• Title/Summary/Keyword: RPID System

Search Result 7, Processing Time 0.023 seconds

SIP based IMPP System for Rich Presence Services (프레즌스 고급 기능 제공을 위한 SIP기반 IMPP 시스템)

  • Park, Sun-Ok;Huh, Mi-Young;Lee, Il-Jin;Kang, Shin-Gak
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.539-541
    • /
    • 2005
  • 인터넷 서비스 보급이 대중화됨에 따라 인터넷을 이용한 다양한 부가 서비스들이 창출되고 있다. 대부분의 인터넷 사용자들은 항상 누군가로부터의 관심을 갈구하기 마련이다. 메신저의 대화명이나, 미니 홈피 등을 통해 수시로 자신의 현재 심리상태를 표현하는것은 그 좋은 예라 할수 있다. 향후, 개발될 새로운 부가서비스는 이러한 사용자들의 현재 상태를 표현하기 위한 프레즌스 서비스와 통합된 형태로 발전해 나갈것으로 여겨진다. 본고에서는 현재 IETF를 중삼으로 진행되고 있는 SIP 기반 프레즌스 및 인스턴스 메시징 서비스에 대한 소개와, 사용자의 프레즌스 정보를 다양하게 기술하기 위한 프레즌스 고급 기능 표준기술도 함께 소개하고자 한다.

  • PDF

A Study on Authentication Protocol for Secure RFID Tag (RFID Tag 보안을 위한 인증 프로토콜에 관한 연구)

  • Jung, Yong-Hoon;Kim, Jung-Jae;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8B
    • /
    • pp.805-811
    • /
    • 2009
  • Firstly, this dissertation suggests the tag ID transfer method using two-dimensional arrangement. Secondly, provide better and stable security system compare to existing one by transferring tag; ID using established two-dimensional arrangement. Thirdly, provide operating module, which possible to descramble two-dimensional arrangement, with a character set when descrambling in a tag and a server. Lastly, suggest safe key transfer using a character set and two-dimensional arrangement. In order to embody suggested system and assess, transferred two-dimensional arrangement several times to carry out the experiment. Confirmed that it is impossible for suggested system to decode key patterns compare to existing RFID systems.

Attendance Check System based on Smartphone using QR code (QR코드를 활용한 스마트폰 기반 출석체크 시스템)

  • Park, Sunju
    • Journal of The Korean Association of Information Education
    • /
    • v.18 no.2
    • /
    • pp.325-334
    • /
    • 2014
  • There are management and price problems that have been caused by requirement of RFID reader, Fingerprint Identification System and Clicker for the construct of automatic attendance system to check the students' attendance accurately and quickly. Therefore, in the thesis, we developed smartphone based attendance check system by utilizing Wi-Fi and the smartphones that has been already built without using additional equipments and establishing construction of system additionally. It recognizes date, time, location and the seat number in classroom if a student logs the attendance chocking application in and it also allows students to get lecture feedback and check attendance by taking quizzes and questionnaires that are related to the lecture. As a result, by applying the attendance check system, instructors state that it is convenient since the app allows instructors to communicate with students though the quizzes and questionnaires. Especially, the instructors state that it is convenient because the results of the quizzes, questionnaires and attendance can be downloaded it the from of Excel files.

Design and Implementation of RFID Based u-SCM System for Fiber and Apparel Industry (섬유 및 의류산업의 RFID 기반 u-SCM 시스템의 설계 및 구현)

  • Moon, Il-Whan;Ahn, Jae-Geun;Kim, Sam-Keun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.986-995
    • /
    • 2011
  • Recently, the market of fiber and apparel industry is rapidly changing from producer to consumer oriented. This trend emphasizes the necessity of SCM systems being able to do flexible correspondences to the market changing through synthetically reflecting consumers' various needs and a variety of patterns. However, because traditional SCMs manage their supply chains being based on bar code systems from the production to the distribution, they are suffering from the needs of real time information sharing and have their essential restrictions in the response to the environmental changes of the market and consumers' needs. This paper suggests a new RFID based u-SCM system optimized into the fiber and apparel industry. The proposed system has the benefits that through basing on RPID can collect information of the production and the distribution real time and make better use of it and connect to the legacy systems organically via Web services and rapidly respond to the market changing and consumers' needs. Through implementation, it is demonstrated that the proposed system can effectively facilitate them.

Distributed REID Information Service Architecture for Ubiquitous Logistics (유비쿼터스 물류를 위한 분산형 RFID 정보서비스 구조)

  • Lee, Jae-Won;Lee, Young-Koo
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.2
    • /
    • pp.105-121
    • /
    • 2005
  • To realize a ubiquitous logistics management system using the smart object of Electronic Product Code(EPC) enabled RFID tag, the design and management of RFID Information Service is very important. RFID Information Service searches, transfers and responds to the other's PML request, but Physical Markup Language (PML) data management between trading system elements has issues of standardization of PML data description and processing, and problems of data traffic and communication time overload because of the innate distributed characteristics. As a complementary study, this research analyzes the usage patterns and data types of PML. On that analysis we provide a design of the distributed RFID Information Service architecture of PML data management that is using DB middleware. Standalone and Integrated type of RFID IS were proposed.

  • PDF

A Strong RFID Authentication Protocol Based on Synchronized Secret Information (비밀정보 동기화에 기반한 Strong RFID 인증)

  • Ha, Jae-Cheol;Ha, Jung-Hoon;Park, Jea-Hoon;Moon, Sang-Jae;Kim, Hwan-Koo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.99-109
    • /
    • 2007
  • Lee et al. recently proposed an RFID mutual authentication scheme based on synchronized secret information. However, we found that their protocol is vulnerable to a spoofing attack in which an adversary can impersonate a legal tag to the reader by sending a malicious random number. To remedy this vulnerability, we propose two RFID authentication protocols which are secure against all possible threats including backward and forward traceability. Furthermore, one of the two proposed protocols requires only three hash operations(but, $[m/2]{\cdot}2+3$ operations in resynchronization state, m is the number of tags) in the database to authenticate a tag, hence it is well suitable fur large scale RFID systems.

A Frequency-Sharing Method to Use Frequency Resources Efficiently (효율적인 주파수 이용을 위한 주파수 공유 방법)

  • Kang, Sang-Gee;Hwang, Taek-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.8
    • /
    • pp.1349-1355
    • /
    • 2008
  • Recently many short-range transceiver systems, such as ZigBee, Bluetooth and RFID(Radio Frequency Identification), have been developed. These systems are mostly low-power transceivers. In the near future many more low-power transceivers are appeared for WPAN(Wireless Personal Area Network) and interference mitigation technologies are necessary to the low-power transceivers for using frequency resources efficiently. In this paper we consider two methods for sharing frequency resources. The first case is that a frequency band previously assigned fer a certain system is shared and the second case is that the white frequency band is shared. We study the method and conditions for sharing frequency resources in the above two cases. When a frequency band is shared with ZigBee, RFID, DCP (Digital Cordless Phone) and Bluetooth as an example for the first case, the sharing conditions are investigated and the results are presented. We propose a balancing factor to maintain an equal transmitting conditions between systems having a different interference mitigation technique. In the interference simulation we use FH(Frequency Hopping) as a reference system and 0.9 of a balancing factor for LBT(Listen Before Talk) and 0.8 for DS(Direct Spreading). From the simulation results we know that a balancing factor reduces interference probability therefore many more systems can be operated in the same frequency bands compared with the case without using a balancing factor.