• Title/Summary/Keyword: Fingerprint recognition system

Search Result 144, Processing Time 0.024 seconds

User certification module development of Gallery-Auction for NFC-based 2 Factor mobile electronic payment (NFC 기반 2 Factor 모바일 전자결제를 위한 갤러리-옥션의 사용자인증 모듈 개발)

  • Jo, Won Oh;Cha, Yoon Seok;Oh, Soo Hee;Choi, Myeong Soo;Kim, Hyung Jong
    • Smart Media Journal
    • /
    • v.6 no.3
    • /
    • pp.29-40
    • /
    • 2017
  • Lately weight for smartphone mounted to function for NFC is increasing, rapidly. Because of this, NFC related technology is made by many companies. We developed Gallery-Auction for security enhancements and new services of NFC-based 2 factor electronic payment system. Enhanced security features development of user authentication module through fingerprint recognition to apply FIDO authentication technology and developed electronic contract voice service of Gallery-Auction using TTS(Text to Speech). Therefore we enhanced convenient and simple authentication method and security through NFC mobile electronic payment.

Application of metabolic profiling for biomarker discovery

  • Hwang, Geum-Sook
    • Proceedings of the Korean Society of Applied Pharmacology
    • /
    • 2007.11a
    • /
    • pp.19-27
    • /
    • 2007
  • An important potential of metabolomics-based approach is the possibility to develop fingerprints of diseases or cellular responses to classes of compounds with known common biological effect. Such fingerprints have the potential to allow classification of disease states or compounds, to provide mechanistic information on cellular perturbations and pathways and to identify biomarkers specific for disease severity and drug efficacy. Metabolic profiles of biological fluids contain a vast array of endogenous metabolites. Changes in those profiles resulting from perturbations of the system can be observed using analytical techniques, such as NMR and MS. $^1H$ NMR was used to generate a molecular fingerprint of serum or urinary sample, and then pattern recognition technique was applied to identity molecular signatures associated with the specific diseases or drug efficiency. Several metabolites that differentiate disease samples from the control were thoroughly characterized by NMR spectroscopy. We investigated the metabolic changes in human normal and clinical samples using $^1H$ NMR. Spectral data were applied to targeted profiling and spectral binning method, and then multivariate statistical data analysis (MVDA) was used to examine in detail the modulation of small molecule candidate biomarkers. We show that targeted profiling produces robust models, generates accurate metabolite concentration data, and provides data that can be used to help understand metabolic differences between healthy and disease population. Such metabolic signatures could provide diagnostic markers for a disease state or biomarkers for drug response phenotypes.

  • PDF

Design of an Visitor Identification system for the Front Door of an Apartment using Deep learning (딥러닝 기반 이용한 공동주택현관문의 출입자 식별 시스템 설계)

  • Lee, Min-Hye;Mun, Hyung-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.45-51
    • /
    • 2022
  • Fear of contact exists due to the prevention of the spread of infectious diseases such as COVID-19. When using the common entrance door of an apartment, access is possible only if the resident enters a password or obtains the resident's permission. There is the inconvenience of having to manually enter the number and password for the common entrance door to enter. Also, contactless entry is required due to COVID-19. Due to the development of ICT, users can be easily identified through the development of face recognition and voice recognition technology. The proposed method detects a visitor's face through a CCTV or camera attached to the common entrance door, recognizes the face, and identifies it as a registered resident. Then, based on the registered information of the resident, it is possible to operate without contact by interworking with the elevator on the server. In particular, if face recognition fails with a hat or mask, the visitor is identified by voice or additional authentication of the visitor is performed based on the voice message. It is possible to block the spread of contagiousness without leaving any contactless function and fingerprint information when entering and exiting the front door of an apartment house, and without the inconvenience of access.

Development of Special Asset Management System Using RFID (RFID를 이용한 특수 자산 관리 시스템 개발)

  • Han, Sang-Hoon;Min, Jang-Geun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.6
    • /
    • pp.33-41
    • /
    • 2011
  • RFID technology is already used in the various application fields such as identification card, traffic card and etc. Many RFID application systems using UHF have been developed in the field of asset management, logistics and security. Because a human being can make mistakes, we need the system that can efficiently manage the special assets such as small arms, jewelry and medicine and can monitor them in real time. In this paper, we proposed a special assets management system to keep assets in safe custody, to monitor their safety status in real time and to manage distribution channels and history of those assets. The developed system is called Smart Cabinet because it has cabinet's form. Smart Cabinet integrates such technologies as RFID, smart card, fingerprint recognition, several sensors and LCD display in order to provide the functions for special asset management. Those functions include condition monitoring of assets, traceability management, distribution channels and security logs, which are to interact with a management server. The article demonstrated the potentiality of RFID by presenting special asset management solutions dedicated to guns and medicine management, and also showed the effectiveness and possibility of those solutions.

Design of a Vision Chip for Edge Detection with an Elimination Function of Output Offset due to MOSFET Mismatch (MOSFET의 부정합에 의한 출력옵셋 제거기능을 가진 윤곽검출용 시각칩의 설계)

  • Park, Jong-Ho;Kim, Jung-Hwan;Lee, Min-Ho;Shin, Jang-Kyoo
    • Journal of Sensor Science and Technology
    • /
    • v.11 no.5
    • /
    • pp.255-262
    • /
    • 2002
  • Human retina is able to detect the edge of an object effectively. We designed a CMOS vision chip by modeling cells of the retina as hardwares involved in edge detection. There are several fluctuation factors which affect characteristics of MOSFETs during CMOS fabrication process and this effect appears as output offset of the vision chip which is composed of pixel arrays and readout circuits. The vision chip detecting edge information from input image is used for input stage of other systems. Therefore, the output offset of a vision chip determine the efficiency of the entire performance of a system. In order to eliminate the offset at the output stage, we designed a vision chip by using CDS(Correlated Double Sampling) technique. Using standard CMOS process, it is possible to integrate with other circuits. Having reliable output characteristics, this chip can be used at the input stage for many applications, like targe tracking system, fingerprint recognition system, human-friendly robot system and etc.

User Authentication System Using USB Device Information (USB 장치 정보를 이용한 사용자 인증방안)

  • Lee, Jin-Hae;Jo, In-June;Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.276-282
    • /
    • 2017
  • Password-based authentication is vulnerable because of its low cost and convenience, but it is still widely used. In order to increase the security of the password-based user authentication method, the password is changed frequently, and it is recommended to use a combination of numbers, alphabets and special characters when generating the password. However, it is difficult for users to remember passwords that are difficult to create and it is not easy to change passwords periodically. Therefore, in this paper, we implemented a user authentication system that does not require a password by using the USB memory that is commonly used. Authentication data used for authentication is protected by USB data stored in USB memory using USB device information to improve security. Also, the authentication data is one-time and reusable.Based on this, it is possible to have the same security as the password authentication system and the security level such as certificate or fingerprint recognition.

Security Measures for Casino Facilities (카지노 시설경비 안전대책 방안)

  • Lee, Sang-Chul
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.243-272
    • /
    • 2005
  • All measures related to the safety of the casino facilities guarantee safety of facilities that are targets of security guards, protect lives and properties, minimize risks of artificial and natural disaster and crimes. In summary, plan for responding to safety and accidents should be developed not only for the casino facilities but also for the facilities of annexed buildings, and lives and properties of customers and employees. Determine areas in the casino facilities that are prone to accidents and set around-the-clock guard in the areas or maintain surveillance with CCTV and prevent accidents through continuous patrol. These are the most basic and the most important requirements in safety. In addition, casinos which prompt gambling are causing economic and psychological treats to families. To resolve these social issues, casinos have adopted limited entrance system. To support this system, new forms of machine security systems such as video automatic recognition system of fingerprint pattern recognition system should be adopted too. In addition, security guards in casino facilities need to instill themselves with a sense of ownership as well as a strong sense of mission to do the best for customer security and to protect the company assets and employees and manage accidents that could occur without notice. Security guards should do their best to enable manage accidents that could occur without notice. Security guards should do their best to enable tourists who are on the rise due to increase in advanced country-style tourism and leisurely activities to get the utmost satisfaction from the casinos, and as a leader of private security company, establish the foundation for security based on the characteristics of security in Korea.

  • PDF

Model-based and wavelet-based fault detection and diagnosis for biomedical and manufacturing applications: Leading Towards Better Quality of Life

  • Kao, Imin;Li, Xiaolin;Tsai, Chia-Hung Dylan
    • Smart Structures and Systems
    • /
    • v.5 no.2
    • /
    • pp.153-171
    • /
    • 2009
  • In this paper, the analytical fault detection and diagnosis (FDD) is presented using model-based and signal-based methodology with wavelet analysis on signals obtained from sensors and sensor networks. In the model-based FDD, we present the modeling of contact interface found in soft materials, including the biomedical contacts. Fingerprint analysis and signal-based FDD are also presented with an experimental framework consisting of a mechanical pneumatic system typically found in manufacturing automation. This diagnosis system focuses on the signal-based approach which employs multi-resolution wavelet decomposition of various sensor signals such as pressure, flow rate, etc., to determine leak configuration. Pattern recognition technique and analytical vectorized maps are developed to diagnose an unknown leakage based on the established FDD information using the affine mapping. Experimental studies and analysis are presented to illustrate the FDD methodology. Both model-based and wavelet-based FDD applied in contact interface and manufacturing automation have implication towards better quality of life by applying theory and practice to understand how effective diagnosis can be made using intelligent FDD. As an illustration, a model-based contact surface technology an benefit the diabetes with the detection of abnormal contact patterns that may result in ulceration if not detected and treated in time, thus, improving the quality of life of the patients. Ultimately, effective diagnosis using FDD with wavelet analysis, whether it is employed in biomedical applications or manufacturing automation, can have impacts on improving our quality of life.

Indoor Zone Recognition System using RSSI of BLE Beacon (BLE Beacons의 RSSI를 이용한 실내 Zone인식 시스템)

  • Kim, Jinpyung;Ahn, Taeki;Kim, Sanghoon;Ahn, Chi-Hyung
    • Journal of the Korean Society for Railway
    • /
    • v.19 no.5
    • /
    • pp.585-591
    • /
    • 2016
  • Recently, indoor location detection has become an important area in the IoT (Internet of Things) environment for various indoor location-based services. In this paper, our proposed method shows that a virtual region can be divided electromagnetically according to specific facilities or services in various IoT application areas called zones. The MLP (Multi-Layer Perceptron) method is applied to recognize the service zone at the current position. The MLP utilized an RSSI (Received Signal Strength Indicator) signal of the BLE (Bluetooth Low Energy) Beacon as input data and made decisions to affiliate the zone of the current region as output. In order to verify the proposed method, we constructed an experimental environment similar in size to an actual rail station using four of the beacon and two zones.

Biometrics for Person Authentication: A Survey (개인 인증을 위한 생체인식시스템 사례 및 분류)

  • Ankur, Agarwal;Pandya, A.-S.;Lho, Young-Uhg;Kim, Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.1
    • /
    • pp.1-15
    • /
    • 2005
  • As organizations search fur more secure authentication methods (Dr user access, e-commerce, and other security applications, biometrics is gaining increasing attention. Biometrics offers greater security and convenience than traditional methods of personal recognition. In some applications, biometrics can replace or supplement the existing technology. In others, it is the only viable approach. Several biometric methods of identification, including fingerprint hand geometry, facial, ear, iris, eye, signature and handwriting have been explored and compared in this paper. They all are well suited for the specific application to their domain. This paper briefly identifies and categorizes them in particular domain well suited for their application. Some methods are less intrusive than others.

  • PDF