• Title/Summary/Keyword: System ID

Search Result 1,005, Processing Time 0.029 seconds

A Study of Spreading code for Watermarking of TxID of ATSC-DTV (ATSC-DTV의 송신기 식별을 위한 워터마킹용 확산코드에 관한 연구)

  • Cha Jae-Sang;Choi Seong-Jin;Lee Seon-Hee;Lee Kwang-Jik;Lee Yong-Tae;Park Goo-Man
    • Journal of Broadcast Engineering
    • /
    • v.11 no.1 s.30
    • /
    • pp.100-106
    • /
    • 2006
  • In this paper, we proposed a TxID(Transmitter Identification) system using ZCD (Zero Correlation Duration) code as interference-cancelled spread codes for single frequency network of ATSC terrestrial DTV broadcasting. ZCD codes are simply implemented and have ZCD characteristics. Then, Proposal system can fundamentally solve interference problems caused by ICI(Inter Code Interference) and MPI(Multi-Path Interference) which happens in TxID system using spread coding method. Also, those can cancel truncated error which happens at watermarking for TxID since those can remove its period. In this paper, we identified the availability of TxID system applying interference-cancelled ZCD codes by analyzing DER (Detection Error Rate) which is simulated in various interference environments such as AWGN, ICI, and MPI.

Design and Analysis of RF-DC Conversion Circuit (RF-DC 변환회로에 대한 설계 및 분석)

  • Kim, Jong-Bum;Kim, Kwang-Soo;Park, Seok-Ha;Jin, In-Soo;Kim, Yang-Mo
    • Proceedings of the KIEE Conference
    • /
    • 1999.07g
    • /
    • pp.3256-3258
    • /
    • 1999
  • Recently contactless ID system has emerged as new ID industry. It's called RF-ID. RF-ID is divided into active RF-ID and passive RF-ID. The passive RF-ID operates without battery and so has no limitation in its operating range and life time. But it needs the RF-OC conversion circuit. It also can be applied to batteryless sensor for many application. This paper presents the study of the RF-OC conversion circuit for batteryless system in high frequency and confirms it by simulation and experiment.

  • PDF

Implementation of RFID Data Transmission System using Wireless LAN (Wireless LAN 기반 RFID 데이터 전송시스템 구현)

  • 백수열;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.41-44
    • /
    • 2004
  • A RFID(Radio Frequency IDentification) system Is a kind of Radio Frequency Communication System and a branch of Automatic Data Collection System. The RFID System is composed of RF Tag(or Transponder) and RFID Reader(controller). This paper deal with Wireless communications that acquired RF Tag ID by RFID reader, and then target system will transmit Tag ID to RFID Server through the internet using Wireless LAN. The RFID system of Todays are commonly used by a wired RFID system. In this system uses commonly used Wireless LAN, and then we can connect the internet if we have a AP(Wireless Lan Access Point). Internet connection can make a transmission of RF Tag ID, and can make a reception of returning data that are images or information.

  • PDF

Improving the QoS using the Modulation and Coding Selection scheme by temperature characteristic of LED in the LED-ID system (LED-ID 시스템에서 LED의 온도 특성에 따른 선택적 변조 및 부호화를 통한 QoS 향상 기법 연구)

  • Lee, Kyu-Jin;Seo, Hyo-Duck;Han, Doo-Hee;Lee, Kye-San
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.1
    • /
    • pp.66-74
    • /
    • 2013
  • This paper introduces the improvement of QoS to compensate the decreasing LED performance by temperature characteristic in the LED-ID communication system. LED does not only use as a lighting device, but also uses as a communication device. The conventional system is transmitted by RGB of LED following the mixture color ratio, which determined the color of lighting, and the BER performance of each RGB signals. However, when the LED used consistently, it has occurred the heat temperature. As a result, LED is degraded the performance by increased temperature each device. To solve this problem, we proposed the adaptive modulation and coding scheme by temperature of device to improve the performance of system and satisfied the QoS in the LED-ID system.

Convenient User Authentication Mechanism Using only User Identification (사용자 ID만을 활용한 간편한 사용자 인증 방안)

  • Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.11
    • /
    • pp.501-508
    • /
    • 2015
  • Most web sites, information systems use the ID/Password technique to identify and authenticate users. But ID/Password technique is vulnerable to security. The user must remember the ID/Password and, the password should include alphabets, numbers, and special characters, not to be predicted easily. User also needs to change your password periodically. In this paper, we propose the user authentication method that the user authentication information stored in the external storage to authenticate a user. If another person knows the ID/Password, he can't log in a system without the external storage. Whenever a user logs in a system, authentication information is generated, and is stored in the external storage. Therefore, the proposed user authentication method is the traditional ID/Password security technique, but it enhances security and, increases user convenience.

Study on unique code by each 3D model for broadcast communication harmony service. (방송통신융합 서비스를 위한 3D 모델별 고유 코드에 관한 연구)

  • Park, In-Gyu;Park, Jun-Yeol;Kim, Joon-Won
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.49-50
    • /
    • 2007
  • We are now using separate ID Database, Permission System, OS and Standard Data Format in PC, Cell phone, IPTV service and these are not good in many kind of usage, data sharing, contents servicing and supervising efficiency To merge these multiple services into one system we need to make a single ID systems for all and this paper will gide you to the new ID system that was much better than the old one. This new type of ID system is made with 3D Data and this will give fantastic visual effect & rich information data to the ID users in 3D way which is much better than 2D image & Text information technology.

  • PDF

Design and Implementation of User Authentication System Using USIM Information (USIM 정보를 이용한 사용자 인증 방안 설계 및 구현)

  • Lee, Jin-Woo;Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.571-578
    • /
    • 2017
  • In order to approach information system through smart device and pc, user has to authenticate him or herself via user authentication. At that time when user tries reaching the system, well-used user authentication technologies are ID/PW base, OTP, certificate, security card, fingerprint, etc. The ID/PWbased method is familiar to users, however, it is vulnerable to brute force cracking, keylogging, dictionary attack. so as to protect these attacks, user has to change the passwords periodically as per password combination instructions. In this paper, we designed and implemented a user authentication system using smartphone's USIM without using password while enhancing security than existing ID / PW based authentication technology.

ID-Based Cryptosystem and Digital Signature Scheme Using Discrete Logarithm Complexity (이산대수 문제를 이용한 ID 기본 암호시스템과 디지틀 서명방식에 관한 연구)

  • 염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.1 no.1
    • /
    • pp.3-15
    • /
    • 1991
  • in 1984 Shamir proposed the concept of ID(identity)-based cryptosystem and digital signature scheme wich does not require any public file for storing the user' s public keys. In this paper, the concept of the ID-based cryptosystem based on discrete logarithm problem using the conven-tional public-key cryptosystems is described, and the implementation method of the ID-based cryptosystem is also presented. The new digital signaturw schme based on the ID-based crypto-system is proposed and possible atacks are considered and analyzed for the security of digital signature scheme. The proposed ID-based schemes are particularrly useful for smart card and personal identification card application.

A Design of OpenID System Using ID Management Method User-Centric (사용자 중심 ID 관리 기법을 이용한 OpenID 시스템의 설계)

  • Jeong, Eui-Kyeong;Yun, Cheol-Yong;Kim, Hyun-Chul;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1373-1376
    • /
    • 2009
  • 인터넷의 확산과 웹 2.0 서비스의 등장은 기존 서비스 제공자 중심의 ID 관리를 사용자 중심의 ID 관리 형태로 변화시키는 계기가 되었다. 그러나 기존 사용자 중심 ID 관리 기법은 사용자 인증 및 정보 관리에 대한 문제가 존재한다. 본 논문에서는 서비스 제공자가 필요로 하는 정보만을 사용자가 선별적으로 선택하여 제공함으로서 기존 ID 관리 기법의 문제를 해결할 수 있는 사용자 중심의 ID 관리 기법을 이용한 OpenID 시스템을 제안한다. 또한, 실험 및 비교분석을 통하여 보안성 및 효율성 측면에서 우수함을 확인 할 수 있었다.

Design of an Authentication System Based on Personal Identity Verification Card (전자신분증 기반의 개인 신분확인을 위한 인증시스템 설계)

  • Park, Young-Ho;Kong, Byung-Un;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1029-1040
    • /
    • 2011
  • Electronic identity (e-ID) card based on smartcard is a representative identity credential for on-line and off-line personal identification. The e-ID card can store the personal identity information securely, so that the information can be accessed fast, automated identity verification and used to determine the cardholder's authorization to access protected resources. Due to such features of an e-ID card, the number of government organizations and corporate enterprises that consider using e-ID card for identity management is increasing. In this paper, we present an authentication framework for access control system using e-ID cards by discussing the threat environment and security requirement against e-ID card. Specifically, to accomplish our purpose, we consider the Personal Identity Verification system as our target model.