• Title/Summary/Keyword: RFID Access Control

Search Result 62, Processing Time 0.024 seconds

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

Design and Implementation of System for Sensing Data Collection in RFID/USN (RFID/USN 기반의 센싱 데이터 수집을 위한 시스템 설계 및 구현)

  • Kim, Kyeong-Og;Ban, Kyeong-Jin;Heo, Su-Yeon;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.2
    • /
    • pp.221-226
    • /
    • 2010
  • Ubiquitous computing is technology that provides services appropriate for the user. At places where environmental and situational context are relevant in making the determination of what services are appropriate, there are sensor nodes installed, which automatically collect, manage and control environmental information. In this computing environment, in order to meet the requirements of services provided to users, a context awareness system is needed for context awareness processing. In this thesis, using RFID/USN sensors, the context of a user entering and leaving an area was produced, and the user's identification information was received via the RFID reader and antenna. At the same time, to decide whether or not to allow access for the user, a distance sensor node was installed to collect context data. Based on this, a system that provides practical services needed in real life for users was designed and implemented. The context of a user entering an area was produced, which the system recognized and provided appropriate services for the user.

TMCS : Tangible Media Control System (감각형 미디어 제어 시스템)

  • 오세진;장세이;우운택
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.10
    • /
    • pp.1356-1363
    • /
    • 2004
  • We propose Tangible Media Control System (TMCS), which allows users to manipulate media contents with physical objects in an intuitive way. Currently, most people access digital media contents by exploiting GUI. However, It provides limited manipulations of the media contents. The proposed system, instead of mouse and keyboard, adopts two types of tangible objects, i.e RFID-enabled object and tracker-embedded object. The TMCS enables users to easily access and control digital media contents with the tangible objects. In addition, it supports an interactive media controller which users can synthesize media contents and generate new media contents according to users' taste. It also offers personalized contents, which is suitable for users' preferences, by exploiting context such as user's profile and situational information. Therefore. the proposed system can be applied to various interactive applications such as multimedia education, entertainment and multimedia editor.

A Study on Smart Door Lock using Internet of Things (IoT를 이용한 스마트 도어락에 관한 연구)

  • Kim, Jang-Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.539-544
    • /
    • 2020
  • The research is on progressing to operate digital door lock with the method to guarantee the security and safety in the meantime to use digital door lock conveniently using Internet of Things (IoT) standardizing various service providing technology using IoT in home network currently. In this study, compose home network interconnecting Raspberry-PI and web server reflection this trend and composed the system to control the door lock after connect Arduino substituting converter function. Making Raspberry-PI using dynamic IP address using existing open source easily maintain DNS information and possible to connect internet network in home network ethernet and finally, making the smartphone can control door lock remotely entering designated address after connect the internet. The connection between home network and Arduino is executed by Raspberry-PI and bluetooth pairing as 1:1 and make random user's access to be impossible. Especially, to make open/close the door lock with smartphone not by using password on the keypad or using RFID card is judged as the method increasing the security make random user's access to be impossible and also increased the usefulness making remote control to be possible.

Development of Position Recognition System by Wireless Communication (무선통신을 이용한 위치인식 시스템 개발)

  • Sohn, Jong-Hoon;Hwang, Gi-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1477-1486
    • /
    • 2013
  • In this paper, Implementation of location estimation system using wireless communication technology based on Zigbee. Using wireless communication technology, calculation more accurate location information and service location information to the H/W and S/W has been developed. Receivers, repeaters, smart tag(location device), was developed for implement a location estimation system. The smart tag is built the 120~130KHz, 13~14MHz, 2.0~3.0GHz radio frequency tag. Receiver and repeater is applied to the tag module to recognize the location device's active RFID tags transmit a wireless signal for tag identification. Common Entrance control system in contact with a smart tag, It was implemented to transfer the value of the tag to the access control server over a LAN.

Efficient Mutual Authentication Protocol Suitable to Passive RFID System (수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계)

  • Won, Tae-Youn;Chun, Ji-Young;Park, Choon-Sik;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.63-73
    • /
    • 2008
  • RFID(Radio Frequency IDentification) system is an automated identification system that basically consists of tags and readers and Back-End-Databases. Tags and Readers communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to replace a bar-code system in supply-chain management and payment system and access control and medical record and so on. However, RFID system creates new threats to the security of systems and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve these problems against attacks, But they are difficult to apply to RFID system based on EPCglobal UHF Class-1 Generation-2 tags. Recently, Chien and Chen proposed a mutual Authentication protocol for RFID conforming to EPCglobal UHF Class-1 Generation-2 tags. we discover vulnerabilities of security and inefficiency about their protocol. Therefore, We analyze vulnerabilities of their protocol and propose an efficient mutual authentication protocol that improves security and efficiency.

Renovation of Korean Geodetic Control Points

  • Choi, Yun-Soo;Kwon, Jay-Hyoun;Hong, Chang-Ki;Lee, Ji-Sun
    • Spatial Information Research
    • /
    • v.16 no.4
    • /
    • pp.401-410
    • /
    • 2008
  • In this contribution, the renovation of the Korean geodetic control points is introduced. The renovation is described in terms of structure and accuracy. Mainly the establishment of the three-dimensional control points is the renovation on structure which leads many changes in accuracy, contents and hierarchy of the control points. The accuracy of the information is being improved based on the satellite positioning technology and precision geoid being developed. Diverse spatial information such as gravity and environmental elements are considered to be measured at the position of the control points so that the related research is enhanced through the analysis of combined information. In addition, an access to the information of control points and service to the public with spatial information will be faster and more efficient through RFID and CDMA communication. With all these efforts being made currently, the Korean geodetic network will provide the most accurate and diverse spatial information in an efficient way. We hope that these activities lead the trends, roles, and future direction of the geodetic control points.

  • PDF

An Efficient Tag Identification Scheme based on the Reader's Power Control

  • Lim, Intaek
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.9 no.1
    • /
    • pp.39-46
    • /
    • 2019
  • This paper proposes an efficient tag identification scheme for ISO/IEC18000-7 standard by dividing the tags into smaller groups. Tag grouping is based on the reader's transmission power. This can reduce the responding tags in the collection round. If the small number of tags exists, we can anticipate the collision probability will decrease. And it makes the identification speed high. A collection round initiated by the reader's collection command. It also proceeds with increasing the power of the reader until all tags are identified. The results showed that 25% of the performance improved.

Design of Low-Area and Low-Power 1-kbit EEPROM (저면적.저전력 1Kb EEPROM 설계)

  • Yu, Yi-Ning;Yang, Hui-Ling;Jin, Li-Yan;Jang, Ji-Hye;Ha, Pan-Bong;Kim, Young-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.4
    • /
    • pp.913-920
    • /
    • 2011
  • In this paper, a logic process based 1-kbit EEPROM IP for RFID tag chips of 900MHz is designed. The cell array of the designed 1-kbit EEPROM IP is arranged in a form of four blocks of 16 rows x 16 columns, that is in a two-dimensional arrangement of one-word EEPROM phantom cells. We can reduce the IP size by making four memory blocks share CG (control gate) and TG (tunnel gate) driver circuits. We propose a TG switch circuit to supply respective TG bias voltages according to operational modes and to keep voltages between devices within 5.5V in terms of reliability in order to share the TG driver circuit. Also, we can reduce the power consumption in the read mode by using a partial activation method to activate just one of four memory blocks. Furthermore, we can reduce the access time by making BL (bit line) switching times faster in the read mode from reduced number of cells connected to each column. We design and compare two 1-kbit EEPROM IPs, two blocks of 32 rows ${\times}$ 16 columns and four blocks of 16 rows ${\times}$ 16 columns, which use Tower's $0.18{\mu}m$ CMOS process. The four-block IP is smaller by 11.9% in the layout size and by 51% in the power consumption in the read mode than the two-block counterpart.

Design of Image Tracking System Using Location Determination Technology (위치 측위 기술을 이용한 영상 추적 시스템 설계)

  • Kim, Bong-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.143-148
    • /
    • 2016
  • There is increasing concern about security as a need for increased safety in the information industry society. However, it does not meet the needs for safety including CCTV. Therefore, in this paper, we link the processing technology using the image information to the IPS system consisting of GPS and Beacon. It designed a conventional RFID tag attached discomfort and image tracking system is limited to complement the disadvantages identifiable area. To this end, we designed a smart device and the Internet of Things convergence system and a research to ensure the accuracy and reliability of the IPS of the access control system. Finally, by leveraging intelligent video information using a PTZ camera, and set the entrant management policies it was carried out to control the situation and control. Also, by designing the integrated video tracking system, an authentication server, visualization systems were designed to establish an efficient technique for analyzing the IPS entrant behavior patterns.