• Title/Summary/Keyword: Visitor identification

Search Result 14, Processing Time 0.026 seconds

Design of an Visitor Identification system for the Front Door of an Apartment using Deep learning (딥러닝 기반 이용한 공동주택현관문의 출입자 식별 시스템 설계)

  • Lee, Min-Hye;Mun, Hyung-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.45-51
    • /
    • 2022
  • Fear of contact exists due to the prevention of the spread of infectious diseases such as COVID-19. When using the common entrance door of an apartment, access is possible only if the resident enters a password or obtains the resident's permission. There is the inconvenience of having to manually enter the number and password for the common entrance door to enter. Also, contactless entry is required due to COVID-19. Due to the development of ICT, users can be easily identified through the development of face recognition and voice recognition technology. The proposed method detects a visitor's face through a CCTV or camera attached to the common entrance door, recognizes the face, and identifies it as a registered resident. Then, based on the registered information of the resident, it is possible to operate without contact by interworking with the elevator on the server. In particular, if face recognition fails with a hat or mask, the visitor is identified by voice or additional authentication of the visitor is performed based on the voice message. It is possible to block the spread of contagiousness without leaving any contactless function and fingerprint information when entering and exiting the front door of an apartment house, and without the inconvenience of access.

A Study of the Detecting Method about the Identification Card's Counterfeit, Modification and Illegal Use by Minors (미성년자의 신분증 위·변조 및 도용을 검출하기 위한 방법 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.87-101
    • /
    • 2018
  • Minors' law evasion is getting serious. Some of them make a fake ID card or use a stolen ID card illegally. They are illegally used for buying alcohol, cigarette, bond or going to club, pub, motel and so on. On the latest News, there was a case that teens rented a car with a driver licence without checking and had severe car accident. Like this case, car rental service was fined and suspended from business because they did not figure out ID card's counterfeit or modification. Thus, this study investigates the detecting method about the ID card(including a driver license) counterfeit, modification or illegal use. The server has a database of 17~19's minors one fingerprint and services whether the visitor is adult true or not. The method will be usable and economical for business. Then, it was compared and analyzed with methods already in use in business.

Design of User Certification Module of Home Gateway System based on OSGi (OSGi 기반 홈게이트웨이 시스템의 사용자 인증 모듈 설계)

  • Myung, Sun-Kyu;Kim, Gwang-Hyun
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.27-35
    • /
    • 2010
  • We implemented an application system which is able to verify visitor identification for remote bundle control based on OSGi and web camera control using embedded linux system. This system are designed open Oscar framework by porting java on the embedded linux system and implemented web camera system in local area networks. Also This system can verify information of visitor from receiving the data of RFID reader and designed the wireless internet system in home. Basically, in this paper we expect that home network system development and the period of application service development are reduced with integrated service provision based on OSGi.

Design and Implementation of Home Gateway System based on OSGi (OSGi 기반 홈게이트웨이 시스템의 설계 및 구현)

  • Kim, Gwang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.1
    • /
    • pp.74-80
    • /
    • 2010
  • We implemented an application system which is able to verify visitor identification for remote bundle control based on OSGi and web camera control using embedded linux system. This system are designed open Oscar framework by porting java on the embedded linux system and implemented web camera system in local area networks. Also This system can verify information of visitor from receiving the data of RFID reader and designed the wireless internet system in home. Basically, in this paper we expect that home network system development and the period of application service development are reduced with integrated service provision based on OSGi.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

A Study on Ubiquitous Convention using RFID (RFID를 활용한 유비쿼터스 컨벤션에 관한 연구)

  • Noh, Young;Byun, Jeung Woo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.175-184
    • /
    • 2009
  • We are entering into a era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge s haring, and calm services. Some people refer to this as the "ubiquitous" computing because its focus is on a high degree of connectivity between a company and its customers, suppliers, and channel partners. Ubiquitous computing technology, "RF" stands for "radio frequency"; the "ID" means "identifer". The tag itself of a computer chip and an antenna. The shortest metaphor is that RFID is like a bar-code but is read with an electromagnetic field rather than by a laser beam. Much has already been written about the use of RFID. But there is no has written about the use of RFID in the convention industry. Therefore this study have specific objectives as follows. 1. To give details on the use of RFID in convention. 2. To introduces the key concepts behind RFID technology. 3. To identify advantage & disadvantage of RFID technology using a BEXCO CASE study. 4. To study on ubiquitous convention using RFID and effective operation methods such as entrance identification system, session management, machine management, CRM management, visitor management, and contents management. This results provide into the current status of ubiquitous computing technology in convention industries. Specific advantages by using ubiquitous computing technology(RFID) are one-stop differentiate service, wireless internet service, use of visitor management system, entrance by tag, and U-logistics. On other side, disadvantages are security, stabilization of RFID system, higher price of RFID tag, and commercial scale. Convention by using of RFID technology is currently at an early stage. Convention company as BEXCO need to have the capabilities to adapt, to customize, to commercialize, and to modify technology to suit our circumstances.

The Meaning of Rurality in Traditional Three-verse Korean Poem Written by Sadaebu (사대부 시조(時調)의 농촌성(Rurality)을 활용한 체험프로그램 연구 - 충남 홍성군 거북이마을 -)

  • Ch'oi, Ja-Un;Kim, Sang-Bum;Kim, Eun-Ja
    • Journal of Agricultural Extension & Community Development
    • /
    • v.18 no.1
    • /
    • pp.129-152
    • /
    • 2011
  • The study aims to investigate the meaning of the rurality in traditional three-verse Korean poem written by Sadaebu(사대부). We will discuss integration method for Rural and rurality. Rurality is not physical truth, but personal and subjective thing. The meaning of the rurality produce socially. So, the concept of the Rurality can be interpreted in many ways. Sadaebu in the Joseon period put emphasis on rural as a object of a self-discipline and govern. They compose a poem from rural life. There are various meaning related to rurality in traditional three-verse Korean poem. The rurality meaning of the Sijo written by Yakcheon and Jonjae can define union between the natural order and poetic narrator. poetic narrators accept theirselves to nature and work willingly. The host of the program must make visitors homesick and gives more energy by Sijo experience program. The most import thing is the identification of the visitor and rural. To accomplish these purpose, It needs visitors can sing a sijo by oneself.

Study on development of the remote control door lock system including speeker verification function in real time (화자 인증 기능이 포함된 실시간 원격 도어락 제어 시스템 개발에 관한 연구)

  • Kwon, Soon-Ryang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.6
    • /
    • pp.714-719
    • /
    • 2005
  • The paper attempts to design and implement the system which can remotely check visitors' speech or Image by a mobile phone. This system is designed to recognize who a visitor is through the automatic calling service, not through a short message, via the mobile phone, even when the home owner is outside. In general, door locks are controlled through the home Server, but it is more effective to control door locks by using DTMF signal from a real-time point of view. The technology suggested in this paper makes it possible to communicate between the visiter and the home owner by making a phone call to tile home owner's mobile phone automatically when the visiter visits the house even if the home owner is outside, and if necessary, it allows for the home owner to control the door lock remotely. Thanks to the system, the home owner is not restricted by time or space for checking the visitor's identification and controlling the door lock. In addition, the security system is improved by changing from the existing password form to the combination of password and speaker verification lot the verification procedure required for controlling the door lock and setting the environment under consideration of any disadvantages which may occur when the mobile Phone is lost. Also, any existing problems such as reconnection to tile network for controlling tile door lock are solved by controlling the door lock in real time by use of DTMF signal while on the phone.

Reliable Digital Door Lock Control System using Face Recognition (얼굴 인식을 통한 신뢰성 있는 디지털 도어록 제어 시스템)

  • Lim, Jimin;Kim, Chan;Cha, Wonsuk;Han, Taemoon;Huh, Guewon;Song, Sanggeun;Lee, Sangjun
    • Journal of IKEEE
    • /
    • v.17 no.4
    • /
    • pp.499-504
    • /
    • 2013
  • Automation is being progressed rapidly in various fields with the advancement of IT technology. Home automation is a typical application and is being used in a variety of ways now. Most of digital door lock systems simply support to open and close a door using the methods of password and a particular magnetic key. In this paper, we propose a intelligent digital door lock system using face recognition technology. Our proposed system can control the locking device opening and closing from a remote location after confirming the identification of the visitor via a smart device, and support the reliable and secure control of door systems.

Management Effectiveness Evaluation(MEE) in Protected Areas for Forest Genetic Resources (산림유전자원보호구역의 관리효과성 평가 적용)

  • Ryu, Kwang-Su;Choi, Jae-Yong;Shin, Hyun-Tak
    • Journal of Forest and Environmental Science
    • /
    • v.27 no.3
    • /
    • pp.205-210
    • /
    • 2011
  • This study aims to assess MEE(management effectiveness evaluations) on PAs(protected areas) for forest genetic resources which play an important role in biodiversity conservation, and then to suggest better ways to manage PAs for forest genetic resources. This study applies same indicators of the MEE on PAs as the ones described in the prior study(Ryu et al. 2011). The indicators applied are composed of five elements, thirty-two indicators which all would be grouped into one element by each traits. Overall indicators belonging to the element of output and outcome are comparatively low. Especially the ones related to the change of biodiversity, degree of ecosystem health, variation of civil complaint and visitor satisfaction are ranked mostly low. The element of input shows the low rank on the number of staff and budget. The score of indicators related to the identification of the threats of PAs and local communities' supports turn out to be low in the element of Context. The element of process, however, has scored low on Staff management, Education/Awareness programs and Governance, while the law enforcement, management regulation and capacity to prevent forest disasters have made relatively high score. Meanwhile, all indicators in the element of planning have scored relatively high as compared to the indicators belonged to other elements. This study suggests to strengthen a few constructive proposals, such as facilitating efficient management framework for PAs, developing local community cooperation program, establishing survey, research and monitoring system, and registering PAs to the WDPA(World Database on Protected Areas) according to the IUCN categories.