• Title/Summary/Keyword: 출입제어

Search Result 76, Processing Time 0.032 seconds

An Implementation Strategy of WOL(Wake On LAN) for Enhancing the Computer Security (컴퓨터 보안 강화를 위한 WOL(Wake On LAN) 기능 구현 전략)

  • Kang, Koohong;Gyeong, Gyuyeol
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.07a
    • /
    • pp.467-468
    • /
    • 2014
  • 본 논문에서는 컴퓨터 보안 강화를 위해 WOL(Wake On LAN) 기능을 출입문 제어시스템에 탑재하여 RFID 카드를 소지한 사용자만이 컴퓨터에 일차적으로 접근 가능한 전략을 제안한다. 이러한 전략은 컴퓨터 사용을 위해 단순히 비밀번호를 이용해 로그온 하는 기존의 방법과 비교해 사전에 자신의 RFID 카드를 이용한 물리보안 인증 단계를 전처리 과정으로 포함함으로써 컴퓨터 보안이 한층 강화되었다고 볼 수 있다. 뿐만 아니라 출입문 제어시스템에 탑재된 WOL 기능에 의해 사용자가 자신의 컴퓨터에 실질적으로 접근하기 이전에 일부 부팅과정에 완료됨에 따라 사용자가 컴퓨터 부팅 과정동안 기다려야하는 대기시간을 줄임으로써 업무효율을 기대할 수 있다. 본 논문에서는 RFID 리더기와 라즈베리파이(Rasqberry Pi)사용해 WOL 기능을 탑재한 출입문 제어시스템을 직접 구현하고 실제 컴퓨팅 환경을 구현해 실험을 실시하였다.

  • PDF

Design and Implementation of Wireless Multicommunication Circuit Based On USN (USN 기반의 무선 멀티 커뮤니케이션 회로 설계 및 구현)

  • Sim, Gab-Sig;Jang, Jae-Hyuk
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.8
    • /
    • pp.33-42
    • /
    • 2011
  • In this paper we designed and implemented a wireless communication circuit which can control the remote devices integrating RFID and ZigBee. This system unifies transmit part and receive part. And this system recognizes RFID tag data, then the recognized information is controlled by MCU, and transmitted to a remote device through the ZigBee. This is operated on TinyOS. If this system is applied to a entrance security system, it can permit/deny one's entrance as well as control the personal computer or other electronic devices. Our experiment shows the result of the recognized data transmission is very different according to a opened playground and a closed place. The data transmission time is stable in the indoor and the data transmission distance is long in the outdoor. We anticipate that our system be applied the various office oriented domains by connecting to the Wired LAN or the WLAN of IEEE 802.11x category.

A Study of Gate Control System Using RFID (RFID를 이용한 출입문 제어 시스템 연구)

  • Kang, Sung-Chul;Kim, Hyung-Chan;Doh, Yang-Hoi;Lee, Kwang-Man;Kim, Do-Hyeun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1505-1512
    • /
    • 2007
  • The RFID Technology (which is importantly used at the Ubiquitous environment) is attached to all of the units like the ID cards and then information on the units and units' environment is transferred and processed through the radio frequency. so it is the no touched recognition system. RFID Technology's research of the middle ware and wireless interface etc. is currently conducted and variously broaden like the industry of the distribution and logistics. This paper suggests that the gate control system which is based on RFID middle ware is realized to prevent the district and facility for security. The indication of this paper is that algorithm (which is to certificate Users' enterance through RFID EPC code) is proposed and realizes the user certification module, the control module of the gates' opening and closing, the maintenance module of the gate, the display module of coming and going information, test program ect. through RFID technology.

  • PDF

"Noise Perimeter Zones" - A New Systematic Method for Noise Exposure Reduction in Highway Construction Sites ("소음주의구역 (Noise Perimeter Zones)" - 고속도로 신설 공사 건설 현장에서의 소음 노출 저감을 위한 새로운 체계적인 방법)

  • An, Kwangseog;Moir, Susan
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.16 no.2
    • /
    • pp.123-130
    • /
    • 2006
  • 이 연구에서는 고속도로 신설 공사 건설 현장 근로자들의 소음 노출을 저감할 수 있는 방법들을 제시하며 특히 현장에서 적용할 수 있는 새로운 체계적인 방법인 "소음 주의 구역"을 제안한다. 고속도로 건설 현장에서 소음원이 되는 장비, 기계, 도구와 근로자들의 소음 노출 특성을 알아 보았으며, 개인청력 보호구, 공학적제어수단 (engineering controls), 관리적제어수단 (administrative controls)을 어떻게 적용할 것인가를 제시하였다. 개인청력 보호구만으로는 소음 노출을 효율적으로 저감시킬 수 없음을 보였으며, 공학적제어수단은 기술적 및 경제적 문제로, 관리적제어수단은 공사 기간 단축과 같은 실제적인 이유로 해서 시행 되기가 어렵다. 따라서 이 연구에서는 실제적으로 적용할 수 있는 체계적인 방법으로서 "소음주의구역 (Noise Perimeter Zones)"을 새롭게 제안하였다. 이 "소음주의구역"은 높은 수준의 소음원이 존재하는 고속도로 건설 공사 현장에 지정된다. 이 구역안에서는 근로자들의 출입이 통제되며 또한 개인청력 보호구, 공학적제어수단, 관리적제어수단과 같은 적절한 제어수단이 사용되어야 한다.

A Study on an Alternation of RNN and Access Control for Offline Environments by using I-PIN (아이핀을 이용한 오프라인 주민번호대체 및 접근제어 방법)

  • Kim, Seung-Hyun;Kim, Seok-Hyun;Jin, Seung-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.840-843
    • /
    • 2011
  • 주민등록번호는 온오프라인에서 가장 많이 사용되는 본인확인 수단이나, 해킹이나 내부자 유출문제로 인해 온라인 환경에서는 아이핀과 같은 대체방안이 제시되었다. 하지만 오프라인 환경에서는 다양한 문제가 우려되나 대체방안이 없는 상황이다. 따라서 본 논문에서는 아이핀을 오프라인 환경에서 사용하기 위한 방안을 제시한다. 아이핀 메시지의 특정 필드에 본인확인을 위한 정보와 접근 제어 정보를 암호화 한 뒤, 사용자의 휴대폰으로 아이핀 인증 요청/응답 메시지를 관리하고 기업의 출입시스템에서 본인확인과 접근제어에 활용하였다. 또한 제안한 시스템은 안드로이드가 탑재된 휴대폰에서 구현되었고 실제 서비스를 제공 중인 본인확인기관과 연계하여 본인확인 절차를 수행했다.

Development of Optimal Control System for Lighting and HVAC(Heating, Ventilation, Air Conditioning) Using Energy Saving (에너지 절감용 조명 및 공조기기 최적제어 시스템 개발)

  • Jang, Woo-Sung;Song, Yeoung-Seok;Cho, Byung-Lok;Cho, Seok-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.5
    • /
    • pp.1029-1036
    • /
    • 2018
  • This paper is a study on the development of optimal control system for lighting and air conditioning equipment to save the energy in campus environment. In the case of controling system developed through this research, lighting and air conditioner are controlled by both information on the number of people entering and leaving the room through the motion sensor and image processing, and the information on temperature and humidity. In addition, energy saving is enabled by the results that are controlled through data integration monitoring and command execution functions according to the control signals.

Study on Enhancing National Defense Security based on RFID and Internet of Things Technology (RFID와 사물인터넷을 활용한 국방 보안 강화에 대한 연구)

  • Oh, Se-Ra;Kim, Young-Gab
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.2
    • /
    • pp.175-188
    • /
    • 2017
  • Radio-frequency identification (RFID) is being used in various fields as a technology for identifying objects (people, things etc.) using radio frequencies. In the past, there was an attempt to apply RFID into national defense, but failed to spread RFID in the defense field because of some limitations of RFID in a specific situation (e.g., low recognition rate). Therefore, in this paper, we propose how to overcome the limitation of RFID by adopting the Internet of Things (IoT) technology which is considered as an important technology of the future. Furthermore, we propose four scenarios (i.e., healcare band and RFID, identification and anormal state detection, access control, and confidential document management) that can be used for enhancing national defense security. In addition, we analyze the basic characteristics and security requirements of RFID and IoT in order to effectively apply each technology and improve security level.

Untact-based elevator operating system design using deep learning of private buildings (프라이빗 건물의 딥러닝을 활용한 언택트 기반 엘리베이터 운영시스템 설계)

  • Lee, Min-hye;Kang, Sun-kyoung;Shin, Seong-yoon;Mun, Hyung-jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.161-163
    • /
    • 2021
  • In an apartment or private building, it is difficult for the user to operate the elevator button in a similar situation with luggage in both hands. In an environment where human contact must be minimized due to a highly infectious virus such as COVID-19, it is inevitable to operate an elevator based on untact. This paper proposes an operating system capable of operating the elevator by using the user's voice and image processing through the user's face without pressing the elevator button. The elevator can be operated to a designated floor without pressing a button by detecting the face of a person entering the elevator by detecting the person's face from the camera installed in the elevator, matching the information registered in advance. When it is difficult to recognize a person's face, it is intended to enhance the convenience of elevator use in an untouched environment by controlling the floor of the elevator using the user's voice through a microphone and automatically recording access information.

  • PDF

Fabrication of Security System for Preventing an intruder Using a Complex Programmable Logic Device(CPLD) (CPLD를 이용한 침입자 방지용 보안 시스템 제작)

  • Son, Ki-Hwan;Choi, Jin-Ho;Kwon, Ki-Ryong;Kim, Eung-Soo
    • Journal of Sensor Science and Technology
    • /
    • v.12 no.1
    • /
    • pp.44-50
    • /
    • 2003
  • A security system consisted of an infrared sensor and PLD(Programmable Logic Device) was fabricated to prevent an intruder. The fabricated system detect the intruder using infrared sensor and has password key pad to permit someone to enter the house and office. The control circuit of the system is designed by VHDL(Very high speed integrated Hardware Description Language). The system was demonstrated in various conditions and the output signals were displayed in LCD, LED, buzzer and so on. This designed system in this paper has a advantage to supplement additional function with ease.

Network 2-Factor Access Control system based on RFID security control system (RFID 출입통제시스템과 연동한 네트워크 이중 접근통제 시스템)

  • Choi, Kyong-Ho;Kim, Jong-Min;Lee, Dae-Sung
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.53-58
    • /
    • 2012
  • Network Access Control System that is one of the efforts to protect the information of internal applies to effectively control of insider and automatic network management and security. However, it has some problems : spoofing the authorized PC or mobile devices, connect to the internal network using a system that authorized users are away. In addition, information leakage due to malicious code in the same system. So in this paper, Network 2-Factor Access Control System based on RFID security control system is proposed for safety communication environment that performing a two-factor authentication using authorized user and devices to connect to the internal network.