• Title/Summary/Keyword: 출입 통제

Search Result 207, Processing Time 0.031 seconds

Industry Secret Information Leakage Prevention : Focus on the Utilization of IoT (기업의 산업기밀정보 유출예방에 관한 연구: 사물인터넷 활용을 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.101-110
    • /
    • 2017
  • The purpose of this study is to examine possibilities of industry secret information leakage through IoT devices and to prevent information leakage from the perspective of administrative and technique security. From the administrative security perspective, first, it is important to face the possibility of industry information data leakage through anyone who can access companies and should establish guidelines to limit the use of IoT devices when entering companies. Second, security management guideline should be prepared by companies or upon user's request and use of any electronic devices sharing wireless internet connection should be eliminated or restricted. From technique security perspective, channels that sharing IoT devices in computers should be controlled since industry secret information are stored in computers and servers. Furthermore, IoT devices that accessing wireless internet network or devices that already registered should be regularly checked in order to minimize any information leakage. Lastly, data and information stored in computers and servers should be encrypted.

Species Diversity and Community Characteristics of Benthic Macroinvertebrates from Irrigation Ponds in the Western CCZ area, Korea (서부 민간인출입통제구역 일대 둠벙의 저서성대형무척추동물 종 다양성 및 군집 특성)

  • Chung, Hyun-Yong;Yeom, Cheol-Min;Kim, Jae Hyun;Park, Shinyeong;Lee, Yae-Won;Pyo, Gina;Kim, Seung Ho
    • Korean Journal of Ecology and Environment
    • /
    • v.53 no.2
    • /
    • pp.173-184
    • /
    • 2020
  • Irrigation ponds, 'dumbeong', which are artificially constructed water resources for traditional farming, serve as a biological shelter connecting seasonally created rice paddy fields to local freshwater ecosystems. This 2018 study surveyed 143 irrigation ponds in the western Civilian Control Zone (CCZ) area from August to September, revealing species diversity and community characteristics of benthic macroinvertebrates. A total of 13,454 individuals of macroinvertebrates were captured and classified into 3 phyla, 5 classes, 17 orders, 59 families, 192 species. Among Insecta, the most frequently recorded order was Odonata, 55 spp.(33.7%), followed by Coleoptera, 52 spp. (31.9%), Hemiptera, 34 spp. (20.8%), Diptera, 17 spp. (9.8%), Ephemeroptera, 3 spp. (2.4%), Trichoptera, 1 spp. (0.6%) and Lepidoptera, 1 spp. (0.6%). Taxon of non-Insecta consisted of Mollusca, 14 spp. (48.2%), Annelida, 11 spp. (37.9%) and Arthropoda, 4 spp. (3.4%). The analysis of Diversity Index (H'), Species Richness Index (RI), Dominance Index (DI) and Evenness Index (J') revealed the general stability of communities in the study sites. A total of 28 rare species were found in 98 study sites, including three endangered species designated by the Ministry of Environment. These results showed that the species diversity and rarity of macroinvertebrates in the study area were greater than those of previous research on lentic wetlands (lake, etc.) and national conserved wetlands(Upo-swamp, etc.) in Korea. A conservation planning of aquatic ecosystems in the western CCZ area, therefore, should focus on conservation of irrigation ponds.

ITU-T SG17 텔레바이오인식 국제표준화 현황

  • Lee, Saewoom;Kim, Jason
    • Review of KIISC
    • /
    • v.28 no.4
    • /
    • pp.18-24
    • /
    • 2018
  • 전통적으로 바이오인식기술은 출입국심사, 출입통제 행정, 사회복지, 의료, 금융 등 다방면에서 폭넓게 보급되어 실생활에서 널리 활용되고 있다. 최근 들어, 모바일 지급결제서비스 ATM 인출기 인터넷전문은행 등과 같은 핀테크 분야에서 비대면 인증기술로 바이오인식기술이 각광을 받기 시작했다. 그러나 지문 얼굴 홍채 정맥 등 기존의 신체적 특징을 이용한 바이오인식기술은 가짜지문 등 신체적 특징을 이용한 바이오인식기술의 위변조 위협에 대한 우려가 존재하여 심전도 등 생체신호, 걸음걸이와 같이 살아있는 사람의 행동학적 특징을 이용한 차세대 바이오인식기술에 박차를 가하고 있는 추세이다. 이에 본 논문에서는 바이오인식 표준화를 위한 ITU-T SG17 Q9 국제표준화기구를 소개하고, X.tab 국제표준화 현황에 대하여 집중적으로 살펴보고자 한다.

Implementation of Position Awareness System Using One-Pass Tag (원패스 태그를 이용한 위치인식 시스템 구현)

  • Sohn, Jong-Hoon;Hwang, Gi-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.301-303
    • /
    • 2012
  • In this Paper, we are implemented position awareness system based on one-pass tag. This system are combined ZigBee and RFID technology. We developed the solution to detect of user's position using position awareness receiver and repeater. This location recognition includes parked car location tracking, coming in and out car, automation of immigration control, enhanced security through emergency call, and automatic invocation elevator control and etc.

  • PDF

AIDA: a Mobile Application for IoT-based Doorlock using NFC (AIDA : NFC를 이용한 IoT 기반 출입통제 앱)

  • Yun, HyeMin;Kim, YeonJeong;Park, JooHee;Lee, JiHye;Chae, SeoYeon;Kim, Myuhng Joo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.62-64
    • /
    • 2018
  • 본 연구는 교내 카드 학생증의 불편함을 해소하기 위해 무선통신 NFC 기술을 활용하여 IoT 도어락을 구현했다. 본 앱의 목적인 출입과 동시에 권한 양도 기능을 수행함으로써 교내 이외 실생활에서도 적용가능 하도록 구현하였으며, 이를 통해 편리성, 효율성, 보안성을 모두 갖출 수 있도록 구현했다.

A Trend of Face Recognition System Technologies and Standards (얼굴인식 기술 및 표준화 동향)

  • Ahn, Ye-Chan;Lee, Jae-Wook;Lee, Keun-Ho;Jeon, You-Boo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.737-739
    • /
    • 2015
  • 최근 생체인식 기술을 응용하여 적용되는 분야들이 다양하게 증가함에 따라 생체인식에 대한 적용도 모바일 결제 시스템, 지능형 CCTV, 출입국심사, 출입통제 등 다양하게 시도되고 있다. 생체인식에는 지문인식에 이어 얼굴인식에 대한 연구가 활발히 이루어지고 있는 가운데 얼굴인식 기술에 설명과 동향 및 시장동향과 국내외 표준화 현황에 대해 알아보고자 한다.

Development of Integrated Preservation System for Fingerprint Recognition (지문인식 통합 보안 시스템 개발)

  • Kang, Young-Goo;Jin, Jin-Yu;Yang, Hae-Sool
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.22-24
    • /
    • 2008
  • 인문 인식기술은 생체인식기술 가운데 안전성과 편리성 면에서 기능이 뛰어나고, 가장 간편하면서도 비용이 많이 들지 않으며, 다양한 분야에 적용이 가능하다는 장점이 있다. 적용 범위는 출입통제, 근태관리, 빌딩통합시스템, 금융자동화기기, 컴퓨터보안 분야, 전자상거래 인증, 공항정보 시스템 등 다양하다. 본 연구에서는 출입보안 및 대여금고, ATM(금융자동화기기)에 지문인식 기술을 적용을 통해 고객이 영업점을 방문하지 않고 가정에서도 금융업무가 가능한 인터넷뱅킹, 전자상거래 등과 같은 서비스에 인문인식 기술이 도입한 통합보안시템을 구축하며 활용방안을 제시하고자 한다.

The Extraction of Fingerprint Corepoint And Region Separation using Labeling for Gate Security (출입 보안을 위한 레이블링을 이용한 영역 분리 및 지문 중심점 추출)

  • Lee, Keon-Ik;Jeon, Young-Cheol;Kim, Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.243-251
    • /
    • 2008
  • This study is to suggest the extraction algorithms of fingerprint corepoint and region separation using the labeling for gate security in order that it might be applied to the fingerprint recognition effectively. The gate security technology is entrance control, attendance management, computer security, electronic commerce authentication, information protection and so on. This study is to extract the directional image by dividing the original image in $128{\times}128$ size into the size of $4{\times}4$ pixel. This study is to separate the region of directional smoothing image extracted by each directional by using the labeling, and extract the block that appeared more than three sorts of change in different directions to the corepoint. This researcher is to increase the recognition rate and matching rate by extracting the corepoint through the separation of region by direction using the maximum direction and labeling, not search the zone of feasibility of corepoint or candidate region of corepoint used in the existing method. According to the result of experimenting with 300 fingerprints, the poincare index method is 94.05%, the proposed method is 97.11%.

  • PDF

AI Automation Smart Access Management System using Personal Authentication and Heat Detector (AI자동화 개인 인증 및 발열 감지기를 이용한 스마트 출입 관리 시스템)

  • Lee, Hyo-Jai;Hong, Changho;Cho, Sung Ho;Kim, Eungsuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.272-274
    • /
    • 2021
  • Recently, due to COVID-19, the use of non-face-to-face authentication and fever detection systems is increasing. As the number of confirmed cases increases, the government is making it mandatory to authenticate and install a fever detector. It is used for entering and leaving not only general restaurants but also all stores. However, in most cases, the heat detector and the authentication device are separately configured and used, which is very inconvenient. Therefore, this study was conducted to develop an access control system that can simultaneously perform these functions. A smart access control system was developed by combining IOT technology as well as a fever detection function and smart personal recognition function. It is expected to further develop K-Quarantine by distributing it to public facilities and nursing facilities in the future.

  • PDF

An Automatic Access Registration System using Beacon and Deep Learning Technology (비콘과 딥러닝 기술을 활용한 전자출입명부 자동등록시스템)

  • Huh, Ji-Won;Ohm, Seong-Yong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.807-812
    • /
    • 2020
  • In order to prevent the national wide spread of the COVID-19 virus, the government enforces to use an electronic access registration system for public facilities to effectively track and manage the spread. Initially, there was a lot of hassle to write a directory, but recently a system for creating an electronic access list using QR codes, what is called KI-Pass, is mainly used. However, the procedure for generating a QR code is somewhat cumbersome. In this paper, we propose a new electronic access registration system that does not require QR code. This system effectively controls the suspicious visitor by using a mask wearing discriminator which has been implemented using deep learning technology, and a non-contact thermometer package. In addition, by linking the beacon, a short-range wireless communication technology, and the visitor's smartphone application, basic information of the facility visitor is automatically registered to KDCA through the server. On the other hand, the user access information registered in the server is encrypted and stored, and is automatically destroyed after up to 4 weeks. This system is expected to be very effective in preventing the spread of other new infectious diseases as well as responding to the coronavirus which is recording a high spread worldwide.