• Title/Summary/Keyword: User certification

Search Result 199, Processing Time 0.025 seconds

Enhanced Password Based User Authentication Mechanism Using Mobile Storage Medium/Channel (이동 저장매체를 활용한 패스워드 기반 사용자 인증 강화 방안)

  • Kim, Seon-Young;Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.533-540
    • /
    • 2014
  • As for the application system or the user authentication scheme that is used in the system, various technologies including simple ID/PW, certificate, fingerprint/iris, phone, security card, and OTP are being used. But simple ID/PW and phone certification lack security features. As for the certificate, fingerprint/iris, and security card/OTP, the weakness in security has been quite strengthened, but there are costs and complexity involved to use these. This paper proposes a new measure of much safer and low-cost user authentication that improves the security level and uses mobile external storage media such as USB that people commonly have.

A Security Model Analysis Adopt to Authentication State Information in IPTV Environment (IPTV 환경에서 가입자의 인증 상태정보를 이용한 인증보안 모델 설계)

  • Jeong, Yoon-Su;Jung, Yoon-Sung;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.421-430
    • /
    • 2010
  • Now a days, as a communications network is being broadband, IPTV(Internet Protocol Television) service which provides various two-way TV service is increasing. But as the data which is transmitted between IPTV set-top box and smart card is almost transmitted to set-top box, the illegal user who gets legal authority by approaching to the context of contents illegally using McComac Hack Attack is not prevented perfectly. In this paper, set-top box access security model is proposed which is for the protection from McComac Hack Attack that tries to get permission for access of IPTV service illegally making data line which is connected from smart card to set-top box by using same kind of other set-top box which illegal user uses. The proposed model reports the result of test which tests the user who wants to get permission illegally by registration the information of a condition of smart card which is usable in set-top box in certification server so that it prevents illegal user. Specially, the proposed model strengthen the security about set-top box by adapting public key which is used for establishing neighbor link and inter-certification process though secret value and random number which is created by Pseudo random function.

Secure MAC address-based Authentication on X.509 v3 Certificate in Group Communication (그룹 통신을 위한 안전 MAC 주소 기반 X.509 인증서에 관한 연구)

  • Hong, Sung-Hyuck
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.69-77
    • /
    • 2008
  • I propose adding users’Media Access Control (MAC) addresses to standard X.509 certificates to provide more secure authentication. The MAC address can be added by the issuing Certification Authority (CA) to the "extensions" section of the X.509 certificate. I demonstrate that when two users with MAC address information on their digital certificates communicate, the MAC address on the first user’s certificate can be easily verified by the second user. In this way, security can be improved without markedly degrading system performance and the level of initial trust between participants in virtual communities will be improved.

  • PDF

Analysis of the Weight for the Required Performance Items of Lightweight Wall through the Test-bed and AHP Method (테스트베드 구축과 AHP기법을 통한 경량벽체 요구성능의 중요도 분석)

  • Lee, Hak-Ju
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2015.05a
    • /
    • pp.105-106
    • /
    • 2015
  • As the Long-life certification system is recently introduced in the Housing Law in Korea, it is expected that an application of the lightweight wall panel will be increased in apartment construction as the main wall system. However, the performance criteria for lightweight wall is in the early phase of its action. Therefore, it is necessary to establish the performance criteria properly by investigating performance requirement in the user's perspective. The purpose of this study is to identify of the weight of the required performance items for the lightweight wall in apartment house. To analyze the priority in the performance, an interview survey is performed; after monitering the test-bed of the lightweight walls, user and experts evaluate the performance requirements. The weight of the performance requirement is developed by AHP method.

  • PDF

User Authentication Technique for VoIP Service (VOIP 서버스의 사용자 인증 기법)

  • Zin, Hyeon-Cheol;Kim, Jeong-Mi;Kim, Chong-Gun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.8
    • /
    • pp.582-585
    • /
    • 2009
  • VoIP technology for transmitting voice over IP network such as packet-based network has a lot of benefits by integrating services and reducing costs. The network is different from PSTN-based communications in some aspect such as transmitting not only voice but also text, image, multimedia data. In addition, portable terminals like a mobile phone, and ubiquitous communicator can easily access the internet for VoIP. Therefore, To prevent illegal users, offering certificate services is necessary, This study proposes a solution of user certification for a VoIP environment.

A Study on Standards of Wheelchair User Accessible Toilet Rooms (휠체어사용자용 화장실의 규격기준에 대한 연구)

  • Shin, Dong-Hong;Park, Kwang-Jae
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.24 no.4
    • /
    • pp.27-35
    • /
    • 2018
  • Purpose: The diverse users and the increase of power wheelchair users have made it difficult to apply the standards of Wheelchair user accessible toilet rooms for the existing law and BF-certification. To address these issues, the standards of the relevant laws have been improved (Ministry of Health and Welfare, 2018), but there are still many problems. In this study, problems with the standards for Wheelchair user accessible toilet rooms in Korea are analyzed by comparing national and international standards. In addition, improvements to standards for Wheelchair user accessible toilet rooms will be suggested. Method: It presents improvement for standards of Wheelchair user accessible toilet rooms by comparing national, international standard and standards of many countries. Korean standard, International Standard(ISO 21542), American Standard(ADA Standards), German Standard(DIN 18040-1), Austrian Standard($\ddot{O}NORM$ B 1600) and Swiss Standard(Norm SIA 500) were investigated and analyzed. Results: Korea's standards differ from the ISO and the Standards of other countries in many ways, so there is a need for realignment. Specifications for disabled toilets and clear criteria for the size, shape, and location of sanitary appliances in toilets that are practically available to wheelchair users should be provided. Considering the increasing number of disabled toilet users, the installation of various disabled toilet rooms should be considered considering the user characteristics of those who can walk and wheelchair users. Implication: Recent partial improvements to relevant laws cannot meet the requirements of various users. Therefore, comprehensive and clear standard should be presented that take into account changing society and the environment.

Aircraft configuration selection method using the airworthiness certification and the decision making process (항공안전 규정 및 의사결정모델을 이용한 항공기 형상선정기법 연구)

  • Yoon, Jung-Won;Bae, Bo-Young;Lee, Jae-Woo;Byun, Yung-Hwan
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.38 no.5
    • /
    • pp.467-476
    • /
    • 2010
  • For the very light jet aircraft design, the design baseline configuration has been selected using the logical decision making process, and the design optimization problem is formulated by considering the airworthiness regulations as design constraints. Airworthiness regulations are the minimum requirements for the safe aircraft flight and must be considered from the conceptual design stage. After carefully selecting the airworthiness constraints and the user specified requirements, a series of design making models including the affinity diagram, nested column diagram, quality function deployment (QFD), Pugh concept selection matrix, are used to find and evaluate alternative configuration baselines. From the feasible design space searching process, the best altenative design, which satisfies the airworthiness constraints while excluding the user subjective decisions as much as possible, has been successfully derived.

Design of Integrated Authentication Scheme for Safe Personal Information Management in a U-Health Environment (U-Health환경에서 안전한 개인정보 관리를 위한 통합 인증스키마 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.6
    • /
    • pp.3865-3871
    • /
    • 2014
  • The U-health service provides medical services with patients anytime or anywhere and is defined as the service that combines information and communication technology with health and medical service. However, it causes some troubles, such as the disclosure of patients' medical information or data spills (personal information extrusion). Moreover, it has the weak point of the security threats associated with data based on existing wire-wireless systems because it conducts data transmission and reception through the network. Therefore, this paper suggests a safe personal information management system by designing integrated certification schema that will help compensate for the weaknesses of the U-health service. In the proposal, the protocols for user information, certification between medical institution and users, data communication encryption & decryption, and user information disuse were designed by applying the ID-Based Encryption, and analyzed such existing systems and PKI Based-based communication process, securely and safely.

A Study on Home Device Authentication method based service using Java Card (자바카드를 이용한 서비스 기반 홈 디바이스 인증 기법에 관한 연구)

  • Lee, Yun-Seok;Kim, Eun;Lee, Geon-Hyeok;Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.2
    • /
    • pp.287-297
    • /
    • 2010
  • Authentication is needed to use safe devices in the home network environment. In this authentication, there are an ID base form and Certification base form. In case of an ID base form, it is difficult to apply to the multi domain environment and in case of an Certification base form, because the way that contains and stores the certificate demand on devices, additional setting of the user is needed for transfer of ownership and purchase of new devices, and more. Because both ways attend an individual authentication for devices, the ways exist overhead as the frequent authentication for a lot of devices in service aspects of user needs. To arrange these problems, in this paper, the authentication information of devices can be securely stored and managed in the java card and a processing time of the authentication could be improved better then the existing technique by authenticating a group of service.

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.205-214
    • /
    • 2006
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware or Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache Poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside. and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF