• Title/Summary/Keyword: 스마트카드데이터

Search Result 113, Processing Time 0.037 seconds

Design and Implementation of Office Security and Automation System Using RFID (RFID를 이용한 오피스 보안 및 자동화 시스템의 설계 및 구현)

  • Lee, Seung-Cheol;Ko, Myeong-Cheol;Kim, Jung-Hwan;Han, Deok-Soo;Yang, Kwon-Woo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.560-565
    • /
    • 2006
  • 최근 보안에 대한 사회적인 관심이 높아지면서 RFID는 기존의 스마트카드와 바코드 시스템이 갖는 여러 기능적인 한계점들을 극복함으로써 향 후 이를 대체할 보안 신기술로서 인식되고 있다. 현재 사무실 출입의 보안을 위해 대표적으로 사용되고 있는 출입문 인증시스템은 일단 출입문을 통과한 사용자들에 대해서는 사무실 내부의 모든 요소들이 무방비 상태로 노출되어 보안상의 허점이 발생한다. 또한 사무실 내 개개의 PC에 단말기를 설치하여 사용하는 스마트카드 인증시스템 역시도 빈번한 자리 이동에 따른 카드 인증 절차의 번거로움으로 인해 근거리 이동시 PC를 잠그지 않는 경우가 빈번하게 발생함으로써 사용자 PC에 저장된 보안이 필요한 데이터들에 대한 침해 우려가 발생한다. 본 논문에서는 다중사용자 환경에서 각각의 사용자가 소지한 RFID 태그를 이용하여 기존 카드시스템과 같이 복잡한 인증절차가 필요 없고 빈번한 자리 이동이 발생하더라도 추가적인 인증작업이 없이 매번 자동으로 컴퓨터 시스템을 잠금 및 해제시킴으로써 인증과정에 따른 사용자의 부담을 줄일 수 있는 보안시스템을 제시한다. 또한 사용자가 출근과 동시에 매일 일상적으로 반복되는 사무실에서의 컴퓨터 작업에 대한 효율을 높이기 위한 사무 자동화 시스템을 구현한다.

  • PDF

A Model for Analyzing Time-Varying Passengers' Crowdedness Degree of Subway Platforms Using Smart Card Data (스마트카드자료를 활용한 지하철 승강장 동적 혼잡도 분석모형)

  • Shin, Seongil;Lee, Sangjun;Lee, Changhun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.5
    • /
    • pp.49-63
    • /
    • 2019
  • Crowdedness management at subway platforms is essential to improve services, including the prevention of train delays and ensuring passenger safety. Establishing effective crowdedness mitigation measures for platforms requires accurate estimation of the congestion level. There are temporal and spatial constraints since crowdedness on subway platforms is assessed at certain locations every 1-2 years by hand counting. However, smart cards generate real-time big data 24 hours a day and could be used in estimating congestion. This study proposes a model based on data from transit cards to estimate crowdedness dynamically. Crowdedness was defined as demand, which can be translated into passengers dynamically moving along a subway network. The trajectory of an individual passenger can be identified through this model. Passenger flow that concentrates or disperses at a platform is also calculated every minute. Lastly, the platform congestion level is estimated based on effective waiting areas for each platform structure.

Real-time CRM Strategy of Big Data and Smart Offering System: KB Kookmin Card Case (KB국민카드의 빅데이터를 활용한 실시간 CRM 전략: 스마트 오퍼링 시스템)

  • Choi, Jaewon;Sohn, Bongjin;Lim, Hyuna
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.1-23
    • /
    • 2019
  • Big data refers to data that is difficult to store, manage, and analyze by existing software. As the lifestyle changes of consumers increase the size and types of needs that consumers desire, they are investing a lot of time and money to understand the needs of consumers. Companies in various industries utilize Big Data to improve their products and services to meet their needs, analyze unstructured data, and respond to real-time responses to products and services. The financial industry operates a decision support system that uses financial data to develop financial products and manage customer risks. The use of big data by financial institutions can effectively create added value of the value chain, and it is possible to develop a more advanced customer relationship management strategy. Financial institutions can utilize the purchase data and unstructured data generated by the credit card, and it becomes possible to confirm and satisfy the customer's desire. CRM has a granular process that can be measured in real time as it grows with information knowledge systems. With the development of information service and CRM, the platform has change and it has become possible to meet consumer needs in various environments. Recently, as the needs of consumers have diversified, more companies are providing systematic marketing services using data mining and advanced CRM (Customer Relationship Management) techniques. KB Kookmin Card, which started as a credit card business in 1980, introduced early stabilization of processes and computer systems, and actively participated in introducing new technologies and systems. In 2011, the bank and credit card companies separated, leading the 'Hye-dam Card' and 'One Card' markets, which were deviated from the existing concept. In 2017, the total use of domestic credit cards and check cards grew by 5.6% year-on-year to 886 trillion won. In 2018, we received a long-term rating of AA + as a result of our credit card evaluation. We confirmed that our credit rating was at the top of the list through effective marketing strategies and services. At present, Kookmin Card emphasizes strategies to meet the individual needs of customers and to maximize the lifetime value of consumers by utilizing payment data of customers. KB Kookmin Card combines internal and external big data and conducts marketing in real time or builds a system for monitoring. KB Kookmin Card has built a marketing system that detects realtime behavior using big data such as visiting the homepage and purchasing history by using the customer card information. It is designed to enable customers to capture action events in real time and execute marketing by utilizing the stores, locations, amounts, usage pattern, etc. of the card transactions. We have created more than 280 different scenarios based on the customer's life cycle and are conducting marketing plans to accommodate various customer groups in real time. We operate a smart offering system, which is a highly efficient marketing management system that detects customers' card usage, customer behavior, and location information in real time, and provides further refinement services by combining with various apps. This study aims to identify the traditional CRM to the current CRM strategy through the process of changing the CRM strategy. Finally, I will confirm the current CRM strategy through KB Kookmin card's big data utilization strategy and marketing activities and propose a marketing plan for KB Kookmin card's future CRM strategy. KB Kookmin Card should invest in securing ICT technology and human resources, which are becoming more sophisticated for the success and continuous growth of smart offering system. It is necessary to establish a strategy for securing profit from a long-term perspective and systematically proceed. Especially, in the current situation where privacy violation and personal information leakage issues are being addressed, efforts should be made to induce customers' recognition of marketing using customer information and to form corporate image emphasizing security.

Model for personal information protection from smart phone synchronization (스마트폰 동기화의 개인정보 유출방지 모델)

  • Maeng, Ho-Kyu;Oh, Tae-Won
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.44-47
    • /
    • 2011
  • 본 연구는 스마트폰 사용자들의 개인정보유출 경로와 스마트폰과 PC에서 동기화가 이뤄질 때 개인정보 유출 방지에 관하여 기술한다. 스마트폰에서 노트북이나 데스크탑 PC로 동기화시킨 후 로컬 컴퓨터 내에 남아있는 스마트폰 사용자의 모든 정보는 침입자들의 정보라고 하여도 과언이 아니다. 특히 스마트폰 사용자의 PC가 DDos에 감염된 좀비 PC라면 스마트폰 사용자의 취약성은 더욱 더 높아질 것이다. 최근 OTP카드의 프로그램을 만드는 최고 보안등급을 가진 RSA사 조차도 해킹을 당했다고 한다. 스마트폰 사용자들의 개인정보는 더욱 취약하다는 것을 반증하는 것이다. 본 연구에서는 개인정보 유출을 막기위해 동기화 후 PC에 남아있는 데이터를 처리하는 방법을 제안한다.

Formal Analysis of Authentication System based on Password using Smart Card (스마트카드를 이용한 패스워드 기반 인증시스템 정형분석)

  • Kim, Hyun-Seok;Kim, Ju-Bae;Jeong, Yeon-Oh;Choi, Jin-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06a
    • /
    • pp.138-139
    • /
    • 2008
  • 인터넷의 범용적인 사용으로 많은 사용자들이 분산된 컴퓨팅 환경에서 원격 서버에 접속하는 일이 빈번해 지고 있다. 하지만 인증된 보호시스템 없이 안전하지 않은 채널을 통한 데이터의 전송은 재생공격이나 오프라인 패스워드 공격 및 가장공격등과 같은 문제점들에 노출되어 있다. 이에 따라 악의적인 공격들을 막기 위해 스마트카드를 이용한 인증프로토콜들에 대해 활발히 연구되고 있다. 본 논문은 패스워드 기반 사용자 인증시스템의 취약성을 분석하고 이에 대해 개선된 사용자 인증 시스템을 제안한다.

  • PDF

RBAC-Based Security Policy Model for SmartCard System (스마트카드 시스템을 위한 RBAC기반의 보안정책모델)

  • Lee Jungrim;Kwon Gihwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.11a
    • /
    • pp.331-334
    • /
    • 2004
  • 공통평가기준(CC, Common Criteria)의 고등급 평가를 받으려면 정형화된 보안정책 모델이 필요하다. 보안정책 중 하나인 접근제어 정책은 시스템의 자원과 데이터의 접근을 중재하여 오직 허가된 접근만 가능하도록 한다. 오늘날 임의적 접근제어(DAC, Discretionary Access Control)와 강제적 접근제어(MAC, Mandatory Access Control)의 대안으로 주목받는 역할기반 접근제어(RBAC, Role-Based Access Control)는 기업이나 정부의 다양한 조직체계를 반영하는 데 적합한 접근제어 정책이다. 다양한 기능과 보안성이 강조되는 스마트카드 시스템의 접근제어정책으로 RBAC을 적용하고 그에 관한 그래프형태의 정형화된 SPM을 보인다.

  • PDF

A Performance Analysis between Rollback Journal mode and WAL mode in SQLite-based Application (SQLite기반 애플리케이션에서 롤백 저널 모드와 WAL 모드의 성능 비교 분석)

  • Kim, Ki-Ho;Oh, Gihwan;Lee, Sang-Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.1146-1148
    • /
    • 2015
  • 현재 전 세계적으로 수많은 모바일 스마트 기기를 사용하고 있다 스마트 기기 대부분 많은 양의 데이터를 처리하기 위해서 SQLite 데이터베이스를 기반으로 사용하고 있다. 본 논문에서는 SQLite가 제공하는 원자성 보장을 위한 두 가지 저널링 모드에 따른 성능 차이에 대하여 비교 분석한다. 안드로이드 모바일 기기에서 Mobibench 애플리케이션을 통해 롤백 저널 (delete 모드)와 WAL 모드의 트랜잭션 처리 성능을 비교해 본 결과 insert시 각각 약 22TPS,49TPS로 WAL 방식이 약 2.5배 더 좋은 TPS를 확인할 수 있었고, 서로 다른 세 종류의 SD카드 환경에서 실제 카카오톡 과 gmail의 쿼리를 추출하여 롤백 저널 (delete 모드) 와 WAL 모드의 수행시간을 측정해본 결과, 모든 SD카드 환경에서 애플리케이션 종류와 상관없이 WAL 모드가 롤백 저널 모드보다 약 2배 빠른 것을 확인 할 수 있었다.

Design and Implementation of Applet for Multi-Users File Access based on Java Card (자바카드기반 다중 사용자 파일접근에 대한 애플릿 설계 및 구현)

  • Kim, Bum-Sik
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.5
    • /
    • pp.481-486
    • /
    • 2006
  • Whereas conveniences deriving from the development of information and telecommunication technology increase, information outflow and illegal data use are also rapidly on the rise. Consequently, many studies to prevent illegal information outflow are currently under way, and the use of Smart Card is in steep jump. Recently, Java Card is diffused fast as an alternative to complement the technical problems of the Smart Card. This paper designed and Implementation the system for multi-users authentication and file access control by user through designing a Java Card applet that is used for information protection and in various application fields. For allowing a file access competence, each user's file access competence is processed via drawing up the access condition table in the applet. Therefore, illegal correction exposure and destruction of information, which become the concerns when multi-users have an access, can be prevented. In addition its application becomes possible in the system requiring multi-users certifications.

  • PDF

A Study on Realization of System in Wireless Location Awareness Technology Using Ubiquitous Active RFID (Active RFID를 이용한 실내 무선 위치 인식 기반 스마트 센서 빌딩 구현에 관한 연구)

  • Jung, Chang Duk
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.3
    • /
    • pp.83-93
    • /
    • 2006
  • This paper is wireless location awareness technology using RFID. We investigates the Location of the received Signal strength reported by RF Analyses of the data are performed to understand the underlying features of location fingerprints. The system is performed factors the extreme environmental Emit signal, which consists of a unique 5000 Terminals. The Location Service have become very popular in many service industries, purchasing and distribution logistics, industry, manufacturing companies and a parking place. The Technically optimal Solution would be the storage of Intelligence information in the most common form of electronic data-carrying device in use in everyday life is the smart card based upon a contact field (telephone smart card, bank cards). The method of an indoor positioning experiment system is compared using measured Location data and a charge of service. The result of research showed the following: first, to check out the mechanism between benefit of system installation and operation of Active RFID. Second, it contributed on indoor wireless location intelligence system efficiency.

  • PDF

Estimation of Mass Rapid Transit Passenger's Train Choice Using a Mixture Distribution Analysis (통행시간 기반 혼합분포모형 분석을 통한 도시철도 승객의 급행 탑승 여부 추정 연구)

  • Jang, Jinwon;Yoon, Hosang;Park, Dongjoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.5
    • /
    • pp.1-17
    • /
    • 2021
  • Identifying the exact train and the type of train boarded by passengers is practically cumbersome. Previous studies identified the trains boarded by each passenger by matching the Automated Fare Collection (AFC) data and the train schedule diagram. However, this approach has been shown to be inefficient as the exact train boarded by a considerable number of passengers cannot be accurately determined. In this study, we demonstrate that the AFC data - diagram matching technique could not estimate 28% of the train type selected by passengers using the Seoul Metro line no.9. To obtain more accurate results, this paper developed a two-step method for estimating the train type boarded by passengers by applying the AFC data - diagram matching method followed by a mixture distribution analysis. As a result of the analysis, we derived reasonable express train use/non-use passenger classification points based on 298 origin-destination pairs that satisfied the verification criteria of this study.