• Title/Summary/Keyword: 지문인식시스템

Search Result 298, Processing Time 0.028 seconds

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

Design and Implementation of User Authentication System Using USIM Information (USIM 정보를 이용한 사용자 인증 방안 설계 및 구현)

  • Lee, Jin-Woo;Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.571-578
    • /
    • 2017
  • In order to approach information system through smart device and pc, user has to authenticate him or herself via user authentication. At that time when user tries reaching the system, well-used user authentication technologies are ID/PW base, OTP, certificate, security card, fingerprint, etc. The ID/PWbased method is familiar to users, however, it is vulnerable to brute force cracking, keylogging, dictionary attack. so as to protect these attacks, user has to change the passwords periodically as per password combination instructions. In this paper, we designed and implemented a user authentication system using smartphone's USIM without using password while enhancing security than existing ID / PW based authentication technology.

The implementation of Biometric System using RF-ID (RF(RF-ID)을 이용한 Biometric System 구현에 관한 연구)

  • 김광환;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.626-629
    • /
    • 2003
  • In this paper, a system that implementation of Biometric System Using RF-ID. We organize a certification system which the security is strengthened, the information is flowed out and the presentation will do the possibility not to be abused. The loss of the credit card and problems which there is many of forgery back are happening. To solve such problems, We organized the system to use after we stored a fingerprint data at RF Card and going through certification necessary formalities. Various research to be related uses this system and is predicted. The development to common use goods will be possible through a certification procedure.

  • PDF

Door lock remote control system using Wi-Fi (와이파이를 이용한 도어락 원격제어 시스템)

  • Kim, Gi Bum;Kim, Dong Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.86-88
    • /
    • 2017
  • The digital door lock is an electronic door lock that uses a password system and has the function of automatically locking the door when the door is closed, thus eliminating the worry about the door lock. As the technology has gradually developed, various authentication technologies such as semiconductor key system, RFID, and fingerprint recognition have been introduced. However, there is a danger of copying the door lock key, and there are password stealing and infringement. In this paper, we develop a remote control system that can unlock or open a smartphone to supplement the user's risk. The system you are going to develop can use WiFi to check if the door is locked or open on your smartphone, and you can lock or unlock the door remotely.

  • PDF

Attendance Check System based on Smartphone using QR code (QR코드를 활용한 스마트폰 기반 출석체크 시스템)

  • Park, Sunju
    • Journal of The Korean Association of Information Education
    • /
    • v.18 no.2
    • /
    • pp.325-334
    • /
    • 2014
  • There are management and price problems that have been caused by requirement of RFID reader, Fingerprint Identification System and Clicker for the construct of automatic attendance system to check the students' attendance accurately and quickly. Therefore, in the thesis, we developed smartphone based attendance check system by utilizing Wi-Fi and the smartphones that has been already built without using additional equipments and establishing construction of system additionally. It recognizes date, time, location and the seat number in classroom if a student logs the attendance chocking application in and it also allows students to get lecture feedback and check attendance by taking quizzes and questionnaires that are related to the lecture. As a result, by applying the attendance check system, instructors state that it is convenient since the app allows instructors to communicate with students though the quizzes and questionnaires. Especially, the instructors state that it is convenient because the results of the quizzes, questionnaires and attendance can be downloaded it the from of Excel files.

Toward Design and Implement to Multiple Schemes for Strong Authentication Mechanism - Case Studying : Secure Entrance System - (다단계 사용자 신분확인 메커니즘 설계와 구현 방안 : 출입통제 시스템 사례 중심으로)

  • Hong Seng-Phil;Kim Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.161-172
    • /
    • 2006
  • As the innovative technologies related to ubiquitous computing are being rapidly developed in recent IT trend, the concern for IT dysfunction(e.g., personal information abuse, information risk, threat, vulnerability, etc.) are also increasing. In our study, we suggested how to design and implement to multiple schemes for strong authentication mechanism in real system environments. We introduce the systematic and secure authentication technologies that resolve the threats incurring from the abuse and illegal duplication of financial transaction card in the public and financial institutions. The multiple schemes for strong authentication mechanism applied to java technology, so various application programs can be embedded, Independent of different platforms, to the smartcard by applying the consolidated authentication technologies based on encryption and biometrics(e.g., finger print identification). We also introduce the appropriate guidelines which can be easily implemented by the system developer and utilized from the software engineering standpoint of view. Further, we proposed ways to utilize java card based biometrics by developing and applying the 'smartcard class library' in order for the developer and engineers involved in real system environment(Secure entrance system) to easily understand the program. Lastly, we briefly introduced the potential for its future business application.

  • PDF

Enterprise Human Resource Management using Hybrid Recognition Technique (하이브리드 인식 기술을 이용한 전사적 인적자원관리)

  • Han, Jung-Soo;Lee, Jeong-Heon;Kim, Gui-Jung
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.333-338
    • /
    • 2012
  • Human resource management is bringing the various changes with the IT technology. In particular, if HRM is non-scientific method such as group management, physical plant, working hours constraints, personal contacts, etc, the current enterprise human resources management(e-HRM) appeared in the individual dimension management, virtual workspace (for example: smart work center, home work, etc.), working time flexibility and elasticity, computer-based statistical data and the scientific method of analysis and management has been a big difference in the sense. Therefore, depending on changes in the environment, companies have introduced a variety of techniques as RFID card, fingerprint time & attendance systems in order to build more efficient and strategic human resource management system. In this paper, time and attendance, access control management system was developed using multi camera for 2D and 3D face recognition technology-based for efficient enterprise human resource management. We had an issue with existing 2D-style face-recognition technology for lighting and the attitude, and got more than 90% recognition rate against the poor readability. In addition, 3D face recognition has computational complexities, so we could improve hybrid video recognition and the speed using 3D and 2D in parallel.

The System of Arresting Wanted Vehicles for Violent Crimes for Public Safety (국민안전을 위한 강력범죄 수배차량 검거시스템)

  • Ji, Moon-Se;Ki, Heajeong;Ki, Chang-Min;Moon, Beom-Seob;Park, Sung-Geon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1762-1769
    • /
    • 2021
  • The final goal of this study is to develop a system that can analyze whether a wanted vehicle is a criminal vehicle from images collected from black boxes, smartphones, CCTVs, and so on. Data collection was collected using a self-developed black box. The used data in this study has used a total of 83,753 cases such as the eight vehicle types(truck, RV, passenger car, van, SUV, bus, sports car, electric vehicle) and 434 vehicle models. As a result of vehicle recognition using YOLO v5, mAP was found to be 80%. As a result of identifying the vehicle model with ReXNet using the self-developed black box, the accuracy was found to be 99%. The result was verified by surveying field police officers. These results suggest that improving the accuracy of data labeling helps to improve vehicle recognition performance.

Design of a User authentication Protocol Using Face Information (얼굴정보를 이용한 사용자 인증 프로토콜 설계)

  • 지은미
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.157-166
    • /
    • 2004
  • Consequently substantial research has been done on the development of the bio-metric recognition method as well as technical research in the field of authentication. As a method of bio-metric recognition, personal and unique information such as fingerprints, voice, face, Iris, hand-geometry and vein-pattern are used. The face image system in bio-metric recognition and information authentication reduces the denial response from the users because it is a non-contact system the face image system operates through a PC camera attached to a computer base this makes the system economically viable as well as user friendly. Conversely, the face image system is very sensitive to illumination, hair style and appearance and consequently creates recognition errors easily, therefore we must build a stable authentication system which is not too sensitive to changes in appearance and light. In this study, I proposed user authentication protocol to serve a confidentiality and integrity and to obtain a least Equal Error Rate to minimize the wrong authentication rate when it authenticates the user.

  • PDF

Virtual Interaction based on Speech Recognition and Fingerprint Verification (음성인식과 지문식별에 기초한 가상 상호작용)

  • Kim Sung-Ill;Oh Se-Jin;Kim Dong-Hun;Lee Sang-Yong;Hwang Seung-Gook
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.05a
    • /
    • pp.192-195
    • /
    • 2006
  • In this paper, we discuss the user-customized interaction for intelligent home environments. The interactive system is based upon the integrated techniques using speech recognition and fingerprint verification. For essential modules, the speech recognition and synthesis were basically used for a virtual interaction between the user and the proposed system. In experiments, particularly, the real-time speech recognizer based on the HM-Net(Hidden Markov Network) was incorporated into the integrated system. Besides, the fingerprint verification was adopted to customize home environments for a specific user. In evaluation, the results showed that the proposed system was easy to use for intelligent home environments, even though the performance of the speech recognizer was not better than the simulation results owing to the noisy environments

  • PDF