• Title/Summary/Keyword: 원격 인증

Search Result 287, Processing Time 0.02 seconds

Design Errors and Cryptanalysis of Shin's Robust Authentication Scheme based Dynamic ID for TMIS

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.10
    • /
    • pp.101-108
    • /
    • 2021
  • In this paper, we analyze Shin's proposed dynamic ID-based user authentication scheme for TMIS(Telecare Medicine Information System), and Shin's authentication scheme is vulnerable to smart card loss attacks, allowing attackers to acquire user IDs, which enables user impersonation attack. In 2019, Shin's proposed authentication scheme attempted to generate a strong random number using ECC, claiming that it is safe to lose a smart card because it is impossible to calculate random number r'i due to the difficulty of the ECC algorithm without knowing random number ri. However, after analyzing Shin's authentication scheme in this paper, the use of transmission messages and smart cards makes it easy to calculate random numbers r'i, which also enables attackers to generate session keys. In addition, Shin's authentication scheme were analyzed to have significantly greater overhead than other authentication scheme, including vulnerabilities to safety analysis, the lack of a way to pass the server's ID to users, and the lack of biometric characteristics with slightly different templates.

A Strategy on Standardization of RPAS Airworthiness Certification (원격 조종 항공기 시스템의 인증 표준화 전략)

  • Yoo, Beong-Seon;Shin, Dong-Jin;Chang, Jae-ho;Park, Jung-Min;Kang, Ja-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.1
    • /
    • pp.1-12
    • /
    • 2018
  • Currently, the domestic UAS technology is lagging behind the leading countries in terms of both advanced technology and industrial competitiveness, but it cannot avoid the global efforts of integrating UAS into existing manned aviation system and applying them to industries. UAS is a relatively new system to existing aviation world, but ICAO is making a great effort to help Contracting States and the aviation industries to better understand and promote UAV systems. In particular, the UAS is classified as RPAS and other UAS, leading to the standardization work for integrating the RPAS into the manned aviation in the near future. For this purpose, ICAO has been promoting the standardization for the global operation of the RPAS, and in this study, it has been carrying out the study on the strategy to establish the domestic RPAS certification system including the ICAO standardization activities. This paper analyzes the domestic and international regulatory frameworks for RPAS and presents a strategy for building the domestic RPAS certification system.

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.205-214
    • /
    • 2006
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware or Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache Poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside. and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.107-116
    • /
    • 2007
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware of Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside, and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

Implementation of U-Kiosk based on PANDA and VNC (PANDA$^{1)}$와 VNC에 기반한 U-Kiosk 구현)

  • Seok, Hyun-Chul;Park, Ki-Woong;Lim, Sang-Seok;Park, Kyu-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10a
    • /
    • pp.238-243
    • /
    • 2006
  • 휴대용 단말기의 보급과 인터넷 및 무선 네트워크의 발달로 사용자들이 사용하는 개별 장치들이 보편화되어 있으며, 이들을 서로 유기적으로 엮은 서비스가 등장하고 있다. 본 논문에서는 이러한 서비스의 한 종류로 U-Kiosk의 개념을 소개한다. U-Kiosk는 Kiosk 단말장치나 공용 PC를 사용자 개인의 PC처럼 사용할 수 있도록 하여 이들의 리소스를 직접 제어할 수 있는 기능을 제공한다. 이것을 실현하기 위한 방안으로 본 논문에서는 공용 PC에서 개인 PC의 바탕화면 설정을 포함해 모든 자원을 직접 사용할 수 있도록 하는 부분을 구현하고 설명을 하였으며, 인증 과정에서 사용자의 개입을 최소한으로 줄이는 방법에 대해서 소개한다. 이를 위하여 초소형 보안 단말기인 PANDA를 사용하였으며, Zigbee 통신을 사용하여 사용자의 위치정보를 파악하여 자동으로 인증을 하도록 하는 Transient Authentication의 개념을 도입하였다. 두 컴퓨터 간의 원격 접속을 위해서는 VNC를 이용하여 구현하였으며, 사용자가 공용 PC로부터 일정 거리 안에 있을 경우, 자동으로 원격 접속이 이루어지고, 공용 PC로부터 멀어질 경우 자동으로 접속이 종료되도록 구현하였다. 이를 기반으로 제안하는 U-Kiosk의 개념에 맞는 테스트 베드를 구축 하였다. 이는 UFC Project$^{2)}$의 일부로서 차후 완벽한 인증 인프라를 구축하여 보다 안정적이고 사용하기 편리한 U-Kiosk의 구현에 초석이 될 것이다.

  • PDF

Analysis of e-Learning Contents in Distance Teacher Training for Quality Improvement (콘텐츠 품질 향상을 위한 교원연수 이러닝 콘텐츠 분석)

  • Kim, Yong
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.9
    • /
    • pp.476-484
    • /
    • 2013
  • The purpose of this study was to analyze the quality of 67 kinds of e-learning contents in an attempt to boost the effectiveness of distance teacher training. As a result of analyzing, the e-learning contents were rated highest in terms of 'training content,' followed by 'instructional design,' 'teaching & learning strategies,' 'evaluation' and 'interaction.' The scores of 'teaching & learning strategies,' 'evaluation' and 'interaction' were below 80 that was the standard of quality certification. In mean comparison(ES) of contents quality level between certified contents and non certified contents, 'instructional design' had the largest ES(effect size), followed by 'teaching & learning strategies,' 'evaluation'. In the analysis of evaluation factors, most of factors had a large effect such as 'webpage layout', 'selection of instructional design'. The findings of the study are expected to suggest what improvements should be made in the development of e-learning contents for distance teacher training.

A study on Web mortification distance education system design that not authentication in multimedia based (멀티미디어 기반에서의 Web을 통한 인증 없는 원격교육시스템 설계에 관한 연구)

  • Lee, Young-Joo;Lee, Sung-Chang
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.42 no.1
    • /
    • pp.69-76
    • /
    • 2005
  • The most important issue in a asynchronous distance education system for multimedia surrounding is depend on the design of user interface that decide the interaction and easily using. The remarkable properties of this asynchronous distance education system that differed from traditional system are three folds: 1)it maded by using realistic metaphoe multimediately. 2)it designed interactively that students can get feed-back effect immediately. 3)it designed considered in its Performaces aspects and it based principal design of interfaces of education technology.

Telemedicine Conference System for Realtime Transfer of Heart Sound (실시간 심음 전송을 위한 원격 의료상담시스템)

  • Lee, Byung-Mun;Cho, Won-Hee;Yoon, Young-Mi
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.158-165
    • /
    • 2009
  • Counselling between a patient and a doctor is crucial in telemedicine. In order for the doctor to examine the patient accurately, it needs an auscultation, at least. Currently, some video conference systems are implemented but it is hard to use them in the case of an cardiac disorder, because the patients suffering from cardiac disorder cannot be examined by a stethoscope over Internet. To solve this problem, the remote counselling service has to support real time transmission of the heart sound of the patient. In this paper, we present a remote counselling system with stethoscope. We also design and implement the system in order for health monitor to connect the patient with his attending physician for the environment of u-healthcare service. The proposed system supports a mobility for doctor and patient by exchanging IP addresses at an user authentication protocol. The system implemented by this paper can be used for cardiac patients in remote clinical setting in the future.

생체신호를 이용한 텔레바이오인식기술 동향 및 전망

  • Kim, Jason;Lee, Saewoom
    • Review of KIISC
    • /
    • v.26 no.4
    • /
    • pp.41-46
    • /
    • 2016
  • 전통적으로 바이오인식기술은 출입국심사(전자여권, 승무원 승객 신원확인), 출입통제(도어락, 출입통제 근태관리), 행정(무인민원발급, 전자조달), 사회복지(미아찾기, 복지기금관리), 의료(원격의료, 의료진 환자 신원확인), 정보통신(휴대폰 PC 인터넷 인증), 금융(온라인 뱅킹, ATM 현금인출) 등 다방면에서 폭넓게 보급되어 실생활에서 널리 활용되고 있다. [그림1]은 신체적 특징(Physiological biometrics)과 행동적 특징(Behavioral biometrics)을 이용한 사용자 인증기술인 바이오인식기술의 유형과 함께 각 기술별 보안취약점(괄호 안 빨강색글자)을 나타내고 있다. 최근 들어, 모바일 지급결제서비스 ATM 인출기 인터넷전문은행 등과 같은 핀테크 분야에서 비대면 인증기술로 바이오인식기술이 각광을 받기 시작했다. 한편, 가짜지문 등 기존의 신체적 특징을 이용한 바이오인식기술의 위변조 위협에 대한 우려 존재함에 따라 뇌파 심전도 근전도 맥박 등 살아있는 사람의 행동적(신체의 기능적) 특징을 이용한 생체신호를 이용하여 비대면 인증기술로서 활용하기 위하여 주요 선진국에서 차세대 바이오인식 기술개발이 가속화되고 있는 추세이다.[1] 또한, 이러한 생체신호는 최근에 삼성전자, LG전자, 애플 등에서 스마트워치를 통해 심장박동수를 측정하고 스마트폰을 통하여 모바일 지급결제, 헬스케어 등과 같은 IoT 모바일 융복합 응용서비스에 활용될 전망이다. 본고에서는 뇌파 심전도(심박수)와 같은 생체신호를 측정하는 스마트워치 밴드형 의복형 또는 패치형태의 웨어러블 디바이스와 같은 생체신호센서, 생체신호 인증기술 및 관련표준화 동향을 고찰해 보기로 한다. 국내외 관련기술과 표준화 동향을 면밀히 분석하여 지난 2015년 5월29일에 발족한 국내외 전문가그룹인 KISA"모바일 생체신호 인증기술 표준연구회"(이하 KISA 표준연구회)가 구심점이 되어 한국형 생체신호를 이용한 차세대 텔레바이오인식기술에 대한 연구개발과 국내외 표준화 추진에 박차를 가할 계획이다.

Structural vulnerability analysis and improvement of a biometrics-based remote user authentication scheme of Li and Hwang's (Li & Hwang's 생체기반 인증스킴에 대한 취약성 분석 및 개선)

  • Shin, Kwang-Cheul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.7
    • /
    • pp.107-115
    • /
    • 2012
  • Recently, Li and Hwang scheme proposed a biometrics-based remote user authentication scheme using smart card. It is asserted that this scheme has very excellent benefits by the operation cost efficiency based on the smart card, one-way function and biometrics using random numbers. But this scheme cannot provide the properly authentication, especially, it is analyzed as the vulnerable security scheme for Denial-of-Service(DoS) attacks by impersonate attacks. The attacker controls the insecure channel, they can easily fabricate messages to pass the user's or server's authentication, and the malicious attacker can impersonate the user to cheat the server and can impersonate the server to cheat the user without knowing any secret information. This paper proposes the strong improved scheme which can respond to multiple attacks by supplementing the function of integrity check from the server which applied variable authenticator and OSPA without exposing the user's password information. It is supplemented pregnable of disguise attack and mutual authentication of Li and Hwang scheme.