• Title/Summary/Keyword: 2-Factor Authentication

Search Result 57, Processing Time 0.023 seconds

A Study on the Design and the Performance Improvement of IP Access Control Protocol for External Mobile terminal (외부 이동단말의 접근제어를 위한 IP 프로토콜 설계 및 성능 개선에 관한 연구)

  • 박대우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.41-48
    • /
    • 2004
  • Access control protocol have verified security of external mobile terminal that access to inner information sever at Ubiquitous ages. In this paper, I would design for If Access Control Protocol of considering operation time when make cipher digital signature. Public key are used Individual identification number that issued from certify communication company, and cipher algorithm are used ECDSA definition factor for generation and verification of digital signature and it used Elliptic Curve with over 160 bit Key. Also, Access control operate on If level that designed IPv6 frame architecture. I would conclude that IP Access Control Protocol have verified security and improved performance in operation time more 4 times than before protocols when through the communication of use cipher digital signature for authentication and verification.

  • PDF

A Study on the Real-time Data Interface Technology based on SCM for Shipbuilding and Marine Equipment Production (조선해양기자재 제작을 위한 SCM 기반 실시간 데이터 인터페이스 기술에 관한 연구)

  • Myeong-Ki Han;Young-Hun Kim;Jun-Su Park;Won-Ho Lee
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.27 no.1
    • /
    • pp.143-149
    • /
    • 2024
  • The production and procurement of shipbuilding and offshore equipment is an important competitive factor in the shipbuilding and offshore industry. Recently, ICT-based digital technology has been rapidly applied to the manufacturing industry following the Fourth Industrial Revolution. Under the digital transformation, real-time data interface technology based on SCM (Supply Chain Management) is emerging as an important tool to improve the efficiency of the equipment manufacturing process. In this study, the characteristics and advantages and disadvantages of interface technologies of web-based data interface technologies were compared and analyzed. The performance was compared between theoretical evaluation based on technical features and practical application cases. As a result, it was confirmed that GraphQL is useful for selective data processing, but there is a problem with optimization, and REST API has a problem with receiving data due to a fixed data structure. Therefore, this study aims to suggest ways to utilize and optimize these data interface technologies.

Design and Implementation of CoAP Authorization Framework Based on OAuth 2.0 (OAuth 2.0 기반 CoAP 인증 프레임워크 설계 및 구현)

  • Kim, Kyoung-Han;Lim, Hyun-Kyo;Heo, Joo-Seong;Han, Youn-Hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.8
    • /
    • pp.329-342
    • /
    • 2017
  • Recently, interest and investment in the Internet of Things (IoT) have increased significantly, and security issues are constantly being raised. As a solution, the IETF ACE Working Group is establishing the ACE framework standard, which is a new security framework for various constrained IoT environments based on the existing OAuth 2.0. However, additional work is required to apply the ACE framework, which proposes a new lightweight security system, to the existing Internet environment, and this additional cost is a factor that hinders the application of OAuth 2.0 to the IOT environment. Therefore, we propose an IoT authentication framework based on OAuth 2.0's existing development motivation, and implement a proposal framework based on CoAPthon and analyze its performance.

Discrimination of Korean Domestic and Foreign Soybeans using Near Infrared Reflectance Spectroscopy (근적외선분광광도계(NIRS)를 이용한 국내산 콩과 수입콩의 판별분석)

  • Ahn, Hyung-Gyun;Kim, Yong-Ho
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.57 no.3
    • /
    • pp.296-300
    • /
    • 2012
  • Discrimination of geographic origin of agricultural products is a important issue in Korea because the price difference between Korean domestic and imported cereals is a key among some reasons. NIRS (Near Infrared Reflectance Spectroscopy) has been applied to classify the geographical origin of soybeans. Total 135 samples (Korean domestic 92 and foreign 43) were used to obtain calibration equation through 400~2,500 nm wavelength. The math treatment with 1st derivative and 4 nm gap and the modified partial least squares(MPLS)regression was outstanding for calibration equation. The standard error of calibration and determination coefficient in calibration set(n=115) was 6.65 and 0.98, respectively. And it showed that the extra 20 samples for validation equation were identified their authentication correctly. This study describes that the application of NIRS would be possible for discrimination of geographical origin between Korean domestic and imported soybeans.

An Adaptive matrix-based Secure Keypad designed for Rollable and Bendable Display Environments (롤러블 및 벤더블 디스플레이 환경에 적합한 가변행렬 기반 보안 키패드)

  • Dong-Min Choi
    • Journal of Industrial Convergence
    • /
    • v.22 no.2
    • /
    • pp.63-71
    • /
    • 2024
  • Conventional methods like PIN used in conventional smartphone form factor have not considered the variation in display structure or screen size. As a result, when applied to recent variable display-based smartphones, the secret information input unit may get reduced or enlarged, leading to vulnerabilities for social engineering attacks due to deformation of the display area. This study proposes a secure keypad that responds to changes in display size in rollable and bendable smart phones. Firstly, the security problems that may arise when applying classical authentication methods to new form factors were analyzed, and corresponding security requirements were derived. The proposed security keypad addresses the key input error problem that can occur when the screen size is small. The arrangement and size of keys can be deformed with the spacing suitable for input depending on the display size of rollable and bendable smartphones. The study also considered the problem of leaking input information for social engineering attacks by irregularly distributing key input coordinates. The proposed method provides better user experience and security than existing methods and can be used in smartphones of various sizes and shapes.

Enhancing the problem of password-based authentication using FIDO (FIDO를 활용한 패스워드 기반 인증방식의 문제점 개선 연구)

  • Lee, Jun-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.620-623
    • /
    • 2022
  • 최근 이메일 해킹사고의 유형을 살펴보면 사회공학적인 기법을 활용한 피싱메일 공격이 대다수를 차지하고 있는 상황이다. 그중 사용자의 패스워드를 빼내기 위한 공격메일이 기존 첨부파일에 악성코드를 삽입해서 보내지는 방식보다 월등히 높아졌다고 할 수 있다. 이는 공격자가 이메일 내용에 관심이 높아진 것으로 이메일은 사용자의 성향, 직업, 라이프스타일 파악뿐만 아니라 해커가 원하는 중요자료가 저장되어 있을 가능성이 매우 높으며 또 다른 공격대상자를 선정할 수 있는 좋은 창구가 될 수 있을 것이기 때문이다. 만일 피싱메일에 노출되어 패스워드가 해커의 손에 넘어 갔다면 많은 보안대책이 무용지물이 된다. 많은 보안 전문가들은 패스워드를 8자리 이상으로 하되 영문대·소문자와 숫자 그리고 특수문자를 포함하고, 사이트별 규칙성이 없이 모두 다르게 설정해야 하며, 정기적으로 바꿔야 한다고 조언한다. 이러한 조언은 패스워드를 크랙할 경우 안전할 수 있지만 요즘처럼 한 개인이 100여개 이상의 사이트에 대한 패스워드를 관리해야 한다면 현실적으로 불가능한 조언이 되고 말 것이다. 이러한 상황에 2017년 6월 미국 국립표준기술연구소(NIST)에서 '특별 간행 800-63-3: 디지털 인증 가이드라인'을 발표하게 된다. 내용은 그동안 보안전문가들이 권고했던 내용과는 많은 차이가 있다. 오히려 자주 바꾸는 것이 문제가 될 수 있다는 내용이다. 자세한 내용은 본 논문에서 살펴보도록 한다. 우리는 스마트폰 등을 사용함으로써 2-Factor인증에 활용하고 있다. 스마트폰 인증의 대표적인 방법은 지문·얼굴인식 등 생체인증 방식을 사용한다. 패스워드 없이도 편리하고 안전하게 인증을 할 수 있다는 점이 장점이다. 이러한 상황에 FIDO라는 인증 프레임워크가 인기를 얻고 있다. FIDO(Fast IDentity Online)는 비밀번호의 문제점을 해결하기 위한 목적으로 FIDO 얼라이언스에 의해 제안된 사용자 인증 프레임워크다. 향후 FIDO로의 대체가 패스워드 문제의 대안이 될 수 있을 것이다. 이제는 패스워드 대신 생체인증 체계로 대체할 수 있는 시대가 되었다고 할 수 있다. 본 논문에서는 패스워드의 문제점을 살펴보고 이를 대체할 수 있는 FIDO기반의 인증체계가 대안이 될 수 있는 근거를 제시하고자 한다.

  • PDF

An Analysis on Countermove of its Farmer and Consumption in Environment-friendly agricultural Products (친환경농산물의 소비 실태와 생산자의 대응방식 분석)

  • Oh, Sung-Eun;Lee, Sang-Houck
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.105-116
    • /
    • 2012
  • This thesis is surveying the notions and the countermeasures of the farmers, who produce environmental-friendly crops, on a market and buyers. It ultimately tries to find out ways to increase the sale and the consumption of environmental-friendly crops from the side of the farmers. In chapter 2, analyzing the reality of consuming environmental-friendly crops and consumers inclinations. Also, on the basis of this, in chapter 3, I demonstrate how environmental-friendly producers countermeasures for the consumers are. I try to analyze the trust of the consumer buying environmental-friendly crops, which have been pointed out as a decisive factor for environmental-friendly crops by a lot of researchers, and analyze producers methods dealing with consumers approach to consume environmental-friendly crops. Regarding ways of the reconsideration about the trust, I have shown the problems about the quality authentication, forming consumers trust, and the ways of the consumer management. For the channel and method of the sale I have scrutinized not only a farmers notion about an internet homepage and his or her use but also producers principal sales route, cognition, and correspondence about it. Finally, I have examined the counter plans of the producer to increase sale and to facilitate consumption.