• Title/Summary/Keyword: 신원기반 인증

Search Result 126, Processing Time 0.042 seconds

Face Recognition-based Conference Participant Management System (얼굴 인식 기반 회의 참가자 관리 시스템 설계 및 구현)

  • Choi, Minhyeok;Yoon, Taehwan;Kim, Yunseo;Kim, Wonvin
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • fall
    • /
    • pp.223-224
    • /
    • 2021
  • 최근 코로나19로 인하여 건물의 출입 관리가 엄격해지고 있으며, 대규모 회의가 진행될 경우 많은 사람들의 출입으로 출입 관리에 어려움이 있다. 이에 본 논문은 이러한 어려움을 해결하기 위하여, 얼굴 인식 기반 회의 참가자 관리 시스템을 제안한다. 회의 개설자가 초대한 회의 참가자들은 얼굴 인식을 통해 본인의 신원을 인증하며, 인증된 사용자는 참가자 목록, 회의록과 같은 회의 정보를 열람할 수 있는 권한을 획득한다.

  • PDF

A Multi-receiver Certificateless Encryption Scheme and Its Application (무인증서 공개키 암호에 기반한 다중수신자 암호 기법 및 응용)

  • Sur, Chul;Park, Young-Ho;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.6
    • /
    • pp.775-784
    • /
    • 2011
  • In this paper we introduce the notion of multi-receiver certificateless encryption that avoids the inherent key escrow problem of multi-receiver identity-based encryption, and also present a highly efficient multi-receiver certificateless encryption scheme which eliminates pairing computation to encrypt a message for multiple receivers, Moreover, the proposed scheme only needs one pairing computation to decrypt the ciphertext. Finally, we discuss how to properly transform our scheme into a new public key broadcast encryption scheme for stateless receivers based on the subset-cover framework, which enjoys the advantages of certificateless cryptography.

Home Observation System using Multimedia Streaming and Personalized Activate Pattern Analysis (멀티미디어 스트리밍 기술과 개인화된 행동 패턴 분석을 통한 홈 내 상황 감시 시스템)

  • Sung, Kyung-Sang;Kim, Hyun-Chul;Kim, Tae-Wook;Oh, Hae-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.241-244
    • /
    • 2005
  • 정보통신 기술의 급격한 발전으로 등장한 첨단 시스템의 활용과 지능형 홈에 대한 관심이 확산되고 있다. 홈 네트워킹 기술과 다양한 멀티미디어 응용의 발달로 생활의 편리화를 추구하기 위한 많은 노력들이 진행되고 있다. 본 논문에서는 유비퀴터스 컴퓨팅 환경에서 다양한 어플리케이션 서비스를 개발하기 위한 필수적인 요소인 멀티미디어를 기반으로 하며, 사용자의 신원확인을 위해 인증 및 접근 제어를 통한 사용자의 행동 패턴을 분석하여 그 정보를 이용한 자동화 처리 시스템에 적용하는 단일화 된 어플리케이션 모델을 제안한다. 또한 일정시간을 두어 캡쳐되어진 영상 이미지에 대한 일정 허용 범위에 대해 픽셀 단위로 비교를 하여 이상 유무를 확인하며, 12byte의 salt 함수를 해쉬화 알고리즘에 이용한 자체 인증 기법을 취함으로써 사용자 인증에 안전을 꾀했다.

  • PDF

Self Generable Conditionally Anonymous Authentication System for VANET (VANET를 위한 차량자체생성 조건부익명 인증시스템)

  • Kim, Sang-Jin;Lim, Ji-Hwan;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.105-114
    • /
    • 2009
  • Messages exchanged among vehicles must be authenticated in order to provide collision avoidance and cooperative driving services in VANET. However, digitally signing the messages can violate the privacy of users. Therefore, we require authentication systems that can provide conditional anonymity. Recently, Zhang et al. proposed conditionally anonymous authentication system for VANET using tamper-resistant hardware. In their system, vehicles can generate identity-based public keys by themselves and use them to sign messages. Moreover, they use batch verification to effectively verify signed messages. In this paper, we provide amelioration to Zhang et al.'s system in the following respects. First, we use a more efficient probabilistic signature scheme. Second, unlike Zhang et al., we use a security proven batch verification scheme. We also provide effective solutions for key revocation and anonymity revocation problems.

An Authentication Model based Fingerprint Recognition for Electronic Medical Records System (지문인식 기반의 전자의무기록 시스템 인증 모델)

  • Lee, Yong-Joon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.379-388
    • /
    • 2011
  • Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence of the adoption of EMR(Electronic Medical Records) in the health care sector, it is becoming more and more common for a health professional to edit and view a patient's record. In order to protect the patient's privacy, a secure authentication model to access the electronic medical records system must be used. A traditional identity based digital certificate for the authenticity of EMR has private key management and key escrow of a user's private key. In order to protect the EMR, The traditional authentication system is based on the digital certificate. The identity based digital certificate has many disadvantages, for example, the private key can be forgotten or stolen, and can be easily escrow of the private key. Nowadays, authentication model using fingerprint recognition technology for EMR has become more prevalent because of the advantages over digital certificate -based authentication model. Because identity-based fingerprint recognition can eliminate disadvantages of identity-based digital certificate, the proposed authentication model provide high security for access control in EMR.

A Study on Expansion Delegation using PMI (PMI 를 이용한 확장 권한위임에 관한 연구)

  • Lee, Deok-Gyu;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.947-950
    • /
    • 2002
  • 인터넷이 급속히 발달하면서 초기에 제공되던 정보제공의 방법으로는 사용자 신원에 대한 인증으로는 부족하게 되었다. 이에 대해 PKI(Public-Key Infrastructure)에서 인증서를 기반으로 사용자의 신원을 제공하는 보안방법이 대두되었다. 하지만 시스템에 따라 각 사용자에게 다른 서비스를 제공하고 이용해야 할 경우가 발생하게 되는데, 이 경우 각 사용자의 권한이나 임무 등의 사용자 속성을 관리할 필요가 있다. 이때 기존에 사용된 PKI의 확장 영역을 이용하지 않고, 새롭게 사용자 속성을 위한 인증서를 사용하게 되는데 이것을 PMI라고 한다. 본 논문에서는 PMI(Privilege Management Infrastructure)를 이용한 효율적이고 검증 가능한 권한위임 프로토콜에 대하여 제안한다.

  • PDF

Secured Authentication Scheme and Charging & Discharging System Operation for Electric Vehicles (정보보호를 고려한 전기자동차 충방전 시스템의 인증과 운영에 관한 연구)

  • Lee, Sunguk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.551-557
    • /
    • 2021
  • With increase of electric vehicle in the road, the number of charging/discharging infrastructure for electric vehicle in public space is also increased rapidly. To charge or discharge the electric vehicle the user of electric vehicle and service provider should verify the each other's identity to minimize security vulnerability. This paper proposes mutual authentication scheme between electric vehicle and charging/discharging service provider with help of hash function and Message Authentication Code(MAC). Also efficient operating scheme for charging/discharging service system is proposed. The analysis shows that the system has robustness against security vulnerability. Also this system can keep the sensitive personal information of service user safely.

FinDID : A DID service supporting the standard service scheme for the financial sector

  • Lee, Young-Eun;Kim, Hye-Won;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.127-138
    • /
    • 2022
  • In this paper, we present FinDID (Financial Decentralized IDentity), a blockchain-based DID(Decentralized IDentity) service that can flexibly control personal information or credentials through a systematic verification method while complying with the standard service scheme of decentralized identity for the financial sector. DID is an identity management system used in a decentralized environment without a specific certification authority, and as a technology that allows users to control their own information, it can realize self-sovereignty over users' own personal information. Through FinDID, users receive credentials that authenticate their various personal information from the issuer, select only the claims required by the target financial service using their personal electronic wallet, create presentations from credentials. Then they submit it to the financial service, leading to their qualification from the service. FinDID consists of electronic wallet, credential issuer, credential storage, DID service including DID management contract and credential management contract, and financial services using this service scheme. The DID service manages each user's DID and supports all verification processes of the associated identity management scheme.

X.509 인증서내 식별번호를 이용한 본인확인기술 표준화 동향

  • 박종욱;김승주;이재일;이홍섭
    • Review of KIISC
    • /
    • v.14 no.2
    • /
    • pp.46-56
    • /
    • 2004
  • 식별번호를 이용한 본인확인기술(SIM : Subject Identification Method) 표준(안)은 국내 보안분야로는 처음으로 IETF PKIX 워킹그룹에서 논의되고 있는 순수 국내 보안기술로 연내 IETF 공식표준문서(RFC)로 채택될 가능성이 높다. 동 기술은 PKI 기반의 전자서명인증서비스에서 동일한 이름을 갖는 개인 사용자나 유사한 법인명을 갖는 법인사업자가 겪을 수 있는 본인확인의 오류를 원천적으로 방지하여 인증서 소유자의 신원을 유일하게 확인할 수 있는 방안을 제공한다. 본 고에서는 관련 국외 동향을 고려하여 SIM 표준(안)의 보안요구사항, 프로토콜, 표준화 주요 쟁점 및 진행상황을 고찰하고자 한다.

An Efficient Password-based Authentication and Key Exchange Protocol for M-Commerce Users (M-Commerce 사용자를 위한 효율적인 패스워드 기반 인증 및 키교환 프로토콜)

  • Park Soo-Jin;Seo Seung-Hyun;Lee Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.3
    • /
    • pp.125-132
    • /
    • 2005
  • Wireless access always has to include the authentication of communication partners and the encryption of communication data in order to use secure M-Commerce services. However, wireless systems have limitations compared with the wired systems, so we need an efficient authentication and key exchange protocol considering these limitations. In this paper, we propose an efficient authentication and key exchange protocol for M-Commerce users using elliptic curve crypto systems. The proposed protocol reduces the computational load of mobile users because the wireless service provider accomplishes some parts of computations instead of the mobile user, and it uses the password-based authentication in wireless links. Also, it guarantees the anonymity of the mobile user not to reveal directly the real identity of the user to the M-Commerce host, and preserves the confidentiality of communication data between the M-Commerce host and the user not to know the contents of communication between them to others including the wireless service provider.