• Title/Summary/Keyword: ID Registration

Search Result 35, Processing Time 0.025 seconds

Construction Plan of 3D Cadastral Information System on Underground Space (지하공간 3차원 지적정보시스템 구축 방안 연구)

  • Song, Myungsoo;Lee, Sungho
    • Journal of the Korean GEO-environmental Society
    • /
    • v.15 no.6
    • /
    • pp.57-65
    • /
    • 2014
  • Recently, Construction business is changing from on the ground to underground space because of deficit of developing space, creation of green space and of incremental of land compensation expenses. Meanwhile, 3D Topographic, Marine and Cadastral maps need to have Spatial Interrelation. Also, understanding of the information is also needed. Spatial information object registration system is impossible to contact and understanding intelligence mutually because the former one is managed as automatic ID system. Therefore, 3D Object information ID System of underground space is managed based on Object Identifier. Construction of Spatial information integration ID System is required and it will offer Division Code (Ground, Index, Underground) and depth information. We are defined and classified Under Spatial Information in this paper. Moreover, we developed the integration ID System based on UFID for cadastral information Construction. We supposed underground spatial information DB Construction and a developed the way of exploiting 3D cadastral information system through the study. The research result will be the base data of Standard ID system, DB Construction and system Development of National spatial data which is considered together with spatial interrelation.

FIDO Universal Authentication System Based on Blockchain (블록체인 기반의 FIDO 범용 인증 시스템)

  • Kim, S.H.;Huh, S.Y.;Cho, Y.S.;Cho, S.R.;Kim, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.1
    • /
    • pp.34-44
    • /
    • 2018
  • In this paper, we describe a FIDO universal authentication system based on a Blockchain that can share the user's FIDO authentication information between the application services of multiple domains without the use of a server. In addition we provide a method to query the FIDO authentication information of the user recorded in the Blockchain using only the user's service ID. Therefore, even if the user executes the FIDO registration process only once, the user can use the FIDO authentication service of another application service without repeating an additional FIDO registration procedure, and the service provider can securely share and utilize the FIDO authentication information of the user without the use of a trusted third party, thereby lowering the deployment and maintenance costs of the FIDO server.

Performance enhancement of movement-based registration using cache (캐시를 이용한 이동기준 위치등록의 성능개선)

  • 황광신;유병한;김경수;백장현
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.683-686
    • /
    • 2000
  • 본 연구에서는 이동기준 위치등록(Movement-Based Registration, MBR)과 선택적 페이징(Selective Paging, SP)을 근간으로 하여 무선 채널에서의 신호 트래픽을 최소화할 수 있는 방법을 제안하고 성능을 분석하였다. 먼저, 사각형 셀 환경에서 선택적 페이징 방법을 적용할 경우 페이징 영역을 적절히 선택함으로써 기존 방법보다 페이징 부하를 줄일 수 있는 방안을 제시하고 성능을 분석하였다. 또한 이동국이 이미 통과한 셀들의 ID를 캐시에 유지함으로써 위치등록 횟수를 줄일 수 있는 개선된 이동기준 위치등록(Improved MBR, IMBR) 방법을 제시하고 성능을 분석하였다. 본 연구의 결과는, 시스템의 운용환경에 따라 적절한 위치등록 방법을 선택, 운용하는 데에 효과적으로 이용될 수 있다.

  • PDF

Design and Implementation of Distributed Mutual Exclusion Lock Counter Algorithm (분산 상호 배제 카운트 알고리즘을 이용한 클라이언트 사용자 구분 시스템 개발)

  • Jang, Seung-Ju
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1227-1235
    • /
    • 2000
  • In this paper, we propose new concepts that the distributed counter value with the distributed EC system identify each user who users the distributed system. The web user should register his/her own user ID in the cyber shopping mall system. Instead of registration, this paper proposes the proprietary mechanism that is distributing counter. The counter assigns the distinguished number to each client. The distributed lock algorithm is used for mutual assignment of the counter to each client. The proposed algorithm is the best solution in the distributed environment system such as cyber shopping mall. If a user should register his/her own ID in every EC system, he/she may not try to use these uncomfortable systems. The mutual counter is used to identify each client. All of these features are designed and implemented on Windows NT web server. Also these features were experiments with 5 clients for 300 times. According to the experiments, clients have their own mutual counter value. The proposed algorithm will be more efficient in internet application environment. Moreover, it will improve the number of internet users.

  • PDF

Mobility Support Architecture in Locator-ID Separation based Future Internet using Proxy Mobile IPv6

  • Seok, Seung-Joon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.2
    • /
    • pp.209-217
    • /
    • 2014
  • Of several approaches for future Internet, separating two properties of IP address into locator and identifier, is being considered as a highly likely solution. IETF's LISP (Locator ID Separation Protocol) is proposed for this architecture. In particular, the LISP model easily allows for device mobility through simple update of information at MS (Mapping Server) without a separate protocol. In recent years, some of the models supporting device mobility using such LISP attributes have emerged; however, most of them have the limitation for seamless mobility support due to the frequent MS information updates and the time required for the updates. In this paper, PMIPv6 (Proxy Mobile IPv6) model is applied for mobility support in LISP model. PMIPv6 is a method that can support mobility based on network without the help of device; thus, this we define anew the behavior of functional modules (LMA, MAG and MS) to fit this model to the LISP environment and present specifically procedures of device registration, data transfer, route optimization and handover. In addition, our approach improves the communication performance using three tunnels identified with locators between mobile node and corresponding node and using a route optimized tunnel between MN's MAG and CN's MAG. Finally, it allows for seamless mobility by designing a sophisticated handover procedure.

On UPAN System Implementation using an NAN System as Ubiquitous Numbering and Address System (신기통신망 번호체계로서 번호문 번호체계를 이용한 보편개인대표 번호의 구현방안)

  • Ku Jay-Il;Chinn Yong-Ok
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.165-172
    • /
    • 2006
  • This paper describes which UPAN System Implementation using an NAN System as Ubiquitous Numbering and Address System. IT is based to UPTN and eNUM and also scribed by NAN of the ortho phonic korean alphabet. other case, in English. the UPAN system is integrated by two kind of numbering system, one is PSTN, another is domain name and address based IP. By this result we contributed personal ID and many kind of numbering of telecommunications services and all kind of personal ID and numbering system by the proper auto-raising registration. Now, we are confirmed this is key solution of ubiquitous networking and defined supra service structures.

  • PDF

Establishment of Hanwoo(Korean Cattle, Bos taurus, Linn.) Traceability System Using Radio Frequency Identification(RF-ID) (전자식별칩(RF-ID)을 이용한 한우 생산이력추적시스템 도입)

  • Seo, K. S.;Kim, S.;Lee, J.G.;Sohn, Y.G.;Salces, A.J.;Choi, T.J.
    • Journal of Animal Science and Technology
    • /
    • v.50 no.1
    • /
    • pp.1-8
    • /
    • 2008
  • This study was conducted to develop a traceability system for systematic animal identifi- cation to increase efficiency of animal production, post production and processing to ensure that quality and sanitary meat products reach the consumers of the entire country. The new animal identification traceability system was designed for easy management, data collection and storage considering bar code, registration number and farm number.Specifically the system aimed 1) To provide standard radio frequency technology identification (RF-ID) for livestock management, standard of ear tag, microchip and ear tag identification equipment, 2) To guarantee meat product label thereby safeguarding the consumers 3) To give incentives to farmers for producing quality meat products and 4) To provide unified system for national livestock management.Results of the research which started in July 2003 which was used by several farmers’ cooperatives and Department Store revealed the feasibility of using the RF-ID system although much will be done to conform to global nomenclatures.

Vision-based Authentication and Registration of Facial Identity in Hospital Information System

  • Bae, Seok-Chan;Lee, Yon-Sik;Choi, Sun-Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.59-65
    • /
    • 2019
  • Hospital Information System includes a wide range of information in the medical profession, from the overall administrative work of the hospital to the medical work of doctors. In this paper, we proposed a Vision-based Authentication and Registration of Facial Identity in Hospital Information System using OpenCV. By using the proposed security module program a Vision-based Authentication and Registration of Facial Identity, the hospital information system was designed to enhance the security through registration of the face in the hospital personnel and to process the receipt, treatment, and prescription process without any secondary leakage of personal information. The implemented security module program eliminates the need for printing, exposing and recognizing the existing sticker paper tags and wristband type personal information that can be checked by the nurse in the hospital information system. In contrast to the original, the security module program is inputted with ID and password instead to improve privacy and recognition rate.

A Hierarchical Preamble Design Technique for Efficient Handover in OFDM-based Multi-hop Relay Systems (OFDM 기반 다중 홉 릴레이시스템에서 효율적인 핸드오버를 위한 계층적 프리앰블 설계 기법)

  • Yoo, Hyun-Il;Kim, Yeong-Jun;Woo, Kyung-Soo;Kim, Jae-Kwon;Yun, Sang-Boh;Cho, Yong-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.4A
    • /
    • pp.342-351
    • /
    • 2008
  • In this paper, a new handover procedure for OFDM-based multi-hop relay systems is proposed to reduce the handover overhead by distinguishing inter-cell handover event from intra-cell handover event at the level of physical layer using a hierarchical design concept of preamble. A Subcell ID concept for identifying RS in a cell is proposed in the design of hierarchical manner, in addition to the existing Cell ID for identifying BS. The decision on either inter-cell handover or intra-cell handover is made by the signal quality measure of CBINR(Carrier of BS to Interference and Noise Ratio) and CRINR(Carrier of RS to Interference and Noise Ratio), provided by the hierarchical preamble. The proposed handover procedure can simplify scanning procedure and skip/simplify network re-entry procedure (capability negotiation, authorization, registration), resulting in a significant reduction of handover overhead.

A Study on the Next Generation Identification System of Mobile-Based using Anonymous Authentication Scheme (익명 인증기법을 이용한 모바일 기반 차세대 본인확인수단에 관한 연구)

  • Park, Jeong Hyo;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.511-516
    • /
    • 2013
  • The cases of identification forgery and counterfeiting are increasing under the current identification system, which was established based on social conditions and administrative environments over 20 years ago. This leads to an increase of various criminal acts including illegal loan using fake ID and a number of damages caused out of good intentions that result in interference with the operations of public organizations. In addition, according to the advancement of information society, privacy protection has emerged as an important issue. However, ID card exposes individuals' personal information, such as names, resident registration numbers, photos, addresses and fingerprints, and thus the incidents associated with illegal use of personal information are increasing continuously. Accordingly, this study aimed at examining the issues of ID card forgery/counterfeiting and privacy protection and at proposing a next-generation identification system to supplement such weaknesses. The top priority has been set as prevention of forgery/counterfeiting and privacy protection in order to ensure the most important function of national identification system, which is user identification.