• Title/Summary/Keyword: Ubiquitous ID system

Search Result 61, Processing Time 0.023 seconds

RFID Authentication System with ID Synchronization (ID 동기화를 가지는 RFID 인증 시스템)

  • Park Jang-Su;Lee Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.5
    • /
    • pp.615-623
    • /
    • 2006
  • It has been estimated that 'RFID' technology would be playing an important role in the incoming ubiquitous environment. For this reason, many studies on 'RFID' have been conducted and its application has been on the increase in various fields such as finance, medicine, transportation and culture as well as in logistics distribution. However, the communication between Tag and Reader in RFID system has been conducted by wireless communication of radio frequency so that the information on identification could be eavesdropped by the third party maliciously. Such eavesdropped information could be also used as basic information in attacking others; in this regard, it could impair the privacy of its users and the users have avoided using 'RFID.' To solve theses problems, many studies are being performed to different output of tags by renewing ID. However, protocols have been devised without considering an ID Synchronization in the ID renewal process between database and tag in the existing studies. In this regard, this study has suggested a RFID Authentication Protocol while considering the ID Synchronization.

  • PDF

Design and Implementation of a User Activity Auto-recognition System based on Multimodal Sensor in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅환경에서의 Multimodal Sensor 기반의 Health care를 위한 사용자 행동 자동인식 시스템 - Multi-Sensor를 이용한 ADL(activities of daily living) 지수 자동 측정 시스템)

  • Byun, Sung-Ho;Jung, Yu-Suk;Kim, Tae-Su;Kim, Hyun-Woo;Lee, Seung-Hwan;Cho, We-Duke
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.21-26
    • /
    • 2009
  • A sensor system capable of automatically recognize activities would allow many potential Ubiquitous applications. This paper presents a new system for recognizing the activities of daily living(ADL) like walking, running, standing, sitting, lying etc. The system based on the state-dependent motion analysis using Tri-Accelerometer and Zigbee tag. Two accelerometers are used for the classification of body and hand activities. Classification of the environment and instrumental activities is performed based on the hand interaction with an object ID using.

  • PDF

Management Plan of Urban Object IDentification through Status-Analysis of Existing Object Management Code (기존 공간정보 관리코드 현황분석을 통한 도시공간정보 객체식별자 관리 방향)

  • Jang, Yong-Gu;Lee, Woo-Sik;Kim, Hyung-Su
    • Spatial Information Research
    • /
    • v.16 no.1
    • /
    • pp.51-64
    • /
    • 2008
  • Recently, development and research of u-City established the ubiquitous environment which can be anytime, anywhere computing or network, has been much highlighted. Thus, current urban facilities should be managed by ubiquitous concept, and monitored location and status information in a real-time manner, and controled if necessary. In order to be establish in the purpose of management, indirect mapping through id-tag is better than facility management directly. For instance, RFID, UCODE, UFID. In this paper, we propose that represent facility object through UOID(Unique Object IDentification). UOID comprises three parts; 1) sensing object, 2) facility object, 3) cell object consists of facilities. and Life cycle management system in UOID, and network system connected with internet is proposed. We wish that proposed UOID and network system mange u-City facilities effectively, and also provide ubiquitous service to the citizen, one of the integrate service of u-City platform.

  • PDF

Indoor positioning system of 50 cm resolution based on LED (50cm의 resolution을 가지는 LED 조명 기반의 실내 측위 시스템)

  • Jung, Soo-Yong;Hann, S-Wook;Park, Chang-Soo
    • Journal of Satellite, Information and Communications
    • /
    • v.5 no.2
    • /
    • pp.69-74
    • /
    • 2010
  • In this paper, we present an indoor positioning system based on light emitting diode (LED). Because LED is a semiconductor light emitting device, we can easily switch and modulate electrical signals into lightwave signals at high speed using LEDs. We assigned unique 8-bit ID address to each LED lights. Photo diode receives data from 16-LED lights and takes correlation coefficient beteween received data and each LED-ID. Using correlation coefficient, proposed positioning system shows resolution of 50 cm in dimensions of $4\;m\;{\times}\;4\;m\;{\times}\;2\;m$.

Performance Analysis of LED-ID Communication Systems In an Indoor Environment (실내 환경에서의 LED-ID 통신 시스템의 성능 분석)

  • Choi, Jae-Hyuck;Kim, Yoon-Hyun;Kim, Jin-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.4
    • /
    • pp.43-51
    • /
    • 2010
  • In this paper, we studied line coding technology tendency for high speed data communication at LED-ID (Identification) communication system in indoor environment. A LED-ID technology is a communication using visible ray (RGB) that come out in LED device. It is energy curtailment effect and possible in ubiquitous network service applications. The LED-ID system has the above advantages about that the communication throughout the whole room is enabled by high power lighting and lighting equipment with white colored LED which are easy to install and have good outward appearance. Therefore, the transmission by light waves is more suitable for wireless networks than by radio waves. We compared with the NRZ, AMI, 4B5B, HDB3, 8B10B line coding for efficient in error detection and serves data transmission of high speed.

Improved RFID Authentication Protocol Based on SSG (SSG기반 개선된 RFID 인증 프로토콜)

  • Park, Taek-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.4
    • /
    • pp.311-317
    • /
    • 2011
  • Recently, RFID is substituted for bar codes according to advance in the ubiquitous computing environments, but the RFID system has several problems such as security and privacy because it uses radio frequencies. Firstly, unauthorized reader can easily read the ID information of any Tag. Secondly, Attacker can easily fake the legitimate reader using the collected Tag ID information,such as the any legitimate tag. This paper proposed improved RFID authentication protocol based on SSG. SSG is organized only one LFSR and selection logic. Thus SSG is suitable for implementation of hardware logic in system with extremely limited resources such as RFID tag and it has resistance to known various attacks because of output bit stream for the use as pseudorandom generator. The proposed protocol is secure and effective because it is based on SSG.

Location for a Car Crash and The Service System (차량 충돌 사고에 대한 위치 확인 및 서비스 시스템)

  • Moon, Seung-Jin;Lee, Yong-Joo
    • The KIPS Transactions:PartA
    • /
    • v.16A no.5
    • /
    • pp.381-388
    • /
    • 2009
  • The spread of wireless Internet technology development and applications with location information in the form of location-based services are becoming more diverse. In particular, where you recognize the location of objects such as people and things and to provide valuable services based on the ubiquitous and location-based services are emerging as an important service. The collision between the vehicle position measurement in this thesis and offers related service system. Used in the proposed system, the GPS PACKET with information about the location and time of collision for the vehicle crash, the vehicle consists of a NodeID. Cause a conflict between these data at the vehicle, the vehicle through the gateway from the server to decide whether to go on to determine that an emergency situation, Emergency Center, the location information and giving information about whether the conflict is measured. Also, for such an emergency, such as a family on the outside of the wireless terminal related to Wireless (PDA, Phone) is to let me know. The server to want to save the crash information to the database of configuration. Additionally, the proposed U-LBS system to verify the validity of the experiment was performed.

연결완전성 제고와 프라이버시 보호를 위한 유비쿼터스 지불 프로세스의 설계

  • Lee, Gyeong-Jeon;Jeong, Mu-Jeong
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.11a
    • /
    • pp.226-233
    • /
    • 2005
  • Ubiquitous computing is a study area explained in a myriad of contexts and technological terms. So when you try to define it with simple words, it gets even more confusing. Payment. however, refers in nature to an act of money transfer from one entity to another, and it is obvious that a payment method will be valued as long as the transaction can be completed with safety no matter what technology was used. In the end, the key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme by looking at the characteristics of seamlessness under the ubiquitous environments, Strong Personal Device, and peer-based if information transactions. We also propose U-SDT Protocol integrating critical technologies such as Radio Frequency Identification (RFID), Bluetooth, Personal Payment Device, Account Managing Application and Transaction ID as a way to make transactions between users seamless and secure better privacy protection.

  • PDF

A Study on Scalable Federated ID Interoperability Method in Mobile Network Environments (모바일 환경으로 확장 가능한 federated ID 연동 방안에 관한 연구)

  • Kim, Bae-Hyun;Ryoo, In-Tae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.27-35
    • /
    • 2005
  • While the current world wide network offers an incredibly rich base of information, it causes network management problem because users should have many independent IDs and passwords for accessing different sewers located in many places. In order to solve this problem users have employed single circle of trust(COT) ID management system, but it is still not sufficient for clearing the problem because the coming ubiquitous network computing environment will be integrated and complex networks combined with wired and wireless network devices. The purpose of this paper is to describe the employment and evaluation of federated ID interoperability method for solving the problem. The use of the proposed model can be a solution for solving network management problem in the age of mobile computing environment as well as wired network computing environment.

A Study on Ubiquitous Convention using RFID (RFID를 활용한 유비쿼터스 컨벤션에 관한 연구)

  • Noh, Young;Byun, Jeung Woo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.175-184
    • /
    • 2009
  • We are entering into a era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge s haring, and calm services. Some people refer to this as the "ubiquitous" computing because its focus is on a high degree of connectivity between a company and its customers, suppliers, and channel partners. Ubiquitous computing technology, "RF" stands for "radio frequency"; the "ID" means "identifer". The tag itself of a computer chip and an antenna. The shortest metaphor is that RFID is like a bar-code but is read with an electromagnetic field rather than by a laser beam. Much has already been written about the use of RFID. But there is no has written about the use of RFID in the convention industry. Therefore this study have specific objectives as follows. 1. To give details on the use of RFID in convention. 2. To introduces the key concepts behind RFID technology. 3. To identify advantage & disadvantage of RFID technology using a BEXCO CASE study. 4. To study on ubiquitous convention using RFID and effective operation methods such as entrance identification system, session management, machine management, CRM management, visitor management, and contents management. This results provide into the current status of ubiquitous computing technology in convention industries. Specific advantages by using ubiquitous computing technology(RFID) are one-stop differentiate service, wireless internet service, use of visitor management system, entrance by tag, and U-logistics. On other side, disadvantages are security, stabilization of RFID system, higher price of RFID tag, and commercial scale. Convention by using of RFID technology is currently at an early stage. Convention company as BEXCO need to have the capabilities to adapt, to customize, to commercialize, and to modify technology to suit our circumstances.