• Title/Summary/Keyword: Contactless Identification System

Search Result 16, Processing Time 0.021 seconds

Contactless Power Transfer System using Voltage Phase (전압위상을 이용한 무접점 전원공급 시스템에 관한 연구)

  • Yu, Joo-Hee;Kim, Choon-Sam
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.16 no.3
    • /
    • pp.219-226
    • /
    • 2011
  • As the existing contactless power transfer system(CPTS) is adopting the principle of contactless transformer enables to supply power in contactless way using RFID(radio frequency identification)/ID communication method between primary and secondary sides of contactless transformer and detect the alien load. Such CPTS requires the circuit that generates ID in addition, and the ID identification and control generated from the secondary side is performed at the primary side, which cuases complexity of the circuit. Therefore, this study suggested the CPTS using voltage phase, and In order to verify the validity of this study, 3[W] class CPTS shall be designed, and the simulation and test of CPTS using current and voltage phases shall be carried out.

Personal Identification Using Inner Face of Fingers from Contactless Hand Image (비접촉 손 영상에서 손가락 면을 이용한 개인 식별)

  • Kim, Min-Ki
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.8
    • /
    • pp.937-945
    • /
    • 2014
  • Multi-modal biometric system can use another biometric trait in the case of having deficiency at a biometric trait. It also has an advantage of improving the performance of personal identification by using multiple biometric traits, so studies on new biometric traits have continuously been performed. The inner face of finger is a relatively new biometric trait. It has two major features of knuckle lines and wrinkles, which can be used as discriminative features. This paper proposes a finger identification method based on displacement vector to effectively process some variation appeared in contactless hand image. At first, the proposed method produces displacement vectors, which are made by connecting corresponding points acquired by matching each pair of local block. It then recognize finger by measuring the similarity among all the detected displacement vectors. The experimental results using pubic CASIA hand image database show that the proposed method may be effectively applied to personal identification.

Contactless User Identification System using Multi-channel Palm Images Facilitated by Triple Attention U-Net and CNN Classifier Ensemble Models

  • Kim, Inki;Kim, Beomjun;Woo, Sunghee;Gwak, Jeonghwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.3
    • /
    • pp.33-43
    • /
    • 2022
  • In this paper, we propose an ensemble model facilitated by multi-channel palm images with attention U-Net models and pretrained convolutional neural networks (CNNs) for establishing a contactless palm-based user identification system using conventional inexpensive camera sensors. Attention U-Net models are used to extract the areas of interest including hands (i.e., with fingers), palms (i.e., without fingers) and palm lines, which are combined to generate three channels being ped into the ensemble classifier. Then, the proposed palm information-based user identification system predicts the class using the classifier ensemble with three outperforming pre-trained CNN models. The proposed model demonstrates that the proposed model could achieve the classification accuracy, precision, recall, F1-score of 98.60%, 98.61%, 98.61%, 98.61% respectively, which indicate that the proposed model is effective even though we are using very cheap and inexpensive image sensors. We believe that in this COVID-19 pandemic circumstances, the proposed palm-based contactless user identification system can be an alternative, with high safety and reliability, compared with currently overwhelming contact-based systems.

Enhanced Pulse Protocol RFID Reader Anti-collision Algorithm using Slot Occupied Probability in Dense Reader Environment

  • Song, In-Chan;Fan, Xiao;Chang, Kyung-Hi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.6
    • /
    • pp.299-311
    • /
    • 2008
  • The Radio Frequency IDentification (RFID) system is a contactless automatic identification system, which comprises readers and tags. In RFID systems, a reader collision occurs when there is interference in communication between one reader and the tags, due to the signals from other readers. The reader collision problem is considered as the fundamental problem affecting high density RFID reader installations. In this paper, we analyze the existing reader anti-collision algorithms. We also propose a pulse protocol-based reader anti-collision algorithm using slot occupied probability (SOP). The implementation of this improvement is simple, yet it effectively mitigates most reader collisions in dense reader mode, as shown in our simulation. That is, the proposed algorithm reduces the identification time, and increasesthe system throughput and system efficiency compared with the conventional reader anti-collision algorithms.

The design of reader for contactless ID card system (비접촉 ID 카드 시스템을 위한 리더 설계)

  • 진인수;양경록;류형선;김양모
    • Proceedings of the IEEK Conference
    • /
    • 2000.06e
    • /
    • pp.199-202
    • /
    • 2000
  • RFID (Radio Frequency Identification) is a technique which is used for identifying different types of objects and tracking people and animals. Passive RFID consists of reader, a passive tag. The reader transmit energy to a tag and read information back from tag. The tag is energized by a carrier frequency which is transmitted by the reader and transmit information back to the reader. In this paper, the circuit for read and write RFID system is presented. The presented RFID system adopts 125kHz carrier frequency, backscattering and PSK for communication method.

  • PDF

Comparison of Memoryless Anti-collision Protocols for Tag Identification (태그 인식을 위한 무기억 충돌 방지 프로토콜의 비교 분석)

  • Yang, Eui-Sik;Lim, In-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.565-568
    • /
    • 2005
  • RFID system allows contactless identification of objects, where small tags are attached to objects and information of objects are transferred using radio frequency. In recent years, industries have incorporated several identification systems to its production processes, which allow collecting automatically information about goods. In order to communicate with a single tag out of a group of tags, the target tag has to be identified. Therefore the read has to attempt to obtain the unique identification code of each tag within its read range. This paper presents performance results of QT and QT-sl protocols, which are tag identification protocols incorporating memoryless property. The memoryless property is that the current response of each tag only depends on the current query of the reader but not on the past history of the reader's queries.

  • PDF

Hybrid Tag Anti-Collision Algorithms in RFID System (RFID 시스템에서 하이브리드 태그 충돌 방지 알고리즘)

  • Shin, Jae-Dong;Yeo, Sang-Soo;Cho, Jung-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4A
    • /
    • pp.358-364
    • /
    • 2007
  • RFID, Radio Frequency Identification, technology is a contactless automatic identification technology using radio frequency. For this RFID technology to be widely spread, the problem of multiple tag identification, which a reader identifies a multiple number of tags in a very short time, has to be solved. Up to the present, many anti-collision algorithms have been developed in order to solve this problem, and those can be largely divided into ALOHA based algorithm and tree based algorithm. In this paper, two new anti-collision algorithms combining the characteristics of these two categories are presented. And the performances of the two algorithms are compared and evaluated in comparison with those of typical anti-collision algorithms: 18000-6 Type A, Type B, Type C, and query tree algorithm.

Efficient Tag Authentication Scheme using Tag ID Identification Bits in RFID Environment (RFID 환경에서 태그 ID의 식별 비트를 이용한 효율적인 태그 인증 기법)

  • Jang, Bong-Im;Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.195-202
    • /
    • 2011
  • RFID(Radio Frequency IDentification) is a system to identify objects and its usage is being extended to distribution, healthcare, and air&port etc. RFID is a contactless system environment, and reducing tag authentication time is important because multiple tags are identified at the same time. Studies about RFID system so far is, however, mostly to improve security vulnerability in the tag authentication process. Therefore, this paper suggests an efficient scheme to decrease the time of tag authentication which is also safe for the security of tag authentication process. The proposed scheme cuts down on the tag ID search time because it searches only the classified relevant ID in the database, which is one of many components of RFID system, by using identification bits for tag ID search. Consequently, the suggested scheme decreases process time for tag ID authentication by reducing the processing time and the load of the database. It also brings performance improvement of RFID system as it improves the energy applicability of passive tag.

Encryption scheme suitable to RFID Systems based on EPC Generation2 (Gen2 기반 RFID 시스템에 적합한 암호 기법 설계)

  • Won, Tae-Youn;Kim, Il-Jung;Choi, Eun-Young;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.67-75
    • /
    • 2008
  • RFID(Radio Frequency Identification) system is an automated identification system that consists of tags and readers. They communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to substitute a bar-code system. But RFID system creates new threats to the security and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve privacy problems against attacks, but it is difficult to apply to RFID system based on low-cost Gen2. Therefore, We will propose a new encryption scheme using matrix based on Gen2 in RFID system in paper, and We will analyze our encryption scheme in view of the security and efficiency through a simulation and investigate application environments to use our encryption scheme.

Change of Recognition Range According to Modulation Index of the 13.56MHz RFID Type B System (13.56MHz RFID Type B 시스템에서 변조지수에 따른 인식거리의 변화)

  • Kim, Yong-Hee;Yang, Woon-Geun;Yoo, Hong-Jun
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.119-122
    • /
    • 2005
  • In this paper, we investigated the recognition range according to modulation index for the ISO(International Standards Organization) 14443 13.56MHz contactless Type B RFID(Radio Frequency IDentification) system. We measured recognition range with changing modulation index step by step from 5% to 24% where we used 4 samples of Type B transponder with different resonance frequencies between 13.838MHz and 17.200MHz. While gradually increasing a distance in vertical direction from the center of the reader antenna, we measured the distance where the transponder's PUPI(Pseudo Unique PICC(Proximity IC Card) Identifier) is recognized continuously during 10 seconds and the distance where the transponder's PUPI is recognized at least two times during 5 seconds. From the measurement results, we found that the best recognition ranges were achieved when the reader had modulation index between 11% and 14%.

  • PDF