Browse > Article
http://dx.doi.org/10.3745/KIPSTD.2007.14-D.3.363

A Study for Method of the User Authentication and Security apply to the Type of Function password in the Embedded System and Electronic Commerce  

Lee, Eun-Ser (숭실대학교 정보미디어기술 연구소)
Moon, Ho-Young (㈜패스허브)
Lee, Sang-Ho (숭실대학교 컴퓨터학부)
Abstract
Password, a traditional user confirmation method that is used for more than 100 years, has become useless as a lot of transactions are dealt by indirect contacts. As a result, an alternative for password is required now. In this paper, we propose a novel confirmation method, which is called Brain-Key. It uses an indirect password input method. It reduces the risks due to hacking, and prevents a big credit accident because it prevents passwords to be reused. Our proposed model has general applicability so that it can be applied in domestic market as well as international markets. This research may provide solutions for the security problems in the electronic commerce.
Keywords
Electronic commerce; Security method; Function password;
Citations & Related Records
연도 인용수 순위
  • Reference
1 ISO. ISO/IEC 15408-3:1999 Information technology-Security techniques-Evaluation criteria for IT security-Part 3: Security assurance requirements
2 Eun-Ser Lee and Sun-Myoung Hwang, 'Definition of Security Requirement Items and Its Process to Security and Progress Management,' LNCIS 344, August 2006
3 Nam-deok and Cho, Eun-Ser Lee, 'Design and Implementation of Semantic Web Search System using Ontology and Anchor Text,' LNCS 3984, May 2006
4 Domingue, J., Dzbor, M. and Motta, E.: Magpie: Supporting Browsing and Navigation on the Semantic Web. Proc. of Intl. Conf. on Intelligent User Interfaces (IUI). 2004. Portugal
5 정보통신부, '전자거래 안전성 강화 종합대책,' 2005. 9. 20
6 김철, '암호학의 이해,' 영풍문고, 1996
7 원동호, '암호방식과 키분배,' 한국 통신정보보호학회 학회지 제1권 1호, 1991
8 The Report of the President's Commission on Critical Infrastructure Protection CCEB (Common Criteria Editorial Board), Common Criteria for Information Technology Security Evaluation, Version 2.0, May 1998
9 Eun-Ser Lee and Sun-Myoung Hwang, 'Design Implementation of Web Security Access Control System for Semantic Web Ontoloty,' LNCS 3481, May 2005
10 양형규, 이윤호, 손기욱, 권창영, 원동호, '영지식 상호 증명 이론 연구,' 데이터 보호기술 워크 샾 논문집, 1989
11 Eun-Ser Lee and Sang-Ho Lee, 'Design progress management for Security Requirements in Ubiqiiuous computing using COQUALMO,' LNCS 3984, May 2006
12 ISO. ISO/IEC 15408-2:1999 Information technology-Security techniques-Evaluation criteria for IT security-Part 2: Security functional requirements
13 ISO/IEC 15408-1:1999 Information technology-Security techniques-Evaluation criteria for IT security-Part 1: Introduction and general model