• Title/Summary/Keyword: 이중 인증

Search Result 138, Processing Time 0.027 seconds

A Smart Phone Banking using motion password Athentication (모션 패스워드 인증방식을 이용한 스마트폰 뱅킹)

  • Song, Jong-Gun;Jang, Won-Tae;Kim, Tae-Yong;Lee, Hoon-Jae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.199-201
    • /
    • 2012
  • 스마트폰은 사용자들에게 편리함을 제공하지만 분실과 악성코로 인한 보안적인 측면에서 문제점을 이슈가 되고 있다. 본 논문에서는 이중 보안 시스템 환경을 이용하여 기존에 사용되어지고 있는 스마트폰 뱅킹 환경에서의 문제점을 해결하고자 한다. 분실 또는 악성코드를 통해 개인정보 유출, 금전적인 피해를 줄이기 위해서는 스마트폰 뱅킹 서비스 환경에서 개인정보의 통제 및 보호가 보장되는 개인인증 방법을 제공할 필요가 있다. 이를 위해서 기존 방식과 더불어 스마트폰의 자이로센서를 이용한 모션 패스워드 인증방식을 제안한다.

  • PDF

A study on Kerberos Authentication and Key Exchange based on PKINIT (PKINIT기반의 Kerberos 인증과 키 교환에 관한 연구)

  • Sin, Gwang-Cheol;Jeong, Il-Yong;Jeong, Jin-Uk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.313-322
    • /
    • 2002
  • In this paper, proposes Kerberos certification mechanism that improve certification service of PKINIT base that announce in IETF CAT Working Ggroup. Did to certificate other realm because search position of outside realm through DNS and apply X.509 directory certification system, acquire public key from DNS server by chain (CertPath) between realms by certification and Key exchange way that provide service between realms applying X.509, DS/BNS of PKINIT base. In order to provide regional services, Certification and key exchange between realms use Kerberos' symmetric method and Session connection used Directory service to connection X.509 is designed using an asymmetric method. Excluded random number ($K_{rand}$) generation and duplex encryption progress to confirm Client. A Design of Kerberos system that have effect and simplification of certification formality that reduce Overload on communication.

Efficient Authentication Establishment Scheme between IoT Device based on Pascal Triangle Theory (파스칼 삼각 이론 기반의 IoT 장치간 효율적인 인증 설립 기법)

  • Han, Kun-Hee;Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.7
    • /
    • pp.15-21
    • /
    • 2017
  • Recently, users' interest in IoT related products is increasing as the 4th industrial revolution has become social. The types and functions of sensors used in IoT devices are becoming increasingly diverse, and mutual authentication technology of IoT devices is required. In this paper, we propose an efficient double signature authentication scheme using Pascal's triangle theory so that different types of IoT devices can operate smoothly with each other. The proposed scheme divides the authentication path between IoT devices into two (main path and auxiliary path) to guarantee authentication and integrity of the IoT device. In addition, the proposed scheme is suitable for IoT devices that require a small capacity because they generate keys so that additional encryption algorithms are unnecessary when authenticating IoT devices. As a result of the performance evaluation, the delay time of the IoT device is improved by 6.9% and the overhead is 11.1% lower than that of the existing technique. The throughput of IoT devices was improved by an average of 12.5% over the existing techniques.

Comprehensive Review of the Evolution and Key Amendments in the 16th Regulation on Quality Certification and Management of Recycled Aggregate (순환골재 품질인증 및 관리에 관한 규칙 16차 개정연혁 및 개정내용에 대한 고찰)

  • Jeon, Soo-Min
    • Journal of the Korea Institute of Building Construction
    • /
    • v.23 no.6
    • /
    • pp.739-750
    • /
    • 2023
  • The quality certification for recycled aggregate is governed by the Construction Waste Recycling Promotion Act, overseen by the Ministry of Environment. The specific criteria for this certification are detailed in the Regulations on Quality Certification and Management of Recycled Aggregate, a mandate of the Ministry of Land, Infrastructure, and Transport. These regulations were initially enacted on April 10, 2006, and have undergone a total of 16 revisions to date, the most recent being on December 23, 2021. This paper delves into the revision history of these pivotal regulations pertaining to quality certification over the past 17 years, with a particular focus on the latest revision, which encompasses significant changes, including those in follow-up management. This analysis aims to aid stakeholders in the recycled aggregate sector, including 402 certified companies, in comprehensively understanding the government's strategic direction for quality certification and to encourage the recycling of construction waste by bolstering the quality certification process.

Design of Authentication Protocol for IMT-2000 (IMT-2000 인증 프로토콜 설계)

  • Gang, Hyeong-U;Yun, Lee-Jung;Lee, Su-Yeon;Park, Chang-Seop;Lee, Dong-Hun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2133-2144
    • /
    • 1999
  • IMT-2000 system is expected to start its service at the beginning of 2000 on the purpose of providing with the highest qualitative service through one mobile terminal. In this paper, we investigate some of the important issues which need to be addresses in designing an authentication protocol for IMT-2000. Also proposed is an authentication protocol which addresses the above issues, and we design a correct and efficient authentication protocol to establish secure communication channel. Our protocol provides an authentication of the communication entities, location privacy, and secure messaging as well as global roaming service.

  • PDF

The Multipactor Test results on the X Band filter of Space Qualification Model appropriated for the Geostationary Satellite considering for space environments (우주환경을 고려한 정지궤도위성에 적합한 X대역 필터의 멀티팩터 시험 결과 연구)

  • Park, Jong-hee;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.65-68
    • /
    • 2017
  • In this paper, a multipactor test for the space qualification model of the X-band dual-mode high-power channel filter for high-speed data transmission of geostationary satellite observation payloads was conducted and compared with the 8 dB margin required for design. It was confirmed that analytically required margins were met through testing and that satisfactory test results were obtained. The design and test of the multipactor are tested according to the ECSS standard. Based on this, it is suggested that if the margin of design is sufficiently secured, it can be used in the development of the filter for space qualification model without any test.

  • PDF

A Study on the Two-channel Authentication Method which Provides Two-way Authentication using Mobile Certificate in the Internet Banking Environment (인터넷 뱅킹 환경에서 사용자 인증 보안을 위한 Two-Channel 인증 방식)

  • You, Han-Na;Lee, Jae-Sik;Kim, Jung-Jae;Park, Jae-Pio;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.939-946
    • /
    • 2011
  • The Internet banking service provides convenience than the traditional offline services. However, it still causes a number of security problems including hacking. In order to strengthen security, the financial institutions have provided such authentication methods as the official authentication certificate, the security token, the security card and OTP. However, the incidents related to hacking have continuously occurred. Especially, various weak points have been suggested for the authentication methods in regard to such types of hacking as the memory hacking or the MITM attack. So I needed was a new authentication method. In this study, the two-channel authentication method which provide two-way authentication on the user's PC and mobile device when executing the electronic financial transactions in the Internet banking environment is suggested. Also, by analyzing it in comparison with other existing methods, it is possible to check that the prospects of safety and credibility are strengthened.

Study on KOLAS Certification Approach for Radiation Protection Products - Focusing on Masks (방사능 방호 제품에 대한 KOLAS 인증 방안 연구 - 마스크를 중심으로)

  • Namhee Park;Wookhyun Yeo;Sungjin Hong
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.4
    • /
    • pp.815-825
    • /
    • 2023
  • Purpose: This paper aims to explore approaches for obtaining KOLAS certification for masks developed as protective equipment for use during evacuation processes in the event of a radiation disaster involving residents within a radiation emergency planning zone. Method: Various reports, papers, and data from the KOLAS accreditation bodies' websites were examined for this study. Result: Although domestic radiation disaster preparedness measures have been established to enhance resident protection, the distribution of protective equipment is limited to thyroid protection drugs. Supplementary support items like masks are necessary to prepare for radiation disasters. Currently, there is no KOLAS-accredited certification body for radiation protection masks. Conclusion: For masks that have established performance certification criteria, a dual process is required for KOLAS certification. This involves obtaining an official test report as an industrial respirator mask, receiving certification, and then obtaining a general test report based on internal standards.

User Privacy Security Scheme using Double Replication Key in the Cloud Environment (클라우드 환경에서 이중 복제 키를 사용한 사용자 프라이버시 보호 기법)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.9-14
    • /
    • 2018
  • Recently, as the internet speed is getting faster, in the cloud environment, the service receiving device is changing from a general PC to a compact device such as a mobile phone or a tablet PC. Since handheld devices such as mobile phones or tablet PCs are often used in wireless rather than wired, there are many problems that personal information may be exposed maliciously from a third party. In this paper, we propose a user privacy protection scheme through a duplicate duplicate key generation process which can safely protect user 's privacy from third party among cloud services being served through various wireless media. The proposed scheme is used to synchronize the duplicated key between the server and the intermediary device, and aims at shortening the time of the authentication process protecting the user 's privacy. In this case, the proposed scheme uses Interleave() function and random number to synchronize the server and the intermediary device, so it can safely prevent the malicious attack of the third party.

Design and implementation of improved authentication mechanism base on mobile DRM using blockchain (블록체인을 이용한 모바일 DRM 기반 개선된 인증 메커니즘 설계 및 구현)

  • Jeon, Jinl-Oh;Seo, Byeong-Min
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.133-139
    • /
    • 2021
  • Due to the rapid progress in network technology, many research on content security technologies is also being conducted in the mobile digital content sector. In the meantime, content protection has been immersed in preventing illegal copying, certifying, and issuance/management certificates, but still have many vulnerabilities in managing or authenticating confidential information. This study aims to strengthen confidential information about content based on dual management of content download rights through mobile phone numbers or device numbers. It also protect replay-attack by building a secure mobile DRM system where digital content is safely distributed based on a three-stage user authentication process. In addition, blockchain-based content security enhancements were studied during the primary/secondary process for user authentication for the prevention of piracy and copyright protection. In addition, the client authentication process was further improved through three final stages of authorization in the use of illegal content, considering that legitimate users redistributed their content to third-party.