• Title/Summary/Keyword: Secure Entrance System

Search Result 19, Processing Time 0.024 seconds

Development of Secure Entrance System using AOP and Design Pattern (관점지향 소프트웨어 개발 방법론과 디자인 패턴을 적용한 출입 보안 시스템 개발)

  • Kim, Tae-Ho;Cheon, Hyeon-Jae;Lee, Hong-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.943-950
    • /
    • 2010
  • A secure entrance system is complicated because it should have various functions like monitoring, logging, tracing, authentication, authorization, staff locating, managing staff enter-and-leave, and gate control. In this paper, we built and applied a secure entrance system for a domestic nuclear plant using Aspect Oriented Programming(AOP) and design pattern. Using AOP has an advantage of clearly distinguishing the role for each functional module because building a system separated independently from the system's business logic and security logic is possible. It can manage system alternation flexibility by frequent change of external environment, building a more flexible system based on increased code reuse, efficient functioning is possible which is an original advantage of AOP. Using design pattern enables to design by structuring the complicated problems that arise in general software development. Therefore, the safety of the system can also be guaranteed.

Toward Design and Implement to Multiple Schemes for Strong Authentication Mechanism - Case Studying : Secure Entrance System - (다단계 사용자 신분확인 메커니즘 설계와 구현 방안 : 출입통제 시스템 사례 중심으로)

  • Hong Seng-Phil;Kim Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.161-172
    • /
    • 2006
  • As the innovative technologies related to ubiquitous computing are being rapidly developed in recent IT trend, the concern for IT dysfunction(e.g., personal information abuse, information risk, threat, vulnerability, etc.) are also increasing. In our study, we suggested how to design and implement to multiple schemes for strong authentication mechanism in real system environments. We introduce the systematic and secure authentication technologies that resolve the threats incurring from the abuse and illegal duplication of financial transaction card in the public and financial institutions. The multiple schemes for strong authentication mechanism applied to java technology, so various application programs can be embedded, Independent of different platforms, to the smartcard by applying the consolidated authentication technologies based on encryption and biometrics(e.g., finger print identification). We also introduce the appropriate guidelines which can be easily implemented by the system developer and utilized from the software engineering standpoint of view. Further, we proposed ways to utilize java card based biometrics by developing and applying the 'smartcard class library' in order for the developer and engineers involved in real system environment(Secure entrance system) to easily understand the program. Lastly, we briefly introduced the potential for its future business application.

  • PDF

A study of express bus entrance system for wheelchair users (고속버스용 휠체어 탑승 전용 승강구 개조부 연구)

  • Lee, Yong-Woo;Ha, Sung-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.1-8
    • /
    • 2019
  • In the rapidly aging society, the number of wheelchair users is increasing steadily. On the other hand, it is almost impossible for a disabled person using a wheelchair to use express buses. Therefore, it is necessary to develop an express bus that can secure the rights of wheelchair users. For these special types of express buses, it is required to develop a special entrance and lift system. The development of a wheelchair entrance system for the express buses requires design modification, retrofit, and reinforcement of the bus frame. This study evaluated the structural integrity of an entrance system for wheelchair users using a finite element method. Torsional stiffness and modal analysis were performed through structural analysis. Through sensitivity analysis, optimization was performed to reduce the weight of the frame. These results on the wheelchair entrance system are expected to be utilized in the vehicle modification and welfare industries.

Reliability of essay-writing scoring in university entrance exam (논술 채점의 신뢰도에 관한 연구)

  • 허명회;한상태
    • The Korean Journal of Applied Statistics
    • /
    • v.9 no.2
    • /
    • pp.45-53
    • /
    • 1996
  • Essay-writing, first introduced to Korean university entrance exams in 1994, is gaining its weight year by year. Especially from 1997 when Nationwide Education Reform System begins, it will be a key component of student selection criteria at Korean universities. Essay-writing's future, however, will not be that smooth unless it shows necessary validity and reliability. This study is on reliability of Essay-writing scoring, mainly from the experience of University K case. To secure solid reliability in Essay-writing scoring for the 1995 University Entrance Exam, the authors started research from the 1994 Autumn Pre-exam which was administred to potential applicants of University K following year. Total of 1,254 students took Essay-writing exam and, subsequently, their essays were graded by two professors independently. The result was not so good. The correlation between two scores was 0.27[0.54] with Cronbach alpha 0.43[0.70] for Humanity-Social Science [Natural Science-Engineering] field. So, some action for reliability improvement was inevitable. The authors considered and investigated following two alternatives. Alternative 1 [A1] : Essays are to be graded three tiems independently at the 1995 University K Entrance Exam. Scores will be given as the average of three scores. Alternative 2 [A2] : Essays are to be graded twice independently, followed by a possible third grading only if two gradings show "significant" defference. Scores are given as the third score if done or the average of first two scores otherwise.otherwise.

  • PDF

Remote Secure Entrance Control System using RFID and TCP/IP (RFID와 TCp/IP를 활용한 원격 보안 출입 제어 시스템)

  • Kim, Jeong-Sook;Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.60-67
    • /
    • 2008
  • At present, RFID system is highly welcomed as a substitute system with its bar code recognition system and self recognition equipment. Consequently, the system has multi applications and can be complementing to its security. In particular, RFID system is significantly related with electronic transaction equipments : transportation card, ID card in check point, attendance sheet. Based upon these characteristic, the system is becoming extremely popular in the field of logistics, harbor and stock management, animal control and product circulation & distribution. In this dissertation, I would like to present a more efficient and stable remote entry control system with the network-based TCP/IP. It is a simple example of ubiquitous computing function. Above all, approved protocol system should be applied to the remote entry control function. Its efficient function with the applied approval protocol based-remote entry control system should be confirmed. Therefore, a preliminary test should be prerequisite in automatic entrance function with the embedded and TCP/IP-based RFID system.

The Role of Electronic Trade Specialized Service Provider under Global Trade Environment

  • Lee, Bong Soo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.60
    • /
    • pp.235-255
    • /
    • 2013
  • This thesis examines the problems faced in the electronic trade specialized service provider for which improvements are necessary, and suggests various ways of overcoming those problems. First, from the legal aspect, it is necessary to clarify the scope of duties as well as to expand the threshold for entrance and business areas through the amendment of related laws. Second, from the operating aspect, the e-trade specialized service provider should be able to provide convenient work spaces through user-centered interface by connecting, integrating, automating and simplifying various services scattered around through the establishment of an operating system. Third, from the institutional aspect, trade firms should be able to perform e-trade duties without difficulties by specializing and increasing the size of the e-trade specialized service provider system and strengthening job competence. For this, it is required to improve legal registration requirements to enhance the reliability of the e-trade specialized service provider system and secure its financial capacity.

  • PDF

Secure delivery system on through preventing leakage entrance password. (공동 현관 비밀번호 유출 방지를 통한 블록체인 기반의 안전한 배송 시스템)

  • Kim, Hyun-Ji;Kwon, Yong-Been;Choi, Seung-ju;Seo, Hwa-Jeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.127-130
    • /
    • 2020
  • 최근 변화하는 소비패턴으로 인해 당일 및 새벽 배송 등의 서비스가 보편화되고 있다. 해당 서비스는 배송 정보를 입력 시 건물에 자유롭게 출입할 수 있는 공동 현관 비밀번호를 기입해야 한다. 이는 이미 빈번하게 발생하고 있는 무단 주거 침입 등의 범죄에 더 쉽게 노출되도록 할 수 있는 위험 요소이다. 본 논문에서는 신뢰할 수 있는 사용자만이 참여 가능한 프라이빗 블록체인 네트워크에서의 차량 번호판 인식 및 스마트 컨트랙트를 통해 랜덤한 마스터 비밀번호를 제공하여, 보안적으로 취약한 비밀번호 기입 절차를 없애고 검증 받은 사용자에게만 출입을 허가하는 방식을 제안한다.

A Study on the plan and the structural system of the '凸'-shaped, the '呂'-shaped and the hexagonal-shaped pit houses (철기시대 철자형(凸字形).여자형(呂字形) 및 한성백제기 육각형(六角形) 주거지(住居址)의 평면과 구조 형식에 관한 연구)

  • Lee, Seung-Yeon;Lee, Sang-Hae
    • Journal of architectural history
    • /
    • v.16 no.4
    • /
    • pp.37-56
    • /
    • 2007
  • The '凸'-shaped, the '呂'-shaped and the hexagonal-shaped pit houses were excavated at the Youngdong area, some location along the upper the Imjin River and Han River between the Iron age and the kingdom of Hanseong Baekje. The aim of this study is to analyze various structural system and developement of the pit house with rectangular plan. It is considered a matter in all its aspects which are plan, scale, aspect, pillar holes, carbonized wood and several traces. These pit houses removes the pillar on the inside or it reduces to secure a wider space, it pursued the chamfered corner, the change of the front, the entrance fixed. Also these adopted diverse structural systems(the chuandou structure, the structural system of columns and beams and a bearing wall). But in the course of time, the Korean wooden architecture is developed gradually the structural system of columns and beams. It is presumed the result that overcome the limit with the close space and pursue the flowing space and compose a group of organizable buildings.

  • PDF

Implementation of Embedded Biometrics Technologies : A Case of a Security Token for Fingerprints (임베디드 생체 인식 기술 구현 : 지문 보안 토큰 사례)

  • 김영진;문대성;반성범;정용화;정교일
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.6
    • /
    • pp.39-46
    • /
    • 2003
  • Biometric technologies using biometric information like fingerprints features are in wide use for the secure user authentication in many services including log-in of computer systems, entrance ID and E-commercial security. Nowadays, biometric technologies are ported into small embedded systems like security tokens or smart cards due to the merit of being secure and automatic in comparison with the previous method in user authentication such as using a PIN. In this paper, the security token developed as an embedded system and tile user authentication system implemented and tested using fingerprints information are described. Communications between the security token and tile host are tested and verified with USB. And, execution time and runtime memory on tile security token board was measured and performance improvement was described. In addition, requisites for the transit from the security token to the match-on-card was mentioned.

A study on applicability of mirror reflector system in tunnel using simulation (시뮬레이션 분석을 통한 반사거울 시스템의 터널 적용성 연구)

  • Lee, Beom-Seok;Lee, Kun-Il;Jeong, In-Young
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.13 no.5
    • /
    • pp.371-383
    • /
    • 2011
  • It is important to secure illumination for the driver's safety because the tunnel is a space for changing brightness quickly, and lighting fixtures of the tunnel have consumed a lot of electric lighting energy for operating in both the daytime and at night. This study aims to evaluate daylighting performance of Mirror Reflector System for luminous environment improvement of tunnel space by using RADIANCE simulation program. The results of simulation show that illuminance of bar type is higher than illuminance of pole type at 20 m from the tunnel entrance.