• Title/Summary/Keyword: 제품식별코드

Search Result 18, Processing Time 0.022 seconds

Business Model based Requirement Analysis from developing An Embedded System through Product-Line (제품-계열적 임베디드 시스템 개발을 위한 비즈니스 기반 요구분석)

  • Hong, Ki-Sam;Yoon, Hee-Byung
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07b
    • /
    • pp.331-333
    • /
    • 2005
  • 제품-계열 방법은 소프트웨어 개발시 나오는 산출물들을 핵심자산으로 만들어 놓고, 이를 체계적으로 재사용할 수 있도록 지원하기 위한 프레임워크 역할을 한다. 그 초점은 소프트웨어 아키텍처나 상세설계 또는 코드에 맞추어져 있어서 임베디드 시스템 개발시 임베디드라는 특성화된 요구사항을 분석하고, 도출 하는데 미흡한 부분이 있다. 본 논문에서는 임베디드 시스템 개발시 요구분석 단계에 IDEF0 비즈니스 모델을 적용한 Feature 도출 및 분석 방법을 제안한다. 제안된 방법은 도메인 요구사항을 관리하는 측면에서 전체시스템에 대한 정확한 요구사항 도출과 분석이 가능하고, 도출된 Feature에 대한 공통성과 가변성을 식별 하는데 효율적이다.

  • PDF

Security Authentication Technique using Hash Code in Wireless RFID Environments (무선 RFID 환경에서 해시코드를 이용한 EPC 코드 보안)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1077-1082
    • /
    • 2019
  • The development of computing technology and networking has developed into a fundamental technology of the Fourth Industrial Revolution, which provides a ubiquitous environment. In the ubiquitous environment, the IoT environment has become an issue so that various devices and the things can be actively accessed and connected. Also, the RFID system using the wireless identification code attaches an RFID tag to the object, such as the production and distribution of products. It is applied to the management very efficiently. EPCglobal is conducting a research on RFID system standardization and various security studies. Since RFID systems use wireless environment technology, there are more security threats than wire problems. In particular, failure to provide confidentiality, indistinguishability, and forward safety could expose them to various threats in the Fourth Industrial Revolution. Therefore, this study analyzes the standard method of EPCgolbal and proposes RFID security method using hash code that can consider the amount of computation.

A study on enhanced M-ary QT algorithm using collision bits position in RFID system (RFID 시스템에서 충돌비트 위치를 이용한 M-ary QT 알고리즘 향상에 관한 연구)

  • Kim, Kwan-Woong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.109-117
    • /
    • 2016
  • The most important mission of RFID reader is identify EPC (Electronic Product Code) of RFID tag of products that located within distinguishable range of RFID reader. RFID reader transmits query message to RFID tags through wireless channel and RFID tags send unique EPC to response its query message simultaneously. therefore tag collision occurred frequently. RFID tags collision resolution algorithm required to apply RFID technology to various industries. In this paper, we propose enhanced M-ary algorithm that collision bits location is used by not only RFID reader but also tags. the main feature of the proposed algorithm is that integrate multiple query message of M-ary QT algorithm to the single query message by analyze multiple response messages from tags. the simulation results show that the proposed algorithm give better performance than M-ary QT algorithm in terms of the number of query-response, identification efficiency and communication overhead.

Flexible RFID의 기술 동향

  • 백경갑;주병권
    • Electrical & Electronic Materials
    • /
    • v.17 no.8
    • /
    • pp.20-24
    • /
    • 2004
  • 무선 인식기술이라고 불리는 RFID(Radio Frequency Identification) 기술은 RF 신호를 이용하여 객체들을 식별하는 비접촉 기술 중의 하나이다. RFID를 사용하여 대상을 인증하는 방법은 여러 가지가 있으나 일반적으로 안테나에 마이크로칩을 부착하여 제품 확인을 위한 일련번호나 다른 정보를 삽입하여 사용한다. RFID는 바코드나 적외선 시스템과 달리 리더와 태그(Tag)간에 가시선이 요구되지 않아 사람이 직접 작업하기 어려운 환경 등에 적합하며,바코드나 마그네틱 카드처럼 직접 스캐닝 할 필요가 없다. 특히, 인터넷의 지속적인 성장, RFID 태그 칩의 저가격 구현, 상품코드의 국제 표준화 등의 환경변화로 인해 RFID 기술은 다양한 산업분야에서 실용화를 가능하게 만들고 있다. 이러한 예로, TI, 히타치, 인피니온, 필립스와 같은 기업들은 내년 중으로 10센트 이하 가격대의 상용 RFID 칩을 출시한다는 계획을 세우고 있으며 2006년 정도면 바코드 수준의 원가 경쟁력이 확보될 것이라는 전망도 조심스럽게 제기되고 있다. 또한 2004년에는 유통분야에서 RFID의 시범 사업이 주류를 이룬 후 2005년부터는 본격적인 성장기에 돌입할 수 있을 것으로 기대된다.(중략)

  • PDF

Attendance Management System using Iris Recognition (홍채인식을 이용한 근태관리 시스템)

  • Lee, Woo-Jin;Byon, Ju-Roung;Gang, Byung-Gil;Bae, You-Suk
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10c
    • /
    • pp.455-458
    • /
    • 2007
  • 생체 인식에 있어서 가장 높은 성능을 가진 것으로 알려진 홍채인식 시스템은 고도의 보안성을 요구하는 시스템에 적합하지만 높은 하드웨어 비용 때문에 널리 보급되고 있지는 못하고 있는 실정이다. 한편, 단초점 CMOS센서는 높은 하드웨어 비용을 보완할 수 있고 개인을 식별하기에 충분한 해상도를 제공한다. 본 논문에서는 단초점 센서를 사용하여 하드웨어 비용을 줄이고 홍채패턴의 코드화는 상용화된 제품에 사용되어 이미 안정적이라 평가받은 John G. Daugman 의 Gabor Wavelet Transform 을 기반으로 하여 홍채인식 시스템을 구현하고 이를 실생활에 적용할 수 있는 근태관리 시스템을 개발하였다.

  • PDF

Construction of a Toolkit for Customizing a PDM Framework (PDM 프레임워크 재 정의 도구 구축)

  • Kim, Jeong-Ah
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.1
    • /
    • pp.38-47
    • /
    • 2001
  • PDM is an integrated solution for managing various kinds of document and information for a whole life~cycle of product management. PDM system spans a huge and complex area and requires so many efforts and budgets for development. A framework has been considered a promising way to improve productivity by reusing the software architecture, not just one part of the design or just source code. This was the reaSon why we developed PDM (Product Data Management) framework. Framework can reduce the time and efforts to develop a new PDM application. However, it also requires supporting environment since a framework is a big set of classes where their interactions are so complex. With this supporting environment, it is easy to understand the framework at a glance and easy to identify what hot spots to be refined to meet new requirements. In this paper, a new framework-supporting reuse environment based on the meta-repository was constructed for easy and convenient reuse.

  • PDF

Suggestion of Guidelines for Separation System According to Recycling Separate Discharge (재활용 분리배출에 따른 분리 체계 가이드라인 제안)

  • Moon, Seon-Young;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.399-405
    • /
    • 2022
  • This study suggests focused in user-centered design which are new separate discharge system that must recycle in paper materials. I searched cases in Korea's current law and regulation in recycling disposal guidelines and already succeed cases in each city that are Asia, Europe, and North America. Suggesting focused in user-centered design of ID(Identification) separate discharge system due to user's good participations, feedbacks of participation's results, and well-organized in awarding. This system consists of visual individual's ID(Identification) that are stickered in only used bag. User must recycle in separate discharge system only used bags, and results must visualized in each user and rewards to user. This separate discharge system is meaning to stimulate user's good participations.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF