• Title/Summary/Keyword: 사용자 인증 메커니즘

Search Result 173, Processing Time 0.025 seconds

User Authentication and Key Distribution on Open IPTV System (개방형 IPTV 환경에서의 사용자 인증 및 키 분배 메커니즘)

  • Jung, Ji-Yeon;Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.227-236
    • /
    • 2011
  • IPTV(Internet Protocol Television) is one of the typical businesses which are the convergence of Broadcast and Communication. It provides broadcasting service using IP networks. Recently, IPTV service is developed to Mobile IPTV or Open IPTV. Especially, Open IPTV uses open platform so not only service providers but also general users can provide contents to other users. Open IPTV system has many content providers, so existing security solution of IPTV cannot be adopted. In this paper, we suggest user authentication and key distribution mechanism on Open IPTV. Our proposed mechanism is based on Kerberos, so it can support distribution environment such as Open IPTV. We demonstrate that proposed mechanism can guarantee secure transmission of contents and reduce the delay of user authentication on Open IPTV system compared to other authentication mechanisms. We also compare our proposal and other mechanisms in various aspects, and analyze efficiency and safety of proposed mechanism. As a result, we insist that this mechanism satisfies the security requirements for IPTV.

Analysis on Authentication Mechanism in Open Distributed Systems (개방형 분산 시스템 환경의 인증 메커니즘 분석)

  • 강창구;최용락
    • Review of KIISC
    • /
    • v.7 no.2
    • /
    • pp.15-34
    • /
    • 1997
  • 분산 시스템 환경은 다수의 컴퓨터가 네트워크에 연결되어 있고, 다양한 사용자가 공통적으로 접근할 수 있기 때문에 심각한 보안 문제를 안고 있다. 본 논문은 개방형 분산 시스템 환경에서 각종 위협에 대응할 수 있는 인증 메커니즘에 관하여 다룬다. 기본적인 위협 요소, 인증 요구조건 및 서비스를 검토하고 관련된 메커니즘들을 조사 분석함으로써 분산 시스템의 응용에서 암호학적인증 메커니즘의 설계 기준을 마련할 수 있을 것이다. 본 논문에서는 Kerberos, X.509, SPX 및 SESAME 인증 메커니즘을 실체 인증의 개념적 관점에서 분석하였다.

  • PDF

Design of Authentication Mechanism for Anonymity And Privacy assurance (익명성과 프라이버시 보장을 위한 효율적인 인증 메커니즘 설계)

  • Lee, Dong-Myung;Choi, Hyo-Min;Yi, Ok-Yeon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.941-944
    • /
    • 2005
  • 본 논문에서는 인터넷을 통해 다양한 컨테츠 서비스를 사용자가 편리하게 이용할 수 있도록 EAP-TLS 인증 방식과 SKKE(Symmetric-Key Key Establishment)방식을 이용하여 보다 효율적인 인증 메커니즘을 설계하였다. 제안하고 있는 메커니즘에서는 사용자가 인증서 방식을 통해 AS(AAA Server)로부터 인증을 받으면 AS 와 가맹 관계에 있는 CP(Contents Provider)에는 별도의 로그인 과정없이 서비스를 이용할 수 있는 SSO 서비스, 사용자 익명성, 프라이버시를 제공한다. 사용자가 익명성을 필요로 하는 컨텐츠 서비스를 이용할 경우 사용자의 익명성을 보장 해주고 AS 모르게 사용자와 CP 가 안전하게 서비스를 전송하기 위해 사용 할 세션키를 교환하고 CP 마다 다른 세션키를 사용함으로써 사용자의 프라이버시를 보장해 준다.

  • PDF

Design and Implementation of OTP Based Authentication Mechanism for Web Service (OTP 기반의 웹서비스 인증 메커니즘 설계 및 구현)

  • Song, You-Jin;Lee, Dong-Hyeok
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.2
    • /
    • pp.89-108
    • /
    • 2005
  • The SOAP specifications are not provided a functions of information security, especially authentication function. In case of user authentication, delivery of the username and password elements can be exposed to sniffing/replay attack by malicious attacker. In this paper, we propose a new mechanism to protect authentication attacks for the SOAP messages. The proposed mechanism is compensated for weakness of S/KEY system. Our mechanism has no limitation for time and overhead and also provide a more effective and secure delivery.

  • PDF

Automatic user authentication mechanism for horne network (홈 네트워크를 위한 자동화된 사용자 인증 메커니즘)

  • I, Chang-Uk;Lee, Hyung-Su;Chang, Hoon;Kim, Seok-Yoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2009.01a
    • /
    • pp.365-368
    • /
    • 2009
  • 본 논문에서는 홈 네트워크 환경을 위하여 다양한 정보가전들에 서비스를 제공하고 운용하기 위해 OSGi 프레임워크를 이용하여 게이트웨이를 구성하였다. 홈 네트워크의 특성상 네트워크를 구성하는 정보가전들의 입력 수단에 대한 제약이 많고 자원이 한정적이다. 따라서 이러한 문제를 해결하기 위해 사용자에게 패스워드를 입력받지 않고 자동으로 인증 과정을 마치는 인증 메커니즘을 연구하였다. 패스워드를 입력받지 않음으로써 사용자 입력 대기 시간을 줄일 수 있고, 대칭키를 이용하여 암호화 과정의 연산량을 줄여 소규모로 구성되는 흠 네트워크 구조에 효율적으로 적용할 수 있었다.

  • PDF

User Authentication Mechanism using Smartphone (스마트폰을 이용한 사용자 인증 메커니즘)

  • Jeong, Pil-seong;Cho, Yang-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.301-308
    • /
    • 2017
  • With the popularization of smart phones and the development of the Internet, many people use smart phones to conduct identity verification procedures. smart phones are easier and faster to authenticate than personal desktop computers. However, as Internet hacking technology and malicious code distribution technology rapidly evolve and attack types become more diverse, authentication methods suitable for mobile environment are required. As authentication methods, there are methods such as possessive-based authentication, knowledge-based authentication, biometric-based authentication, pattern-based authentication, and multi-element authentication. In this paper, we propose a user authentication mechanism that uses collected information as authentication factor using smart phone. Using the proposed authentication mechanism, it is possible to use the smart phone information and environment information of the user as a hidden authentication factor, so that the authentication process can be performed without being exposed to others. We implemented the user authentication system using the proposed authentication mechanism and evaluated the effectiveness based on applicability, convenience, and security.

Implementation of a Secure Wireless LAU System using AP Authentication and Dynamic Key Exchange (AP 인증 및 동적 키 분배를 이용한 안전한 무선랜 시스템 구현)

  • Lee, Jong-Hu;Lee, Myung-Sun;Ryou, Jae-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.497-508
    • /
    • 2004
  • The existing wireless LAN standard IEEE802.11b has many vulnerabilities from security point of view. The authentication mechanisms in IEEE802.11b have many vulnerabilities. As a result to complement the weak of IEEE802.11b authentication, the IEEE802.1x had been developed in the sense of providing strong user authentication with appropriate mechanism. But this mechanism does not perform AP authentication and there are also some weak points. And in confidentiality and message Integrity case, WEP is weak from key stream reuse attack, IV reuse attack and so on. For that reason, in this paper we propose secure wireless LAN system. Our system provides strong user authentication, confidentiality, and message integrity based on existing IEEE802.1x framework and TLS.

A Study on Authentication Technique based on OSGi Service Platform (OSGi 서비스 플랫폼 기반의 인증 기법에 관한 연구)

  • I, Chang-Uk;Hong, Won-Gi;Chang, Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.387-395
    • /
    • 2009
  • The establishment of security architecture is essential because security vulnerabilities occur such as user's unjustifiable connection for the opened gateway and access to resources without permission in OSGi service platform environment. In this paper, it proposes a authentication technique for an Automatic user authentication which is used the Symmetric Key and the Service bundle authentication to consider the constraints of the hardware in the OSGi service platform environment. Typically, the type of entering a password is used for the user authentication mechanism however OSGi platform environment studies not entering the password but using MAC address and encrypted identifier of the automatic user authentication mechanism because the devices are limited in their input. In this paper, the Symmetric Key is used for bundle authentication mechanism. Therefore operation becomes quick and secure authentication process has been successfully completed by using the time data and a ticket which contains a license. Based on these two different authentication mechanisms, it could eliminate the constraints of resources and improve the convenience of users and administrators. Also it shows an effect from omitting the waiting time to enter a password and reducing operations which need for authentication in the OSGi service platform environment.

Implementation of 3GPP AKA protocol in USIM (USIM 에서의 3GPP 상호인증 프로토콜 구현)

  • Kim, Keon-Woo;Lee, Hang-Rok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1933-1936
    • /
    • 2003
  • 2 세대 GSM 통신에서는 SIM 을 이용하여 망이 사용자를 인식하는 단방향 인증 서비스만 제공한다. 하지만, 3 세대 비동기 방식의 IMT-2000 에서는 2 세대 인증 메커니즘의 취약성 보완 및 양방향 인증을 위해서 새로운 인증 프로토콜을 설계하였다. 이에 3GPP 는 인증 메커니즘의 핵심 알고리즘으로 Milenage를 사용할 것을 권고하고 사업자는 이를 사용하여 인증 서비스를 제공할 것으로 예상된다. 본 논문은 JCOS 기반의 USIM 플랫폼에서 상호인증 기능을 수행하는 자바 애플릿 구현에 관한 것이다. 결과에 관해 에뮬레이터 환경에서 테스트하여 표준문서에서 제시하는 값과 동일함을 확인하였다.

  • PDF

Design of a effective Authorization Mechanism based on Kerberos (커버로스 기반의 효율적인 허가 메커니즘 설계)

  • Kim, Eun-Hwan;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.287-294
    • /
    • 2003
  • Authentication and authorization are essential functions for the security of distributed network environment. Authorization is determining and to decide whether a user or process is permitted to perform a particular operation. In this paper, we design an authorization mechanism to make a system more effective with Kerberos for authentication mechanism. In the authorization mechanism, Kerberos server operates proxy privilege server. Proxy privilege server manages and permits right of users, servers and services with using proposed algorithm. Also, privilege attribute certificate issued by proxy privilege server is used in delegation. We designed secure kerberos with proposed functions for effective authorization at the same time authentication of Kerberos mechanism.