Browse > Article
http://dx.doi.org/10.6109/jkiice.2018.22.1.75

User Authentication System based on Auto Identification and Data Collection  

Jeong, Pil-seong (JNPSOLUTION)
Cho, Yang-hyun (Division of Computer Science, Sahmyook University)
Abstract
As user of mobile device increases, various user authentication methods are actively researched. The user authentication methods includes a method of using a user ID and a password, a method of using user biometric feature, a method of using location based, and a method of authenticating secondary authentication such as OTP(One Time Password) method is used. In this paper, we propose a user system which improves the problem of existing authentication method and encryption can proceed in a way that user desires. The proposed authentication system is composed of an authentication factor collection module that collects authentication factors using a mobile device, a security key generation module that generates a security key by combining the collected authentication factors, and a module that performs authentication using the generated security key module.
Keywords
Mobile Device; Security Key; User Authentication; Authentication Factors; Authentication System;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 S. J. Oh, "A Cross-cultural Study on the Perception Types of Korean and American Users of Smartphone," Journal of the Korean society for Wellness, vol. 11, no. 3, pp. 1-21, Aug. 2016.
2 S. R. Cho, D. S. Choi, S. H. Jin, and H. H. Lee, "Passwordless Authentication Technology-FIDO," Electronics and Telecommunications Trends, vol. 29, no. 4, pp. 101-109, Aug. 2014.
3 S. J. Kim, "Information Security Plan on Cloud Computing - Information Security Management System," Korean Review of Management Consulting, vol. 1, no. 2, pp. 194-208, Aug. 2010.
4 F. Zhang, A. Kondoro, and S. Muftic, "Location-Based Authentication and Authorization Using Smart Phones," 2012 IEEE 11th International Conference on Trust, Security, and Policy in Computing and Communications, pp. 1285-1292, June 2012.
5 H. Takamizawa, and N. Tanaka, "Authentication system using location information on ipad or smartphone" International Journal of Computer Theory and Engineering, vol. 4, no. 2, pp.153-157, April 2012.
6 W. Jansen, and V. Korolev, "A location-based mechanism for mobile device security," Computer Science and Information Engineering, 2009 WRI World Congress on IEEE, vol. 1, pp. 99-104, March 2009.
7 H. Ketabdar, K. A. Yuksel, A. Jahnbekarn, M. Roshandel, and D. Skirop, "MagiSign: User Identification /Authentication Based on 3D Around Device Magnetic Signatures," The Fourth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, pp. 31-34, 2010.
8 J. S. Seo, and J. S. Moon, "A Study on User Authentication with Smartphone Accelerometer Sensor," Journal of The Korea Institute of Information Security and Cryptology, vol. 25, no. 6, pp. 1477-1484, Dec. 2015.   DOI
9 T. K. Lee, Y. H. Kim, and E. G. Im, "Biometric User Authentication Method of Mobile Appilication in Trustable Space," Journal of The Korea Institute of Information Security and Cryptology, vol. 27, no. 2, pp. 201-212, April 2017.   DOI
10 A. Bianchi, I. Oakley, V. Kostakos, and D. S. Kwon, "The Phone Lock: Audio and Haptic Shoulder-Surfing Resistant PIN Entry Methods for Mobile Devices," TEI'11 Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction, pp. 197-200, Jan. 2011.