• Title/Summary/Keyword: 공인인증서비스

Search Result 76, Processing Time 0.029 seconds

A Study on the Two-channel Authentication Method which Provides Two-way Authentication using Mobile Certificate in the Internet Banking Environment (인터넷 뱅킹 환경에서 사용자 인증 보안을 위한 Two-Channel 인증 방식)

  • You, Han-Na;Lee, Jae-Sik;Kim, Jung-Jae;Park, Jae-Pio;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.939-946
    • /
    • 2011
  • The Internet banking service provides convenience than the traditional offline services. However, it still causes a number of security problems including hacking. In order to strengthen security, the financial institutions have provided such authentication methods as the official authentication certificate, the security token, the security card and OTP. However, the incidents related to hacking have continuously occurred. Especially, various weak points have been suggested for the authentication methods in regard to such types of hacking as the memory hacking or the MITM attack. So I needed was a new authentication method. In this study, the two-channel authentication method which provide two-way authentication on the user's PC and mobile device when executing the electronic financial transactions in the Internet banking environment is suggested. Also, by analyzing it in comparison with other existing methods, it is possible to check that the prospects of safety and credibility are strengthened.

Implementation of Kiosk-based Internet Public Services System (키오스크 기반 인터넷민원처리시스템의 구현)

  • An, Im-Sang;Jeong, Gi-Won
    • The KIPS Transactions:PartA
    • /
    • v.10A no.5
    • /
    • pp.433-438
    • /
    • 2003
  • To provede public services through Internet, there are several prerequisites such as security issue resolutions for public area installation and hardware support for authorized signatures etc. in addition to web-based system development. A kiosk-based system is a right solution for public services provision through Internet because a kiosk has hardware features supporting authorized signatures and also it can be installed at public area through Internet without security exposure, meeting security guidelines of National Intelligence Service. The process to provide public services through a koisk is that a client requests a kind of public services selecting menu through the kiosk, then the system issues a civil service documents after taking authentification and payment process. To support those kinds o processes it is required to support electronic payment using SMART card in addition to cash payment and to apply government standard security guidelines to protect administrative and personal information. This kiosk-based Internet public service system support and meet those all requirements.

AMI 네트워크 기반 수용가 자동 수요반응 시스템

  • Seo, Jong-Gwan;Jeon, Hui-Yeon;Lee, Jae-Jo
    • Information and Communications Magazine
    • /
    • v.34 no.5
    • /
    • pp.68-75
    • /
    • 2017
  • 본고에서는 Advanced Metering Infrastructure (AMI) 네트워크 기반의 자동 수요반응 기술에 대해 소개한다. 수요반응은 피크 수요 기간 동안 전력의 안정화에 큰 기여를 할 수 있으며, 수요반응의 범위와 효과가 증가함에 따라 일반 수용가의 참여가 매우 중요한 이슈로 떠오르고 있다. 하지만, 다양한 지역에 위치한 수용가를 대상으로 수요반응 서비스를 제공하기 위해서는 유틸리티 또는 수요관리사업자와 고객 간의 수요반응 신호 교환과 정보 공유를 위한 통합 네트워크 구축이 필수적으로 필요하다. 또한, 이기종 시스템 간 상호운용성 보장을 위한 공통의 통신 제어 기술이 요구된다. 본고에서는 AMI 네트워크를 기반으로 IEC/PAS 규격인 Open Automated Demand Response version 2.0 (OpenADR2.0) 기술을 채택하여 수용가를 대상으로 한 자동화된 수요반응 서비스를 실현하고자 한다. AMI 디바이스를 수요반응 자원으로 활용하기 위하여 기존의 기능은 유지한 채로 OpenADR2.0 프로토콜을 탑재하여 수요반응 기능이 추가된 디바이스들을 개발하였으며, 프로토콜 적합성 테스트와 필드 테스트를 통하여 자동화된 수요 반응 서비스 및 부하 감축을 검증하였다. 개발 소프트웨어는 OpenADR Alliance로부터 국제공인인증을 획득함으로써 수요 반응 시스템의 레퍼런스 통신 기술로 적용이 가능하다.

Authentication of Fast Handovers for Mobile IPv6 using Return Routability (Return Routability를 이용한 Fast Handovers for Mobile IPv6 인증기법)

  • Shin, Tea-Il;Mun, Young-Song
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.1-8
    • /
    • 2008
  • IETF has proposed Fast Handovers for Mobile IPv6 (FMIPv6) for efficient mobility management, FMIPv6 has no solutions to protect binding updates. Previous researches have mainly concentrated on using AAA, public cerificates or cryptographic algorithms to secure binding updates. However the approaches need a particular infrastructure or a heavy processing cost to setup secure associations for handovers. Proposed scheem provides authentication for FMIPv6 without infrasturcture and costly cryptographic algorithms by extending Return Routability Protocol. Also proposed scheme is oble to be used for various existing handover mechanisms in IPv6 network.

  • PDF

Design and Implementation of Multiplex Certification System Using XML Signature For WBI (WBI에서 XML 전자 서명을 이용한 다중 인증 시스템 설계 및 구현)

  • Won, Eom-Ki;Kim, Jung-Jae;Jun, Moon-Seuck
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.3
    • /
    • pp.457-464
    • /
    • 2005
  • Internet becomes absolutely necessary tools due to rapid progress of information technology. Educational correspondence abount an age of information demand is a education focused on a learner and remote education based on information technology. Internal and external standardization working is accelerated and recently XML security studies are activated using XML which is next generation web standard document format. But using these are main contents that users have to pay about Certification service to get CA certificate from 2004 me. This paper propose multiplex Certification remote education agent system using XML digital signature to satisfy security requirement.

  • PDF

A Design of DA_UDC(Double Authentication User.Device.Cross) Module using OTA(One Time Authentication) Key in Home Network Environment (홈 네트워크 환경에서 OTA(One Time Authentication)키를 이용한 DA_UDC(Double Authentication User.Device.Cross) 모듈 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.419-427
    • /
    • 2009
  • This paper propose DA-UDC(Double Authentication User, Device, Cross) Module which solves the cost problem and the appropriation of Certificate using User Authentication, Device Authentication and Cross Authentication with OTA(One Time Authentication) Key, and which is designed not to subscribe to the service of Home network business. Home Server transmits its public key which is needed to create OTA to the user which passed the first step of authentication which verifies User ID, Device ID and Session Key. And it performs the second step of authentication process which verifies the OTA key created by a user. Whenever the OTA key of DA-UDC module is generated, the key is designed to be changed. Therefore, DA-UDC Module prevents the exposure of User and Device ID by performing the two steps of authentication and enhances the authentication security of Home Network from malicious user with OTA key. Also, DA-UDC Module is faster than the existing authentication system in processing speed because it performs authentication calculation only once. Though DA-UDC Module increases data traffic slightly because of the extra authentication key, it enhances the security more than the existing technique.

The Role of Control Transparency and Outcome Feedback on Security Protection in Online Banking (계좌 이용 과정과 결과의 투명성이 온라인 뱅킹 이용자의 보안 인식에 미치는 영향)

  • Lee, Un-Kon;Choi, Ji Eun;Lee, Ho Geun
    • Information Systems Review
    • /
    • v.14 no.3
    • /
    • pp.75-97
    • /
    • 2012
  • Fostering trusting belief in financial transactions is a challenging task in Internet banking services. Authenticated Certificate had been regarded as an effective method to guarantee the trusting belief for online transactions. However, previous research claimed that this method has some loopholes for such abusers as hackers, who intend to attack the financial accounts of innocent transactors in Internet. Two types of methods have been suggested as alternatives for securing user identification and activity in online financial services. Control transparency uses information over the transaction process to verify and to control the transactions. Outcome feedback, which refers to the specific information about exchange outcomes, provides information over final transaction results. By using these two methods, financial service providers can send signals to involved parties about the robustness of their security mechanisms. These two methods-control transparency and outcome feedback-have been widely used in the IS field to enhance the quality of IS services. In this research, we intend to verify that these two methods can also be used to reduce risks and to increase the security protections in online banking services. The purpose of this paper is to empirically test the effects of the control transparency and the outcome feedback on the risk perceptions in Internet banking services. Our assumption is that these two methods-control transparency and outcome feedback-can reduce perceived risks involved with online financial transactions, while increasing perceived trust over financial service providers. These changes in user attitudes can increase the level of user satisfactions, which may lead to the increased user loyalty as well as users' willingness to pay for the financial transactions. Previous research in IS suggested that the increased level of transparency on the process and the result of transactions can enhance the information quality and decision quality of IS users. Transparency helps IS users to acquire the information needed to control the transaction counterpart and thus to complete transaction successfully. It is also argued that transparency can reduce the perceived transaction risks in IS usage. Many IS researchers also argued that the trust can be generated by the institutional mechanisms. Trusting belief refers to the truster's belief for the trustee to have attributes for being beneficial to the truster. Institution-based trust plays an important role to enhance the probability of achieving a successful outcome. When a transactor regards the conditions crucial for the transaction success, he or she considers the condition providers as trustful, and thus eventually trust the others involved with such condition providers. In this process, transparency helps the transactor complete the transaction successfully. Through the investigation of these studies, we expect that the control transparency and outcome feedback can reduce the risk perception on transaction and enhance the trust with the service provider. Based on a theoretical framework of transparency and institution-based trust, we propose and test a research model by evaluating research hypotheses. We have conducted a laboratory experiment in order to validate our research model. Since the transparency artifact(control transparency and outcome feedback) is not yet adopted in online banking services, the general survey method could not be employed to verify our research model. We collected data from 138 experiment subjects who had experiences with online banking services. PLS is used to analyze the experiment data. The measurement model confirms that our data set has appropriate convergent and discriminant validity. The results of testing the structural model indicate that control transparency significantly enhances the trust and significantly reduces the risk perception of online banking users. The result also suggested that the outcome feedback significantly enhances the trust of users. We have found that the reduced risk and the increased trust level significantly improve the level of service satisfaction. The increased satisfaction finally leads to the increased loyalty and willingness to pay for the financial services.

  • PDF

User Verification System using QRcode in Mobile Telemedicine Cloud Environment (모바일 원격의료 클라우드 환경에서 QRcode를 이용한 사용자 검증 시스템 연구)

  • Kim, Young-Hyuk;Lim, Il-Kwon;Lee, Jun-Woo;Li, QiGui;Lee, Jae-Kwang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.858-861
    • /
    • 2011
  • Smart Society로 나아가는 핵심으로 손꼽히는 모바일의 급속한 확산은 교육, 교통, 경제뿐만 아니라 건강에도 큰 영향을 미치고 있다. 그동안 발전이 미진했던 u-Health 기술 및 시장 역시 모바일로 인해 새로운 서비스 모델을 제시함으로써 발전하고 있다. 본 논문은 제안하는 시스템은 u-Health 서비스 중 sensor를 이용하여 원격지 환자의 생체정보를 수집하고, 실시간으로 병원의 클라우드 서버에 전송하는 시스템에서 사용자 검증에 대하여 연구하였다. 여기서 사용자란 클라우드 서버에 접속하는 의사를 말하며, 환자의 생체정보를 보기 위하여 시스템 접속함에 있어 공인인증서나 기타 인증 시스템과 비교해 간편하고, 네트워크 트래픽이 적은 사용자 검증 시스템을 목표로 한다. 그리하여 QRcode를 3개 생성하고, 각 클라우드 서버에 분산 분배 후 서로 섞음으로써 기존의 QRcode와 전혀 다른 인증용 QRcode를 생성할 수 있었다. 이것을 3차원 인덱스를 통해 원본 사용자 QRcode와 대조함으로 사용자 검증 과정을 수행시킴으로써 절차를 간소화하고 네트워크 트래픽을 약 15% 감소시킬 수 있었다.

A Study on a Secure Internet Service Provider Model Using Smart Secure-Pad (스마트 보안패드를 이용한 안전한 인터넷 서비스 제공 모델에 관한 연구)

  • Lee, Jae-Sik;Kim, Hyung-Joo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1428-1438
    • /
    • 2013
  • Services take place in Internet environment, a formation of the trust relationship between user and service provider for services. Different authentication schemes such as using Certificate of Public Key Infrastructure authentication and using ID/PW for a simple user authentication have been proposed for trust relationship. In addition, in the case of electronic financial transactions, transaction integrity and non-repudiation features are provided. These services are provided in Internet environment, use various measures to ensure service safety. However, it was difficult to prevent attacks using existing security technology because of emergence of MITB attack that manipulate the memory area of the Web browser and social engineering attacks such as phishing/pharming, requires application of new security technologies became. In this paper, we propose a concept of smart secure-pad, and utilize it safely formed a trust relationship between user and service provider, a model has been proposed to ensure safety of data transmission. Proposed model's security evaluation results show security against to MITB attack and phishing/pharming that can't be prevent attack using existing security technology. In addition, service provider can easily apply the model in safe environment can provide Internet service using provided representative services applying the proposed model.

Anonymity Certification Technique of a Smart Card base for Personal Information Protection (개인정보보호를 위한 스마트카드 기반의 익명 인증 기법)

  • Lee, Kwang-Hyoung;Park, Jeong-Hyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.12
    • /
    • pp.6071-6080
    • /
    • 2012
  • Regarding the official authentication method which is a strong encrypt method for financial transactions, there has recently been a concern for the problem of storage. As a solution for such problems, this study provides the anonymous authentication method based on the smart card used for such a purpose by utilizing the pseudo ID replacing the user's personal data. Such an anonymous authentication method makes it possible to prevent any inside leakage, intermediary attack, limited re-transmission attack, service-denying attack, directional safety attack and secret inspector attack in regard to the user's personal data. As a result, there would be no concern for the leakage of any personal data. In comparative analysis, after executing the comparison and analysis process through the experiment for the authentication process by using the previously-used smart card, the new one has shown about 10% a high level of efficiency for the encrypt and decrypt process together with excellent features in terms of flexibility in regard to the user's anonymity and tracking ability.