• 제목/요약/키워드: ID management system

검색결과 197건 처리시간 0.033초

A Study on the Construction of Electronic Library for Urban Foundation Facility Management (도시기반시설물 관리를 위한 전자라이브러리 구축 방안에 관한 연구)

  • Jin, Hai-Ming;Kim, Byung-Guk;Park, In-Man;Sung, Jeong-Gon
    • 한국공간정보시스템학회:학술대회논문집
    • /
    • 한국공간정보시스템학회 2005년도 GIS/RS 공동 춘계학술대회
    • /
    • pp.23-27
    • /
    • 2005
  • 현재 지방자치단체에서는 각자 도시기반시설물관리시스템을 구축하여 활용하고 있다. 그리고 GIS DB 구축 시, 같은 속성 값을 가지고 있는 시설물에 대해서도 중복 작업을 진행하고 있다. 각 지방자치단체가 관리하고 있는 시설물의 대부분은 공통된 시설물을 대상으로 하고 있지만 DB 속성항목에서 다소 차이가 나고 있다. 이에 공통된 동일 시설물에 대해서는 DB의 속성항목을 표준화하고 시설물의 사양을 표준화하여 각 시설물 사양에 따라 ID를 부여하여 도시기반시설물 전자라이브러리(Electronic Library)를 구축하는 방안을 제시한다.

  • PDF

Bio Profiler using Smart Card File management System (바이오 프로파일러를 이용한 스마트카드 파일 매니지먼트 시스템)

  • Kyung, Jin-Hui;Cho, Dong-Sub
    • Annual Conference of KIPS
    • /
    • 한국정보처리학회 2005년도 추계학술발표대회 및 정기총회
    • /
    • pp.611-614
    • /
    • 2005
  • 스마트카드는 현재 신분확인용 ID 카드, 교통, 신용카드, 위성방송 수신 카드 등 다양한 분야에 응용 되고 있다. 하지만 좀 더 개인의 생활에 밀접한 분야의 응용은 아직 부족한 현실이다. 본 논문은 다양한 분야에서 응용되고 있는 스마트카드를 개인의 신체정보를 이용하여 구입하고자 하는 물품의 구매에 도움을 주고자 하는 취지에서 연구하게 되었다.

  • PDF

A Study on Privacy Protection Technology based on Blockchain and Zero Knowledge Proof (블록체인과 영지식 증명에 기반한 프라이버시 보호 기술 연구)

  • Kwang Kyu Lee
    • Smart Media Journal
    • /
    • 제12권9호
    • /
    • pp.95-102
    • /
    • 2023
  • As the utilization value of personal information increases, discussions on how to provide personal information are active, but information required by institutions to utilize personal information is being exposed more than necessary. Therefore, personal privacy protection is essential to overcome the problems and limitations of personal information protection. In this study, a decentralized identity information management model that overcomes the problems and limitations of the centralized identity management method of personal information and manages and selectively provides personal information by the information owner himself and demonstrates the excellence of personal information by implementing the Smart Personal Information Provision System (SPIPS) in the PBFT consensus algorithm through experiments.

A Smart System for Customer Ordering Management at Offline Stores (오프라인 매장에서 고객 순번 관리를 위한 스마트 시스템)

  • Chung, Myoungbeom
    • Journal of Korea Multimedia Society
    • /
    • 제21권8호
    • /
    • pp.925-933
    • /
    • 2018
  • In this paper, we propose a new smart ordering application system for granting the customer numbers. The proposed system assigns sequence number of customers who visit at offline store as using speaker and microphone of smart device. This system has more advantage than the existing ordering system. Because the proposed system does not need any customer information like as phone number or SNS ID, it can protect customer privacy information. In this system, we use high frequency which is inaudible to the human ear as communication signal between speaker and microphone. To confirm performance evaluation, we perform a test with ten smart devices like as iPhone 6, 7, 8, Galaxy s8 and the result shown a success rate of 98.7 percent. Therefore, the proposed system can be useful service technology at the various offline store which need to assign a sequence number for customers, because many customers visit at the store.

Case Study : Integrated Approach for Prioritization in Automobile Development Process

  • Goel, Parveen;Lim, Ik-Sung;Koo, Il-Seob;Kim, Tae-Sung
    • Journal of Korean Society for Quality Management
    • /
    • 제30권3호
    • /
    • pp.139-149
    • /
    • 2002
  • A successful product development process can not be achieved without a proper focus and prioritization. For this research, the priority is defined as the relative urgency of a system compared to other system in order to develop and launch a successful product. The process of integrated approach for prioritization using ID and Goal Programming is developed. The development of a mid-size car by an internationally reputed automotive company is described as a case study.

A Study on the Implementation of Integrated Management System for CATV Network (CATV망 관리를 위한 통합관리 시스템 구현 사례 연구)

  • 곽윤식
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제7권5호
    • /
    • pp.1082-1088
    • /
    • 2003
  • This study is about the development of a system related to the CATV network. It intends to develop an automatically centralized Headend system and a distributive system to remove the ineffectiveness of the established manual system. To achieve this goal, we took a put of bandwidth, which is not used for the transmission of video signals in the established frequency bandwidth, and used it for the transmission and receiver of controlling signals. By this way we could design a system of transmission and receiver and a automatic distributive system. We developed an information management system for the 9600bps CATV using RS-232 of forward/backward communication and backward communication. Based on window, It consist of ID generation, transmitter/receiver, control and backup part.

The Implementation of Integration Management System for CATV Network (CATV망을 위한 통합 관리 시스템 구현)

  • 김인호;곽윤식;김윤호;류광렬
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국해양정보통신학회 2003년도 춘계종합학술대회
    • /
    • pp.179-182
    • /
    • 2003
  • This study is about the development of a system related to the CATV network. It intends to develop an automatically centralized Headend system and a distributive system to remove the ineffectiveness of the established manual system. To achieve this goal, we took a part of bandwidth, which is not used for the transmission of video signals in the established frequency bandwidth, and used it for the transmission and receiver and a automatic distributive system. We developed an information management system for the 9600bps CATV using RS-232 of forward/backward communication and backward communication. Based on window, It consist of ID generation, transmitter/receiver, control and backup part.

  • PDF

A Study on RFID System with Secure Service Availability for Ubiquitous Computing

  • Seo, Dae-Hee;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • 제1권1호
    • /
    • pp.96-101
    • /
    • 2005
  • Spotlighted as an innovative information technology environment, ubiquitous computing has been actively researched on recently. Especially, domestic and global researches focus on the RFID system, which is being eyed to replace the existing bar-code system. As an essential technology for ubiquitous computing, the RFID system can be applied for various purposes. The security issues of the RFID system focus on how the low-priced tag type could have reasonable price competitiveness. The Auto-ID Center in the U.S. is spearheading the research on distribution service and omni-directional security. As for Japan, the researches on omni-directional security and EPC application are necessary in securing the technology for ubiquitous computing with support from the Ministry of Public Management Home Affairs, Posts, and Telecommunication. In this paper, a method of ensuring the availability of the RFID system service will be presented based on the ubiquitous computing environment with the existing omni-directional security and user-friendly interface. While the existing researches focus on the RF reader system and tag-based security, this paper's suggestion also considers the availability of a sen ice to suggest ways of increasing the practical usage of a low-priced RF tag.

PARKING GUIDE AND MANAGEMENT SYSTEM WITH RFID AND WIRELESS SENSOR NETWORK

  • Gue Hun Kim;Seung Yong Lee;Joong Hyun Choi;Youngmi Kwon
    • International conference on construction engineering and project management
    • /
    • The 3th International Conference on Construction Engineering and Project Management
    • /
    • pp.1278-1282
    • /
    • 2009
  • In apartment type of housing, if resident's vehicle is registered in central control office and RFID TAG is issued, identification can be recognized from the time of entrance into parking lot and intelligent parking guide system can be activated based on the residents' profile. Parking Guide System leads a vehicle to the available parking space which is closest to the entrance gate of the vehicle's owner. And when residents forget where they parked their cars, they can query to the Parking Guide and Management System and get responses about the location. For the correct operation of this system, it is necessary to find out where the residents' cars have parked in real time and which lot is available for parking of other cars. RFID is very fancy solution for this system. RFID reader gathers the ID information in RFID TAGs in parked cars and updates the DB up to date. But, when non-residents' cars are parked inside apartment, RFID reader cannot identify them nor know the exact empty/occupied status of parking spaces because they don't react to RFID reader's query. So for the exact detection of empty/occupied status, we suggest the combined use of ultrasonic sensors and RFID. We designed a tree topology with intermediate data aggregators. The depth of tree is normally more than 3 from root (central office) to leaves (individual parking lots). The depth of 2 in tree topology brings about the bottleneck in communication and maintenance. We also designed the information fields used in RFID networks and Sensor Networks.

  • PDF

Design of RFID Authentication Protocol Using 2D Tent-map (2차원 Tent-map을 이용한 RFID 인증 프로토콜 설계)

  • Yim, Geo-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • 제13권5호
    • /
    • pp.425-431
    • /
    • 2020
  • Recent advancements in industries and technologies have resulted in an increase in the volume of transportation, management, and distribution of logistics. Radio-frequency identification (RFID) technologies have been developed to efficiently manage such a large amount of logistics information. The use of RFID for management is being applied not only to the logistics industry, but also to the power transmission and energy management field. However, due to the limitation of program development capacity, the RFID device is limited in development, and this limitation is vulnerable to security because the existing strong encryption method cannot be used. For this reason, we designed a chaotic system for security with simple operations that are easy to apply to such a restricted environment of RFID. The designed system is a two-dimensional tent map chaotic system. In order to solve the problem of a biased distribution of signals according to the parameters of the chaotic dynamical system, the system has a cryptographic parameter(𝜇1), a distribution parameter(𝜇2), and a parameter(𝜃), which is the constant point, ID value, that can be used as a key value. The designed RFID authentication system is similar to random numbers, and it has the characteristics of chaotic signals that can be reproduced with initial values. It can also solve the problem of a biased distribution of parameters, so it is deemed to be more effective than the existing encryption method using the chaotic system.