• Title/Summary/Keyword: ID management system

Search Result 197, Processing Time 0.029 seconds

A study of Location based Air Logistics Systems with Light-ID and RFID on Drone System for Air Cargo Warehouse Case

  • Baik, Nam-Jin;Baik, Nam-Kyu;Lee, Min-Woo;Cha, Jae-Sang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.31-37
    • /
    • 2017
  • Recently Drone technology is emerging as an alternative new way of distribution systems services. Amazon, Google which are global network chain distribution companies are developing an idea of Drone based delivery service and applied for patent for Drone distribution systems in USA. In this paper, we investigate a way to adopt Drone system to Air Cargo logistics, in particular, drone system based on combination of Light ID and RFID technology in the management procedure in stock warehouse. Also we explain the expected impact of Drone systems to customs declaration process. In this paper, we address the investigated limitations of Drone by the Korean Aviation Act as well as suggest the directions of future research for application of Drone to Air logistics industry with investigated limitations.

A Study of the Elements Analysis of Metadata for Electronic Resource Management (전자자원 관리용 메타데이터의 요소 분석에 관한 연구)

  • Nam, Young-Joon;Jang, Bo-Seong
    • Journal of the Korean Society for information Management
    • /
    • v.23 no.3 s.61
    • /
    • pp.241-264
    • /
    • 2006
  • This study suggested indispensable elements of metadata for electronic resource management and effectively manage of electronic resource in library. Therefore, this research analyzed into the data elements of DLF ERMI's ERMS data structure, foreign three universities. The Data elements are verified by domestic ERM specialist. As the result, trial categories are 12 elements, consortium categories are 15 elements, license categories are 33 elements, electronic resource information categories are 21 elements, access/administrative information categories are 20 elements, usage statistics categories are 13 elements, workflow categories are 14 elements, contact information categories are 18 elements.

Blockchain-Based Access Control Audit System for Next Generation Learning Management (차세대학습관리를 위한 블록체인 기반의 접근제어 감사시스템)

  • Chun, Ji Young;Noh, Geontae
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.11
    • /
    • pp.351-356
    • /
    • 2020
  • With the spread of COVID-19 infections, the need for next-generation learning management system for undact education is rapidly increasing, and the Ministry of Education is planning future education through the establishment of fourth-generation NEIS. If the fourth-generation NEIS System is well utilized, there are advantages such as providing personalized education services and activating the use of educational data, but a solution to the illegal access problem in an access control environment where strict authorization is difficult due to various user rights. In this paper, we propose a blockchain-based access control audit system for next-generation learning management. Sensitive personal information is encrypted and stored using the proposed system, and when the auditor performs an audit later, a secret key for decryption is issued to ensure auditing. In addition, in order to prevent modification and deletion of stored log information, log information was stored in the blockchain to ensure stability. In this paper, a hierarchical ID-based encryption and a private blockchain are used so that higher-level institutions such as the Ministry of Education can hierarchically manage the access rights of each institution.

A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis (분석단계 보안에서 식별 및 인증의 보안 요건 정의에 대한 연구)

  • Shin, Seong-Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.7
    • /
    • pp.87-93
    • /
    • 2014
  • TIn analysis as the first step of S/W development, security requirements of identification and authentication, ID and password management, authentication process, authentication method, ete. should be defined. Identification is to uniquely identify certain users and applications running on a certain system. Authentication means the function to determine true or false users and applications in some cases. This paper is to suggest the security requirements for identification and authentication in analysis step. Firstly, individual ID should be uniquely identified. The second element is to apply the length limitations, combination and periodic changes of passwords. The third should require the more reinforced authentication methods besides ID and passwords and satisfy the defined security elements on authentication process. In this paper, the security requirements for the step of identification and authentication have been explained through several practical implementation methods.

Development of Urban Object Identification System Based on Network for Intelligent Urban Facility Management (지능형 도시시설물 관리를 위한 네트워크 기반 도시공간객체식별자(UOID) 시스템 개발)

  • Kim, Tae-Hoon
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.14 no.4
    • /
    • pp.172-181
    • /
    • 2011
  • Recently, Urban has been innovated through u-City and Smart City. Urban facility management system is developing using the latest IT technology for real-time monitoring and prevention. In this paper, we propose an UOID(Unique Object IDentification), a standard location-based ID system for urban facility object and develop the UOID service system based on network for innovation of urban facility management system. The system has been tested through Test-bed for connectivity and stability. We wish that the proposed UOID and network service system manages u-City facilities effectively and also provides various ubiquitous services to the citizen, one of the integrate service of u-City platform.

An Encoding Method for Presentation of ISO 19848 Data Channel and Management of Ship Equipment Failure-Maintenance Types (ISO 19848 데이터 채널 표현과 선박 기관장비 고장·유지보수 유형 관리를 위한 코드화 기법)

  • Hwang, Hun-Gyu;Woo, Yun-Tae;Kim, Bae-Sung;Shin, Il-Sik;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.134-137
    • /
    • 2020
  • Recently, there are emphasized to support the maintenance and management system of vessels using acquired data from engine part equipment. But, there are limitations for data exchange and management. To solve the problem, the ISO published ISO 19847 and 19848. In this paper, we analyze the ISO 19848 requirements related to identify data channel ID for ship equipment, and propose the examples for applying encoding techniques. In addition, we suggest the proposed technique for applying of managing the failure and maintenance type of the ship's engine part facilities by examples. If this method is applied, the vessel's equipment can exchange data through the sharing of the code table, and express what response is needed or acted, including where the failure occurred.

Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID (보안문서와 트랜잭션ID 연계기반 개인정보유통경로 탐지기법 연구)

  • Shin, Jae-ho;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1435-1447
    • /
    • 2015
  • Finance Companies are operating a security solution such as E-DRM(Enterprise-Digital Right Management), Personal information search, DLP(Data Loss Prevention), Security of printed paper, Internet network separation system, Privacy monitoring system for privacy leakage prevention by insiders. However, privacy leakages are occurring continuously and it is difficult to the association analysis about relating to the company's internal and external distribution of private document. Because log system operated in the separate and independent security solutions. This paper propose a systematic chains that can correlatively analyze business systems and log among heterogeneous security solutions organically and consistently based on security documents. Also, we suggest methods of efficient detection for Life-Cycle management plan about security documents that are created in the personal computer or by individual through the business system and distribution channel tracking about security documents contained privacy.

Management Plan of Urban Object IDentification through Status-Analysis of Existing Object Management Code (기존 공간정보 관리코드 현황분석을 통한 도시공간정보 객체식별자 관리 방향)

  • Jang, Yong-Gu;Lee, Woo-Sik;Kim, Hyung-Su
    • Spatial Information Research
    • /
    • v.16 no.1
    • /
    • pp.51-64
    • /
    • 2008
  • Recently, development and research of u-City established the ubiquitous environment which can be anytime, anywhere computing or network, has been much highlighted. Thus, current urban facilities should be managed by ubiquitous concept, and monitored location and status information in a real-time manner, and controled if necessary. In order to be establish in the purpose of management, indirect mapping through id-tag is better than facility management directly. For instance, RFID, UCODE, UFID. In this paper, we propose that represent facility object through UOID(Unique Object IDentification). UOID comprises three parts; 1) sensing object, 2) facility object, 3) cell object consists of facilities. and Life cycle management system in UOID, and network system connected with internet is proposed. We wish that proposed UOID and network system mange u-City facilities effectively, and also provide ubiquitous service to the citizen, one of the integrate service of u-City platform.

  • PDF

Design and Implementation on High Efficient EPMS(Energy-Power Management System) for USN Sensor Node Using Self-Charging Module (자가 충전 모듈을 이용한 USN 센서노드용 고효율 에너지 전력관리 시스템 구현 및 검증)

  • Kim, Hyun-Woong;Park, Hee-Jeong;Lim, Se-Mi;Oh, Jong-Hwa;Roh, Hyoung-Hwan;Park, Jun-Seok
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.1
    • /
    • pp.124-130
    • /
    • 2011
  • In this paper, We design and implementation of Self-Charging Module for charging to battery which obtaining the environment inergy such as solar energy. The power chared battery through the charging module send to sensor node. And implementation of System Activation Module(SAM) based on ID system and Dynamic Power Management Module(DPM) with SPO(Self Power Off). This system consume power only communication between the sensor nodes. We verification this system by implementing the high efficiency poweer management system.

The development of web based power plant maintenance management system (Web기반 발전설비 정비관리시스템 개발)

  • Kim, Bum-Shin;Kim, Eui-Hyun;Jang, Don-Sik;Cho, Jae-Min;Chae, Gil-Seok;Jung, Gyu-Chol
    • Proceedings of the KSME Conference
    • /
    • 2004.04a
    • /
    • pp.2059-2063
    • /
    • 2004
  • Most power plants have operated many independent computerize systems for maintenance. Independence of systems have caused complexity of business process and inconvenience of computer system management. Because the equipment and material master data is not standardize and structurize, it is difficult to manage equipment maintenance history and material delivery. Especially equipment classification criterion is important for standardization of every maintenance information. It is necessary to integrate function of independent systems for business process simplification and rapid work flow. this paper provides equipment classification criterion design and system integration method with the case of live system development.

  • PDF