• Title/Summary/Keyword: Card Identification

Search Result 117, Processing Time 0.025 seconds

A Development of Household Debt Management Education and Counseling Programs (가계의 부채관리 교육 및 상담프로그램의 개발)

  • 최현자;성영애
    • Journal of Families and Better Life
    • /
    • v.19 no.1
    • /
    • pp.235-251
    • /
    • 2001
  • The purposes of this study was to develop household debt management education and counseling programs. The issues related with the consumer use of credit were identified and the selected programs of the United States were analyzed to develop the education and counseling programs for Korean households. Curriculums for the debt management education in three subjects and the process for debt counseling were suggested. Debt management education program included the issues related to general credit management strategy, credit card usage, and debt burden. For debt counseling, worksheets of problem identification, budget analysis, and action planning were developed.

  • PDF

Algorithm Development of Electric Door Lock for Security Improvement (전자 도어록의 보안성 향상을 위한 알고리즘 개발)

  • 장긍덕;고영준;남효덕;장호경
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2001.07a
    • /
    • pp.515-518
    • /
    • 2001
  • In this study, the electric door lock using the password input system for security improvement was fabricated. The security has been improved by using the multiple micro process. The controller with solenoid valve has been designed indirect driving system for releasing the door lock system. Also, the self checkup system for improving the trustworthy was developed with two kinds of micro process. The results will be applied IC card system and fingerprint identification system for security improvement.

  • PDF

The design of reader for contactless ID card system (비접촉 ID 카드 시스템을 위한 리더 설계)

  • 진인수;양경록;류형선;김양모
    • Proceedings of the IEEK Conference
    • /
    • 2000.06e
    • /
    • pp.199-202
    • /
    • 2000
  • RFID (Radio Frequency Identification) is a technique which is used for identifying different types of objects and tracking people and animals. Passive RFID consists of reader, a passive tag. The reader transmit energy to a tag and read information back from tag. The tag is energized by a carrier frequency which is transmitted by the reader and transmit information back to the reader. In this paper, the circuit for read and write RFID system is presented. The presented RFID system adopts 125kHz carrier frequency, backscattering and PSK for communication method.

  • PDF

A Study on Safe Identification Card Using Fingerprint Recognition and Encrypted QR (지문인식기술과 암호화된 QR코드를 이용한 안전한 신분증 연구)

  • Song, Chung-Geon;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.317-323
    • /
    • 2014
  • The registration cards that are currently used to identify the people of Korea may cause secondary damage once stolen because they contain very specifically expressed fingerprint information. In order to solve this problem, in ID is required that can utilize the state-owned fingerprint DB, while while maintaining confidentiality of the identification information and satisfying the cost as well. At this point accordingly, a secure form of ID, which uses the encrypted QR code and fingerprint information, is proposed.

Java Card-based User Authentication and Personalized IPTV Services in 3G Mobile Environment (개인 맞춤형 IPTV 서비스를 위한 자바카드 기반의 사용자 인증 메커니즘)

  • Park, Youn-Kyoung;Lim, Sun-Hee;Yun, Seung-Hwan;Yi, Ok-Yeon;Lee, Sang-Jin
    • Journal of Broadcast Engineering
    • /
    • v.13 no.4
    • /
    • pp.528-543
    • /
    • 2008
  • Internet Protocol Television (IPTV) provides an interactive and personalized service for realizing integrated broadcasting and telecommunication services. Set-top box (SIB) connected to TV is an essential component required for IPTV and has a unique hardware identifier used in identification and authentication. It means that subscriber authentication based on box-level identification is inconsistent with IPTV's main intention of providing personalized services. The proposed solution is to provide an opportunity to use the flexible user-centric authentication mechanism through Java Card applets in IPTV application server and 3G networks. This paper suggests personalized services by moving the user's private data and authentication management beyond the STB to a truly personalized device, the ubiquitous mobile phone. In addition, this paper presents effectiveness and security analysis for verifying the proposal.

A Study on the RFID Biometrics System Based on Hippocampal Learning Algorithm Using NMF and LDA Mixture Feature Extraction (NMF와 LDA 혼합 특징추출을 이용한 해마 학습기반 RFID 생체 인증 시스템에 관한 연구)

  • Oh Sun-Moon;Kang Dae-Seong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.4 s.310
    • /
    • pp.46-54
    • /
    • 2006
  • Recently, the important of a personal identification is increasing according to expansion using each on-line commercial transaction and personal ID-card. Although a personal ID-card embedded RFID(Radio Frequency Identification) tag is gradually increased, the way for a person's identification is deficiency. So we need automatic methods. Because RFID tag is vary small storage capacity of memory, it needs effective feature extraction method to store personal biometrics information. We need new recognition method to compare each feature. In this paper, we studied the face verification system using Hippocampal neuron modeling algorithm which can remodel the hippocampal neuron as a principle of a man's brain in engineering, then it can learn the feature vector of the face images very fast. and construct the optimized feature each image. The system is composed of two parts mainly. One is feature extraction using NMF(Non-negative Matrix Factorization) and LDA(Linear Discriminants Analysis) mixture algorithm and the other is hippocampal neuron modeling and recognition simulation experiments confirm the each recognition rate, that are face changes, pose changes and low-level quality image. The results of experiments, we can compare a feature extraction and learning method proposed in this paper of any other methods, and we can confirm that the proposed method is superior to the existing method.

The Study on Difference in Length Cognition Ability in Dominant Eye (우성안에 따른 길이식별 인지능력 차이에 관한 연구)

  • Nam, Kun-Woo;Park, Dae-Sung
    • Journal of Korean Physical Therapy Science
    • /
    • v.15 no.4
    • /
    • pp.11-17
    • /
    • 2008
  • Background: Human body is formed of symmetric bilateral structures that are comprised of eye, upper arm, lower arm and etc. but, we are used only dominant components. The purpose of this study was to analysis length cognition ability in dominant eye. Methods: Total 88 persons (male 18, female 70) were participated in this study. They were tested with ‘hole in the card’ test for identification of dominant eye's side, then the length cognition ability was measured in right & left axillary level by describing 10cm line. Results: The results by independent t-test were as follows. In difference of length cognition ability in right axillary level between right dominant eyed group & left dominant eyed group, right dominant eyed group was superior to left dominant eyed group, but significant difference was not existed statistically(p>.05). In left axillary level, right dominant eyed group was superior to left dominant eyed group, but significant difference was not existed statistically(p>.05). Conclusion: These result can be applied to the learning of palpation & observation skill in physical therapy, although this study was not identify a relation between dominant eye & dominant hand.

  • PDF

A Study on the Recognition of Face Based on CNN Algorithms (CNN 알고리즘을 기반한 얼굴인식에 관한 연구)

  • Son, Da-Yeon;Lee, Kwang-Keun
    • Korean Journal of Artificial Intelligence
    • /
    • v.5 no.2
    • /
    • pp.15-25
    • /
    • 2017
  • Recently, technologies are being developed to recognize and authenticate users using bioinformatics to solve information security issues. Biometric information includes face, fingerprint, iris, voice, and vein. Among them, face recognition technology occupies a large part. Face recognition technology is applied in various fields. For example, it can be used for identity verification, such as a personal identification card, passport, credit card, security system, and personnel data. In addition, it can be used for security, including crime suspect search, unsafe zone monitoring, vehicle tracking crime.In this thesis, we conducted a study to recognize faces by detecting the areas of the face through a computer webcam. The purpose of this study was to contribute to the improvement in the accuracy of Recognition of Face Based on CNN Algorithms. For this purpose, We used data files provided by github to build a face recognition model. We also created data using CNN algorithms, which are widely used for image recognition. Various photos were learned by CNN algorithm. The study found that the accuracy of face recognition based on CNN algorithms was 77%. Based on the results of the study, We carried out recognition of the face according to the distance. Research findings may be useful if face recognition is required in a variety of situations. Research based on this study is also expected to improve the accuracy of face recognition.

CEPS 기반의 개방형 전자화폐 Teeni 시스템 개발

  • Oh, Gyung-Seok;Heo, Sin;Do, Gyung-Gu;Ryu, Jae-Chul;Kim, Woon;Kim, Hyung-Ju
    • The Magazine of the IEIE
    • /
    • v.29 no.11
    • /
    • pp.1333-1342
    • /
    • 2002
  • 최근 들어 컴퓨터 통신의 확산과 함께 인터넷의 사용이 전 세계적으로 급증함에 따라 인터넷의 용도는 지금까지의 학술 및 연구를 대상으로한 정보 공유의 목적에서 인터넷을 마케팅의 대상으로 보고 이를 상업적으로 이용하려는 시도가 증가하고 있다. 이미 선진 외국의 경우에는 Mon-dex, Visa cash, Proton 등의 다양한 전자화폐 상품이 개발되어 사용되고 있으나 국제 호환성의 측면에서는 아직 미미한 형편이며 국제간 통용이 가능한 개방형 전자화폐 시스템 개발은 매우 필요하다. 소액지불 시스템의 국제 표준규격으로 인정받고 있는 CEPS(Common Electronic Purse Specification) 기반의 개방형 전자화폐 teem 시스템은 EMV(Europay, Master, Visa) 규격을 준용하고, PKI 기반의 보안기능을 채택하여 지불거래시 반드시 확보되어야 할 거래 데이타의 비밀성, 무결성, 부인방지 기능과 PIN(Personal Identification Number)를 이용한 사용자 인증을 제공하며 구매거래시 IC카드와 가맹점의 구매 단말기(POS)와의 오프라인 동적데이타 인증 (Dynamic Data Authentication) 방식의 상호인증을 제공한다. 개방형 전자화폐 teem 시스템의 구성 모듈은 발급, 충전, 구매, 정산, 인증시스템으로 구성되어 있으며, 웹기반의 사용자 인터페이스를 제공하고 DES, 3-DES, SHA-1, RSA, SEED등 다양한 암호 모듈과 다양한 어플리케이션의 탐재가 가능한 Java Card를 기반으로 하고 있으며, VOP(Visa Open Platform) 2.0,1, Java Card API 2.1 지원하는 시스템이다.

  • PDF

Development of Special Asset Management System Using RFID (RFID를 이용한 특수 자산 관리 시스템 개발)

  • Han, Sang-Hoon;Min, Jang-Geun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.6
    • /
    • pp.33-41
    • /
    • 2011
  • RFID technology is already used in the various application fields such as identification card, traffic card and etc. Many RFID application systems using UHF have been developed in the field of asset management, logistics and security. Because a human being can make mistakes, we need the system that can efficiently manage the special assets such as small arms, jewelry and medicine and can monitor them in real time. In this paper, we proposed a special assets management system to keep assets in safe custody, to monitor their safety status in real time and to manage distribution channels and history of those assets. The developed system is called Smart Cabinet because it has cabinet's form. Smart Cabinet integrates such technologies as RFID, smart card, fingerprint recognition, several sensors and LCD display in order to provide the functions for special asset management. Those functions include condition monitoring of assets, traceability management, distribution channels and security logs, which are to interact with a management server. The article demonstrated the potentiality of RFID by presenting special asset management solutions dedicated to guns and medicine management, and also showed the effectiveness and possibility of those solutions.