• Title/Summary/Keyword: product identifier

Search Result 7, Processing Time 0.021 seconds

Design of the Identifier Structure for Ubiquitous National Product Asset Management (U-국가물품자산관리를 위한 식별코드체계 설계)

  • Kim, Sun-Ho;Yun, Ji-Ho;Kim, Jin-Yong;Ann, Chong-Hwan
    • IE interfaces
    • /
    • v.20 no.2
    • /
    • pp.227-234
    • /
    • 2007
  • The national product identifier(NPI) currently used in the national product asset management system does not accommodate ISO or EPC standards due to the limitation of tag memory. For this reason, we propose a new NPI which accommodates not only ISO item identification standards but also the memory capacity of ISO tags. First of all, memory structures of ISO/IEC 18000-6C and EPC tags are analyzed from the view point of product identifier structure. Second, ISO/IEC 15459 and EPC identification standards as item identifier structures for the product asset management are analyzed. Third, based on these analyses, the NPI used for the current RFID-based product asset management system is analyzed and its problems are presented. Finally, a new NPI structure is proposed suitable for ISO/IEC 18000-6C and ISO/IEC 15459.

The Operational Method of the RFID Identification System for National Product Asset Management (국가물품자산관리를 위한 RFID 식별코드체계 운용방안)

  • Kim, Sun-Ho;Kim, Jin-Yong;Park, Jeong-Jae;Song, Ju-Hyung;Kim, Hyun-Min;Ann, Chong-Hwan
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.3
    • /
    • pp.19-31
    • /
    • 2007
  • In this research, we propose the operational method of the RFID-based NPI (National Product Identifier) which can manage product assets for the Korean government in the future. First of all, we present the operational concept of the national product asset management. Second, we suggest the structure of the NPI which accommodates ISO/IEC 15459 and the method to encode NPI and related data to ISO/IEC 18000-6C tags. Finally, we propose the operational business processes to generate and manage NPI in the stages of product procurement and product asset management.

  • PDF

Smart Platform Design for Location based Drama Contents Services (위치기반의 드라마 콘텐츠서비스용 스마트 플랫폼 설계)

  • Choi, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.37-41
    • /
    • 2017
  • In this paper, a platform was proposed that can service the streaming of location based real-time video-clip for smart-travel-services to work with PPL(Product Placement). The location information of drama like as LTE GPS and Beacon were used to provide the drama video with the PUSH service. And PPL DB with the attributes like as picture, video, music and URI(Uniform resource Identifier) was designed. As a result, this platform could provide the location based video streaming service that could replace the original PPL properties, color or shape, with the other properties by the interactive tagging the PPL DB in drama scenes. The proposed platform could provide the location based real-time video streaming service that can alter the PPL properties with the request of service provider.

Design of National Product Identifier and its Encoding based on RFID (RFID기반의 국가물품식별코드체계 및 인코딩 방안 설계)

  • Kim, Jin-Yong;Park, Jung-Jae;Song, Joo-Hyung;Kim, Hyun-Min;Ann, Chong-Hwan;Kim, Sun-Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.1
    • /
    • pp.25-40
    • /
    • 2007
  • As memory-extended RFID tags are recently developed, various types of item identification structures can be stored in the tags. In this paper, we propose a new national product identifier(NPI) which accepts not only ISO item identification standards but also the memory capacity of ISO tags. First of all, item identification structures of ISO/IEC 15459 and EPC, and memory structures of ISO/IEC 18000-6C and EPC tags are analyzed. Based on these analyses, the NPI currently used is analyzed and its problems are described from the viewpoint of standardization. To overcome the problems, a new NPI structure suitable for ISO/IEC 15459 is proposed. Finally, data related to the NPI is designed for encoding to tags.

  • PDF

Design and Implementation of Digital Signature on Pedigree Using ECDSA (ECDSA를 사용한 Pedigree 디지털 서명의 설계 및 구현)

  • Khosiawan, Yohanes;Kwon, Joon-Ho;Hong, Bong-Hee
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06c
    • /
    • pp.286-288
    • /
    • 2012
  • Facing the counterfeiting acts towards various products, many manufacturers implement ePedigree system to secure their supply chain. Using ePedigree, a distribution history including a valid product identifier from the manufacturer until the final retailer is recorded. And this ePedigree is signed by each involved supply chain party using digital signature. With this digital signature, any unauthorized alteration to the ePedigree document would generate a failed verification process. If there is a counterfeit product using a fake ePedigree document, it wouldn't be able to pass the verification process either. Hence, there wouldn't be any counterfeit product that could enter the legal supply chain and bought by the consumer. We are proposing to use ECDSA instead of RSA since it has faster performance and shorter key size. At a certain same security level, ECDSA only needs 163 bits, while RSA needs 1024 bits.

Security Protocol Design and Analysis for passive RFID Tag (수동형 RFID 태그를 위한 보안 프로토콜 설계 및 분석)

  • Kim, In-Seop;Lee, Byung-Gil;Kim, Ho-Won
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.52-54
    • /
    • 2005
  • 모든 사물에 고유 식별 정보(Unique Product Identifier)가 부착되어 사물의 개별 관리 및 컴퓨팅 환경을 구성하는 RFID(전자식별) 기술이 다양한 응용 및 구현 기술을 위해 활발하게 연구되고 있다. 하지만 수동형 태그 기반 RFID 시스템은 태그 자체의 자원 제약성 때문에 인가되지 않은 사용자에 의한 악의적인 태그 점보 노출이 용이하고, 그 결과 개인의 프라이버시 및 정보의 기밀성이 위협받게 된다. 비록 이를 예방하기 위해 다양한 보호 기법이 제안 되고 있지만 수동형 태그에 적용하기 힘들거나(예: Hash 기반 메카니즘) 보안에 취약하다. 따라서 본 논문에서는 태그 코드 암호화와 리더 인증 관리를 통해서 수동형 태그에 적합하고 프라이버시 보호 및 기밀성을 제공할 수 있는 메카니즘을 제안하고자 한다.

  • PDF

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF