• Title/Summary/Keyword: RFID Access Control

Search Result 62, Processing Time 0.024 seconds

High Security FeRAM-Based EPC C1G2 UHF (860 MHz-960 MHz) Passive RFID Tag Chip

  • Kang, Hee-Bok;Hong, Suk-Kyoung;Song, Yong-Wook;Sung, Man-Young;Choi, Bok-Gil;Chung, Jin-Yong;Lee, Jong-Wook
    • ETRI Journal
    • /
    • v.30 no.6
    • /
    • pp.826-832
    • /
    • 2008
  • The metal-ferroelectric-metal (MFM) capacitor in the ferroelectric random access memory (FeRAM) embedded RFID chip is used in both the memory cell region and the peripheral analog and digital circuit area for capacitance parameter control. The capacitance value of the MFM capacitor is about 30 times larger than that of conventional capacitors, such as the poly-insulator-poly (PIP) capacitor and the metal-insulator-metal (MIM) capacitor. An MFM capacitor directly stacked over the analog and memory circuit region can share the layout area with the circuit region; thus, the chip size can be reduced by about 60%. The energy transformation efficiency using the MFM scheme is higher than that of the PIP scheme in RFID chips. The radio frequency operational signal properties using circuits with MFM capacitors are almost the same as or better than with PIP, MIM, and MOS capacitors. For the default value specification requirement, the default set cell is designed with an additional dummy cell.

  • PDF

A Study of security improvements to access in port (Focus on Container Terminal) (항만보안 출입통제에 관한 연구 및 개선점 고찰 (컨테이너 터미널 중심으로))

  • Kwak, Kyu-Seok;Nam, Ki-Chan;Jeong, Su-Cheon;Min, Se-Hong;Park, Seung-Jae
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.06a
    • /
    • pp.205-206
    • /
    • 2014
  • 세계화의 진전 및 시장 개방의 가속화로 인해 국내외 항만물류산업의 중요성이 높아지고 있다. 우리나라는 항만의 경쟁에서 살아남기 위해 첨단기술을 적용한 무인 자동화 컨테이너 터미널의 구축 등을 통해 생산성, 경제성, 보안성 및 서비스 수준을 향상을 위해 연구 하고 있다. 하지만 컨테이너터미널 내부 효율 및 생산성을 향상시키는 연구가 대부분이며 보안업무 등을 처리하는 연구는 미흡한 실정이다. 컨테이너 터미널 보안의 중요성은 갈수록 중요 ${\cdot}{\cdot}$(중략)${\cdots}{\cdot}$.

  • PDF

Development of Remote Mornitoring Web System for National Control Points using RFID Tags (RFID를 이용한 국가기준점 원격 모니터링 웹 시스템 개발)

  • Oh, Yoon-Seuk;Lee, Young-Kyun;Park, Jae-Min
    • Spatial Information Research
    • /
    • v.15 no.3
    • /
    • pp.237-249
    • /
    • 2007
  • There are about 22,000 national control points throughout this nation. However, in order to identify the location data of a national control point, a control point result table is needed. And although the control points are important national facilities, due to the fact that these points located at remote areas such as on top of mountains, the facilities are being maintained via on-site inspection without any protections around them. In this research, by taking the locations where the control points are placed into consideration, a specialized RFID tags that can be attached to the national control point's marker has been developed, and CDMA-ready PDA based mobile Web System and national control point control system are developed as well. With help of these systems, control point data can be checked at the seen, and national control point maintenance personnel can find out about maintenance status and keep track of usage record. When these systems are taken into effect, access to the national control point data becomes easy, fast response to the change in data can be possible, and management efficiency will go up. When the Ubiquitous society becomes reality, the importance of location information will be high. Therefore, national control points using above mentioned RFID tags will not only be useful to the control point users and maintenance personnels such as professional land surveyors, but also useful when providing location based services to people, and it will become an important national infrastructure in terms of providing absolute location information.

  • PDF

Small-Scale Warehouse Management System by Log-Based Context Awareness (로그기반 상황인식에 의한 소규모 창고관리시스템)

  • Kim, Young-Ho;Choi, Byoung-Yong;Jun, Byung-Hwan
    • The KIPS Transactions:PartB
    • /
    • v.13B no.5 s.108
    • /
    • pp.507-514
    • /
    • 2006
  • Various application systems are developed using RFID as a part of ubiquitous computing, and it is expected that RFID chip will become wide-spread for the distribution industry especially. Efficient and efact intelligent-type of warehouse management system is essential for small-to-medium-sized enterprises in the situation having a trouble in the viewpoint of expense and manpower. In this paper, we implement small-scale warehouse management system using log-based context awareness technology. This system is implemented to be controlled on web, configuring clients to control RFID readers and building up DBMS system in a server. Especially, it grasps user's intention of storing or delivering based on toE data for the history of user's access to the system and it reports user's irregular pattern of warehouse use and serves predictive information of the control of goods in stock. As a result, the proposed system can contribute to enhance efficiency and correctness of small-scale warehouse management.

A Study on the NFC Services for Social Networking Applications (소셜 네트워킹 응용을 위한 NFC 서비스에 관한 연구)

  • Roh, Jae-Sung;Kim, Wan-Tae;Lee, Man-Hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.568-570
    • /
    • 2013
  • NFC represents the 2nd generation of the proximity contact-less technology, which beyond the RFID, supports peer-to-peer communication, and enables consumer access to aggregated services, anytime, anywhere, with any type of consumer stationary and mobile devices. NFC is a short range device wireless technology designed to exchange data, initiate connections with other wireless networks and act as a secured smart key for access to services such as cashless payment, ticketing, on-line entertainment and access control. In this paper, the NFC services for social networking applications are studied, and the signal flow of SNS application based on NFC P2P for smart devices and server model is proposed.

  • PDF

An Implementation Strategy of WOL(Wake On LAN) for Enhancing the Computer Security (컴퓨터 보안 강화를 위한 WOL(Wake On LAN) 기능 구현 전략)

  • Kang, Koohong;Gyeong, Gyuyeol
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.07a
    • /
    • pp.467-468
    • /
    • 2014
  • 본 논문에서는 컴퓨터 보안 강화를 위해 WOL(Wake On LAN) 기능을 출입문 제어시스템에 탑재하여 RFID 카드를 소지한 사용자만이 컴퓨터에 일차적으로 접근 가능한 전략을 제안한다. 이러한 전략은 컴퓨터 사용을 위해 단순히 비밀번호를 이용해 로그온 하는 기존의 방법과 비교해 사전에 자신의 RFID 카드를 이용한 물리보안 인증 단계를 전처리 과정으로 포함함으로써 컴퓨터 보안이 한층 강화되었다고 볼 수 있다. 뿐만 아니라 출입문 제어시스템에 탑재된 WOL 기능에 의해 사용자가 자신의 컴퓨터에 실질적으로 접근하기 이전에 일부 부팅과정에 완료됨에 따라 사용자가 컴퓨터 부팅 과정동안 기다려야하는 대기시간을 줄임으로써 업무효율을 기대할 수 있다. 본 논문에서는 RFID 리더기와 라즈베리파이(Rasqberry Pi)사용해 WOL 기능을 탑재한 출입문 제어시스템을 직접 구현하고 실제 컴퓨팅 환경을 구현해 실험을 실시하였다.

  • PDF

Security Architecture for U-Healthcare Application in Wireless Sensor Network (무선 센서 네트워크에서의 유비쿼터스 헬스케어 시스템을 위한 보안 구조)

  • Shin, Yoon-gu;Kim, Hankyu;Kim, Sujin;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.884-885
    • /
    • 2014
  • The use of Radio Frequency Identification technology (RFID) in medical context enables not only drug identification, but also a rapid and precise identification of patients, physicians, nurses or any other health care related staffs. The combination of RFID tag identification with structured and secured Internet of Things (IoT) solutions enables ubiquitous and easy access to medical related records, while providing control and security to all interactions. This paper surveyed a basic security architecture, easily deployable on mobile platforms, which would allow to establish and manage a medication prescription service in mobility context making use of electronic personal health records.

  • PDF

Implementation of a Secure Access Control System Based on RFID/USN (RFID/USN 기반 안전한 출입통제 시스템 구현)

  • Song, Bok-Sob;Choi, Yeon-Sik;Kim, Jeong-Ho;Kim, Chul-Su;Ryu, Hwan-Gyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.162-165
    • /
    • 2010
  • USN 기술은 센서노드의 전류소모 감소를 위한 저전력 기술개발과 관련 기술력 확보를 위해 많은 연구가 지행되고 있다. 유비쿼터스 환경에서 보안의 취약성과 낮은 신뢰성 문제는 USN 기술의 상용화 성공을 위해 선행되어야할 요소이다. 본 연구에서는 보안 문제로 W-Key 알고리즘을 도입하여 키분배 관리, 인증관리, 환경관리로 구성하여 무선 Key기법과 다른 RFID/USN기반의 안전한 출입통제 시스템을 구현하였다.

Design and Implementation of Embedded Contactless (Type-B) Protocol Module for RFID (RFID를 위한 내장형 비접촉(Type-B) 프로토콜 지원 모듈 설계 및 구현)

  • Jeon, Yong-Sung;Park, Ji-Mann;Ju, Hong-Il;Jun, Sung-Ik
    • The KIPS Transactions:PartA
    • /
    • v.10A no.3
    • /
    • pp.255-260
    • /
    • 2003
  • In recent, as a typical example of RFID, the contactless IC card is widely used in traffic, access control system and so forth. And its use becomes a general tendency more and more because of the development of RF technology and improvement of requirement for user convenience. This paper describes the hardware module to process embedded contactless protocol for implementation contactless IC card. And the hardware module consists of analog circuits and specific digital logic circuits. This paper also describes more effective design method of contactless IC card, which method separates into analog circuit parts, digital logic circuit part, and software parts according to the role of the design parts.

Improvement of Physical security System Operation (물리적 보안시스템 운용수준 분석)

  • Chung, Taehwang
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.2
    • /
    • pp.282-286
    • /
    • 2014
  • This study is to present an improvement of physical security system operation by survey on the install and operation of physical security system of 90 facilities. The level of CCTV operation is higher than Access Control system and Intrusion Detection System. But the level of maintenance and management of physical security system is low. The rate of install of X-ray Inspection device show the concern on material detection, although the rate is low. The level of install and operation for the Integration of physical security system is low, so integration of security personnel and security system is necessary for the effective operation. For reinforcement of access control management, security gate and preparing of some obstacles are required with RFID.