• Title/Summary/Keyword: Knowledge / Possessive based Authentication Technology

Search Result 3, Processing Time 0.015 seconds

A Study on the Factors Influencing Innovation Resistance and Intention of Using on the Biometrics Technology (생체인증 기술의 혁신저항 및 사용의도에 영향을 미치는 요인에 관한 연구)

  • Park, Jong-Seok;Kwon, Hyeog-In
    • The Journal of Information Systems
    • /
    • v.27 no.2
    • /
    • pp.53-75
    • /
    • 2018
  • Purpose The purpose of this study is to provide implications by examining the factors affecting the consumers' innovation resistance and intention to use FIDO technology based on the innovation resistance model. In addition, we investigate the difference between FIDO group using biometric authentication technology and those using knowledge / possessive authentication technology. Design/methodology/approach This study investigated the factors influencing innovation resistance and intention to use based on the innovation resistance model. And the structural equation model was applied to analyze the effect of innovation resistance and intention to use. Findings According to empirical results, this study found that perceived relative advantage (+), perceived risk (+), perceived complexity (+), and existing product attitude(+) influenced innovation resistance, and perceived relative advantage (+), self efficacy(+), and innovation resistance(-) influenced intention to use. In addition, this study found that there is a significant difference between the group using the bio-based authentication technology and the group using the knowledge / possessive based authentication technology.

Multiple Method Authentication System Using Embedded Device (임베디드 기기를 활용한 다중 방식 인증 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.7
    • /
    • pp.7-14
    • /
    • 2019
  • Users who use smartphone can using knowledge-based authentication, possession-based authentication, biometric-based authentication, and token-based authentication in order to access rights to systems requiring authentication. However, desktop computer users use method only ID and password, which are knowledge-based authentication factors, due to limitations of authentication devices, despite various authentication methods. In this paper, we designed and implemented a raspberry pi based authentication system that provides multiple authentication method of a user's desired type. The implementation system uses knowledge-based authentication, possessive-based authentication, biometric-based authentication, and token-based authentication. The proposed system can provide a security function that can be used by SMEs, which is difficult to hire a security officer due to the economic burden. The implemented system can be used not only for personal use but also for enterprise, and it can be applied to various fields such as finance and game.

User Authentication Mechanism using Smartphone (스마트폰을 이용한 사용자 인증 메커니즘)

  • Jeong, Pil-seong;Cho, Yang-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.301-308
    • /
    • 2017
  • With the popularization of smart phones and the development of the Internet, many people use smart phones to conduct identity verification procedures. smart phones are easier and faster to authenticate than personal desktop computers. However, as Internet hacking technology and malicious code distribution technology rapidly evolve and attack types become more diverse, authentication methods suitable for mobile environment are required. As authentication methods, there are methods such as possessive-based authentication, knowledge-based authentication, biometric-based authentication, pattern-based authentication, and multi-element authentication. In this paper, we propose a user authentication mechanism that uses collected information as authentication factor using smart phone. Using the proposed authentication mechanism, it is possible to use the smart phone information and environment information of the user as a hidden authentication factor, so that the authentication process can be performed without being exposed to others. We implemented the user authentication system using the proposed authentication mechanism and evaluated the effectiveness based on applicability, convenience, and security.