• Title/Summary/Keyword: 지문 센서

Search Result 83, Processing Time 0.036 seconds

Development of a system for children's safe back and forth school (아동의 안전 등하원을 위한 시스템 개발)

  • Kim, Dayun;Kang, YuBin;Shin, GaYeon;An, Seongmin;Lee, Chang-Ho;Shim, Hyeon-min
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.236-238
    • /
    • 2020
  • 본 논문에서는 셔틀버스 내부 갇힘 사고 방지 및 사고 발생 시 빠른 처리를 위한 시스템을 제안한다. 셔틀버스 운행 종료 후 운전자가 차량 내부에 남아있는 아동 확인 후 맨 뒷좌석에 부착된 지문인식을 이용한 슬리핑 차일드 체크를 실시한다. 또는 사고 발생 시 차량 내 적외선 인체 감지 센서로 감지한 후 카메라로 촬영한다. 촬영 영상은 GPS 모듈로 파악한 현재 위치와 함께 앱에서 확인할 수 있다.

Gradual Certification Correspond with Sensual Confidence by Network Paths (본인인증의 네트워크 경로와 감성신뢰도에 연동한 점진적 인증방법)

  • Suh, Hyo-Joong
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.12
    • /
    • pp.955-963
    • /
    • 2017
  • Nowadays, fintech becomes the key technology of the mobile banking and payments. Financial market is moved to fintech-based non-face-to-face trade/payment from traditional face-to-face process in Korea. Core of this transition is the smartphones, which have several sensitive sensors for personal identifications such as fingerprint and iris recognition sensors. But it has some originated security risks by data path attacks, for instance, hacking and pharming. Multi-level certification and security systems are applied to avoid these threats effectively, while these protections can be cause of some inconvenience for non-face-to-face certifications and financing processes. In this paper, I confirmed that it have sensible differences correspond with the data connection paths such as WiFi networks and mobile communication networks of the smartphones, and I propose a gradual certification method which alleviates the inconvenience by risk-level definitions of the data-paths.

Design of a Vision Chip for Edge Detection with an Elimination Function of Output Offset due to MOSFET Mismatch (MOSFET의 부정합에 의한 출력옵셋 제거기능을 가진 윤곽검출용 시각칩의 설계)

  • Park, Jong-Ho;Kim, Jung-Hwan;Lee, Min-Ho;Shin, Jang-Kyoo
    • Journal of Sensor Science and Technology
    • /
    • v.11 no.5
    • /
    • pp.255-262
    • /
    • 2002
  • Human retina is able to detect the edge of an object effectively. We designed a CMOS vision chip by modeling cells of the retina as hardwares involved in edge detection. There are several fluctuation factors which affect characteristics of MOSFETs during CMOS fabrication process and this effect appears as output offset of the vision chip which is composed of pixel arrays and readout circuits. The vision chip detecting edge information from input image is used for input stage of other systems. Therefore, the output offset of a vision chip determine the efficiency of the entire performance of a system. In order to eliminate the offset at the output stage, we designed a vision chip by using CDS(Correlated Double Sampling) technique. Using standard CMOS process, it is possible to integrate with other circuits. Having reliable output characteristics, this chip can be used at the input stage for many applications, like targe tracking system, fingerprint recognition system, human-friendly robot system and etc.

FIDO Platform of Passwordless Users based on Multiple Biometrics for Secondary Authentication (암호 없는 사용자의 2차 인증용 복합생체 기반의 FIDO 플랫폼)

  • Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.65-72
    • /
    • 2022
  • In this paper, a zero trust-based complex biometric authentication was proposed in a passwordless environment. The linkage of FIDO 2.0 (Fast IDENTITY Online) transaction authentication platforms was designed in conjunction with metaverse. In particular, it was applied with the location information of a smart terminal according to a geomagnetic sensor, an accelerator sensor, and biometric information for multi-factor authentication(MFA). At this time, a FIDO transaction authentication platform was presented for adaptive complex authentication with user's environment through complex authentication with secondary authentication based on situational awareness such as illuminance and temperature/humidity. As a result, it is possible to authenticate secondary users based on zero trust with behavior patterns such as fingerprint recognition, iris recognition, face recognition, and voice according to the environment. In addition, it is intended to check the linkage result of the FIDO platform for complex integrated authentication and improve the authentication accuracy of the linkage platform for transaction authentication using FIDO2.0.

Remotely Controllable Smart Door Lock (원격 제어가 가능한 스마트 도어락)

  • Choi, Duk-Kyu;Lee, Sang-Bin;Park, Jin-Sol;Kwon, Yong-Min;Kim, Jun-Bin;Kwon, Min-Ji;Jang, Jae-Min;Jeong, woo-won
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.261-262
    • /
    • 2020
  • 현대에 흔히 쓰이는 도어락은 안전과 보안등의 목적과 편리함을 목적에 두고 있다. 실제로 그전에 쓰던 열쇠보다 더 편리하고 분실염려도 없고 복제키 등으로 인한 사건, 사고로 인한 범죄율이 줄어들었다. 도어락은 사용자가 손으로 직접 비밀번호를 입력하여 잠금을 해제하는 방식이고 이 과정에서 도어락에 지문이나 표시가 남으며 비밀번호가 주위에 쉽게 노출될 수 있다. 본 논문은 위의 문제를 해결하기 위해 아두이노로 라즈베리파이와 앱을 무선 통신하여 '원격 제어가 가능한 스마트 도어락'을 고안했다. 아두이노 와이파이 모듈을 통해 스마트폰으로 도어락을 원격으로 제어할 수 있으며 라즈베리파이 카메라 모듈과 초음파 센서를 통해 도어락에 접근하는 사람을 감지하고 확인할 수 있다. 이 기능으로 범죄를 예방할 수 있으며 자녀들의 귀가 여부도 확인할 수 있고 문을 열어줘야 할 상황에 비밀번호 노출없이 문을 열어줄 수 있다.

  • PDF

Development of Special Asset Management System Using RFID (RFID를 이용한 특수 자산 관리 시스템 개발)

  • Han, Sang-Hoon;Min, Jang-Geun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.6
    • /
    • pp.33-41
    • /
    • 2011
  • RFID technology is already used in the various application fields such as identification card, traffic card and etc. Many RFID application systems using UHF have been developed in the field of asset management, logistics and security. Because a human being can make mistakes, we need the system that can efficiently manage the special assets such as small arms, jewelry and medicine and can monitor them in real time. In this paper, we proposed a special assets management system to keep assets in safe custody, to monitor their safety status in real time and to manage distribution channels and history of those assets. The developed system is called Smart Cabinet because it has cabinet's form. Smart Cabinet integrates such technologies as RFID, smart card, fingerprint recognition, several sensors and LCD display in order to provide the functions for special asset management. Those functions include condition monitoring of assets, traceability management, distribution channels and security logs, which are to interact with a management server. The article demonstrated the potentiality of RFID by presenting special asset management solutions dedicated to guns and medicine management, and also showed the effectiveness and possibility of those solutions.

생체신호를 이용한 텔레바이오인식기술 동향 및 전망

  • Kim, Jason;Lee, Saewoom
    • Review of KIISC
    • /
    • v.26 no.4
    • /
    • pp.41-46
    • /
    • 2016
  • 전통적으로 바이오인식기술은 출입국심사(전자여권, 승무원 승객 신원확인), 출입통제(도어락, 출입통제 근태관리), 행정(무인민원발급, 전자조달), 사회복지(미아찾기, 복지기금관리), 의료(원격의료, 의료진 환자 신원확인), 정보통신(휴대폰 PC 인터넷 인증), 금융(온라인 뱅킹, ATM 현금인출) 등 다방면에서 폭넓게 보급되어 실생활에서 널리 활용되고 있다. [그림1]은 신체적 특징(Physiological biometrics)과 행동적 특징(Behavioral biometrics)을 이용한 사용자 인증기술인 바이오인식기술의 유형과 함께 각 기술별 보안취약점(괄호 안 빨강색글자)을 나타내고 있다. 최근 들어, 모바일 지급결제서비스 ATM 인출기 인터넷전문은행 등과 같은 핀테크 분야에서 비대면 인증기술로 바이오인식기술이 각광을 받기 시작했다. 한편, 가짜지문 등 기존의 신체적 특징을 이용한 바이오인식기술의 위변조 위협에 대한 우려 존재함에 따라 뇌파 심전도 근전도 맥박 등 살아있는 사람의 행동적(신체의 기능적) 특징을 이용한 생체신호를 이용하여 비대면 인증기술로서 활용하기 위하여 주요 선진국에서 차세대 바이오인식 기술개발이 가속화되고 있는 추세이다.[1] 또한, 이러한 생체신호는 최근에 삼성전자, LG전자, 애플 등에서 스마트워치를 통해 심장박동수를 측정하고 스마트폰을 통하여 모바일 지급결제, 헬스케어 등과 같은 IoT 모바일 융복합 응용서비스에 활용될 전망이다. 본고에서는 뇌파 심전도(심박수)와 같은 생체신호를 측정하는 스마트워치 밴드형 의복형 또는 패치형태의 웨어러블 디바이스와 같은 생체신호센서, 생체신호 인증기술 및 관련표준화 동향을 고찰해 보기로 한다. 국내외 관련기술과 표준화 동향을 면밀히 분석하여 지난 2015년 5월29일에 발족한 국내외 전문가그룹인 KISA"모바일 생체신호 인증기술 표준연구회"(이하 KISA 표준연구회)가 구심점이 되어 한국형 생체신호를 이용한 차세대 텔레바이오인식기술에 대한 연구개발과 국내외 표준화 추진에 박차를 가할 계획이다.

Contactless Biometric Using Thumb Image (엄지손가락 영상을 이용한 비접촉식 바이오인식)

  • Lim, Naeun;Han, Jae Hyun;Lee, Eui Chul
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.12
    • /
    • pp.671-676
    • /
    • 2016
  • Recently, according to the limelight of Fintech, simple payment using biometric at smartphone is widely used. In this paper, we propose a new contactless biometric method using thumb image without additional sensors unlike previous biometrics such as fingerprint, iris, and vein recognition. In our method, length, width, and skin texture information are used as features. For that, illumination normalization, skin region segmentation, size normalization and alignment procedures are sequentially performed from the captured thumb image. Then, correlation coefficient is calculated for similarity measurement. To analyze recognition accuracy, genuine and imposter matchings are performed. At result, we confirmed the FAR of 1.68% at the FRR of 1.55%. In here, because the distribution of imposter matching is almost normal distribution, our method has the advantage of low FAR. That is, because 0% FAR can be achieved at the FRR of 15%, the proposed method is enough to 1:1 matching for payment verification.

On Pattern Kernel with Multi-Resolution Architecture for a Lip Print Recognition (구순문 인식을 위한 복수 해상도 시스템의 패턴 커널에 관한 연구)

  • 김진옥;황대준;백경석;정진현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12A
    • /
    • pp.2067-2073
    • /
    • 2001
  • Biometric systems are forms of technology that use unique human physical characteristics to automatically identify a person. They have sensors to pick up some physical characteristics, convert them into digital patterns, and compare them with patterns stored for individual identification. However, lip-print recognition has been less developed than recognition of other human physical attributes such as the fingerprint, voice patterns, retinal at blood vessel patterns, or the face. The lip print recognition by a CCD camera has the merit of being linked with other recognition systems such as the retinal/iris eye and the face. A new method using multi-resolution architecture is proposed to recognize a lip print from the pattern kernels. A set of pattern kernels is a function of some local lip print masks. This function converts the information from a lip print into digital data. Recognition in the multi-resolution system is more reliable than recognition in the single-resolution system. The multi-resolution architecture allows us to reduce the false recognition rate from 15% to 4.7%. This paper shows that a lip print is sufficiently used by the measurements of biometric systems.

  • PDF

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF