• Title/Summary/Keyword: 출입통제시스템

Search Result 129, Processing Time 0.039 seconds

Global Market Entry Strategy for Smart Personal Recognition-based Non-contact Thermometer Convergence access Control System (스마트 개인 인식기반 비접촉 체열측정기 융합 출입통제시스템의 글로벌 시장 진출전략)

  • Chung, Jason;Kim, hyung-o
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.673-675
    • /
    • 2021
  • Biometric technology is a next-generation information security technology that provides reliability and convenience. As a core technology in the post-corona era, then on-contact biometric access control system is capable of non-face-to-face and automated technology, and is active not only in Korea but also in overseas markets such as the United States, Europe, and the Middle East. There are precautions that must be taken to reflect requirements such as cooperation between companies and approval of the US Food and Drug Admin is tration in developing IoT-based smart device customized sensors and securing H/W systems.

  • PDF

The Design and Implementation of Mobile base on Access Control System Using ZigBee Method (지그비 기술을 이용한 무선기반의 출입 통제 시스템 설계 및 구현)

  • Joo, Heon-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.211-220
    • /
    • 2008
  • The home network technology which used USN is developing quickly. Use yet line to a lot of part as home network technology. Recently be leap into prominence to technology core of home network as wireless technology a ZigBee. ZigBee Perceive with cognition from tag and sensor as use USN, and processing, save, integration, and provide information. Implement the access control system which used technology BigBee with design at these papers. The wireless-based construction that used ZigBee. The influence that can let you implement early a Ubiquitous society is technology there being. Also, show by a large spinoff in an allied industry field, and improve the quality of life, and invention calls value added of leading edge IT service and product. The implementation of mobile base on access control system using zigbee method is expected to be helpful for the convenience in home network use.

  • PDF

Design and Development of Entrance Control System for Energy Saving (에너지 절약을 위한 출입 통제 시스템의 설계 및 구현)

  • Ko, Youngbum
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.2-4
    • /
    • 2019
  • In this study, the RFID card is designed to be developed so that when users attempt to enter or exit, the system is switched on and the system switched off if the RFID card is not placed. For this study, circuit diagrams were designed and completed. We also programmed into Arduino to send information to Windows applications. It was also programmed to create a Windows application using C# and used to receive information from Arduino. The future research projects will be developed into a system applicable to real buildings.

  • PDF

A Study on Automatic Switch Control System for Systematic Control and History Management of Underground Utility Tunnel Work (지하공동구의 체계적인 통제 및 이력관리를 위한 자동개폐시스템에 대한 연구)

  • Oh, Am-suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1443-1448
    • /
    • 2015
  • Most of access control systems for underground utility tunnel work through wired network between central system and the automatic switch control unit. However, there are several issues regarding the absence of network infrastructure and an outdoor reader in a relatively unique environment. To solve these issues we propose an authenticated key based smart phone control system for secure access to the underground utility tunnel and this scheme is anticipated providing us with crucial information about a systemic entrance history and effective management procedures of utility tunnel. In addition, the proposed scheme enables to access to secured control system in smart phone based bluetooth network and it provides information about systemic control and history management for the switch controls through smart phone applications.

A Study on the ITS integrated airport security system (ITS 통합 공항 보안시스템에 관한 고찰)

  • Kim, Chun-Suk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.2
    • /
    • pp.339-344
    • /
    • 2013
  • Airport security activities to ensure the airport's facilities and assets from crime, such as theft, to prevent. security systems that support these activities efficiently so you can be called. security center systems, CCTV systems, access control systems, intrusion detection systems, security communication systems, warning broadcasting system, network security systems, perimeter intrusion detection systems, search systems, and information security systems for the security system will be examined.

Design for Access Control System based on Voice Recognition for Infectious Disease Prevention (전염성 확산 차단을 위한 음성인식 기반의 출입통제시스템 설계)

  • Mun, Hyung-Jin;Han, Kun-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.7
    • /
    • pp.19-24
    • /
    • 2020
  • WHO declared a global pandemic on March 11th for Corona 19. However, there is a situation where you have to go to building for face-to-face education or seminars for economic and social activities. The first check method of COVID-19 infection is to measure body temperature, so the primary entrance and exit is blocked for near-field body temperature measurement. However, since it is troublesome to check directly, thermal camera is installed at the entrance of the building, and body temperature is measured indirectly using the infrared camera to control access. In case of middle and high schools, universities, and lifelong education center, we need a system that is possible to interoperate with attendance checks and automatically recognizes whether to wear masks and can authenticate students. We proposed the system that is to confirm whether to wear a mask with a camera that is embedded in a smart mirror, and that authenticates the user through voice recognition of the user who wants to enter the building by using voice recognition technology and determines whether to enter them or not. The proposed system can check attendance if it is linked with near-field temperature measurement and attendance check APP of student's smart phone.

Improving the Protection and Security System Outside the National Assembly Building (국회 외곽 경호·경비시스템 발전방향에 관한 연구)

  • Choi, O-Ho
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.113-135
    • /
    • 2019
  • Despite being one of the most important national facilities, the National Assembly building of the Republic of Korea has become increasingly vulnerable to potential terrorist attacks, and the instances of demonstrations occurring around and banned items taken into the building are continuing to rise. In addition, promoting the idea of "open assembly" has led to increased visitors and weakened access control. Furthermore, while there is a significant symbolic value attached to attacking the National Assembly building, the level of security management is relatively very low, making it a suitable target for terrorism. In order to address such vulnerability, an appropriate access control system should be in place from the areas surrounding the building. However, the National Assembly Security Service which oversees security around the building is scheduled to disband in June 2020 following the abolition of the conscripted police force in 2023. Therefore, there needs to be an alternative option to bolster the security system outside the facility. In this research, the perceptions of 114 government officials in charge of security at the National Assembly Secretariat toward the protection and security system of the areas surrounding the National Assembly building were examined. Results showed that the respondents believed it was highly likely that risky situations could occur outside the building, and the use of advanced technologies such as intelligent video surveillance, intrusion detection system, and drones was viewed favorably. Moreover, a mid- to long-term plan of establishing a unified three-layer protection system and designating a department in charge of the security outside the building were perceived positively. Lastly, the participants supported the idea of employing private police to replace the National Assembly Security Service for the short term and introducing parliamentary police for the mid- to long-term.