• Title/Summary/Keyword: Traceability system

Search Result 316, Processing Time 0.029 seconds

An Offline Electronic Payment System Based on an Untraceable Blind Signature Scheme

  • Kutubi, Md. Abdullah Al Rahat;Alam, Kazi Md. Rokibul;Tahsin, Rafaf;Ali, G.G. Md. Nawaz;Chong, Peter Han Joo;Morimoto, Yasuhiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2628-2645
    • /
    • 2017
  • This paper proposes a new offline electronic payment (e-payment) system that satisfies the major security requirements of e-payment, i.e. anonymity, unlinkability, unforgeability, double spending control, conditional traceability, and fraud prevention. The central idea is the use of Hwang et al.'s RSA-based untraceable blind signature (BS), which disables the link between the e-coin and its owner and ensures the anonymity of both the customer and the merchant. It attaches an expiration, a deposit and the transaction dates to each e-coin in order to manage the database of the bank effectively, to correctly calculate the interest on the e-coin and to aid arbitration if a dishonest customer attempts to double-spend the coin. It also ensures the anonymity of the customer as long as the coin is spent legitimately. Only when a fraudulent e-coin transaction is detected can the bank, with the help of the central authority (a trusted entity), determine the identity of the dishonest customer. The system is referred to as offline since the bank does not need to be concurrently involved in transactions between a customer and a merchant. Finally, analyses of the performance of the prototype and the primary security requirements of the proposed system are also presented.

Design of RFID-based Integration System for Collection and Recycling Process of EOL Household Electric Appliances in Korea (국내 폐가전제품의 회수 및 재활용을 위한 RFID 기반 통합관리시스템 설계)

  • Kim, Hyun-Soo;Han, Dae-Hee;Jeong, Hae-Jun;Lee, Seong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.32 no.2
    • /
    • pp.120-131
    • /
    • 2009
  • Most world-leading companies are aware that Environment and Health and Safety Issues are critical to the product quality and sustainable growth of their company. Environment-friendly efforts are seen in almost all aspects of business operations in an advanced nation. The Extended Producer Responsibility(EPR) and EU Directive on Waste Electric and Electronic Equipment(WEEE) attempt to tackle the growing quantity of WEEE by making producers responsible for the costs of the collection and recycling of their products at the End-of-Life(EOL). To implement the RFID-based integration system for EOL household electric appliances, such as washing machines and refrigerators, we analyzed the process of collecting, recovering, and recycling the EOL products returned from the distribution points. Furthermore, we proposed a soon-to-be process using the RFID-based integration system in the metropolitan recycling center(MRC). This soon-to-be process model is composed of RFID tags, readers, ALEs, applications and several devices. Through the introduction of the RFID-based integration system, we are expecting to see increasing traceability and real-time management for EOL products from customers, and also improvements in valuable reusable materials(VRM) produced from recycling processes.

A Study on the Estimation Process of Material handling Equipment for Offshore Plant Using System Engineering Approach (시스템엔지니어링 기반 해양플랜트 Material handling 장비 수량산출 프로세스에 관한 연구)

  • Han, Seong-Jong;Seo, Young-Kyun;Cho, Mang-Ik;Kim, Hyung-Woo;Park, Chang-soo
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.22 no.6
    • /
    • pp.785-795
    • /
    • 2019
  • This paper is a study on the modeling of the quantity estimation model for offshore plant Material handling equipment in FEED(Front End Engineering Design) verification stage using system engineering approach which is an engineering design methods. The relevant engineering execution procedure is not systemized although the operation method and Material handling equipment selection with weight and space constraints is a key part of the FEED. Using the system engineering process, the stakeholder requirements analysis process, the system requirements analysis, and the final system architecture design were sequentially performed, and the process developed through the functional development diagram and Requirement traceability matrix (RTM) was verified. In addition, based on the established process, we propose a Material handling quantity estimation model and Quantity calculation verification Table that can be applied at the FEED verification stage and we verify the applicability through case studies.

A Tag Flow-Driven Deployment Simulator for Developing RFID Applications (RFID 애플리케이션 개발을 위한 태그 흐름기반 배치 시뮬레이터)

  • Moon, Mi-Kyeong
    • The KIPS Transactions:PartD
    • /
    • v.17D no.2
    • /
    • pp.157-166
    • /
    • 2010
  • More recently, RFID (Radio Frequency Identification) systems have begun to find greater use in various industrial fields. The use of RFID system in these application domains has been promoted by efforts to develop the RFID tags which are low in cost, small in size, and high in performance. The RFID applications enable the real-time capture and update of RFID tag information, while simultaneously allowing business process change through real-time alerting and alarms. These be developed to monitor person or objects with RFID tags in a place and to provide visibility and traceability of the seamless flows of RFID tags. In this time, the RFID readers should be placed in diverse locations, the RFID flows between these readers can be tested based on various scenarios. However, due to the high cost of RFID readers, it may be difficult to prepare the similar environment equipped with RFID read/write devices. In this paper, we propose a simulator to allow RFID application testing without installing physical devices. It can model the RFID deployment environment, place various RFID readers and sensors on this model, and move the RFID tags through the business processes. This simulator can improve the software development productivity by accurately testing RFID middleware and applications. In addition, when data security cannot be ensured by any fault, it can decide where the problem is occurred between RFID hardware and middleware.

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

Converting Panax ginseng DNA and chemical fingerprints into two-dimensional barcode

  • Cai, Yong;Li, Peng;Li, Xi-Wen;Zhao, Jing;Chen, Hai;Yang, Qing;Hu, Hao
    • Journal of Ginseng Research
    • /
    • v.41 no.3
    • /
    • pp.339-346
    • /
    • 2017
  • Background: In this study, we investigated how to convert the Panax ginseng DNA sequence code and chemical fingerprints into a two-dimensional code. In order to improve the compression efficiency, GATC2Bytes and digital merger compression algorithms are proposed. Methods: HPLC chemical fingerprint data of 10 groups of P. ginseng from Northeast China and the internal transcribed spacer 2 (ITS2) sequence code as the DNA sequence code were ready for conversion. In order to convert such data into a two-dimensional code, the following six steps were performed: First, the chemical fingerprint characteristic data sets were obtained through the inflection filtering algorithm. Second, precompression processing of such data sets is undertaken. Third, precompression processing was undertaken with the P. ginseng DNA (ITS2) sequence codes. Fourth, the precompressed chemical fingerprint data and the DNA (ITS2) sequence code were combined in accordance with the set data format. Such combined data can be compressed by Zlib, an open source data compression algorithm. Finally, the compressed data generated a two-dimensional code called a quick response code (QR code). Results: Through the abovementioned converting process, it can be found that the number of bytes needed for storing P. ginseng chemical fingerprints and its DNA (ITS2) sequence code can be greatly reduced. After GTCA2Bytes algorithm processing, the ITS2 compression rate reaches 75% and the chemical fingerprint compression rate exceeds 99.65% via filtration and digital merger compression algorithm processing. Therefore, the overall compression ratio even exceeds 99.36%. The capacity of the formed QR code is around 0.5k, which can easily and successfully be read and identified by any smartphone. Conclusion: P. ginseng chemical fingerprints and its DNA (ITS2) sequence code can form a QR code after data processing, and therefore the QR code can be a perfect carrier of the authenticity and quality of P. ginseng information. This study provides a theoretical basis for the development of a quality traceability system of traditional Chinese medicine based on a two-dimensional code.

Polymorphism analysis of tri- and tetranucleotide repeat microsatellite markers in Hanwoo cattle

  • Shil Jin;Jeong Il Won;Hyoun Ju Kim;Byoungho Park;Sung Woo Kim;Ui Hyung Kim;Sung-Sik Kang;Hyun-Jeong Lee;Sung Jin Moon;Myung Sun Park;Yong Teak Sim;Sun Sik Jang;Nam Young Kim
    • Journal of Animal Science and Technology
    • /
    • v.66 no.4
    • /
    • pp.717-725
    • /
    • 2024
  • The Hanwoo traceability system currently utilizes 11 dinucleotide repeat microsatellite (MS) markers. However, dinucleotide repeat markers are known to have a high incidence of polymerase chain reaction (PCR) artifacts, such as stutter bands, which can complicate the accurate reading of alleles. In this study, we examined the polymorphisms of the 11 dinucleotide repeat MS markers currently employed in traceability systems. Additionally, we explored four trinucleotide repeat MS markers and one tetranucleotide repeat MS marker in a sample of 1,106 Hanwoo cattle. We also assessed the potential utility of the tri- and tetranucleotide repeat MS markers. The polymorphic information content (PIC) of the five tri- and tetranucleotide repeat markers ranged from 0.663 to 0.767 (mean: 0.722), sufficiently polymorphic and slightly higher than the mean (0.716) of the current 11 dinucleotide repeat markers. Using all 16 markers, the mean PIC was 0.718. The estimated probability of identity (PI) was 3.13 × 10-12 using the 11 dinucleotide repeat markers, 7.03 × 10-6 using the five tri- and tetranucleotide repeat markers, and 2.39 × 10-17 using all 16 markers; the respective PIhalf-sibs values were 2.69 × 10-9, 1.29 × 10-4, and 3.42 × 10-13; and the respective PIsibs values were 3.89 × 10-5, 9.6 × 10-3, and 3.69 × 10-7. The probability of exclusion1 (PE1) was 0.999864 for the 11 dinucleotide repeat markers, 0.981141 for five of the tri- and tetranucleotide repeat markers, and > 0.99 for all 16 markers; the respective PE2 values were 0.994632, 0.901369, and > 0.99; and the respective PE3 values were 0.998702, > 0.99, and > 0.99. The five investigated triand tetranucleotide repeat MS markers can be used in combination with the 11 existing MS markers to improve the accuracy of individual identification and paternity testing in Hanwoo.

Traceability Systems for Good Agricultural Products (우수농산물을 위한 생산이력 시스템)

  • Yu, Seong-Jae;Kim, Ki-Tae;Min, Byung-Hun;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.179-182
    • /
    • 2005
  • Recently gene fabrication foodstuffs, remained chemicals and heavy metal on the agricultural product gets prominent, consciousness of consumers is getting higher regarding safety and quality problems of consumer products. A measurement should be done immediately because the research concerned about this has not been made compared to the foreign countries such as Europe, United States, Japan and so on has quickly accepted production record system. In this paper, we designed all the procedures among the production, postharvest, packing, storing should be done without any kinds of harm that could be happened from the farm to the dinner tables of each family as possible as we can. And also we defined the data system in accordance with the domestic agricultural system and realized the production trace system on the base of Good Agriculture Practices(GAPs) in order to let the consumers confirm the procedures themselves.

  • PDF

Self Re-Encryption Protocol (SREP) providing Strong Privacy for Low-Cost RFID System (저가형 RFID 시스템에 강한 프라이버시를 제공하는 자체 재암호화 프로토콜)

  • Park Jeong-Su;Choi Eun-Young;Lee Su-Mi;Lee Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.3-12
    • /
    • 2006
  • RFID (Radio Frequency Identification) system is expected to play a critical role providing widespread services in the ubiquitous period. However, widespread use of RFID tags may create new threats to the privacy of individuals such as information leakage and traceability. It is difficult to solve the privacy problems because a tag has the limited computing power that is not the adequate resource to support the general encryption. Although the scheme of [2] protects the consumer privacy using an external agent, a tag should compute exponential operation needed high cost. We propose Self Re-Encryption Protocol (SREP) which provides song privacy without assisting of any external agent. Our SREP is well suitable to low-cost RFID system since it only needs multiplication and exclusive-or operation.

Biometric identification of Black Bengal goat: unique iris pattern matching system vs deep learning approach

  • Menalsh Laishram;Satyendra Nath Mandal;Avijit Haldar;Shubhajyoti Das;Santanu Bera;Rajarshi Samanta
    • Animal Bioscience
    • /
    • v.36 no.6
    • /
    • pp.980-989
    • /
    • 2023
  • Objective: Iris pattern recognition system is well developed and practiced in human, however, there is a scarcity of information on application of iris recognition system in animals at the field conditions where the major challenge is to capture a high-quality iris image from a constantly moving non-cooperative animal even when restrained properly. The aim of the study was to validate and identify Black Bengal goat biometrically to improve animal management in its traceability system. Methods: Forty-nine healthy, disease free, 3 months±6 days old female Black Bengal goats were randomly selected at the farmer's field. Eye images were captured from the left eye of an individual goat at 3, 6, 9, and 12 months of age using a specialized camera made for human iris scanning. iGoat software was used for matching the same individual goats at 3, 6, 9, and 12 months of ages. Resnet152V2 deep learning algorithm was further applied on same image sets to predict matching percentages using only captured eye images without extracting their iris features. Results: The matching threshold computed within and between goats was 55%. The accuracies of template matching of goats at 3, 6, 9, and 12 months of ages were recorded as 81.63%, 90.24%, 44.44%, and 16.66%, respectively. As the accuracies of matching the goats at 9 and 12 months of ages were low and below the minimum threshold matching percentage, this process of iris pattern matching was not acceptable. The validation accuracies of resnet152V2 deep learning model were found 82.49%, 92.68%, 77.17%, and 87.76% for identification of goat at 3, 6, 9, and 12 months of ages, respectively after training the model. Conclusion: This study strongly supported that deep learning method using eye images could be used as a signature for biometric identification of an individual goat.