• 제목/요약/키워드: User certification

검색결과 198건 처리시간 0.025초

다양한 장치에서 JWT 토큰을 이용한 FIDO UAF 연계 인증 연구 (A Study on FIDO UAF Federated Authentication Using JWT Token in Various Devices)

  • 김형겸;김기천
    • 디지털산업정보학회논문지
    • /
    • 제16권4호
    • /
    • pp.43-53
    • /
    • 2020
  • There are three standards for FIDO1 authentication technology: Universal Second Factor (U2F), Universal Authentication Framework (UAF), and Client to Authenticator Protocols (CTAP). FIDO2 refers to the WebAuthn standard established by W3C for the creation and use of a certificate in a web application that complements the existing CTAP. In Korea, the FIDO certified market is dominated by UAF, which deals with standards for smartphone (Android, iOS) apps owned by the majority of the people. As the market requires certification through FIDO on PCs, FIDO Alliance and W3C established standards that can be certified on the platform-independent Web and published 『Web Authentication: An API for Accessing Public Key Credentials Level 1』 on March 4, 2019. Most PC do not contain biometrics, so they are not being utilized contrary to expectations. In this paper, we intend to present a model that allows login in PC environment through biometric recognition of smartphone and FIDO UAF authentication. We propose a model in which a user requests login from a PC and performs FIDO authentication on a smartphone, and authentication is completed on the PC without any other user's additional gesture.

모바일 OTP 생성 모델에 관한 연구 (A Study on Mobile OTP Generation Model)

  • 정윤수;한상호;신승수
    • 디지털융복합연구
    • /
    • 제10권2호
    • /
    • pp.183-191
    • /
    • 2012
  • 본 논문에서는 사용자를 인증하는 방식 중 자신이 알고 있는 것과 소유하고 있는 것, 두 가지를 이용한 인증 모델을 모바일 OTP 구현검토 사항에 만족하는 모바일 OTP 생성 알고리즘과 안전한 OTP 추출 알고리즘으로 구성된 모바일 OTP 생성 모델을 제안한다. 기존 OTP 기반 시스템의 보안성을 높이기 위해서 모바일 OTP 생성단계에서 수행되는 사용자의 개인정보인 회원번호, 랜덤번호를 사용하여 보안의 안전성을 향상시켰다.

무역공급망 법규준수 협력지수 개발 (Development of Compliance Collaboration Index for Trade Supply Chain)

  • 김희수;마순덕
    • 품질경영학회지
    • /
    • 제38권1호
    • /
    • pp.34-41
    • /
    • 2010
  • This paper proposes the compliance collaboration index(CCI) which can be useful to measure the level of supply chain's compliance collaboration quantitatively. It can be shown that the proposed index is quite flexible when applied in real situations at the request of the index user. For instance, even if only one company of many companies in trade supply chain to be tested through the AEO certification test is not satisfied the required specification. the index is designed in such a way that the score can't be higher than a certain predetermined value. The proposed CCI can be used as the guidance for a trade company's collaboration process control strategy to increase the efficiency of compliance improvement activity. In this paper, we use the Analysis Hierarchy Process(AHP) which is one of the methods recommended by ISO/ICE as a measurement of weight to be assigned to the relevant parameters considered in the CCI.

모바일 휴대장치(스마트폰)를 이용한 간편 결제 시스템 설계 및 구현 (A Design and Implementation of the Easy Payment System by Using Mobile Device)

  • 김대규;최세일
    • 한국전자통신학회논문지
    • /
    • 제10권5호
    • /
    • pp.607-614
    • /
    • 2015
  • 본 논문은 스마트폰의 NFC 기능을 이용한 간편 결제 시스템을 제안한다. 스마트폰의 NFC기능을 이용한 다양한 결제방법이 이미 발표되어 있지만, 제안 시스템의 특징은 암호화된 토큰과 사용자들의 간접 인증을 통하여 결제에 필요한 정보 입력 없이 결제를 간단히 처리하는데 있다. 제안 기법은 보안 인증 절차가 간단하기 때문에 큰 금액의 거래에는 적절하지 않지만 소액결제에는 매우 유용하게 사용될 수 있다.

영구임대주택 친환경 계획요소에 관한 연구 (A Study on the Environmentally-friendly Planning Factors of Permanent Rental Housing)

  • 박은미;신남수
    • 한국실내디자인학회:학술대회논문집
    • /
    • 한국실내디자인학회 2006년도 춘계학술발표대회 논문집
    • /
    • pp.165-168
    • /
    • 2006
  • This study beings from solving problems of permanent rental housing with environmentally-friendly planning factors to raise quality of life. Environmentally-friendly planning factors of permanent rental housing are derived from the study of references and green building certification systems of other countries. Surveys of inhabitants and experts give weights on these factors. Inhabitants do are focussed natural ventilation, life cycle cost, operation and maintenance cost. This reflects their interest in indoor amenity and a burden on the cost. Experts put more weights on pedestrian spaces considering the old and feeble persons and block planning. Besides, T-test pointed out that there are meaningful differences in land use between inhabitants and experts. Though inhabitants' opinion has priority because they are real user, experts' opinion which has the variety and the view in the long term should be reflected.

  • PDF

자동차 적용기기용 위성정보시스템 모듈의 신뢰성 평가기준 (Reliability Assessment Criteria of Satellite Information System Applied for Vehicles)

  • 송병석;황순미;천성일;정해성;백재욱
    • 한국신뢰성학회지:신뢰성응용연구
    • /
    • 제9권2호
    • /
    • pp.93-106
    • /
    • 2009
  • GPS(Global positioning system) system is widely used in artificial satellite, ground controlled approach system as well as in end-user environment such as in the automobile. It is exposed to a very diverse environment and consists of many complicated components and therefore needs careful approach to the enhancement of reliability of the item. In this article reliability standards for the GPS system are established in terms of quality certification tests and failure rate tests.

  • PDF

신용카드기반의 안전한 소액 지불 프로토콜 설계 (A Credit Card based Secure Micro-Payment Protocol Design)

  • 김석매;이현주;이충세
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2003년도 추계종합학술대회
    • /
    • pp.215-218
    • /
    • 2003
  • 본 논문에서는 AIP프로토콜에서 사용자와 서비스 제공자간에 종단간 보안이 제공되는 무선 인터넷 플랫폼에 독립적인 프로토콜을 제안한다. 또한, ID 기반 공개키 암호 시스템을 적용한 Weil Pairing에 의해 세션키를 생성하여 온라인 인증기관이 인증과정에 참여하는 경우의 프로토콜에 대하여 안전성 및 효율성을 분석한다.

  • PDF

Automatic Log-in System by the Speaker Certification

  • Sohn, Young-Sun
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제4권2호
    • /
    • pp.176-181
    • /
    • 2004
  • This paper introduces a Web site login system that uses user's native voice to improve the bother of remembering the ID and password in order to login the Web site. The DTW method that applies fuzzy inference is used as the speaker recognition algorithm. We get the ACC(Average Cepstrum Coefficient) membership function by each degree, by using the LPC that models the vocal chords, to block the recorded voice that is problem for the speaker recognition. We infer the existence of the recorded voice by setting on the basis of the number of zeros that is the value of the ACC membership function, and on the basis of the average value of the ACC membership function. We experiment the six Web sites for the six subjects and get the result that protects the recorded voice about 98% that is recorded by the digital recorder.

얼굴 인증을 이용한 무인 접수 로봇 개발 (Unattended Reception Robot using Face Identification)

  • 박세현;류정탁;문병현;차경애
    • 한국산업정보학회논문지
    • /
    • 제19권5호
    • /
    • pp.33-37
    • /
    • 2014
  • 다양한 개인 정보의 활용으로 신뢰할 수 있는 인증 수단이 요구되고 있다. 개인 얼굴의 특징을 이용하는 얼굴 인증 기술은 특징점 추출이 용이하여 많이 활용되고 있다. 본 논문에서는 무인 접수를 위한 얼굴인증 로봇을 구현하였다. 구현된 로봇은 사용자 인증을 위해 얼굴인식방법을 이용한여 개인 인증을 하고 있다. 얼굴인증 시스템을 무인접수로봇에 적용하여 유용함을 보였다.

텍스트마이닝을 이용한 정보보호 연구동향 분석 (Research Trends Analysis of Information Security using Text Mining)

  • 김태경;김창식
    • 디지털산업정보학회논문지
    • /
    • 제14권2호
    • /
    • pp.19-25
    • /
    • 2018
  • With the development of IT technology, various services such as artificial intelligence and autonomous vehicles are being introduced, and many changes are taking place in our lives. However, if secure security is not provided, it will cause many risks, so the information security becomes more important. In this paper, we analyzed the research trends of main themes of information security over time. In order to conduct the research, 'Information Security' was searched in the Web of Science database. Using the abstracts of theses published from 1991 to 2016, we derived main research topics through topic modeling and time series regression analysis. The topic modeling results showed that the research topics were Information technology, system access, attack, threat, risk management, network type, security management, security awareness, certification level, information protection organization, security policy, access control, personal information, security investment, computing environment, investment cost, system structure, authentication method, user behavior, encryption. The time series regression results indicated that all the topics were hot topics.