• Title/Summary/Keyword: 출입보안시스템

Search Result 121, Processing Time 0.024 seconds

Design of Smart Digital Door Lock System Using Heterogeneous Communication (이종 통신을 이용한 스마트 디지털 도어락 시스템 설계)

  • Han, Yong-Sik;Cho, Hyun-Chul;Park, Jin-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.1
    • /
    • pp.45-52
    • /
    • 2018
  • In this paper, we propose smart digital door lock system using heterogeneous communication. This system has efficient function using RF communication and Internet communication, and realizes access and real image of the passengers by combining camera control technology to secure original competitiveness with existing products. It uses the Internet of things and receive images to and from your smart-phone. And senses human behavior. In the simulated results, the image transmission rate of 90 % or more and the time required to transmit 10,000 images have an average transmission speed of 3 seconds. It is expected to secure competitiveness to increase the security of door lock in the future by enabling minimum security and fire monitoring service in real time.

Biometrics System Technology Trends Based on Biosignal (생체신호 기반 바이오인식 시스템 기술 동향)

  • Choi, Gyu-Ho;Moon, Hae-Min;Pan, Sung-Bum
    • Journal of Digital Convergence
    • /
    • v.15 no.1
    • /
    • pp.381-391
    • /
    • 2017
  • Biometric technology is a technology for authenticating a user using the physical or behavioral features of the inherent characteristics of the individual. With the necessity and efficiency of the technology in the fields of finance, security, access control, medical welfare, inspection, and entertainment, the service range has been expanding. Biometrics using biometric information such as fingerprints and faces have been exposed to counterfeit and disguised threats and become a social problem. Recent studies using a bio-signal from the inside of the body other than the bio-information of the external body are being developed. This paper analyzes the recent research and technology of biometric systems using bio-signals, ECG, heart sounds, EEG, and EMG to present the skills needed for the development direction. In the future, utilizing the deep learning to build and analyze database to manage bio-signal based big data for the complex condition of individuals, biometrics technologies suitable for real time environment are expected to be researched.

Tracking Path Generation of Mobile Robot for Interrupting Human Behavior (행동차단을 위한 이동로봇의 추적경로 생성)

  • Jin, Taeseok
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.5
    • /
    • pp.460-465
    • /
    • 2013
  • In this paper, we describe a security robot system to control human's behavior in the security area. In order to achieve these goals, we present a method for representing, tracking and human blocking by laserscanner systems in security area, with application to pedestrian tracking in a crowd. When it detects walking human who is for the security area, robot calculates his velocity vector, plans own path to forestall and interrupts him who want to head restricted area and starts to move along the estimated trajectory. While moving the robot continues these processes for adapting change of situation. After arriving at an opposite position human's walking direction, the robot advises him not to be headed more and change his course. The experimental results of estimating and tracking of the human in the wrong direction with the mobile robot are presented.

Cloud-based malware QR Code detection system (클라우드 기반 악성 QR Code 탐지 시스템)

  • Kim, Dae-Woon;Jo, Young-Tae;Kim, Jong-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.9
    • /
    • pp.1227-1233
    • /
    • 2021
  • QR Code has been used in various forms such as simple business cards and URLs. Recently, the influence of Corona 19 Fundemik has led to the use of QR Codes to track travel routes through visits and entry / exit records, and QR Code usage has skyrocketed. In this way, most people have come to use it in the masses and are constantly under threat. In the case of QR Code, you do not know what you are doing until you execute it. Therefore, if you undoubtedly execute a QR Code with a malicious URL inserted, you will be directly exposed to security threats. Therefore, this paper provides a cloud-based malware QR Code detection system that can make a normal connection only when there is no abnormality after determining whether it is a malicious QR Code when scanning the QR Code.

A Study on Emergency Evacuation Route Planning and USN-Based Induction Activities of Correctional Facilities (교정시설의 비상시 피난경로계획 및 USN기반 대피유도활동에 관한 연구)

  • Park, Joo-Hyung;Park, Jong-Hyun
    • Fire Science and Engineering
    • /
    • v.25 no.2
    • /
    • pp.39-46
    • /
    • 2011
  • In correctional facilities with majority of occupants in custody, the safe evacuation guide without getaway accidents should be very important due to complexity in escape paths. Fire causes are various in correctional facilities, for example, arson fire is a major cause in mental treatment facilities, however, old facilities or carelessness of flammable materials consist of fire causes in jail facilities. Both types of correctional facilities are the same in terms of many casualties from the fire cases. The thesis focus on escape paths and evacuation guide plans on the basis of analysis on fire cases and structural vulnerability, and then an electronic unlocking system is concededly installed for safe evacuation of occupants in custody without getaway accidents. Especially, the effect of the electronic unlocking system is going to be analyzed on the basis of RSET (required safe egress time) in order to realize for the occupants to evacuate safely to the front yard in case of emergency. In conclusion, if electronic security allowed system with USN (Ubiquitous Sensor Networks) technology should be installed in multi-storey correctional buildings, it is proposed that the occupants in custody might be a guided safely without getaway trials.

Security Problem of National Major Facility's Parking Lot and its Improvement Method -Focused on Doonchi(Waterside) Parking Lot of National (국가중요시설의 주차장 보안의 문제점과 개선방안: 국회둔치주차장을 중심으로)

  • Lee, Sang-Hun;Lee, Sang-Yeol
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.61-87
    • /
    • 2017
  • National Assembly is a constitutional institution that is required to first consult the will of the people and it should do its effort continuously so that security of citizens using parking lot would be enhanced at the same time while improving parking service in order to increase customer satisfaction of the people. Under this recognition, in this study, Doonchi parking lot of National Assembly under consigned management was first reviewed in a perspective of criminal prevention through environmental design(CPTED) and particularly, fence installation and reinforcement work for securing 'territoriality' and operation of all round shooting camera and installation of No-trespassing warning board at entrance were suggested. Second, it was recommended to change independent control system in which CCTV security system of National Assembly Doonchi parking lot is operated separately from National Assembly safety situation room and integrate it with National Assembly safety situation room(revised to double safety system) and performance of CCTV camera was made to be increased to over 2m. In addition, video recording mode was converted to NVR mode for application to IP camera in the future and in order to avoid dead zone of security monitoring area and based on site inspection result, addition 3 places of newly installing CCTV were indicated. Third, it was recommended to introduce parking fare billing and management system through unmanned equipment in parking lot management and operation.(specialized management of professional parking service provider was reviewed). By doing so, risk of cash handling by charging personnel was removed by reducing current 7 working personnel to 3 and particularly, by converting parking lot management mode being operated temporarily from 9 A.M. to 9 P.M. at present to 24 hours operation mode and providing more specialized parking service, citizens visiting National Assembly were provided with convenience and image of National Assembly was also enhanced. This study was carried out in parallel with various literature and case studies, including data from the Office of the Defense Protection in the National Assembly.

  • PDF

Fingerprint Identification Algorithm using Pixel Direction Factor in Blocks (블록별 화소방향성분을 이용한 지문의 동일성 판별 알고리즘)

  • Cho Nam-Hyung;Lee Joo-Shin
    • The KIPS Transactions:PartB
    • /
    • v.12B no.2 s.98
    • /
    • pp.123-130
    • /
    • 2005
  • In this paper, fingerprint identification algorithm using pixel direction factor in blocks is proposed to minimize false acceptance ratio and to apply security system. The proposed algorithm is that a fingerprint image is divided by 16 blocks, then feature parameters which have direct factors of $0^{\circ},\;45^{\circ},\;90^{\circ}\;and\;135^{\circ}$ is extracted for each block. Membership function of a reference fingerprint and an input fingerprint for the extracted parameters is calculated, then identification of two fingerprint is distinguished using fuzzy inference. False acceptance ratio is evaluated about different fingerprints of In kinds regardless of sex and shape which are obtained from adults, and false rejection ratio is evaluated about fingerprints which are obtained by adding fingerprints of 10 kinds on different fingerprints of 100 kinds. The experiment results is that false acceptance ratio is average $0.34\%$ about experiment of 4,950 times, and false rejection ratio is average $3.7\%$ about experiment of 1,000 times. The proposed algerian is excellent for recognition rate and security.

Security Measures for Casino Facilities (카지노 시설경비 안전대책 방안)

  • Lee, Sang-Chul
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.243-272
    • /
    • 2005
  • All measures related to the safety of the casino facilities guarantee safety of facilities that are targets of security guards, protect lives and properties, minimize risks of artificial and natural disaster and crimes. In summary, plan for responding to safety and accidents should be developed not only for the casino facilities but also for the facilities of annexed buildings, and lives and properties of customers and employees. Determine areas in the casino facilities that are prone to accidents and set around-the-clock guard in the areas or maintain surveillance with CCTV and prevent accidents through continuous patrol. These are the most basic and the most important requirements in safety. In addition, casinos which prompt gambling are causing economic and psychological treats to families. To resolve these social issues, casinos have adopted limited entrance system. To support this system, new forms of machine security systems such as video automatic recognition system of fingerprint pattern recognition system should be adopted too. In addition, security guards in casino facilities need to instill themselves with a sense of ownership as well as a strong sense of mission to do the best for customer security and to protect the company assets and employees and manage accidents that could occur without notice. Security guards should do their best to enable manage accidents that could occur without notice. Security guards should do their best to enable tourists who are on the rise due to increase in advanced country-style tourism and leisurely activities to get the utmost satisfaction from the casinos, and as a leader of private security company, establish the foundation for security based on the characteristics of security in Korea.

  • PDF

A Study on Competitiveness-reinforcing Factors in Designing Digital Door Lock Products and in Penetrating the Market -With Focus on an Analysis of Consumers' Preference by Product- (디지털 도어락 시장 진입을 위한 제품디자인의 경쟁력 장화요소 연구 - 제품별 소비자 선호도 분석을 중심으로 -)

  • Yoo, Boo-Mee
    • Archives of design research
    • /
    • v.18 no.1 s.59
    • /
    • pp.135-144
    • /
    • 2005
  • Consumers' awareness of product value, and their product preferences, are becoming increasingly influential in product development, particularly in corporations' efforts in manufacturing products with a competitive edge. Corporations conduct surveys on consumers' product satisfaction and preferences and conduct in-depth studies on consumer needs. They then manufacture products in accordance with the results of these surveys and studies. With the necessity and demand for digital door lock products recently growing, this research sought to explore product competitiveness reinforcement factors that could facilitate market penetration, and to formulate corresponding design strategies. In-depth consumer interviews were also conducted to identify consumer lifestyles and needs. Furthermore, consumer preference images, purchase and use-related patterns, and the status of door lock markets were studied. In the past, to design and manufacture consumer-oriented products, corporations primarily resorted to the improvement of the products' technological features. At present, the users' product preferences and the ways that they use these products are the factors that determine product design. Consumers today tend to adjust their lifestyles according to available products, and prefer products that have greater value in terms of lifestyle and culture. Strategic points for reinforcing competitiveness were presented in this study: first, offering different values that will enhance consumer satisfaction, second, positively developing bio-recognizable methods that will boost consumer preference, third, meeting the consumers' expectations that door lock products should not be mere 'entrance and exit control' systems, but network security systems and fourth, adopting convenient authentication methods backed by advanced technologies.

  • PDF

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF