• Title/Summary/Keyword: Reader Management

Search Result 198, Processing Time 0.029 seconds

RBAC Based Security Model for International Logistic Service (국제 물류 서비스를 위한 RBAC 기반 보안 모델)

  • Hwang, Jeong-Hee;Shin, Moon-Sun;Lee, Jong-Yun;Hwang, Ik-Soo
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.307-316
    • /
    • 2009
  • RFID technique which is recognizable without the physical contact between the reader and the tag is the core to archive ubiquitous environment, and has been attracting a lot of interest from both industry and academic institutes. Especially, RFID based logistic service management can get the low priced cost and the advancement of the appointed date of delivery. In this paper, we first analyze security requirements of international logistics process, and then propose a RBAC based security model and represent access control constraints using UML.

Electronic Books' Marketplaces : Status quo and Perspective (전자책 시장의 현황과 전망)

  • Kim, Eun-Jeong;Kim, Sol-Mi
    • Journal of Information Management
    • /
    • v.32 no.1
    • /
    • pp.71-86
    • /
    • 2001
  • The advancement of Internet and information technology allows people to access information and knowledge resources without the limit of time and place. Recent the development of various readers and wireless communication technologies has made It possible to facilitate the widespread use of electronic books. This paper is describes the definitions, features and advantages of e-books, and examines researches of technologies standards, and digital rights managements related to e-books in Korea and other countries. It also observes a future growth in the production and utilization of e-books in libraries.

  • PDF

모바일 RFID를 활용한 출결관리 방법 및 시스템 설계에 대한 연구

  • Lee, Gyeong-Jeon;Jeon, Jeong-Ho
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2007.11a
    • /
    • pp.398-402
    • /
    • 2007
  • 본 연구는 모바일 RFID를 활용한 출결관리 방법 및 그 시스템을 설계에 대하여 분석한다. RFID를 활용한 출결관리 방법에 대한 기존의 방식은 ID 카드와 같은 매체에 FID 태그를 부착하여 일정한 장소에 설치되어 있는 리더 (Reader)에 스캔함으로써, 정보가 저장되는 단순한 형식이 대부분이었다. 그러나 본 연구에서는 사용자에게 태그를 제공하는 것이 아니라 모바일 FRID 리더를 제공하여, 사용자의 부정 사용을 최소화하고, 프라이버시를 강화할 수 있는 시스템을 설계한다. 이를 위해 U-출결관리 모델의 시나리오와 다이어그램, 그리고 본 모델과 관련된 기술 사항에 대한 검토를 진행한다. 또한 본 모델을 Timmers의 비즈니스 모델 정의에 의해 분석하고, 이 모델에서 사용되는 태그들의 경제성을 태그 평가 모형에 기반하여 분석한다.

  • PDF

Design of a Location Management System for Coal Miner based on the ZigBee (ZigBee를 이용한 광부 위치 관리 시스템의 설계)

  • Kai, Ding;Park, Seok-Cheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.166-168
    • /
    • 2013
  • 광산의 작업 환경은 매우 위험하기 때문에 안전사고가 빈번히 발생하고 있으며, 이는 광부의 개인 안전을 크게 위협하고 있다. 광부에게 광산에서 안전사고가 생길 시에는 광부의 위치가 제일 먼저 파악되어야 하고 이는 가장 중요한 정보 중 하나이다. 따라서 본 논문에서는 ZigBee를 이용하여 무선 센서 네트워크를 구성하고, 안전사고가 빈번히 발생하는 광산에서의 광부 위치 관리 시스템을 설계하였다. 이를 위해 본 논문에서는 광부의 이동범위에 설치된 ZigBee Reader와 광부의 신체 및 소지품에 부착된 ZigBee Tag와 ZigBee 무선 센서 네트워크의 정보를 관리하는 ZigBee 서버및 데이터를 기록할 DB와 지상 관리자의 요구를 받아 이 정보를 지상 관리자에게 알려주는 위치 관리 시스템을 설계하였다.

The Etrance Authentication Systems Using Real-Time Object Extraction and the RFID Tag (얼굴 인식과 RFID를 이용한 실시간 객체 추적 및 인증 시스템)

  • Jung, Young Hoon;Lee, Chang Soo;Lee, Kwang Hyung;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.4
    • /
    • pp.51-62
    • /
    • 2008
  • In this paper, the proposal system can achieve the more safety of RFID System with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After authentication RFID Tag, additionally, the proposal system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In this paper, the system which was proposed more enforce the security of the automatic entrance and exit authentication system with the cognitive characters of RFID Tag and the extracted characteristic information of the user image through the camera. The RFID system which use the active tag and reader with 2.4GHz bandwidth can recognize the tag of RFID in the various output manner. Additionally, when the RFID system have errors, the characteristic information of the user image is designed to replace the RFID system as it compare with the similarity of the color, outline and input image information which was recorded to the database previously. In the result of experiment, the system can acquire more exact results as compared with the single authentication system when it using RFID Tag and the information of color characteristics.

A Study on the Design of Automatic Billing Information Systems for Long-Term Home Care Services Business Using iBeacon (iBeacon을 활용하는 장기요양 재가 서비스 업무를 위한 자동청구 정보시스템의 설계에 관한 연구)

  • Jung, Sung Hwa;Kim, Myong Hee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.3
    • /
    • pp.612-619
    • /
    • 2016
  • Applying evolved IT technology to increase the satisfaction of the consumer is a typical feature of the rapidly transformed service industry. Smart devices have taken a place as the mainstream of major media, moreover, IT service strategies utilizing smart devices have been constantly developed. Location recognition method of users has been proposed as one of the significant features to the IT service industry. The long-term care home services can be one example of user location recognition methods that real time computerization of service record utilize an attached tag to home of pensioners with RFID reader or an NFC function of mobile when a home carer provides service. And, the Homecare Electronics Management System (HEMS) and the various location recognition methods will be discussed to improve effectiveness of services. In this paper, we propose a home applicable electronic management system which insurer, home care service facilities, home cares, pensioners and guardians which enables to simultaneously check service records based on the improved system by use of iBeacon.

An Implementation of a RFID Reader Firmware for ISO/IEC 18000-6 Type C Specification (ISO/IEC 18000-6 Type C 규격에 적합한 리더 펌웨어 개발)

  • Yang, Jung-Kyu;Oh, Ha-Ryoung;Seong, Yeong-Rak;Park, Jun-Seok;Song, Eui-Seok;Joung, Myoung-Sub;Kwak, Ho-Kil;Ahn, Si-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.927-930
    • /
    • 2007
  • As RFID systems are applied to various fields and applications such as supply chain management, asset management, location based applications etc. the requirements becomes diverse. For example, Much higher performance, TCP/IP protocol stack are required in some applications. However, low end processors based systems such as 8051 processor can not meet such requirements due to their low processing capacity and limited size of memory. In this paper a UHF band RFID system which meets the ISO 18000-6 TYPE C specification with ARM920T-based processor is implemented and tested.

  • PDF

Analysis of Electronic Book User Needs through Fuzzy AHP & Conjoint Analysis (퍼지 계층적 의사결정 기법과 컨조인트 분석을 활용한 국내 전자책 이용그룹의 요구수준 분석)

  • Yoon, Su-Jin;Jung, Ho-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.205-214
    • /
    • 2011
  • With the success of Kindle, an electronic book reader developed by Amazon.com, there has been a growing interest in both electronic books and readers in Korea. In this paper, we analyze electronic book user needs through fuzzy analytic hierarchy process (AHP) and conjoint analysis. First, we select the important factors which can affect the intention to purchase electronic book readers by applying the fuzzy AHP with the help of electronic book experts. Next, we perform conjoint analysis to reveal the detailed needs of electronic book users for each of the selected factors. Some useful implications and research limitations are also presented with future research directions.

A Study on Development of Movable u-POS System based on RFID (RFID 기반의 이동형 u-POS 시스템 개발에 관한 연구)

  • Jho, Yong-Chul;Li, Zhong-Shi;Lee, Chang-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.9 no.6
    • /
    • pp.155-162
    • /
    • 2007
  • Recently, retail store automation appliance market is changed with traditional POS systems techniques and RFID, radio POS system, and self checkout system, etc. in the foreign advanced distribution industry. Retailers and consumers require convenient POS system which can provide more functions and fast service. These requests bring to rapid evolution of various H/W and S/W corresponding with POS system. In this study with the POS systems and the RFID technology we develop core technology of movable u-POS system based on RFID that can use in large store. So we propose u-Cart system that can alternate the current shopping cart and POS terminal and that provide value added services to customer. As the result we present the configuration of u-Cart terminal device(WMDT : Wireless Mobile Data Terminal) including RFID reader module that can provide various information to consumer and some convenient client applications that are running in WMDT and u-POS administration service module.

The Design of User-Authentication technique using QR-Code recognition (스마트폰의 QR-Code의 인식 기법을 이용한 사용자 인증 기법 설계)

  • Lee, Yong Jae;Kim, Young Gon;Park, Tae Sung;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.85-95
    • /
    • 2011
  • Smart phones, greatly expanding in the recent mobile market, are equipped with various features compared to existing feature phones and provide the conveniences to in several ways. The camera, one of the features of a smartphone, creates the digital contents, such photos and videos, and plays a role for the media which transmits information, such as video calls and bar code reader. QR-Code recognition is also one of the camera features. It contains a variety of information in two-dimensional bar code type in matrix format, and makes it possible to obtain the information by using smart phones. This paper analyzes the method of QR-Code recognition, password method-the existing user-authentication technique, smart card, biometrics and voice recognition and so on and thenn designs a new user-authentication technique. The proposed user-authentication technique is the technique in which QR-Code, which can be simply granted is read by smart phones and transmitted to a server, for authentication. It has the advantages in view that it will simply the process of authentication and conteract the disadvantages, such as brute force attack, man-inthe-middle attack, and keyboard hacking, which may occur in other authentication techniques.