• Title/Summary/Keyword: 보안USB

Search Result 89, Processing Time 0.026 seconds

Enhanced Password Based User Authentication Mechanism Using Mobile Storage Medium/Channel (이동 저장매체를 활용한 패스워드 기반 사용자 인증 강화 방안)

  • Kim, Seon-Young;Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.533-540
    • /
    • 2014
  • As for the application system or the user authentication scheme that is used in the system, various technologies including simple ID/PW, certificate, fingerprint/iris, phone, security card, and OTP are being used. But simple ID/PW and phone certification lack security features. As for the certificate, fingerprint/iris, and security card/OTP, the weakness in security has been quite strengthened, but there are costs and complexity involved to use these. This paper proposes a new measure of much safer and low-cost user authentication that improves the security level and uses mobile external storage media such as USB that people commonly have.

Process of Collection for a Removable Storage Device Image Using a Software (소프트웨어를 이용한 이동식 저장매체 이미지 수집 절차)

  • Baek, Hyun Woo;Jeon, Sang Jun;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.1
    • /
    • pp.17-24
    • /
    • 2017
  • As the prevalence of removable device, critical intelligences are often stored in the removable device. For that reason, in seizure and search, the removable device became a important evidence of while it could be has a salient key for prove a crime. When we acquired a removable device for proof, we image it by a imaging device or software with a write protection. However, these are high-priced exclusive equipments and sometimes it could be out of order. In addition, we found that some secure USB and inbuilt vaccine USB are failed to connect to the imaging device. Therefore, in this paper, we provide a suitable digital evidence collection procedure for real.

Implementation of Smart USB Memory based on Bluetooth (블루투스 기반 스마트 USB 메모리 구현)

  • Kang, Byeong-gwan;Woo, Seung-heon;Yu, Hyun-ju;Ju, Haein;Lee, Ju-won;Kang, Seong-in
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.522-524
    • /
    • 2015
  • A USB memory stick became common for secondary storage Unit.. But USB memory stick has critical problems as well. Such as personal information data leakage due to easy loss of the portable device. Therefore, User increased Repurchases of USB memory stick, and damage case of personal and company information data leakage increased. In this study, to prevent such loss and stolen, we propose Smart USB memory stick based on Bluetooth. Smart USB memory stick support the security and prevent the loss.

  • PDF

Design of Security Protocal for Mobility Memory Secunity Using PUF (이동성 메모리 보안을 위한 PUF을 이용한 보안 시스템 프로토콜 설계)

  • Jung, Young-Min;Park, Seok-Cheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.625-628
    • /
    • 2013
  • 기술이 발달함에 따라 USB메모리, 보안 SD카드, 보안인증토큰 등 이동형 저장 매체도 비약적인 발전을 하고 있다. USB의 가격이 저렴해지고 작아지면서 용량의 확장도 증가하여 다양한 이용을 할 수 있게 되었다. 하지만 분실율이 높고 보안성이 낮아 다수의 사용자에게 중요한 회사의 기밀이나 개인의 인적 사항들이 노출 될 수 있다. 이를 위해 PUF를 이용하여 플래시 메모리 마다 고유키를 저장, 생성하여 외부 유출이 없이 사용자 인증을 하기 위한 플래시 드라이버의 구조 및 프로토콜을 제안하고자 한다.

A Convergence Technology of IPTV-RFID against Clone Attack (Clone 공격에 강한 IPTV-RFID 융합 기술)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.145-156
    • /
    • 2010
  • Now a days, the development of TV and internet like communicational technique makes IPTV service which combines internet with multimedia contents increase. But when a user gets service in specific place, the certification process and user's ID check in IPTV service is complicate so that there occurs communicational difficulty like increasing illegal users and service delay etc. This paper proposes communication security mechanism to prevent Clone attack which happens in wireless section by efficiently extracting illegal user. The proposed mechanism performs key distribution procedure, inter certification procedure, and key initiation procedure by putting security agent in RFID-USB for RFID tags users use to perform plug-and-plug function. Also, the proposed mechanism updates the hased token value by its ID and the random number which RFID-USB creates whenever a user accesses in the area of RFID-USB so that it protects reply attack and man-in-the-middle attack which happen often in the area of wireless section.

Management Method for Private Key File of PKI using Container ID of USB memory (USB 메모리의 컨테이너ID를 이용한 PKI 기반의 개인키 파일의 안전한 관리 방안)

  • Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.10
    • /
    • pp.607-615
    • /
    • 2015
  • Mosts user of internet and smart phone has certificate, and uses it when money transfer, stock trading, on-line shopping, etc. Mosts user stores certificate in a hard disk drive of PC, or the external storage medium. In particular, the certification agencies are encouraged for user to store certificate in external storage media such as USB memory rather than a hard disk drive. User think that the external storage medium is safe, but when it is connect to a PC, certificate may be copied easily, and can be exposed to hackers through malware or pharming site. Moreover, if a hacker knows the user's password, he can use user's certificate without restrictions. In this paper, we suggest secure management scheme of the private key file using a password of the encrypted private key file, and a USB Memory's hardware information. The private key file is protected safely even if the encrypted private key file is copied or exposed by a hacker. Also, if the password of the private key file is exposed, USB Memory's container ID, additional authentication factor keeps the private key file safe. Therefore, suggested scheme can improve the security of the external storage media for certificate.

Vulnerability and Security Requirement Analysis on Security Token and Protection Profile Development based on Common Criteria Version 3.1 (보안토큰의 취약성/보안요구사항 분석 및 CC v3.1 기반 보호프로파일 개발)

  • Kwak, Jin;Hong, Soon-Won;Yi, Wan-Suck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.139-150
    • /
    • 2008
  • Recently, financial institutes and industrial companies are adopted to security token such as OTP, smart card, and USB authentication token and so on for secure system management and user authentication. However, some research institutes have been introduced security weaknesses and problems in security tokens. Therefore, in this paper, we analyses of security functions and security requirements in security token performed by analyses of standardization documents, trends, security problems, attack methods for security tokens. Finally, we propose a CC v.3.1 based security token protection profile.

Study on Analysis and Reconstruction of Leaked Signal from USB Keyboards (USB 키보드 누설신호 분석 및 복원에 관한 연구)

  • Choi, Hyo-Joon;Lee, Ho Seong;Sim, Kyuhong;Oh, Seungsub;Yook, Jong-Gwan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.11
    • /
    • pp.1004-1011
    • /
    • 2016
  • In this paper, we suggested the methodology of analyzing and reconstructing of measured electromagnetic emanations from the Micro Controller Unit(MCU) chip of Universal Serial Bus(USB) keyboard. By analyzing electromagnetic emanations, entered information is found at keystroke and furthermore, information security problems such as personal information leakage and eavesdropping can be arisen. USB keyboards make the radiated signal according to the signal transmission mechanism. Electromagnetic emanations were measured by log periodic antenna and wideband receiver and were analyzed by signal processing algorithm.

USB security solution using 2 fator authentication (2차 인증방식을 이용한 USB보안 솔루션 (USS Solution))

  • Ko, Sang-Hyun;Han, Seok-Jin;Choi, Yoon-SU;Bae, Jong-Su;Lee, Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.267-270
    • /
    • 2017
  • As IT technology developed, storage media also developed. Among them, USB, which is a removable storage medium, is used not only to have several per person but also to work in various companies. Users store valuable and confidential data within USB. As time went on, the need for security increased. In order to solve this security problem, USB has been introduced to allow users to access internal files by inputting ID and password by embedding a security program in USB. However, the method of storing ID and Password inside is low confidentiality and high risk of information leakage. To solve these problems, we propose a 2 factor authentication system using Radius server in addition to login authentication. The proposed system not only improves the authenticity of the device, but also reduces the risk of infringement of personal information when lost. It also encrypts internal files to increase the confidentiality of internal information.