsung developer conference (sdc24) took place on october 3rd, 2024, at san jose mcenery convention center in san jose, california and online. alongside other exciting activities and showcasing of the latest technological advances, code lab offered attendees the opportunity to engage in hands-on experiences and deep dive into the latest samsung sdks and tools. code lab allows tech enthusiasts and developers of all skill levels and interests to learn about the diverse world of samsung development. this year's code lab covered a range of topics related to smartthings, samsung health, samsung wallet, and automotive. 1. smartthings participants actively engaged in creating a smartthings edge driver for a smart device and resolved edge driver issues using the smartthings test suite. they also designed their own smartthings find-compatible device. these activities are now available online for continued learning. moreover, participants discovered how to use generative ai in routine generation and 3d object creation. although exclusive to sdc24, these activities provided a glimpse of the upcoming generative ai feature in the smartthings app. 2. samsung health the new samsung health data sdk was presented to participants through two health-focused activities. the participants developed android apps capable of gathering and analyzing data from the samsung health app and connected wearable devices, including step count and sleep patterns. additionally, participants learned how to easily establish a health research platform utilizing the samsung health research stack, an open-source toolkit, allowing data collection from mobile and wearable devices and visualization through a web portal. 3. samsung wallet participants were taught two methods to integrate the samsung pay payment system into services, including utilizing the web checkout sdk for websites and incorporating the samsung pay sdk flutter plugin for in-app payments within flutter-based applications. they also acquired knowledge on maximizing the capabilities of samsung wallet, particularly learning how to utilize the add to samsung wallet service to store digital assets like boarding passes, tickets, and coupons within the samsung wallet application. furthermore, they learned how to add a button in websites or android apps to authenticate users' identities using the id information stored in the wallet app. 4. automotive participants had the opportunity to develop an in-vehicle app for android automotive os (aaos) using templates from aaos and ignite store. the app incorporated payment processing functionality through the ignite payment sdk, powered by samsung checkout. with guidance from mentors at harman international, a subsidiary of samsung, participants gained valuable knowledge into app development specifically tailored for the automotive industry. this marked the first code lab activity focused on automotive applications. the samsung developer conference promotes innovation and collaboration in the tech industry. by offering a wide variety of subjects in code lab, participants are given the necessary resources and expertise to expand the limits of what can be achieved within samsung's ecosystem. although sdc24 has concluded, the innovative spirit lives on! for those who missed out on the event or simply desire to explore additional activities, the code lab page offers endless possibilities accessible at any time, from any location.
Christopher Marquez
Connect Samsung Developer Conference
websessions dive into the future of connected customer experiences through tech sessions by developers offering further insight into the innovations introduced in the keynote filter filter filter main category all topics all reset apply there are no results. a tv-based lifestyle contents platform, designed to enrich users' everyday life tech session enterprise & ecosystem, smart tv, ai, contents&service this session introduces how seamlessly to integrate into lifestyle contents platforms, samsung daily+ and daily board. automotive monetization made simple: cross-platform opportunities tech session enterprise & ecosystem, monetization, android, platform explore the untapped potential of the automotive market for android developers. learn how to adapt your existing mobile and tablet apps for the automotive environment, leveraging the unique opportunities for monetization and broader market reach. bixby upgrades for next-gen smart home appliances tech session device ai, ai, smart appliances, iot/connectivity this session introduces how the updated bixby will make our goal of 'device control' even more convenient. with this update, bixby is able to communicate with you more naturally and control your appliances seamlessly. building digital health ecosystems with samsung health sdk suite tech session enterprise & ecosystem, health, platform, mobile samsung health is advancing its care@home vision with the samsung health sdk suite, introducing the new data sdk and updating the sensor sdk. cochl: creating ears for ai open stage advanced tech, ai, service & content, smart appliances cochl provides a sound ai solution, featuring cutting-edge technology for applications in smart homes, manufacturing and security. data-driven ai strategies for smart home appliances tech session device ai, ai, smart appliances, iot/connectivity introduce several ai features deployed in samsung's appliances and ai strategies based on data-driven approaches. developer center/test suite open stage smartthings, iot/connectivity, platform, productivity learn about smartthings latest updates for developers and how they make it easier than ever to obtain wwst certification. door locks on smartthings x samsung wallet tech session smartthings, iot/connectivity, platform, smart appliances smart door lock platform to provide personalization experience, advanced authentication, and various door lock connectivity support ecosystem for advanced professional video codec tech session advanced tech, service & content, mobile, open sources growing the ecosystem of advanced professional video, a codec for easy capture without losing quality via standards + open-source software. enhancing smartthings connectivity tech session smartthings, iot/connectivity, open sources, mobile a case study on developing a solution to ensure stable connectivity for customers using smartthings, enabling a seamless iot experience immersive audio experience with google: an introductory session tech session advanced tech, service & content, open sources, smart tv discover the future of immersive audio enabled by aomedia's next-generation 3d audio technology. islet: on-device confidential computing for secure and privacy-first ai tech session advanced tech, security & privacy, open sources, platform introducing islet, an open-source project redefining secure computing for user devices and ensuring the security of on-device ai. knox ai service for business tech session enterprise & ecosystem, enterprise, platform, ai this session introduces the state of galaxy ai and knox ai service for business. music sync partner collaboration tech session smartthings, iot/connectivity, platform, smart appliances the music sync service within smartthings, the updates to the music sync feature and how to integrate smartthings music sync. omnious.ai: vella, a new virtual try-on generative ai model open stage enterprise & ecosystem, ai, service & content omnious.ai is a research-focused company leveraging ai to transform the customer experience and augment human creativity. on-device translation with ai tech session advanced tech, ai, productivity we introduce samsung's on-device machine translation models and our translation solution for services. present and future of samsung tv security with knox tech session responsible ai, security & privacy, smart tv, platform this session will introduce the knox security principles and explain our future preparations to enhance knox security. samsung vxt: cms platform with pirs(pre-integrated repeatable solution) open stage enterprise & ecosystem, platform, contents&service, enterprise samsung vxt actively seeks partnerships with ai experts via the pirs app, providing sdks for seamless integration. samsung wallet: expanding the ecosystem with partners tech session enterprise & ecosystem, service & content, platform, android introducing new features for "add to samsung wallet", a revamped partner portal with mdl sdk, and the new merchant notification system. smartthings find program tech session smartthings, iot/connectivity, open sources, mobile introducing the status and new services of smartthings find, what's new in our partnership program, and node management system(nms). smartthings innovation challenge awards open stage smartthings smartthings innovation challenge sound recognition applications tech session device ai, ai, smart appliances, mobile advancements and applications of sound recognition technology in various smart devices by samsung. the convergence of ai and iot: transforming our daily lives open stage smartthings, ai, iot/connectivity discover how ai and iot change our daily lives, making tech more intuitive and personalized, and reshaping our relationship with devices. unlocking the future of ai integration tech session device ai, ai, tizen, smart tv samsung will make screen highly interoperable with ai by empowering tizen sdk. now, we are unlocking ai cast, ai actions and recognition sdk. wallpaper translation using generative ai tech session advanced tech, ai time and weather translate your mobile device wallpaper using on-device generative ai for your daily photos. what's new in samsung health research stack? tech session advanced tech, health, open sources, platform introducing the newly rebranded samsung health research stack version 2.0, enhancing connectivity with samsung devices and services. what's new in tizen? tech session advanced tech, tizen, platform, open sources introducing the exciting features coming up in tizen 9.0 and deep diving into the latest updates. back to previous page
Develop Mobile Samsung Automation
docopen source samsung automation studio is one way to integrate samsung services with open source or 3rd-part services we are actively using open source and trying to contribute to the open source ecosystem check out the following article samsung electronics migrates iot developer tools to cloud foundry based on node-red samsung automation studio was forked from node-red version 0 17 5 and developed to support the easy development of smartthings automation webhook in early 2016 low-code programming for event-driven applications node-red is a programming tool for wiring together hardware devices, apis and online services in new and interesting ways it provides a browser-based editor that makes it easy to wire together flows using the wide range of nodes in the palette that can be deployed to its runtime in a single-click flow-based programming invented by j paul morrison in the 1970s, flow-based programming is a way of describing an application’s behavior as a network of black-boxes, or “nodes” as they are called in node-red each node has a well-defined purpose; it is given some data, it does something with that data and then it passes that data on the network is responsible for the flow of data between the nodes it is a model that lends itself very well to a visual representation and makes it more accessible to a wider range of users if someone can break down a problem into discrete steps they can look at a flow and get a sense of what it is doing; without having to understand the individual lines of code within each node more details are available at nodered org contributes samsung automation studio team published custom nodes on the node-red site we are improving it through open source see the following github https //github com/samsung/samsungautomationstudio and we continue to engage the nodered community running on cloud foundry automation studio deploys flows in secured and isolated containers whose healths and lifecycles are managed automatically by the reliable container platform cf cloud platform cloud platforms let anyone deploy network apps or services and make them available to the world in a few minutes when an app becomes popular, the cloud scales it to handle more traffic, replacing build-out and migration efforts that once took months with a few keystrokes cloud platforms enable you to focus exclusively on your apps and data without worrying about underlying infrastructure the following diagram shows the layers of a typical technology stack, and compares the traditional it model to the cloud platform model about the cloud foundry platform this section describes why cloud foundry is an industry-standard cloud platform not all cloud platforms are created equal some have limited language and framework support, lack key app services, or restrict deployment to a single cloud as an industry-standard cloud platform, cloud foundry offers the following open source code the platform’s openness and extensibility prevent its users from being locked into a single framework, set of app services, or cloud deployment automation developers can deploy their apps to cloud foundry using their existing tools and with zero modification to their code flexible infrastructure you can deploy cloud foundry to run your apps on your own computing infrastructure, or deploy on an iaas like vsphere, aws, azure, gcp, or openstack commercial options you can also use a paas deployed by a commercial cloud foundry cloud provider community support a broad community contributes to and supports cloud foundry cloud foundry is ideal for anyone interested in removing the cost and complexity of configuring infrastructure for their apps more details are available at cloudfoundry org get started - samsung automation studio beta
announcement mobile, ai, iot, ar/vr/xr
blogin the fast-changing world of development, a new year always brings new trends and exciting technologies. for me, it has also brought a new role as a samsung technical evangelist. previously, i was a developer champion for samsung’s artik iot platform, working within the maker community. and prior to that, i was an independent developer focusing on full-stack mobile app development, hybrid and native.with that background in mind, i always say i eat javascript for breakfast, have swift and linux protein shakes for a midday snack, and enjoy open source super foods. i also have a sweet tooth for ar and iot. my appetite for development is also accompanied by a strong desire to engage with the developer and creative communities who are equally passionate about creating amazing things. that’s why i’m so excited about my new role. one of my main responsibilities will be making sure our developer community stays on top of industry innovations by providing the resources you need to create really cutting-edge work. this starts with the 2018 source code: a dev’s guide. over the next few weeks, we’ll be asking the industry’s brightest minds about the trends they’re watching and for their top dev predictions for 2018. but before we get to that, i’d like to share my personal predictions for 2018 from a developer standpoint: the evolution of artificial intelligence in healthcare from iot to voice user interfaces (vui) to autonomous cars, ai is steadily evolving around our daily activities. this is perhaps most apparent within the healthcare sector. here, ai is solving a variety of challenges in predicting illnesses by capturing and analyzing physiological and well-being data, as well as relationships between prevention/treatment and patient outcomes, just to name a few. in 2018, i see more open research data being made available and more health apis for developers to take advantage of (e.g. holistic apps, products and services). intelligent iot made easy by itself, iot generates large amounts of unstructured data. without the ability to analyze it at a high, frictionless pace, this data can be easily wasted. now, with iot playgrounds like smartthings cloud, developers will be able to create smartapps that can easily integrate third-party cloud-to-cloud devices. in 2018, i believe we’ll see a massive leap forward in the ease of iot app development and the overall functionality of these apps. the creation of new revenue streams in ar/vr/mr in the developer world, these acronyms represent many opportunities. the way we consume content, the way we make transactions and the way we socialize with the rest of world will continue to be transformed in 2018’s digital universe. with the help of partners like facebook oculus and google arcore, you will be able to develop immersive and interactive apps to engage a new generation of consumers. if you are a developer polishing your monetization strategy in ar/vr/mr, you will be well positioned to blaze revenue stream models other developers will look to as the gold standard for years to come. be sure to check back here for more valuable insights and perspectives designed to help position you for success in 2018. remember to follow #beasamusungdev on twitter and like us on facebook to make sure you don’t miss a thing. i’m excited to meet you in 2018!
Josue Bustos
Learn Code Lab
codelabbuild a health app with steps from samsung health and its connected wearables objective create a step counter application for android devices, utilizing the samsung health data sdk to read steps data collected by the samsung health app overview samsung health offers various features to monitor user health data such as their daily step activity with the samsung health data sdk, android applications can easily access collected data, including steps recorded over a specific period or from a certain device you can retrieve steps data collected by samsung health, obtain the total number of steps taken within the day, and the total number of steps per hour, and apply local time filters to refine your queries effectively set up your environment you will need the following android studio latest version recommended java se development kit jdk 17 or later android mobile device compatible with the latest samsung health version sample code here is a sample code for you to start coding in this code lab download it and start your learning experience! health data steps sample code 573 9 kb set up your android device click on the following links to set up your android device enable developer options run apps on a hardware device activate samsung health's developer mode to enable the developer mode in the samsung health app, follow these steps go to settings > about samsung health then, tap the version number quickly 10 times or more if you are successful, the developer mode new button is shown tap developer mode new and choose on now, you can test your app with samsung health notethe samsung health developer mode is only intended for testing or debugging your application it is not for application users start your project in android studio click open to open existing project locate the downloaded android project mysteps from the directory and click ok check gradle settings before using the samsung health data sdk library, certain configurations are necessary these steps are already applied in the sample code provided the samsung-health-data-api-1 0 0b1 aar library is added to the app\libs folder, and included as a dependency in the module-level build gradle file in the same file, the gson library is also added as a dependency dependencies { implementation filetree mapof "dir" to "libs", "include" to listof "* aar" implementation libs gson } next, the kotlin-parcelize plugin is applied plugins { id "kotlin-parcelize" } lastly, the following entries are also added in the gradle > libs version toml file [versions] gson = "2 10 1" parcelize = “1 9 0” [libraries] gson = { module = "com google code gson gson", version ref = "gson" } [plugins] parcelize = { id = “org jetbrains kotlin plugin parcelize”, version ref = ”parcelize” } request steps data permissions noteyou can access data from samsung health by obtaining a healthdatastore object using the healthdataservice getstore appcontext method to read data from samsung health, you need to acquire proper permissions from the app user each health data type has its own permission additionally, separate permissions are required for reading and writing operations the user must grant the following permissions in the app steps for read operation steps_goal for read operation when launching the application, it is important to verify if the necessary permissions have already been granted this can be achieved through the library function healthdatastore getgrantedpermissions permissions set<permission> set<permission> go to app > kotlin+java > com samsung health mysteps domain in the arepermissionsgrantedusecase kt file, navigate to the permissions object and create the permissions needed to read the steps and steps goal data from samsung health /**************************************************************************** * [practice 1] create permission set to receive step data * * make permissions set down below contain two permission * com samsung android sdk health data permission permission objects of types * - 'datatypes steps' of 'accesstype read' * - 'datatypes steps_goal of 'accesstype read' ****************************************************************************/ object permissions { //todo 1 val permissions = emptyset<permission> } if the permissions are not granted, invoke an ask-for-permissions view the special function provided by the library is called from mainactivity, where the context is an activity's context val result = healthdatastore requestpermissions permissions, context after invoking the function, the app user sees the following pop-up upon starting the application if the user does not consent to read their steps data, the application displays a message explaining why this authorization is vital for the app to function properly notepermissions can be granted or revoked at any time by tapping the more button on the toolbar and selecting the connect to samsung health tab once the user grants the necessary permissions, you can proceed with retrieving the step data from the healthdatastore retrieve steps data from samsung health understand how to retrieve step goal a step goal is a target number of steps set by an individual to achieve within a day this can be set in the samsung health app by navigating to steps > settings > set target check the readlaststepgoal function in readstepgoalfromtodayusecase kt to know how to retrieve the most recent step goal from samsung health @throws healthdataexception class private suspend fun readlaststepgoal int { val startdate = localdate now val enddate = localdate now plusdays 1 log i tag, "startdate $startdate; enddate $enddate" val readrequest = datatype stepsgoaltype last requestbuilder setlocaldatefilter localdatefilter of startdate, enddate build val result = healthdatastore aggregatedata readrequest var stepgoal = 0 result datalist foreach { data -> log i tag, "step goal ${data value}" log i tag, "data starttime ${data starttime}" log i tag, "data endtime ${data endtime}" data value? let { stepgoal = it } } return stepgoal } the function readlaststepgoal retrieves the most recent step goal from samsung health first, it filters the data by setting the startdate and enddate to the current date and the next day respectively using a localdatefilter next, the function builds a request using the datatype stepsgoaltype last constant to retrieve the most recent value and specifies the date range using the setlocaldatefilter method the request is then executed by calling the aggregatedata function of the healthdatastore once the data is fetched, the function loops through each entry and extracts the step goal value finally, it returns the step goal value as the result collect today's total number of steps to verify if the user reached their daily step goal, get the number of steps taken from midnight until the current time perform this calculation by creating a generic function that calculates the total number of steps within a specified time frame then, set the start time as the beginning of today and the end time as the current timestamp total is an aggregate operation that obtains the sum of steps to achieve this task, use the following healthdatastore getgrantedpermissions permissions set<permission> set containsall elements collection<@unsafevariance e> aggregaterequest it represents a request for an aggregation query over time it is used to run aggregate operations like total and last for healthdatapoint localtimefilter filter with a localdatetime type time interval as a condition the time interval is represented as local date time companion function of starttime localdatetime?, endtime localdatetime? creates a localtimefilter with starttime and endtime aggregaterequest localtimebuilder<t> provides a convenient and safe way to set the fields and create an aggregaterequest setlocaltimefilter localtimefilter localtimefilter sets the local time filter of the request in readstepsfromatimerangeusecase kt, navigate to the function getaggregaterequestbuilder and filter today's steps /*************************************************************************** * [practice 2] - create a read request builder to obtain steps from given * time range * collecting steps from a period of time is an aggregate operation which * sums up all the steps from that period * in this exercise you need to * - create a localtimefilter with starttime and endtime for the * aggregaterequest * - apply the filter to the aggregaterequest * ------------------------------------------------------------------------- * - hint * use localtimefilter of to create a time filter for the request **************************************************************************/ fun getaggregaterequestbuilder starttime localdatetime, endtime localdatetime aggregaterequest<long> { val aggregaterequest = datatype stepstype total requestbuilder build // todo 2 return aggregaterequest } a list of aggregated data is received as a result of the request in this example, it's a single-item list containing the total number of steps taken from the beginning of the day to the present moment with the given code, you can iterate over the list and check if the value of the analyzed aggregateddata element is not null if so, assign it to the stepcount variable however, if the value is empty, the code returns a value of 0, indicating that no steps were recorded val result = healthdatastore aggregatedata aggregaterequest var stepcount = 0l result datalist foreach { aggregateddata -> aggregateddata value? let { stepcount = it } } obtain the number of steps for each hour after setting up the functions to fetch steps data from samsung health and aggregating the data to calculate the total step count, you need to obtain the total number of steps for each hour and visualize the steps the user took during every hour of the day to achieve this, utilize the aggregate operation sum of steps , but this time incorporate additional filtering grouping by hour aggregaterequest it represents a request for an aggregation query over time it is used to run aggregate operations like total and last on healthdatapoint localtimefilter filter with a localdatetime type time interval as a condition the time interval is represented as local date time companion function of starttime localdatetime?, endtime localdatetime? creates a localtimefilter with starttime and endtime localtimegroup grouped time interval with a pair of localtimegroupunit and multiplier this means that the grouping is applied to intervals as much as multiplier in local date and time companion function of timegroupunit localtimegroupunit, multiplier int creates a localtimegroup with the given timegroupunit and multiplier localtimebuilder<t> provides a convenient and safe way to set the fields and create an aggregaterequest setlocaltimefilterwithgroup localtimefilter localtimefilter?, localtimegroup localtimegroup? sets the local time filter with the local time group of the request in readgroupedstepsbytimerangeusecase kt, navigate to the getaggregaterequestbuilder function obtain the total number of steps from every hour by creating two variables one to specify the time range using localtimefilter of and another to define the grouping using localtimegroup of by combining these variables, you can set an aggregate request that retrieves the desired data /************************************************************************ * [practice 3] - create an aggregate request for steps from given period * of time * for this, datatype steps grouped by hour is needed * in this exercise you need to * - create an aggregate request, with grouping and time filters, * for filters' parameters use the method's arguments * - return the request * ---------------------------------------------------------------------- * - hint * use setlocaltimefilterwithgroup function to apply time and grouping * filters to the request builder ***********************************************************************/ fun getaggregaterequestbuilder startdatetime localdatetime, enddatetime localdatetime, localtimegroupunit localtimegroupunit, multiplier int aggregaterequest<long> { val aggregaterequest = datatype stepstype total requestbuilder build // todo 3 return aggregaterequest } to apply local time filtering with the given group, use the localtimefilter and localtimegroup classes the localtimegroup consists of a localtimegroupunit, which in this case is hourly, and a multiplier you can also group by other time periods such as daily, weekly, monthly, minutely, and yearly since you want data from every hour period, use a multiplier value of 1 the returned data from the request is a list, where each item represents a grouped value healthdatastore only returns values for periods when the step count is greater than zero the code below shows that by iterating over the returned datalist and adding non-null groupeddata to the output steplist, you can obtain the aggregated value of steps for each hour of the day val result = healthdatastore aggregatedata aggregaterequest val steplist arraylist<groupeddata> = arraylist result datalist foreach { aggregateddata -> var stepcount = 0l aggregateddata value? let { stepcount = it } val starttime = aggregateddata starttime atzone zoneid systemdefault val groupeddata = groupeddata stepcount, starttime tolocaldatetime steplist add groupeddata } noteevery usage of samsung health data sdk might throw a healthdataexception such exceptions are thrown from every backend function up the call stack and handled in viewmodel the healthdataexception has four possible subclasses an example is resolvableplatformexception, which means it can be automatically resolved by invoking resolvableplatformexception resolve activitycontext the reason for such an exception is, for instance, when samsung health app is not installed on the device resolving it results in opening samsung health page in the app store run unit tests for your convenience, an additional unit tests package is provided this package lets you verify your code changes even without using a physical device right-click on com samsung health mysteps test and select run 'tests in 'com samsung health mysteps' if you completed all the tasks correctly, you can see that all the unit tests passed successfully run the app after building the apk, you can run the app on a connected device to read your steps data once the app starts, allow all permissions to read steps data from samsung health and tap done afterwards, the app's main screen appears, displaying the daily summary of steps taken, target, and steps by hour swipe down to sync the latest data from samsung health you can scroll down to steps by hour to see the hourly breakdown you're done! congratulations! you have successfully achieved the goal of this code lab now, you can create a mobile health app that reads samsung health steps count data by yourself! if you are having trouble, you may download this file health data steps complete code 573 4 kb to learn more about samsung health, visit developer samsung com/health
featured ai, mobile
blognote: this article assumes that you have prior knowledge about machine learning. if you have any questions, please post them in the samsung neural forum. the development of machine learning has revolutionized the technology industry by bringing human-like decision making to compact devices. from health care to real estate, finance, and computer vision, machine learning has penetrated almost every field. today, many businesses deploy machine learning to gain a competitive edge for their products and services. one of the fastest-growing machine learning areas is deep neural networks (dnn), also known as artificial intelligence (ai), which is inspired by the neural interactions in the human brain. with the ai industry growing so quickly, it is not only difficult to be up-to-date with the latest innovations, but even more so to deploy those developments in your business or application. as ai technology paves its way into the mobile industry, one wonders: what can be achieved with the limited capacity of mobile embedded devices? how does one execute dnn models on mobile devices, and what are the implications of running a computationally intensive model on a low resource device? how does it affect the user experience? typically, a deep neural network is developed on a resource-rich gpu farm or server, where it is designed and then trained with a specific data set. this pre-trained dnn model is then ready to be deployed in an environment, such as a mobile device, to generate output. a pre-trained dnn model can easily be used to develop an ai-based application that brings completely unique user experiences to mobile devices. a variety of pre-trained models, such as inception, resnet, and mobilenet are available in the open source community. the samsung neural sdk is samsung’s in-house inference engine which efficiently executes a pre-trained dnn model on samsung mobile devices. it is a one-stop solution for all application and dnn model developers who want to develop ai-based applications for samsung mobile devices. to simplify the process of deploying applications that exploit neural network technology, the samsung neural sdk supports the leading dnn model formats, such as caffe, tensorflow, tflite, and onnx, while enabling you to select between the available compute units on the device, such as the cpu, gpu, or ai processor.1 the samsung neural sdk enables easy, efficient and secure execution of pre-trained dnn models on samsung mobile devices, irrespective of the constraints posed by hardware such as compute unit capability, memory configuration and power limitations. samsung neural stack features the samsung neural sdk provides simple apis that enable you to easily deploy on-device pre-trained or custom neural networks. the sdk is designed to accelerate the machine learning models in order to improve performance and optimize hardware utilization, balancing performance and latency with memory use and power consumption. the samsung neural sdk supports mixed precision formats (fp32/fp16 and int8), and provides a great variety of operations that enable you to experiment with different models and architectures to find what works best for your use case. it also employs industry-standard cryptographic encryption methods for neural network models, to protect your intellectual property. the samsung neural sdk includes complete api documentation for your ready reference. it describes all the optimization tools and supported operations, provides code examples, and more. sample benchmarking code included with the samsung neural sdk the accompanying sample benchmarking code helps you understand how to use the api methods and demonstrates the available features and configurations, such as selecting a compute unit and execution data type. the samsung neural sdk can be used in a wide range of applications that utilize deep neural networks and improves their performance on samsung mobile devices. it has already been applied to many use cases and we look forward to supporting your application idea. are you interested in using samsung neural sdk? visit samsung neural sdk to learn more about becoming a partner today. partners gain access to the sdk and technical content such as developer tips and sample code. if you have questions about the samsung neural sdk, email us at sdk.neural@samsung.com. [1] ai processors include neural processing units (npu) and digital signal processors (dsp). the samsung neural sdk currently supports only the caffe and tensorflow formats.
Samsung Neural Team
Connect Samsung Developer Conference
webtech square products and services using our new technology are displayed in the space by each field, and you can find details in the keynote speech and sessions. ai for platforms enterprise & ecosystem ai for devices category ai for platforms enterprise & ecosystem ai for devices mobile remote on smartthings control your tv effortlessly with our innovative mobile remote. 1. personalize your mobile remote to match your needs. arrange your mobile remote with the buttons and applications you want. you can use the touchpad to control without looking at the mobile screen (swipe-navigation, tap-ok, double tap-return). 2. use the mobile remote even without the internet. the mobile remote connects to your tv via ble for seamless interaction. 3. share the mobile remote with your family. simply scan a qr code to share the mobile remote with family members. innovating together for 10 years samsung smartthings has been leading the way in connected living for a decade — consistently redefining home automation and setting the standard for efficiency and security. growing from 100 million subscribers in 2019 to over 350 million by august 2024, smartthings has established samsung as a leader in the smart home market. the platform continues to expand its influence in the iot industry by enhancing its ai-driven capabilities and even extending its reach into the b2b space. check out the infographic below to explore samsung smartthings' 10-year journey of innovation. easily certify your product family the smartthings platform supports connectivity with a wide range of partner devices to enhance convenience in users' daily lives. to achieve this goal, we have introduced a program called ‘certification by similarity'. this program allows free certification for derivative products that share the same features as the main certified product based solely on self-verification test results. it also enables mass certification and registration of entire product lines at once. smartthings is planning various promotions to introduce wwst-certified partner devices to general users. tailored moods with music sync with smartthings music sync, you can match lighting to your gaming environment or favorite movie scenes, and when it comes to home parties, relaxation, or even workouts, smartthings music sync offers music synchronization to create an engaging listening experience. smartthings hubs working together as a team smartthings hubs are already integrated into millions of samsung devices. these hubs build a multi-hub network and can fully cover your home without any dead spots. samsung knox matrix knox matrix realizes samsung's vision for a future where connected devices can protect each other within an ecosystem. it is set to provide the devices within a user's ecosystem with fewer vulnerabilities through strong, diverse security practices. take care of your loved ones with family care take care of your loved ones with smartthings. no matter the distance, you can now easily check in to make sure they are ok. experience navien house with smartthings navien monitors consumer hot water and heating usage patterns, analyzes the data, and generates a home report. by collaborating with smartthings, navien strives to offer global consumers more opportunities to experience the excellence of navien products. conserve water for a better future we're thrilled introduce a new partner to the smartthings ecosystem. join us at sdc to learn all the details about this exciting partnership! home insight powered by smartthings ai a message that helps with your daily life, home insight. smartthings intuitively summarizes the essential details of your home and intelligently fine-tunes your needs with your living environment. door locks on smartthings x samsung wallet a keyless experience with samsung wallet and smartthings. samsung wallet and smartthings' partners can display their own brand on a digital home key. in smartthings, you can manage users who have access to your door lock and utilize safe and various ways of opening the door. also, you can grant personalized experiences based on who unlocks the door. convenient remote control experience you can easily find and quickly control your devices with the larger remote control cards in the smartthings application. work from home in comfort by adjusting the temperature right from your galaxy book. create the best mood lighting for movie night by dimming the lights from your tv's quick launch. simply tap the device icon in map view and the remote appears on your smartphone or tablet. no need to switch screens or be close to the device anymore. daily health care in the comfort of your home make daily health management at home effortless for you and your loved ones. now samsung health is integrated with smartthings which is connected to millions of devices, opening the possibilities of new experiences in home environments. back to previous page samsung health sdk suite unlock the future of health tech. explore the samsung health sdk suite today! empowering health innovation with samsung's suite of health sdks, enabling seamless integration of advanced digital health solutions into your applications and devices. partner with samsung health transforming lives together. improve health and well-being through innovation, research, and collaboration to empower people throughout their lives. samsung wallet: expanding eco with partners samsung wallet is expanding its offerings by providing new card types and features. it also allows easy onboarding of multiple merchants through the improved partner site and can send push notifications to users directly. the existing samsung wallet/pay partner site has been integrated with the developer portal, resulting in enhanced usability and added functionality. this integration is expected to provide a more convenient experience for partners. samsung wallet: digital key for home and office no need to carry a key. tap to unlock your door with the digital key of samsung wallet. samsung wallet: sdk for online id verification add your mobile driver's license or state id to samsung wallet and easily verify your identity online. car rental, liquor purchase, loan applications, and more require proof of identity. experience the convenience and security when you present your state-issued credential with samsung wallet. galaxy for knowledge workers introduction of enterprise mobility solutions enabled with strategic partners to deliver maximum business productivity via samsung flagship devices and samsung multi-device connectivity environment. galaxy for frontline workers this session introduces three enterprise partner solutions for field workers. we are going to showcase how galaxy devices are transformed into optimized solutions through partner collaboration. first, koamtac advanced inventory management solution. second, targus field ready case and mpos solution. third, harman's worker safety and productivity solution for galaxy watch. samsung vxt : cms platform with pirs (pre-integrated repeatable solution) traditionally, the signage industry was centered around hardware, but with vxt, we've taken a leap towards becoming a software solution. starting with saas, we're now progressing towards daas and paas, ensuring high growth and market dominance based on revenue generated from the vxt platform ecosystem. our cutting-edge cms software, vxt cms, incorporates ai technology to provide comprehensive support for all aspects of content production, operation, and management. by utilizing an ai-powered chatbot, we enable efficient operations and management. to further enhance our offering, we are actively seeking partnerships with ai experts through the pirs application. by providing easy access to development tools such as sdks, we encourage more ai companies to join us in shaping this new ecosystem. our goal is to create an application environment where si partners can develop specialized features that seamlessly integrate with samsung vxt. harman ignite store – a white-label aaos app store the harman ignite store is an integrated automotive app store built on the android automotive operating system (aaos). learn how harman automotive is connecting developers with carmakers to create unique in-vehicle digital experiences that can be monetized. back to previous page samsung ai cast: delivering ai-generated experiences to your screen samsung ai cast brings the power of ai directly to your screen, delivering immersive experiences right to your display. it showcases stunning ai-generated images, elegantly framed like artwork. it offers personalized content recommendations. it shares text from your conversations with ai. whether it's a visual creation, a custom content suggestion, or any insightful text, ai cast ensures that the best of ai is always on display, making your screen experience richer and more interactive. expansion of sign language guide the sign language guide, initially designed for tv settings (2022), has now been extended to cover a wider range of tv built-in services. this innovative feature enables individuals who are deaf to easily access information displayed on their tvs. in collaboration with broadcasting companies, we are incorporating sign language information into real-time broadcasts and outputting them on tv. we are also preparing to expand the use of sign language in various areas such as the out-of-box experience (oobe), notifications, and electronic manuals containing tv usage information. with advancements in technology, it is expected that live streaming videos will soon be able to be translated into sign language in real-time using an ai-powered motion capture technique. by expanding the motion dictionary within the tv, a broader variety of sign language motions can be stored and utilized effectively. ai picture quality the ai picture quality of samsung tv focuses on ai object-oriented picture quality enhancement. ai upscaling pro can improve face quality through object-oriented upscaling technology based on ai face detection and face-specific upscaling model. ai motion enhancer pro can improve motion picture quality of cognitively important objects (ball/text) by recognizing the type of sports and detecting the movement of important objects. samsung daily+ and daily board ecosystem samsung presents a lifestyle content platform, samsung daily+ and daily board. here, we invite you to easily join the samsung daily+ and daily board ecosystem. samsung daily+ is an on-screen experience platform that suggests users explore diverse lifestyle content across various experience categories. a new daily board sdk provides an easier way to include widgets on the daily board screen, providing frequently displayed off-screen experiences. samsung ai tv on risc-v an initial step to expand ai screen towards risc-v. ai screen on tizen is now powered by risc-v-based computing platforms. by harnessing the flexibility and openness of risc-v and tizen, samsung will enhance user experience by holistically optimizing entire hardware and software stacks. hassle-free adoption of tizen applications. you can still enjoy all existing web and .net applications without any modification. tizen will provide all environments (e.g., toolchain, sdk, etc.) to easily migrate native applications for risc-v. generative wallpaper generative wallpaper serves the experience of providing large images reflecting preferences using a generative ai model. it enriches the home atmosphere with high-quality generated images, making every moment shared with family and friends even more special. it offers more than 18 styles tailored to customers' tastes and provides high-resolution images suitable for a large screen. enhancing search experience with bixby search is the most basic but important thing nowadays. there are so many movies and shows on many different ott platforms. how can we find the exact one that we want to see without knowing the exact title? with this upgraded search system, you can now find the movie with a somewhat ambiguous sentence or some part of the plot. like "find me a movie about a mouse inside a cook's hat." (what movie did you expect?) or you can find the movie by a genre or time period, like "find a movie about the financial crisis," or "find a movie about the korean war." not only enhanced search power, but now bixby can also do more things at once. you can have a conversation with bixby with context, like this: "who's the director of parasite?" "the director of parasite is bong joon-ho." "find his movies." and you can do many things with only one sentence: "hi bixby, turn the volume to 10 and find action movies." you don't have to wait and say one command at a time and wait for bixby's 'completed' signal. ecosystem for advanced professional video codec advanced professional video (apv) codec is a new video codec for prosumers who do not want to compromise on quality while enjoying the convenience of capturing video using smartphones. at our booth, you can experience the superior visual quality of the apv codec and a video editing demonstration supported by the apv codec. on-device cleaning solution samsung's home appliances are equipped with on-device ai, making them smarter than ever before. with various sensors and cameras, they offer an enhanced user experience by optimizing cleaning paths and recognizing different objects. additionally, these appliances identify carpeted areas and floor types to adjust their cleaning performance accordingly. explore more of the on-device features available in samsung's home appliances for a truly innovative experience. new ai familyhub the family hub refrigerator is equipped with ai vision technology, allowing you to manage your food efficiently by always knowing what's inside. additionally, you can personalize your family hub experience with generative wallpaper, which enables users to create their own unique wallpapers for the device. now it's time to try generating the desired wallpaper and enhance your family hub experience. enhanced appliance control : bixby & ai home on-device automatic speech recognition (asr) technology enables appliances to support voice interactions without requiring voice activation commands. this technology allows for a more natural and intuitive way to interact with our products, ultimately enhancing user experience. additionally, bixby's advancements facilitate seamless communication between appliances and users, resulting in improved convenience and usability. the incorporation of these technologies into home appliances showcases their potential to revolutionize the way we interact with everyday objects. back to previous page mobile remote on smartthings control your tv effortlessly with our innovative mobile remote. 1. personalize your mobile remote to match your needs. arrange your mobile remote with the buttons and applications you want. you can use the touchpad to control without looking at the mobile screen (swipe-navigation, tap-ok, double tap-return). 2. use the mobile remote even without the internet. the mobile remote connects to your tv via ble for seamless interaction. 3. share the mobile remote with your family. simply scan a qr code to share the mobile remote with family members. innovating together for 10 years samsung smartthings has been leading the way in connected living for a decade — consistently redefining home automation and setting the standard for efficiency and security. growing from 100 million subscribers in 2019 to over 350 million by august 2024, smartthings has established samsung as a leader in the smart home market. the platform continues to expand its influence in the iot industry by enhancing its ai-driven capabilities and even extending its reach into the b2b space. check out the infographic below to explore samsung smartthings' 10-year journey of innovation. easily certify your product family the smartthings platform supports connectivity with a wide range of partner devices to enhance convenience in users' daily lives. to achieve this goal, we have introduced a program called ‘certification by similarity'. this program allows free certification for derivative products that share the same features as the main certified product based solely on self-verification test results. it also enables mass certification and registration of entire product lines at once. smartthings is planning various promotions to introduce wwst-certified partner devices to general users. tailored moods with music sync with smartthings music sync, you can match lighting to your gaming environment or favorite movie scenes, and when it comes to home parties, relaxation, or even workouts, smartthings music sync offers music synchronization to create an engaging listening experience. smartthings hubs working together as a team smartthings hubs are already integrated into millions of samsung devices. these hubs build a multi-hub network and can fully cover your home without any dead spots. samsung knox matrix knox matrix realizes samsung's vision for a future where connected devices can protect each other within an ecosystem. it is set to provide the devices within a user's ecosystem with fewer vulnerabilities through strong, diverse security practices. take care of your loved ones with family care take care of your loved ones with smartthings. no matter the distance, you can now easily check in to make sure they are ok. experience navien house with smartthings navien monitors consumer hot water and heating usage patterns, analyzes the data, and generates a home report. by collaborating with smartthings, navien strives to offer global consumers more opportunities to experience the excellence of navien products. conserve water for a better future we're thrilled introduce a new partner to the smartthings ecosystem. join us at sdc to learn all the details about this exciting partnership! home insight powered by smartthings ai a message that helps with your daily life, home insight. smartthings intuitively summarizes the essential details of your home and intelligently fine-tunes your needs with your living environment. door locks on smartthings x samsung wallet a keyless experience with samsung wallet and smartthings. samsung wallet and smartthings' partners can display their own brand on a digital home key. in smartthings, you can manage users who have access to your door lock and utilize safe and various ways of opening the door. also, you can grant personalized experiences based on who unlocks the door. convenient remote control experience you can easily find and quickly control your devices with the larger remote control cards in the smartthings application. work from home in comfort by adjusting the temperature right from your galaxy book. create the best mood lighting for movie night by dimming the lights from your tv's quick launch. simply tap the device icon in map view and the remote appears on your smartphone or tablet. no need to switch screens or be close to the device anymore. daily health care in the comfort of your home make daily health management at home effortless for you and your loved ones. now samsung health is integrated with smartthings which is connected to millions of devices, opening the possibilities of new experiences in home environments. samsung health sdk suite unlock the future of health tech. explore the samsung health sdk suite today! empowering health innovation with samsung's suite of health sdks, enabling seamless integration of advanced digital health solutions into your applications and devices. partner with samsung health transforming lives together. improve health and well-being through innovation, research, and collaboration to empower people throughout their lives. samsung wallet: expanding eco with partners samsung wallet is expanding its offerings by providing new card types and features. it also allows easy onboarding of multiple merchants through the improved partner site and can send push notifications to users directly. the existing samsung wallet/pay partner site has been integrated with the developer portal, resulting in enhanced usability and added functionality. this integration is expected to provide a more convenient experience for partners. samsung wallet: digital key for home and office no need to carry a key. tap to unlock your door with the digital key of samsung wallet. samsung wallet: sdk for online id verification add your mobile driver's license or state id to samsung wallet and easily verify your identity online. car rental, liquor purchase, loan applications, and more require proof of identity. experience the convenience and security when you present your state-issued credential with samsung wallet. galaxy for knowledge workers introduction of enterprise mobility solutions enabled with strategic partners to deliver maximum business productivity via samsung flagship devices and samsung multi-device connectivity environment. galaxy for frontline workers this session introduces three enterprise partner solutions for field workers. we are going to showcase how galaxy devices are transformed into optimized solutions through partner collaboration. first, koamtac advanced inventory management solution. second, targus field ready case and mpos solution. third, harman's worker safety and productivity solution for galaxy watch. samsung vxt : cms platform with pirs (pre-integrated repeatable solution) traditionally, the signage industry was centered around hardware, but with vxt, we've taken a leap towards becoming a software solution. starting with saas, we're now progressing towards daas and paas, ensuring high growth and market dominance based on revenue generated from the vxt platform ecosystem. our cutting-edge cms software, vxt cms, incorporates ai technology to provide comprehensive support for all aspects of content production, operation, and management. by utilizing an ai-powered chatbot, we enable efficient operations and management. to further enhance our offering, we are actively seeking partnerships with ai experts through the pirs application. by providing easy access to development tools such as sdks, we encourage more ai companies to join us in shaping this new ecosystem. our goal is to create an application environment where si partners can develop specialized features that seamlessly integrate with samsung vxt. harman ignite store – a white-label aaos app store the harman ignite store is an integrated automotive app store built on the android automotive operating system (aaos). learn how harman automotive is connecting developers with carmakers to create unique in-vehicle digital experiences that can be monetized. samsung ai cast: delivering ai-generated experiences to your screen samsung ai cast brings the power of ai directly to your screen, delivering immersive experiences right to your display. it showcases stunning ai-generated images, elegantly framed like artwork. it offers personalized content recommendations and shares text from your conversations with ai. whether it's a visual creation, a custom content suggestion, or any insightful text, ai cast ensures that the best of ai is always on display, making your screen experience richer and more interactive. expansion of sign language guide the sign language guide, initially designed for tv settings (2022), has now been extended to cover a wider range of tv built-in services. this innovative feature enables individuals who are deaf to easily access information displayed on their tvs. in collaboration with broadcasting companies, we are incorporating sign language information into real-time broadcasts and outputting them on tv. we are also preparing to expand the use of sign language in various areas such as the out-of-box experience (oobe), notifications, and electronic manuals containing tv usage information. with advancements in technology, it is expected that live streaming videos will soon be able to be translated into sign language in real-time using an ai-powered motion capture technique. by expanding the motion dictionary within the tv, a broader variety of sign language motions can be stored and utilized effectively. ai picture quality the ai picture quality of samsung tv focuses on ai object-oriented picture quality enhancement. ai upscaling pro can improve face quality through object-oriented upscaling technology based on ai face detection and face-specific upscaling model. ai motion enhancer pro can improve motion picture quality of cognitively important objects (ball/text) by recognizing the type of sports and detecting the movement of important objects. samsung daily+ and daily board ecosystem samsung presents a lifestyle content platform, samsung daily+ and daily board. here, we invite you to easily join the samsung daily+ and daily board ecosystem. samsung daily+ is an on-screen experience platform that suggests users explore diverse lifestyle content across various experience categories. a new daily board sdk provides an easier way to include widgets on the daily board screen, providing frequently displayed off-screen experiences. samsung ai tv on risc-v an initial step to expand ai screen towards risc-v. ai screen on tizen is now powered by risc-v-based computing platforms. by harnessing the flexibility and openness of risc-v and tizen, samsung will enhance user experience by holistically optimizing entire hardware and software stacks. hassle-free adoption of tizen applications. you can still enjoy all existing web and .net applications without any modification. tizen will provide all environments (e.g., toolchain, sdk, etc.) to easily migrate native applications for risc-v. generative wallpaper generative wallpaper serves the experience of providing large images reflecting preferences using a generative ai model. it enriches the home atmosphere with high-quality generated images, making every moment shared with family and friends even more special. it offers more than 18 styles tailored to customers' tastes and provides high-resolution images suitable for a large screen. enhancing search experience with bixby search is the most basic but important thing nowadays. there are so many movies and shows on many different ott platforms. how can we find the exact one that we want to see without knowing the exact title? with this upgraded search system, you can now find the movie with a somewhat ambiguous sentence or some part of the plot. like "find me a movie about a mouse inside a cook's hat." (what movie did you expect?) or you can find the movie by a genre or time period, like "find a movie about the financial crisis," or "find a movie about the korean war." not only enhanced search power, but now bixby can also do more things at once. you can have a conversation with bixby with context, like this: "who's the director of parasite?" "the director of parasite is bong joon-ho." "find his movies." and you can do many things with only one sentence: "hi bixby, turn the volume to 10 and find action movies." you don't have to wait and say one command at a time and wait for bixby's 'completed' signal. ecosystem for advanced professional video codec advanced professional video (apv) codec is a new video codec for prosumers who do not want to compromise on quality while enjoying the convenience of capturing video using smartphones. at our booth, you can experience the superior visual quality of the apv codec and a video editing demonstration supported by the apv codec. on-device cleaning solution samsung's home appliances are equipped with on-device ai, making them smarter than ever before. with various sensors and cameras, they offer an enhanced user experience by optimizing cleaning paths and recognizing different objects. additionally, these appliances identify carpeted areas and floor types to adjust their cleaning performance accordingly. explore more of the on-device features available in samsung's home appliances for a truly innovative experience. new ai familyhub the family hub refrigerator is equipped with ai vision technology, allowing you to manage your food efficiently by always knowing what's inside. additionally, you can personalize your family hub experience with generative wallpaper, which enables users to create their own unique wallpapers for the device. now it's time to try generating the desired wallpaper and enhance your family hub experience. enhanced appliance control : bixby & ai home on-device automatic speech recognition (asr) technology enables appliances to support voice interactions without requiring voice activation commands. this technology allows for a more natural and intuitive way to interact with our products, ultimately enhancing user experience. additionally, bixby's advancements facilitate seamless communication between appliances and users, resulting in improved convenience and usability. the incorporation of these technologies into home appliances showcases their potential to revolutionize the way we interact with everyday objects.
Develop Smart TV
docapplication security this topic describe the security of applications which run on samsung devices related info web security testing guide owasp secure software development lifecycle microsoft security development lifecycle sdl cwe list version 4 6 overview security is becoming an important issue with the increase of various smart devices in order to protect data from users and businesses, samsung devices are enhancing security in several layers, from hardware to software as samsung device applications are also software driven by samsung, the security needs to be taken into account samsung device applications can store important information such as code and key values and personal information of the user, which is an important resource that must be protected these resources can be leaked due to a variety of reasons, such as a simple mistake by a developer or hacking by an attacker in order to safeguard this, samsung device applications need to be developed according to secure by design in particular, the personal information of the user should comply with the policy related to the personal information for each country secure by design all software within the devices developed by samsung are based on the secure development lifecycle sdl model, and development step is divided into analysis, design, implementation, and testing, so vulnerability should be removed by performing a security review at each step from the same point of view, applications operating on samsung device should maintain the same security level for this, we recommend that you consider security in the application development phase by referring to the following step-by-step security review security in the analysis/design phase you should identify important information that is stored and transferred and ensure that the information is handled safely if you receive user input, you should review that you do not require more information than you need, and there is no issue with the input format you must identify the important information to be used and ensure that the information is displayed on vulnerable areas in the flow of the program in particular, when transmitting important information outside the device, you need to ensure that it communicates with the specified server through a secured channel at the time of designing, you must first define important information that needs to be protected and design it in a proper manner to protect it security in the implementation phase it must be implemented in compliance with security rules to prevent information in the software from being leaked through known vulnerabilities important information obtained in the design phase should be stored by applying security techniques such as encryption and make sure that it does not exist in plain text within the program establish secure coding rules for each language and proceed with development accordingly you must use only the minimum permissions required and notify the user of the permissions you use you should make sure that the security channel is properly set on the network, and the latest version of the technology is applied if you use encryption algorithms, you must use them securely using verified standard algorithms where vulnerabilities are not reported security in test phase security checks must be performed before deployment to prevent security issues and maintain security through maintenance after deployment before deployment, it is necessary to verify that there is no issue with analysis, design, and implementation when actually operated through simulated hacking, packet checking, etc after deployment, if a new vulnerability is found or a modification occurs in the security check, it must be patched and applied to all users as soon as possible security review process in order to maintain the security of the application ecosystem, samsung is performing security checks on the submitted applications samsung checks the risk or misuse cases that may occur due to the submitted applications, and if there is an issue, the deployment process can be stopped and the application submitter can be advised to fix it application security guide this section provides basic security guidelines to consider in the development of applications for a safe and reliable application running environment, we recommend that you proceed with the following points in the development phase data protection three key factors for data protection are confidentiality, integrity, and availability if an application sends or stores sensitive information, the application must encrypt data stored on these devices and protect it from attackers it is very important to protect sensitive data such as user credentials or personal information in application security if the mechanism of the operating system is not used correctly, sensitive data can be unintentionally exposed definition of sensitive data personally identifiable information that can be exploited for identity theft for example, resident registration number, social security number, credit card number, bank account number, health information, etc sensitive data that can lead to loss of honor and loss of money if leaked all data that must be protected for legal or compliance reasons security item description data protection sensitive data, such as passwords or pin data, should not be exposed through the user interface the key values used by the application must be hardcoded or not stored in plain text sensitive data should not be stored in an application container or external storage sensitive data should not be recorded in the application log sensitive data should not be shared with third parties unless it is necessary in the architecture sensitive data should not be shared with third parties unless it is necessary in the architecture keyboard cache must be disabled from the text input that processes sensitive data sensitive data should not be exposed even during internal communication you should ensure that the data stored in the client-side storage ex html5 local storage, session store, indexeddb, regular cookie, or flash cookie does not contain sensitive data make sure that you have provided clear t&c for the collection and use of the provided personal information and that you have provided selective consent to the use of that data before you use it reference links european union general data protection regulation gdpr overvieweuropean union data protection supervisor - internet privacy engineering networkapplication development privacy guide table 1 data protection security description and reference links authentication if there is a feature to log-in to the remote service by the user, it must be configured through security design even when most of the logic is operating on a remote service, the device must also meet security requirements on how to manage user accounts and sessions security item description authentication if the application provides remote services to the user, user name and password authentication must be performed from the remote service if you use status storage session management, the remote service must authenticate the client request using the randomly generated session identifier without sending the user's credentials if using stateless token-based authentication, the remote services must provide signed tokens using security algorithms when a user logs out, the remote service must end the existing session table 2 authentication security description access control an application can access a resource only if it has access to it security item description access control application must require only the minimum access required application must use the privilege that match the permissions and specify the privileges used when accessing user data, make sure that the principle of minimum access privilege requirement is followed applications must have access to apis, data files, urls, controllers, directories, services, and other resources with minimal access required you should verify and process all input from external resources and users this should include data received through the ui, a user-defined url, inter-process communication ipc , etc if an application uses a completely unprotected custom url, you should not export sensitive information important data or apis must be protected from user access other than data owners reference links owasp cheat sheet access control table 3 access control security description and reference links communications when the network is used, the application should not display the transmitted/received content using a secured channel security item description communications data must be encrypted on the network using tls transport layer security security channels must be used consistently throughout the application the setting of the security channel must be configured to protect information safely the data being transmitted must be protected from being snatched/taken over in the middle ex defence against man in the middle attack reference links owasp – tls cheat sheet table 4 communications security description and reference links input validation you must defend the command insertion attack through validating the validity of input value input value validation should be considered at all stages of development security item description input validation input values must process the data based on type and content, applicable laws, regulations and other policy compliance, and define how to handle it you must ensure that input validation is performed on a trusted service layer you need to check whether it protects against parameter attacks such as mass parameter allocation attacks or unsafe parameter allocation all possible input values e g html form fields, rest requests, url parameters, http headers, cookies, batch files, rss feeds, etc must be checked using validation ex whitelist you should check whether the values entered are in the correct form in well-defined schemas, including allowed characters, lengths, and patterns the url redirection and forward should display a warning that only whitelist targets are allowed or that you are connecting with potentially untrusted content make sure you use memory safety strings, secure memory copy, and pointer calculation to detect or prevent stacks, buffers, or heap overflows in order to prevent integer overflow, you need to make sure that sign, range, and input validation techniques are used reference links xml external entity xxe prevention cheat sheetreducing xss by way of automatic context-aware escaping in template systems table 5 input validation security description and reference links password management in case of application with different user password, security settings are required for them security item description password management you must ensure that the password does not contain spaces and cut/copy is not performed in the password change feature, you should check that the user's current password and new password are required it is recommended to provide a password strength meter so that users can set a stronger password it is also recommended to provide rules that limit allowed character types uppercase letter, numeric, special characters you should check that it is recommended to change your user password within the right due date do not store the user password in the application's properties or settings file in plain text or recoverable form passwords must be stored, transferred, and compared in a hashed state using a standard hash function to prevent random attacks, you should use the login limit number of login or captcha default password should not be generated make sure you do not show the key information, like passwords in the log reference links cwe-804 guessable captchacwe-836 use of password hash instead of password for authenticationcwe-257 storing passwords in a recoverable formatcwe-261 weak encoding for passwordcwe-263 password aging with long expiration table 6 password management security description and reference links session manager a session is a technique for controlling and maintaining the status of a user or device interacting with one user in a web application a session has a unique value for each user and cannot guess or share that value security item description session manager you should check that the session token is not exposed/displayed in the application's url parameter or error message make sure the application generates a new session token from user authentication you should check that the session token is stored using properly secured cookies or security methods you should check that a session token is generated using a standard encryption algorithm make sure the session is not reused by verifying that the session token is invalid when logout and session expires reference links owasp session management cheat sheetalgorithms, key size and parameters report 2014 table 7 session manager security description and reference links error handling the purpose of error handling is to allow applications to provide security events related to monitoring, status check, and increase in permission, and not just creating logs security item description error handling you must ensure that common error handling formats and access method are used you must make sure exception handling is used on the code base to explain expected and unexpected error conditions you must ensure that other error handlers that can prepare all unprocessed exceptions are defined in case of an error, you must make sure that the message shown to the user does not contain application-related technical or sensitive information we recommend using separate error codes for error support table 8 error handling security description release check the following before releasing the application security item description release application must be signed and distributed with a valid certificate, and the private key must be properly protected debugging code and developer support code test code, back door, hidden settings, etc must be removed deployed applications should not output or record detailed errors or debugging messages libraries and frameworks etc used by applications should be checked for known vulnerabilities the equipment used for release must be able to respond to external threats viruses, hacking, etc it should be built in release mode a separate debug message should not be left from the application if you include binary, debug information should be removed if a vulnerability occurs after release, you should update the application as soon as possible and always keep the latest version table 9 release security description
Develop Smart Signage
docapplication security this topic describe the security of applications which run on samsung devices related info web security testing guide owasp secure software development lifecycle microsoft security development lifecycle sdl cwe list version 4 6 overview security is becoming an important issue with the increase of various smart devices in order to protect data from users and businesses, samsung devices are enhancing security in several layers, from hardware to software as samsung device applications are also software driven by samsung, the security needs to be taken into account samsung device applications can store important information such as code and key values and personal information of the user, which is an important resource that must be protected these resources can be leaked due to a variety of reasons, such as a simple mistake by a developer or hacking by an attacker in order to safeguard this, samsung device applications need to be developed according to secure by design in particular, the personal information of the user should comply with the policy related to the personal information for each country secure by design all software within the devices developed by samsung are based on the secure development lifecycle sdl model, and development step is divided into analysis, design, implementation, and testing, so vulnerability should be removed by performing a security review at each step from the same point of view, applications operating on samsung device should maintain the same security level for this, we recommend that you consider security in the application development phase by referring to the following step-by-step security review security in the analysis/design phase you should identify important information that is stored and transferred and ensure that the information is handled safely if you receive user input, you should review that you do not require more information than you need, and there is no issue with the input format you must identify the important information to be used and ensure that the information is displayed on vulnerable areas in the flow of the program in particular, when transmitting important information outside the device, you need to ensure that it communicates with the specified server through a secured channel at the time of designing, you must first define important information that needs to be protected and design it in a proper manner to protect it security in the implementation phase it must be implemented in compliance with security rules to prevent information in the software from being leaked through known vulnerabilities important information obtained in the design phase should be stored by applying security techniques such as encryption and make sure that it does not exist in plain text within the program establish secure coding rules for each language and proceed with development accordingly you must use only the minimum permissions required and notify the user of the permissions you use you should make sure that the security channel is properly set on the network, and the latest version of the technology is applied if you use encryption algorithms, you must use them securely using verified standard algorithms where vulnerabilities are not reported security in test phase security checks must be performed before deployment to prevent security issues and maintain security through maintenance after deployment before deployment, it is necessary to verify that there is no issue with analysis, design, and implementation when actually operated through simulated hacking, packet checking, etc after deployment, if a new vulnerability is found or a modification occurs in the security check, it must be patched and applied to all users as soon as possible security review process in order to maintain the security of the application ecosystem, samsung is performing security checks on the submitted applications samsung checks the risk or misuse cases that may occur due to the submitted applications, and if there is an issue, the deployment process can be stopped and the application submitter can be advised to fix it application security guide this section provides basic security guidelines to consider in the development of applications for a safe and reliable application running environment, we recommend that you proceed with the following points in the development phase data protection three key factors for data protection are confidentiality, integrity, and availability if an application sends or stores sensitive information, the application must encrypt data stored on these devices and protect it from attackers it is very important to protect sensitive data such as user credentials or personal information in application security if the mechanism of the operating system is not used correctly, sensitive data can be unintentionally exposed definition of sensitive data personally identifiable information that can be exploited for identity theft for example, resident registration number, social security number, credit card number, bank account number, health information, etc sensitive data that can lead to loss of honor and loss of money if leaked all data that must be protected for legal or compliance reasons security item description data protection sensitive data, such as passwords or pin data, should not be exposed through the user interface the key values used by the application must be hardcoded or not stored in plain text sensitive data should not be stored in an application container or external storage sensitive data should not be recorded in the application log sensitive data should not be shared with third parties unless it is necessary in the architecture sensitive data should not be shared with third parties unless it is necessary in the architecture keyboard cache must be disabled from the text input that processes sensitive data sensitive data should not be exposed even during internal communication you should ensure that the data stored in the client-side storage ex html5 local storage, session store, indexeddb, regular cookie, or flash cookie does not contain sensitive data make sure that you have provided clear t&c for the collection and use of the provided personal information and that you have provided selective consent to the use of that data before you use it reference links european union general data protection regulation gdpr overvieweuropean union data protection supervisor - internet privacy engineering networkapplication development privacy guide table 1 data protection security description and reference links authentication if there is a feature to log-in to the remote service by the user, it must be configured through security design even when most of the logic is operating on a remote service, the device must also meet security requirements on how to manage user accounts and sessions security item description authentication if the application provides remote services to the user, user name and password authentication must be performed from the remote service if you use status storage session management, the remote service must authenticate the client request using the randomly generated session identifier without sending the user's credentials if using stateless token-based authentication, the remote services must provide signed tokens using security algorithms when a user logs out, the remote service must end the existing session table 2 authentication security description access control an application can access a resource only if it has access to it security item description access control application must require only the minimum access required application must use the privilege that match the permissions and specify the privileges used when accessing user data, make sure that the principle of minimum access privilege requirement is followed applications must have access to apis, data files, urls, controllers, directories, services, and other resources with minimal access required you should verify and process all input from external resources and users this should include data received through the ui, a user-defined url, inter-process communication ipc , etc if an application uses a completely unprotected custom url, you should not export sensitive information important data or apis must be protected from user access other than data owners reference links owasp cheat sheet access control table 3 access control security description and reference links communications when the network is used, the application should not display the transmitted/received content using a secured channel security item description communications data must be encrypted on the network using tls transport layer security security channels must be used consistently throughout the application the setting of the security channel must be configured to protect information safely the data being transmitted must be protected from being snatched/taken over in the middle ex defence against man in the middle attack reference links owasp – tls cheat sheet table 4 communications security description and reference links input validation you must defend the command insertion attack through validating the validity of input value input value validation should be considered at all stages of development security item description input validation input values must process the data based on type and content, applicable laws, regulations and other policy compliance, and define how to handle it you must ensure that input validation is performed on a trusted service layer you need to check whether it protects against parameter attacks such as mass parameter allocation attacks or unsafe parameter allocation all possible input values e g html form fields, rest requests, url parameters, http headers, cookies, batch files, rss feeds, etc must be checked using validation ex whitelist you should check whether the values entered are in the correct form in well-defined schemas, including allowed characters, lengths, and patterns the url redirection and forward should display a warning that only whitelist targets are allowed or that you are connecting with potentially untrusted content make sure you use memory safety strings, secure memory copy, and pointer calculation to detect or prevent stacks, buffers, or heap overflows in order to prevent integer overflow, you need to make sure that sign, range, and input validation techniques are used reference links xml external entity xxe prevention cheat sheetreducing xss by way of automatic context-aware escaping in template systems table 5 input validation security description and reference links password management in case of application with different user password, security settings are required for them security item description password management you must ensure that the password does not contain spaces and cut/copy is not performed in the password change feature, you should check that the user's current password and new password are required it is recommended to provide a password strength meter so that users can set a stronger password it is also recommended to provide rules that limit allowed character types uppercase letter, numeric, special characters you should check that it is recommended to change your user password within the right due date do not store the user password in the application's properties or settings file in plain text or recoverable form passwords must be stored, transferred, and compared in a hashed state using a standard hash function to prevent random attacks, you should use the login limit number of login or captcha default password should not be generated make sure you do not show the key information, like passwords in the log reference links cwe-804 guessable captchacwe-836 use of password hash instead of password for authenticationcwe-257 storing passwords in a recoverable formatcwe-261 weak encoding for passwordcwe-263 password aging with long expiration table 6 password management security description and reference links session manager a session is a technique for controlling and maintaining the status of a user or device interacting with one user in a web application a session has a unique value for each user and cannot guess or share that value security item description session manager you should check that the session token is not exposed/displayed in the application's url parameter or error message make sure the application generates a new session token from user authentication you should check that the session token is stored using properly secured cookies or security methods you should check that a session token is generated using a standard encryption algorithm make sure the session is not reused by verifying that the session token is invalid when logout and session expires reference links owasp session management cheat sheetalgorithms, key size and parameters report 2014 table 7 session manager security description and reference links error handling the purpose of error handling is to allow applications to provide security events related to monitoring, status check, and increase in permission, and not just creating logs security item description error handling you must ensure that common error handling formats and access method are used you must make sure exception handling is used on the code base to explain expected and unexpected error conditions you must ensure that other error handlers that can prepare all unprocessed exceptions are defined in case of an error, you must make sure that the message shown to the user does not contain application-related technical or sensitive information we recommend using separate error codes for error support table 8 error handling security description release check the following before releasing the application security item description release application must be signed and distributed with a valid certificate, and the private key must be properly protected debugging code and developer support code test code, back door, hidden settings, etc must be removed deployed applications should not output or record detailed errors or debugging messages libraries and frameworks etc used by applications should be checked for known vulnerabilities the equipment used for release must be able to respond to external threats viruses, hacking, etc it should be built in release mode a separate debug message should not be left from the application if you include binary, debug information should be removed if a vulnerability occurs after release, you should update the application as soon as possible and always keep the latest version table 9 release security description
Develop Smart Hospitality Display
docapplication security this topic describe the security of applications which run on samsung devices related info web security testing guide owasp secure software development lifecycle microsoft security development lifecycle sdl cwe list version 4 6 overview security is becoming an important issue with the increase of various smart devices in order to protect data from users and businesses, samsung devices are enhancing security in several layers, from hardware to software as samsung device applications are also software driven by samsung, the security needs to be taken into account samsung device applications can store important information such as code and key values and personal information of the user, which is an important resource that must be protected these resources can be leaked due to a variety of reasons, such as a simple mistake by a developer or hacking by an attacker in order to safeguard this, samsung device applications need to be developed according to secure by design in particular, the personal information of the user should comply with the policy related to the personal information for each country secure by design all software within the devices developed by samsung are based on the secure development lifecycle sdl model, and development step is divided into analysis, design, implementation, and testing, so vulnerability should be removed by performing a security review at each step from the same point of view, applications operating on samsung device should maintain the same security level for this, we recommend that you consider security in the application development phase by referring to the following step-by-step security review security in the analysis/design phase you should identify important information that is stored and transferred and ensure that the information is handled safely if you receive user input, you should review that you do not require more information than you need, and there is no issue with the input format you must identify the important information to be used and ensure that the information is displayed on vulnerable areas in the flow of the program in particular, when transmitting important information outside the device, you need to ensure that it communicates with the specified server through a secured channel at the time of designing, you must first define important information that needs to be protected and design it in a proper manner to protect it security in the implementation phase it must be implemented in compliance with security rules to prevent information in the software from being leaked through known vulnerabilities important information obtained in the design phase should be stored by applying security techniques such as encryption and make sure that it does not exist in plain text within the program establish secure coding rules for each language and proceed with development accordingly you must use only the minimum permissions required and notify the user of the permissions you use you should make sure that the security channel is properly set on the network, and the latest version of the technology is applied if you use encryption algorithms, you must use them securely using verified standard algorithms where vulnerabilities are not reported security in test phase security checks must be performed before deployment to prevent security issues and maintain security through maintenance after deployment before deployment, it is necessary to verify that there is no issue with analysis, design, and implementation when actually operated through simulated hacking, packet checking, etc after deployment, if a new vulnerability is found or a modification occurs in the security check, it must be patched and applied to all users as soon as possible security review process in order to maintain the security of the application ecosystem, samsung is performing security checks on the submitted applications samsung checks the risk or misuse cases that may occur due to the submitted applications, and if there is an issue, the deployment process can be stopped and the application submitter can be advised to fix it application security guide this section provides basic security guidelines to consider in the development of applications for a safe and reliable application running environment, we recommend that you proceed with the following points in the development phase data protection three key factors for data protection are confidentiality, integrity, and availability if an application sends or stores sensitive information, the application must encrypt data stored on these devices and protect it from attackers it is very important to protect sensitive data such as user credentials or personal information in application security if the mechanism of the operating system is not used correctly, sensitive data can be unintentionally exposed definition of sensitive data personally identifiable information that can be exploited for identity theft for example, resident registration number, social security number, credit card number, bank account number, health information, etc sensitive data that can lead to loss of honor and loss of money if leaked all data that must be protected for legal or compliance reasons security item description data protection sensitive data, such as passwords or pin data, should not be exposed through the user interface the key values used by the application must be hardcoded or not stored in plain text sensitive data should not be stored in an application container or external storage sensitive data should not be recorded in the application log sensitive data should not be shared with third parties unless it is necessary in the architecture sensitive data should not be shared with third parties unless it is necessary in the architecture keyboard cache must be disabled from the text input that processes sensitive data sensitive data should not be exposed even during internal communication you should ensure that the data stored in the client-side storage ex html5 local storage, session store, indexeddb, regular cookie, or flash cookie does not contain sensitive data make sure that you have provided clear t&c for the collection and use of the provided personal information and that you have provided selective consent to the use of that data before you use it reference links european union general data protection regulation gdpr overvieweuropean union data protection supervisor - internet privacy engineering networkapplication development privacy guide table 1 data protection security description and reference links authentication if there is a feature to log-in to the remote service by the user, it must be configured through security design even when most of the logic is operating on a remote service, the device must also meet security requirements on how to manage user accounts and sessions security item description authentication if the application provides remote services to the user, user name and password authentication must be performed from the remote service if you use status storage session management, the remote service must authenticate the client request using the randomly generated session identifier without sending the user's credentials if using stateless token-based authentication, the remote services must provide signed tokens using security algorithms when a user logs out, the remote service must end the existing session table 2 authentication security description access control an application can access a resource only if it has access to it security item description access control application must require only the minimum access required application must use the privilege that match the permissions and specify the privileges used when accessing user data, make sure that the principle of minimum access privilege requirement is followed applications must have access to apis, data files, urls, controllers, directories, services, and other resources with minimal access required you should verify and process all input from external resources and users this should include data received through the ui, a user-defined url, inter-process communication ipc , etc if an application uses a completely unprotected custom url, you should not export sensitive information important data or apis must be protected from user access other than data owners reference links owasp cheat sheet access control table 3 access control security description and reference links communications when the network is used, the application should not display the transmitted/received content using a secured channel security item description communications data must be encrypted on the network using tls transport layer security security channels must be used consistently throughout the application the setting of the security channel must be configured to protect information safely the data being transmitted must be protected from being snatched/taken over in the middle ex defence against man in the middle attack reference links owasp – tls cheat sheet table 4 communications security description and reference links input validation you must defend the command insertion attack through validating the validity of input value input value validation should be considered at all stages of development security item description input validation input values must process the data based on type and content, applicable laws, regulations and other policy compliance, and define how to handle it you must ensure that input validation is performed on a trusted service layer you need to check whether it protects against parameter attacks such as mass parameter allocation attacks or unsafe parameter allocation all possible input values e g html form fields, rest requests, url parameters, http headers, cookies, batch files, rss feeds, etc must be checked using validation ex whitelist you should check whether the values entered are in the correct form in well-defined schemas, including allowed characters, lengths, and patterns the url redirection and forward should display a warning that only whitelist targets are allowed or that you are connecting with potentially untrusted content make sure you use memory safety strings, secure memory copy, and pointer calculation to detect or prevent stacks, buffers, or heap overflows in order to prevent integer overflow, you need to make sure that sign, range, and input validation techniques are used reference links xml external entity xxe prevention cheat sheetreducing xss by way of automatic context-aware escaping in template systems table 5 input validation security description and reference links password management in case of application with different user password, security settings are required for them security item description password management you must ensure that the password does not contain spaces and cut/copy is not performed in the password change feature, you should check that the user's current password and new password are required it is recommended to provide a password strength meter so that users can set a stronger password it is also recommended to provide rules that limit allowed character types uppercase letter, numeric, special characters you should check that it is recommended to change your user password within the right due date do not store the user password in the application's properties or settings file in plain text or recoverable form passwords must be stored, transferred, and compared in a hashed state using a standard hash function to prevent random attacks, you should use the login limit number of login or captcha default password should not be generated make sure you do not show the key information, like passwords in the log reference links cwe-804 guessable captchacwe-836 use of password hash instead of password for authenticationcwe-257 storing passwords in a recoverable formatcwe-261 weak encoding for passwordcwe-263 password aging with long expiration table 6 password management security description and reference links session manager a session is a technique for controlling and maintaining the status of a user or device interacting with one user in a web application a session has a unique value for each user and cannot guess or share that value security item description session manager you should check that the session token is not exposed/displayed in the application's url parameter or error message make sure the application generates a new session token from user authentication you should check that the session token is stored using properly secured cookies or security methods you should check that a session token is generated using a standard encryption algorithm make sure the session is not reused by verifying that the session token is invalid when logout and session expires reference links owasp session management cheat sheetalgorithms, key size and parameters report 2014 table 7 session manager security description and reference links error handling the purpose of error handling is to allow applications to provide security events related to monitoring, status check, and increase in permission, and not just creating logs security item description error handling you must ensure that common error handling formats and access method are used you must make sure exception handling is used on the code base to explain expected and unexpected error conditions you must ensure that other error handlers that can prepare all unprocessed exceptions are defined in case of an error, you must make sure that the message shown to the user does not contain application-related technical or sensitive information we recommend using separate error codes for error support table 8 error handling security description release check the following before releasing the application security item description release application must be signed and distributed with a valid certificate, and the private key must be properly protected debugging code and developer support code test code, back door, hidden settings, etc must be removed deployed applications should not output or record detailed errors or debugging messages libraries and frameworks etc used by applications should be checked for known vulnerabilities the equipment used for release must be able to respond to external threats viruses, hacking, etc it should be built in release mode a separate debug message should not be left from the application if you include binary, debug information should be removed if a vulnerability occurs after release, you should update the application as soon as possible and always keep the latest version table 9 release security description
We use cookies to improve your experience on our website and to show you relevant advertising. Manage you settings for our cookies below.
These cookies are essential as they enable you to move around the website. This category cannot be disabled.
These cookies collect information about how you use our website. for example which pages you visit most often. All information these cookies collect is used to improve how the website works.
These cookies allow our website to remember choices you make (such as your user name, language or the region your are in) and tailor the website to provide enhanced features and content for you.
These cookies gather information about your browser habits. They remember that you've visited our website and share this information with other organizations such as advertisers.
You have successfully updated your cookie preferences.