• Title/Summary/Keyword: Keystroke

Search Result 39, Processing Time 0.034 seconds

User Authentication Method using Vibration Cue on Smartphone (진동 큐를 이용한 스마트폰 사용자 인증 방식)

  • Lee, Jong-Hyeok;Choi, Ok-Kyung;Kim, Kang-Seok;Yeh, Hong-Jin
    • The KIPS Transactions:PartC
    • /
    • v.19C no.3
    • /
    • pp.167-172
    • /
    • 2012
  • Mobile phone devices and memory card can be robbed and lost due to the carelessness that might be caused to leak personal information, and also company's confidential information can be disclosed. Therefore, the importance of user authentication to protect personal information is increasing exponentially. However, there are the limitations that criminals could easily obtain and abuse information about individuals, because the input method of personal identification number or the input method of password might not be safe for Shoulder Surfing Attack(SSA). Although various biometric identification methods were suggested to obstruct the SSA, it is the fact that they also have some faults due to the inconvenience to use in mobile environments. In this study, more complemented service for the user authentication was proposed by applying Keystroke method in the mobile environments to make up for the faults of existing biometric identification method. Lastly, the effectiveness and validity of this study were confirmed through experimental evaluations.

Adaptive Keystroke Authentication Method for Online Test (온라인 시험을 위한 적응적 키보드 인증방법)

  • Ko, Joo-Young;Shim, Jae-Chang;Kim, Hyen-Ki
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1129-1137
    • /
    • 2008
  • E-learning as a new education trend is being applied not only to cyber school but also various education fields such as employee training for companies or interactive learning for consumers. Users of the E-learning can take online tests individually anywhere, to evaluate their achievement level. Because users who are taking the online tests may show their own IDs or passwords to others, the possibility of cheating is very high. Therefore, it is very important to authenticate the users. In this paper, we propose an adaptive-keyboard authentication method which depends on user behavior patterns through the use of IDs and passwords. This method does not need any additional devices or special effort. An adaptive method to update patterns in which IDs and passwords are entered was previously suggested and this new method has proved to be better than previous methods through simulations and implementation.

  • PDF

GA-SVM Ensemble 모델에서의 accuracy와 diversity를 고려한 feature subset population 선택

  • Seong, Gi-Seok;Jo, Seong-Jun
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.05a
    • /
    • pp.614-620
    • /
    • 2005
  • Ensemble에서 feature selection은 각 classifier의 학습할 데이터의 변수를 다르게 하여 diversity를 높이며, 이것은 일반적인 성능향상을 가져온다. Feature selection을 할 때 쓰는 방법 중의 하나가 Genetic Algorithm (GA)이며, GA-SVM은 GA를 기본으로 한 wrapper based feature selection mechanism으로 response model과 keystroke dynamics identity verification model을 만들 때 좋은 성능을 보였다. 하지만 population 안의 후보들간의 diversity를 보장해주지 못한다는 단점 때문에 classifier들의 accuracy와 diversity의 균형을 맞추기 위한 heuristic parameter setting이 존재하며 이를 조정해야만 하였다. 우리는 GA-SVM 알고리즘을 바탕으로, population안 후보들의 fitness를 측정할 때 accuracy와 diversity 둘 다 고려하는 fitness function을 도입하여 추가적인 classifier 선택 작업을 제거하면서 성능을 유지시키는 방안을 연구하였으며 결과적으로 알고리즘의 복잡성을 줄이면서도 모델의 성능을 유지시켰다.

  • PDF

A Study of Adaptive Feature Subset for Improving Accuracy of Keystroke Dynamics Authentication on Mobile Environment (모바일 환경에서 키스트로크 다이나믹스 인증 성능 향상을 위한 사용자 맞춤형 특징 집합 연구)

  • Lee, Sung-Hoon;Roh, Jong-Hyuk;Kim, Soohyung;Jin, Seung-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.287-290
    • /
    • 2017
  • 키스트로크 다이나믹스 사용자 인증은 행위 기반 인증 방법 중의 하나로써, 사용자가 입력하는 비밀번호 혹은 PIN번호의 패턴을 분석하여 사용자를 인증한다. 비밀번호나 PIN번호가 다른 사용자에게 노출되어도 입력 패턴을 분석하여 사용자를 인증함으로써 지식기반(what you know) 인증의 단점을 보완할 수 있다. 하지만 사용자의 입력 패턴이 항상 일정하지 않고, 사용자별 터치하는 방법이 모두 다르기 때문에 모든 사용자에게서 동일한 특징을 추출하여 그 사용자의 패턴을 생성하고 인증 수단으로 사용하기에는 한계가 있다. 이에 본 논문에서는 사용자별 맞춤형 특징 집합과 전체 특징과의 사용자 인증 성능 변화를 실험을 통해 확인한다. 사용자별 맞춤형 특징이 전체 특징을 사용한 경우보다 평균적으로 EER 6% 이상의 성능 향상이 있었다.

A Security Program To Protect against Keyboard-Emulating BadUSB (키보드를 모방하는 BadUSB를 차단하기 위한 보안 프로그램)

  • Choi, Byung-jun;Suh, Taeweon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1483-1492
    • /
    • 2016
  • Ducky USB is one of rarely-known keyboard-emulating BadUSBs. The attacking strategy using Ducky USB is taking and executing the scripted keystroke automatically whenever the USB is inserted into PC. Prior works exhibit some problems such as performance loss and additional device requirement. To solve this problem, this paper devised a countermeasure program to efficiently block the Duck USB in Windows. The experiment proves its effectiveness.

User Authentication and Management Using Smart Card (스마트카드를 이용한 사용자 인증 및 관리)

  • 박종원;이긍해
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04b
    • /
    • pp.514-516
    • /
    • 2004
  • 최근 컴퓨터 잊 다양한 디바이스들을 이용하여 인터넷 서비스를 제공받는 사용자가 않아지고 있다. 이러한 인터넷 서비스를 제공받기 위해서 사용자는 서비스 제공사이트에서 요구하는 개인정보를 입력하거나 인증절차를 거치게 되는 경우가 많이 생긴다. 기존 인증방법의 경우 고정된 패스워드로. Keystroke 해킹 등 각종 해킹으로 개인 정보 유출 가능성이 높다. 본 논문은 스마트카드를 이용하여 이러한 문제점을 해결하는 것을 목표로 한다. 스마트카드를 이용하여 다양한 디바이스에 연결 할 때 기존 패스워드 방식이 아닌 Q/A 방식으로 개인만이 알 수 있는 열 개의 임의의 질문에 답변하는 방식으로 개인 점보를 원하는 곳에 안전하게 사용할 수 있는 사용자 인증과 관리방법을 제안한다. 그리고 제안된 사용자 인증 및 관리 방법에 대해 설명한다.

  • PDF

Mobile Office Authentication Method using Keystroke (키스트로크를 이용한 모바일 오피스 사용자 인증 방식)

  • Lee, Jong-Hyeok;Choi, Okkyung;Yeh, Hong-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.759-761
    • /
    • 2011
  • 스마트폰이 발전함에 따라 모바일 단말기를 이용해 외부에서 회사 업무를 처리할 수 있는 모바일 오피스 업무 시스템이 증가 하고 있는 실정이다. 개인 휴대 기기의 특성상 이용자의 부주의로 인해 기기 및 메모리카드 등을 도난, 분실 할 수 있으며 이에 따라 개인 및 기업의 정보 유출이 가능하다. 그러므로 본 방식 연구에서는 모바일 오피스 환경에 보다 효율적이고 정보보호를 위한 인증 방법으로 키스트로크(KeyStroke) 방식과 모바일의 IMSI / IMCI 방식을 연구 분석하여 강력하고 적합한 인증 방식을 제안한다.

The Proposal for the Model of Users' Addictions in Social Gaming

  • Anuar, Tengku Fauzan Tengku;Song, Seung Keun
    • Cartoon and Animation Studies
    • /
    • s.40
    • /
    • pp.337-365
    • /
    • 2015
  • The objective of this study proposes the new user's addiction model in 'Social Network Games' (SNGs). Research model is derived from the separation of two characteristics. First one is logical characteristics that includes 'Functional' (F), 'Keystroke' (K), and 'Goal' (G). Second one is feeling characteristics that consists a few factors such as 'Emotion' (E), 'Social' (S), and 'Affection' (A). For the pre-test, a total of 30 participants responded to survey in order to inspect the fitness of research questionnaire, roughly validity of the proposed model, and the direction of this reseach. After that for the main test, a total 300 users participated in this research. The final number of effective participants were 261 because 39 were insincere respondents and without playing SNGs who were excluded. Then we examined the measurement model by performing 'Partial Least Squares - Structural Equation Modeling' (PLS-SEM) analysis to test the research hypothesis empirically. The results of the measurement and structural model test lend support to the proposed research model by providing a good fit to the construct data. Interestingly, the model showed the significant effects of the interaction between eleven hypothesis(H1,H2,H3,H4,H5,H6,H7,H8,H9,H10, H12). Only one hypothesis decision t-value not supported that is involved the relationship between SNGs Addiction and Keystroke, H11(1.193). This research expect to contributes to an exploratory SNGs research to clarify the base of addition and will aids understanding of users' behavior associated with SNGs development.

Usability Study of Different Types of Smart Phones Using KLM Model (KLM(Keystroke-level Model)모델을 이용한 서로 다른 스마트폰의 사용성 연구)

  • Yoon, Cheol-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.10
    • /
    • pp.4700-4705
    • /
    • 2013
  • The purpose of this study is to investigate the usability and user interface in different types of smart phones. KLM(key-stroke-level model) model estimation and observation values were calculated to perform 12 functional factors in 3 different groups. In results, it was found that the usability of smart phones are similar in basic and general functions. On the contrary, the usability of smart phones are different in more complex functions. Current results can be used to anticipate the future effort to improve user interface design in smart phone.

Design of the Multimodal Input System using Image Processing and Speech Recognition (음성인식 및 영상처리 기반 멀티모달 입력장치의 설계)

  • Choi, Won-Suk;Lee, Dong-Woo;Kim, Moon-Sik;Na, Jong-Whoa
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.8
    • /
    • pp.743-748
    • /
    • 2007
  • Recently, various types of camera mouse are developed using the image processing. The camera mouse showed limited performance compared to the traditional optical mouse in terms of the response time and the usability. These problems are caused by the mismatch between the size of the monitor and that of the active pixel area of the CMOS Image Sensor. To overcome these limitations, we designed a new input device that uses the face recognition as well as the speech recognition simultaneously. In the proposed system, the area of the monitor is partitioned into 'n' zones. The face recognition is performed using the web-camera, so that the mouse pointer follows the movement of the face of the user in a particular zone. The user can switch the zone by speaking the name of the zone. The multimodal mouse is analyzed using the Keystroke Level Model and the initial experiments was performed to evaluate the feasibility and the performance of the proposed system.