• Title/Summary/Keyword: Card Identification

Search Result 117, Processing Time 0.029 seconds

A Attendance-Absence Checking System using the Self-organizing Face Recognition (자기조직형 얼굴 인식에 의한 학생 출결 관리 시스템)

  • Lee, Woo-Beom
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.72-79
    • /
    • 2010
  • A EAARS(Electronic Attendance-Absence Recording System) is the important LSS(Learning Support System) for blending a on-line learning in the face-to-face classroom. However, the EAARS based on the smart card can not identify a real owner of the checked card. Therefore, we develop the CS(Client-Sever) system that manages the attendance-absence checking automatically, which is used the self-organizing neural network for the face recognition. A client system creates the ID file by extracting the face feature, a server system analyzes the ID file sent from client system, and performs a student identification by using the Recognized weight file saved in Database. As a result, The proposed CS EAARS shows the 92% efficiency in the CS environment that includes the various face image database of the real classroom.

Digital Holographic Security Identification System (디지털 홀로그래픽 보안 인증 시스템)

  • Kim, Jung-Hoi;Kim, Nam;Jeon, Seok-Hee
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.2
    • /
    • pp.89-98
    • /
    • 2004
  • In this paper, we implement a digital holographic security card system that combines digital holographic memory using random phase encoded reference beams with electrical biometrics. Digitally encoded data including a document, a picture of face, and a fingerprint are recorded by multiplexing of holographic memory. A random phase mask encoding reference beams are used as a decoded key to protect illegal counterfeit. As a result, we can achieve a raw BER of 3.6${\times}$10-4 and shift selectivity of 4${\mu}{\textrm}{m}$ using the 2D random phase mask. Also, we develop a recording pattern and image processing which are suitable for a low cost reader without a position sensing photo-detector for real time data extraction and remove danger of fraud from unauthorized person by comparing the reconstructed holographic data with the live fingerprint data.

Toward Design and Implement to Multiple Schemes for Strong Authentication Mechanism - Case Studying : Secure Entrance System - (다단계 사용자 신분확인 메커니즘 설계와 구현 방안 : 출입통제 시스템 사례 중심으로)

  • Hong Seng-Phil;Kim Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.161-172
    • /
    • 2006
  • As the innovative technologies related to ubiquitous computing are being rapidly developed in recent IT trend, the concern for IT dysfunction(e.g., personal information abuse, information risk, threat, vulnerability, etc.) are also increasing. In our study, we suggested how to design and implement to multiple schemes for strong authentication mechanism in real system environments. We introduce the systematic and secure authentication technologies that resolve the threats incurring from the abuse and illegal duplication of financial transaction card in the public and financial institutions. The multiple schemes for strong authentication mechanism applied to java technology, so various application programs can be embedded, Independent of different platforms, to the smartcard by applying the consolidated authentication technologies based on encryption and biometrics(e.g., finger print identification). We also introduce the appropriate guidelines which can be easily implemented by the system developer and utilized from the software engineering standpoint of view. Further, we proposed ways to utilize java card based biometrics by developing and applying the 'smartcard class library' in order for the developer and engineers involved in real system environment(Secure entrance system) to easily understand the program. Lastly, we briefly introduced the potential for its future business application.

  • PDF

A Model for Self-Authentication Based on Decentralized Identifier (탈중앙화 신원증명에 기반한 본인 인증 모델)

  • Kim, Ho-Yoon;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.66-74
    • /
    • 2021
  • With the development of the Internet, user authentication technology that proves me online is improving. Existing ID methods pose a threat of personal information leakage if the service provider manages personal information and security is weak, and the information subject is to the service provider. In this study, as online identification technology develops, we propose a DID-based self-authentication model to prevent the threat of leakage of personal information from a centralized format and strengthen sovereignty. The proposed model allows users to directly manage personal information and strengthen their sovereignty over information topics through VC issued by the issuing agency. As a research method, a self-authentication model that guarantees security and integrity is presented using a decentralized identifier method based on distributed ledger technology, and the security of the attack method is analyzed. Because it authenticates through DID Auth using public key encryption algorithms, it is safe from sniffing, man in the middle attack, and the proposed model can replace real identity card.

Two Cases of Anti-Jka Whose Reactivity Was Disappeared after Enzyme Treatment (효소 처리 후 항체반응이 사라진 항-Jka 2예)

  • Choi, Moon Suk;Cho, Yong Gon;Lee, Jaehyeon;Kim, Dal Sik;Lee, Hye Soo;Choi, Sam Im
    • The Korean Journal of Blood Transfusion
    • /
    • v.23 no.2
    • /
    • pp.173-179
    • /
    • 2012
  • We report on two cases of anti-$Jk^a$, whose reactivity disappeared on an antibody identification test using enzyme-treated red cells. One of two patients was a 72-year-old female with cirrhosis of the liver and colon cancer, and the other was a 55-year-old female with known MDS and incomplete Behcet's disease. Results of an antibody identification test using a LISS/Coombs gel card (DiaMed AG) showed negative to one positive with red cells having the $Jk^a$ antigen; however, all reactions using the enzyme-treated cells showed negative results, which was unexpected. The patients' RBC phenotype was Jk(a-b+). We obtained positive results in reactions of enzyme-treated $Jk^a+$ cells and EDTA using a patient's serum and proved that the cause of the negative reaction might be complement-related.

Design of RFID Tag Data Format for Books Information Management and Implementation of System (도서 관리를 위한 RFID 태그 데이터 포맷 설계 및 시스템 구현)

  • Jeong, Pil-Seong;Jung, Won-Soo;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.3
    • /
    • pp.1-7
    • /
    • 2007
  • RFID ( Radio Frequency IDentification ) is an automatic realization technology that recognizes things or a person with data stored tag, card, label, etc that have microchip by using radio frequency. Automation and efficient data base management(DBM) of system are possible by replaces using Bar-code that is used widely with using RFID. In this paper, we designed RFID tag data format that used to recognize information of books in Library and implemented library management system. Library management system is divided checking collection of books, self-loaning books system, self-returning books system, management books information system for a librarian. RFID leader realized information of tag and transfer it to host computer through RS-232 interface. Host computer processes and operates information with middleware. System that we made is depending on executive system for a librarian.

Certified Key Management in Multi K-FIDO Device Environment (복수 K-FIDO 기기 환경에서의 인증키 관리)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.293-303
    • /
    • 2017
  • FIDO(Fast IDentity Online) technology is expanding very rapidly which can replace traditional password-based authentication with biometrics technology[1,7]. FIDO provides convenient authentication with biometrics technology and secure key management with smart card technology, but it does not provide user identification, thus traditional user identification technology should be used before a FIDO device is registered to a FIDO server. K-FIDO[3] is an approach to implement FIDO and certificate-based authentication technology into a single device that user can utilize certificate-based authentication in initial registration of FIDO device to FIDO server. It is expected that very shortly users will own and use multiple K-FIDO devices. If we consider the traditional approach of copying single certificate to multiple devices or issuing independent certificate to each device, there will be many complex problems. In this paper we propose more secure and convenient key management technology in multiple K-FIDO device scenario using self-extended certification[4].

Conceptual Design of Crew Support System Based on Wireless Sensor Network and Power Line Communication for Cruise Ship (전력선통신(Power Line Communication) 기반 센서네트워크를 이용한 크루즈선 승무원 지원 시스템 개념연구)

  • Kang, Hee-Jin;Lee, Dong-Kon;Park, Beom-Jin;Paik, Bu-Geun;Cho, Seong-Rak
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.46 no.6
    • /
    • pp.631-640
    • /
    • 2009
  • The highest priority of the cruise trip is the safety and comfort of its passengers. Though the cruise lines take every appropriate measure to ensure that their Passengers are safe and experience enjoyable vacations it is hard to fulfill all passenger's personnel requirement with limited number of crews. Generally, each passenger is issued an identification card which contains their digital photo and personal identification information on a magnetic strip that he or she must present when entering or leaving the ship. This technology allows the ship to know which Passengers and crew members are on board and which are not. However, this system has some limitations of functions and usage. To support each passenger as his or her personal liking, additional number of crews or some kind of new system is needed. In this paper, the crew support system based on sensor network using wireless and wired communication technologies was studied. To design the system, PLC(Power Line Communication) system and ZigBee based passenger location recognition, classification system has studied experimentally. By using this system, crews can serve passengers more closely and personally with less effort.

Red Cell Alloimmunization and Autoimmunization in Multi-Transfused Thalassemia Patients in Sulaymaniyah Province-Iraq

  • Abdulqader, Aveen M. Raouf;Mohammed, Ali Ibrahim;Mohammed, Nagham Ibrahim
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.52 no.2
    • /
    • pp.98-104
    • /
    • 2020
  • Thalassemias are considered important health issues throughout Iraq, involving its Kurdistan region. This disorder, particularly its major form, needs lifelong regular transfusions. But this form of medical care is associated with various complications including red cell alloimmunization and autoimmunization. This study determined the frequency and associations of alloimmunization among multi-transfused patients with β-thalassemia major. The subjects were 204 patients who were registered at a thalassemia care center in Sulaymaniyah-Iraqi Kurdistan. The patients' records were analyzed, their red cells were phenotyped for ABO/RhD antigens using the gel card method, and irregular antibody screening/identification was performed using the standard tube method. Alloantibodies were detected in 5.8% of the patients, while DAT was positive in 4% of the patients, which indicated autoantibodies. The identified alloantibodies were anti-E (2.4%), anti-C (1.4%), anti-e (1%), and anti-K (1%). A patient's age at the start of transfusion (>2 years) (P=0.042) and a positive history of transfusion reactions (P=0.003) were correlated with a significantly higher rate of alloantibody formation. From the results of our study, we conclude that measures to decrease the development of alloantibodies may incorporate matching for Rhesus and Kell systems and early induction of blood transfusions.

Fuzzy Supervised Learning Algorithm by using Self-generation (Self-generation을 이용한 퍼지 지도 학습 알고리즘)

  • 김광백
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.7
    • /
    • pp.1312-1320
    • /
    • 2003
  • In this paper, we consider a multilayer neural network, with a single hidden layer. Error backpropagation learning method used widely in multilayer neural networks has a possibility of local minima due to the inadequate weights and the insufficient number of hidden nodes. So we propose a fuzzy supervised learning algorithm by using self-generation that self-generates hidden nodes by the compound fuzzy single layer perceptron and modified ART1. From the input layer to hidden layer, a modified ART1 is used to produce nodes. And winner take-all method is adopted to the connection weight adaptation, so that a stored pattern for some pattern gets updated. The proposed method has applied to the student identification card images. In simulation results, the proposed method reduces a possibility of local minima and improves learning speed and paralysis than the conventional error backpropagation learning algorithm.

  • PDF