• Title/Summary/Keyword: 출입보안시스템

Search Result 121, Processing Time 0.027 seconds

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

Implementation of Position Awareness System Using One-Pass Tag (원패스 태그를 이용한 위치인식 시스템 구현)

  • Sohn, Jong-Hoon;Hwang, Gi-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.301-303
    • /
    • 2012
  • In this Paper, we are implemented position awareness system based on one-pass tag. This system are combined ZigBee and RFID technology. We developed the solution to detect of user's position using position awareness receiver and repeater. This location recognition includes parked car location tracking, coming in and out car, automation of immigration control, enhanced security through emergency call, and automatic invocation elevator control and etc.

  • PDF

A study on Improved Convergence Security Monitoring System model (융합보안관제시스템 개선에 관한 연구)

  • Lee, Dong-Hwi;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.3-12
    • /
    • 2011
  • According to the NIS, damages due to leaking industrial technology are reaching tens of trillion won. The type of damages are classified according to insider leaks, joint research, and hacking, illegal technology leaks and collaborated camouflaged. But 80% of them turned out to be an insider leak about connecting with physical security. The convergence of IT and non IT is accelerating, and the boundaries between all area are crumbling. Information Security Industry has grown continuously focusing Private Information Security which is gradually expanding to Knowledge Information Security Industry, but Information Security Industry hereafter is concentrated with convergence of IT Security Technology and product, convergence of IT Security and Physical Security, and IT convergence Industry Security. In this paper, for preventing company information leaks, logical security and physical security both of them are managed at the same level. In particular, using convergence of physical security systems (access control systems, video security systems, and others) and IT integrated security control system, convergence security monitoring model is proposed that is the prevention of external attacks and insider leaks, blocked and how to maximize the synergy effect of the analysis.

3D Image Qube Password Interface Design and Implementation for Entrance/Exit of Sailors (선박승무원 출입관리를 위한 3차원 영상 큐브 암호 인터페이스 설계 및 구현)

  • Son, Nam-Rye;Jeong, Min-A;Lee, Seong-Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1A
    • /
    • pp.25-32
    • /
    • 2010
  • Recently a passenger ship and liner has been spread throughout men of diversity, the space and informations is not open to general passenger. Therefore security systems are necessary for special sailors to admit them. Although security systems has a variety usage methods which are organism recognition(finger printer, iritis and vein etc) a few years ago, these usages has a defect reusing other objects because of leaving a trace. Therefore this paper designs and implements using 3D Qube image password interface which hand gestures are recognized after acquiring from 2D input image for protective marker of finger printer.

Trends in Intelligent Video Surveillance (지능형 영상보안 기술현황 및 동향)

  • Yu, Jang-Hui;Mun, Gi-Yeong;Jo, Hyeon-Suk
    • Electronics and Telecommunications Trends
    • /
    • v.23 no.4
    • /
    • pp.80-88
    • /
    • 2008
  • 9.11 사태 이후, 세계 각국은 개인 및 공공의 안전을 위한 국토보안에 대한 중요성을 한층 더 실감하고 이에 대한 노력을 더욱 강화하고 있으며, 이러한 과정에서 지능형 영상보안 기술의 개발 및 활용에 대한 중요성이 날로 증대되고 있다. 아날로그 CCTV에서 디지털 저장장치, IP 기반기술과의 결합과 지능형 영상인식에 이르기까지 영상보안 기술은 지속적인 진화를 거듭하고 있다. 이에 따라 기존의 시설물과 출입자에 대한 수동적인 녹화 및 감시에서 실시간으로 상황을 인지하고 자율대응할 수 있는 네트워크 기반의 지능형 시스템으로 발전하고 있다. 또한 공항, 군사, 항만, 도로, 교량 등 주요 국가시설, 지하철, 버스, 사무실, 카지노에서 산불감시에 이르기까지 매우 다양한 분야로 그 응용영역을 확대하고 있는 추세에 있다. 본 고에서는 이러한 배경을 토대로 영상 보안 기술의 현황과 시장동향, 지능형 영상보안 및 Human ID 기술, 최근 이슈와 발전 방향에 관하여 살펴보고자 한다.

The Design and Implementation of Mobile base on Access Control System Using ZigBee Method (지그비 기술을 이용한 무선기반의 출입 통제 시스템 설계 및 구현)

  • Joo, Heon-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.211-220
    • /
    • 2008
  • The home network technology which used USN is developing quickly. Use yet line to a lot of part as home network technology. Recently be leap into prominence to technology core of home network as wireless technology a ZigBee. ZigBee Perceive with cognition from tag and sensor as use USN, and processing, save, integration, and provide information. Implement the access control system which used technology BigBee with design at these papers. The wireless-based construction that used ZigBee. The influence that can let you implement early a Ubiquitous society is technology there being. Also, show by a large spinoff in an allied industry field, and improve the quality of life, and invention calls value added of leading edge IT service and product. The implementation of mobile base on access control system using zigbee method is expected to be helpful for the convenience in home network use.

  • PDF

Authentication of the smart wallet based on One-time password (일회용 패스워드 기반의 스마트 지갑 인증)

  • Choi, Yo-Han;Seo, Hee-Suk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.739-742
    • /
    • 2011
  • 스마트폰의 보급과 함께 등장한 스마트지갑은 스마트폰을 이용한 지불 시스템이다. 스마트지갑을 이용하여 결제를 수행하기 위해서는 결제단말과 스마트폰의 페어링 과정이 필요하다. 페어링을 통해 결제가 이루어지는 만큼 페어링 과정의 보안이 중요하다. 하지만 현재의 페어링과정에 적용되는 보안절차는 이미지 비교, 바코드, 사운드 등의 원시적인 차원의 보안절차만이 적용되어 있는 수준으로 보안강도가 낮다. 본 논문에서는 일회용 패스워드를 이용하여 기존의 페어링의 취약점을 보완하려고 한다. 일회용 패스워드를 이용하기 위해서는 사용자의 모바일ID를 검증하는 인증서버가 필요하다. 인증서버와 사용자 인증을 수행하는 단말사이의 통신은 해시 값을 이용하여 통신함으로 보안성을 높일 수 있다. 또한, 일회용 패스워드 기반의 스마트 지갑은 지불 서비스 이외에도 출입인증수단으로 이용될 수 있다.

Research commuter terminal system using finger vein (지정맥을 이용한 출퇴근 단말기 시스템 연구)

  • Jeong, Dong-Jin;Cho, Jae-Hyun;Kim, Gwan-Hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.672-673
    • /
    • 2016
  • 최근 위변조에 의한 본인 인증 관련 사고가 급증하였으며 지문인식 밑 기타 다양한 인증시스템이 연구되고 있다. 최근에는 사람의 지정맥을 활용한 인증 시스템의 개발에 차세대 인증 시스템으로 연구가 활발히 진행되고 있다. 지정맥 인증 기술은 손가락 두 번째 마디 내 정맥을 말한다. 지정맥의 특성은 겉으로 보이지 않고 사람마다 패턴이 다르기 때문에 위 변조가 불가능하다. 뿐만아니라 지정맥 인증은 인증 절차가 간단하고, 보안성이 매우 높은 것으로 알려져 있다. 본 연구는 기존 지문을 이용한 출/퇴근 정보는 각종 관련 사고를 유발 시킬 수 있음을 방지하고자 지정맥을 이용한 본인 인증에 대한 보안성을 높이고, 각종 부당 취득 사고(추가근무)를 미연에 방지할 수 있으며, 지정맥을 이용해 출입/퇴근 시간을 기록하며 기록된 데이터로 지각/추가 근무 시간을 정확하게 측정 할 수 있다. 본 논문의 연구 결과물을 통해서 지정맥을 이용한 출/퇴근 정보를 데이터베이스/엑셀/텍스트에 저장하고, 기록된 정보를 이용해 지각/추가근무 시간을 정확하게 산출하여 각종사고를 미연에 방지할 수 있음을 확인하였다.

  • PDF

Utilization of Physical Security Events for the Converged Security using Analytic Hierarchy Process: focus on Information Security (계층분석과정을 이용한 융합보안을 위한 물리 보안 이벤트 활용: 정보 보안 중심)

  • Kang, Koo-Hong;Kang, Dong-Ho;Nah, Jung-Chan;Kim, Ik-Kyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.553-564
    • /
    • 2012
  • Today's security initiatives tend to integrate the physical and information securities which have been run by completely separate departments. That is, the converged security management becomes the core in the security market trend. However, to the best of our knowledge, we cannot find any solutions how to combine these two security events for the converged security. In this paper, we propose an information security object-driven approach which utilizes the physical security events to enhance and improve the information security. For scalability, we also present a systematic method using the analytic hierarchy process finding the meaningful event combinations among the large number of physical security events. In particular, we show the whole implementation processes in detail where we consider the information security object 'illegal computing system access' combined with two physical security devices - access controller and CCTV+video analyzer system.

A Study on Convergence of Cyber Security Monitoring and Industrial Security (기밀유출방지를 위한 융합보안 관리 체계)

  • Lee, Chang-Hun;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.61-67
    • /
    • 2010
  • Information communication the dazzling development life was convenient with to join in and planned an industrial technical advance. Not only the nation with technical security of the enterprise between the description competition keenly in the present point of view which rushes to technical competitive time of the nation between is become accomplished. The damage which is caused by with outflow of industrial secrecy that company prevents this effectively because is threatening at the degree which will threaten the existence of the nation and the technique which manages is become accomplished with the domestic foreign enemy. Prevents an industrial secret outflow the research for on a large scale with physical security technique and information security to be divided, is researched.