• Title/Summary/Keyword: Access System

Search Result 6,584, Processing Time 0.039 seconds

LED-QR Authentication Technology for Access Control and Security

  • Chung, Youngseek;Jung, Soonho;Kim, Junwoo;Lee, Junghoon;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • v.4 no.2
    • /
    • pp.69-75
    • /
    • 2015
  • There are several possible places which are accessible in many buildings and facilities, various types of systems have been utilized such as access control or surveillance depending on the purpose. Especially if security is important, it must go through the various authentication procedures when people can access. Until now many access control systems have been proposed and developed, they are applied and utilized to companies which security is needed. However, as time passes the problems with existing access control systems occur or the vulnerabilities related to access control are reported, as technology advances. The solution to this, we propose authentication technology related to access control using LED-QR tag.

A Study of Digital Message Transfer System based on R-NAD for FM Radios (FM무전기를 통한 디지털 메시지 전송장비에 R-NAD 적용 연구)

  • Rho, Hai-Hwan;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.523-526
    • /
    • 2010
  • FM Radio communication operating mode is half-duplex mode. FM radio network access control shall be used to detect the presence of active transmissions on a multiple-subscriber-access communications network and shall provide a means to preclude data transmissions from conflicting on the network. In this study, we implemented R-NAD(Random Network Access Delay) that is one of network access control method.

  • PDF

A study on the transformation of the fisheries relations in accordance with the changes in Japan and Russia Fisheries Agreement (일본과 러시아 간 어업질서의 재편에 따른 양국 어업관계의 변모)

  • Kim, Dae-Young
    • The Journal of Fisheries Business Administration
    • /
    • v.46 no.2
    • /
    • pp.93-110
    • /
    • 2015
  • This research examined the transformations of the fisheries relations between Japan and Russia since the establishment of the Exclusive Economic Zone (EEZ) system. The author reviewed the transformations with investigation on mutual fishing access to EEZ including salmon & trout catches. The Japan-Russia fisheries relations have evolved through multiple developmental stages, which include mutual fishing access to EEZ, the reductions of a fishing quota to balance catches of the nations, provision of financial and technical support, and a payment system of EEZ fishing access fee. The Japanese salmon industry also has done similar practices, continuing to catch salmon and trout in the Russian EEZ. Additionally, Japan and Russia have attempted to develop joint fisheries projects and to assure fishing operation safety around Kuril Islands. The case of Japan-Russia mutual fishing access shows that a country that has authority over crucial fisheries resources tends to establish specific conditions of mutual fishing access so that it maximizes its national interest. Thus, this case gives us implication what could be future directions of Korea-China-Japan multinational fishing access. The principle of same number of fishing vessels and quantities of catches has worked in existing mutual fishing access to EEZ among Korea, China, and Japan. However, it is expected that a nation that is endowed with abundant fisheries resources would limit counterpart's fishing access to its EEZ. Therefore, Korean fisheries administration should prepare for all possible situations like a dramatic cut in fishing quota and the termination of fishing access. International fisheries cooperation and payment of fishing access could be viable options for such a situation.

Study on Token based KMS for Information Sharing (정보 공유를 위한 토큰 기반 KMS 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.29-34
    • /
    • 2023
  • KMS (Knowledge Management System) is used by various organizations to share information. This KMS includes important information as well as basic information used by each organization. To protect infortant information stored in KMS, many KMS use user identification and authentication features. In such a KMS security environment, if the account information of a user who can access the KMS is leaked, a malicious attacker using the account information can access the KMS and access all authorized important information. In this study, we propose KMS with user access control function that can protect important information even if user account information is leaked. The KMS with the user access control function proposed in this study protects the stored files in the KMS by applying an encryption algorithm. Users can access important documents by using tokens after logging in. A malicious attacker without a Token cannot access important files. As a result of checking the unit function for the target user access control function for effectiveness verification, it was confirmed that the access control function to be provided by KMS is normally provided.

An Implementation of Multiple Access Memory System for High Speed Image Processing (고속 영상처리를 위한 다중접근 기억장치의 구현)

  • 김길윤;이형규;박종원
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.29B no.10
    • /
    • pp.10-18
    • /
    • 1992
  • This paper considers and implementation of the memory system which provides simultaneous access to pq image points of block(p$\times$q), horizontal vector(1$\times$pq)and/vertical vector(pq$\times$1) in 2-dimension image array, where p and q are design parameters. This memory system consists of an address calculation circuit, address routing circuit, data routing circuit, module selection circuit and m memory modules where m>qp. The address calculation circuit computes pq addresses in parallel by using the difference of addresses among image points. Extra module assignment circuit is not used by improving module selection circuit with routhing circuit. By using Verilog-XL logic simulator, we verify the correctness of the memory system and estimate the performance. The implemented system provides simultaneous access to 16 image points and is 6 times faster than conventional memory system.

  • PDF

APPLICATION OF KOREAN TEXT-TO-SPEECH FOR X.400 MHS SYSTEM

  • Kim, Hee-Dong;Koo, Jun-Mo;Choi, Ho-Joon;Kim, Sang-Taek
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1994.06a
    • /
    • pp.885-892
    • /
    • 1994
  • This paper presents the Korean text-to-speech (TTS) algorithm with speed and intonation control capability, and describes the development of the Voice message delivery system employing this TTS algorithm. This system allows the Interpersonal Messaging (IPM) Service users of Message Handling System (MHS) to send his/her text messages to user via telephone line using synthetic voice. In the X.400 MHS recommendation, the protocols and service elements are not specified for the voice message delivery system. Thus, we defined access protocol and service elements for Voice Access Unit based on the application program interface for message transfers between X.400 Message Transfer Agent and Voice Access Unit. The system architecture and operations will be provided.

  • PDF

Development of Authentication Service Model Based Context-Awareness for Accessing Patient's Medical Information (환자 의료정보 접근을 위한 상황인식 기반의 인증서비스 모델 개발)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.99-107
    • /
    • 2021
  • With the recent establishment of a ubiquitous-based medical and healthcare environment, the medical information system for obtaining situation information from various sensors is increasing. In the medical information system environment based on context-awareness, the patient situation can be determined as normal or emergency using situational information. In addition, medical staff can easily access patient information after simple user authentication using ID and Password through applications on smart devices. However, these services of authentication and patient information access are staff-oriented systems and do not fully consider the ubiquitous-based healthcare information system environment. In this paper, we present a authentication service model based context-awareness system for providing situational information-driven authentication services to users who access medical information, and implemented proposed system. The authentication service model based context-awareness system is a service that recognizes patient situations through sensors and the authentication and authorization of medical staff proceed differently according to patient situations. It was implemented using wearables, biometric data measurement modules, camera sensors, etc. to configure various situational information measurement environments. If the patient situation was emergency situation, the medical information server sent an emergency message to the smart device of the medical staff, and the medical staff that received the emergency message tried to authenticate using the application of the smart device to access the patient information. Once all authentication was completed, medical staff will be given access to high-level medical information and can even checked patient medical information that could not be seen under normal situation. The authentication service model based context-awareness system not only fully considered the ubiquitous medical information system environment, but also enhanced patient-centered systematic security and access transparency.

The Proposed UMA Mode in DMB CAS Authentication Process (비인가 무선접속 모드를 이용한 디지털 멀티미디어 방송의 제한 수신시스템의 인증 제안)

  • Oh, Se-Kab;Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.3
    • /
    • pp.239-244
    • /
    • 2008
  • In this paper refer to the digital multimedia mobile phone with the combination of broadcasting and the communication the unity of wire and wireless solution that can provide the UMA(Unlicensed Mobile Access) function is added. In UNC(Universal Naming Convention) in the case of CAS(Conditional Access System) is supported, the device(mobile phone) is authenticated through AP and then following the method of broadcasting signal the user can view the wanted contents as long as they want and for this matter the service charge system are proposed.

  • PDF

The case study of implementation for a limited hospital medical information system based on ACL-applied router (ACL이 적용된 라우터 기반의 제한된 병원 의료정보시스템의 구현 사례)

  • Yoon, Sung-Ja;Kim, No-Whan;Kang, Eun-Hong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.10
    • /
    • pp.1003-1008
    • /
    • 2016
  • Recently hospitals have divided into many divisions, specialized the medical service, and shown organic cooperation, all to provide patients with various and high quality medical service. They have also showed improvement in information protection by introducing an information protection system to regulate the access to patients' medical and personal information. The purpose of this paper is to present a case study to implement of a limited hospital medical information system that can regulate the access to medical information. For this, a router-based virtual network applying an ACL(: Access Control List) to regulate access to information was made using a packet tracer.

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption

  • Liu, Zhenhua;Ji, Jiaqi;Yin, Fangfang;Wang, Baocang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.323-342
    • /
    • 2021
  • Personal health records (PHRs) is an electronic medical system that enables patients to acquire, manage and share their health data. Nevertheless, data confidentiality and user privacy in PHRs have not been handled completely. As a fine-grained access control over health data, ciphertext-policy attribute-based encryption (CP-ABE) has an ability to guarantee data confidentiality. However, existing CP-ABE solutions for PHRs are facing some new challenges in access control, such as policy privacy disclosure and dynamic policy update. In terms of addressing these problems, we propose a privacy protection and dynamic share system (PPADS) based on CP-ABE for PHRs, which supports full policy hiding and flexible access control. In the system, attribute information of access policy is fully hidden by attribute bloom filter. Moreover, data user produces a transforming key for the PHRs Cloud to change access policy dynamically. Furthermore, relied on security analysis, PPADS is selectively secure under standard model. Finally, the performance comparisons and simulation results demonstrate that PPADS is suitable for PHRs.