• Title/Summary/Keyword: s-키패드

Search Result 22, Processing Time 0.025 seconds

Virtual Keypads based on Tetris with Resistance for Attack using Location Information (위치정보로 비밀정보를 유추할 수 있는 공격에 내성이 있는 테트리스 형태 기반의 보안 키패드)

  • Mun, Hyung-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.6
    • /
    • pp.37-44
    • /
    • 2017
  • Mobile devices provide various services through payment and authentication by inputting important information such as passwords on the screen with the virtual keypads. In order to infer the password inputted by the user, the attacker captures the user's touch location information. The attacker is able to infer the password by using the location information or to obtain password information by peeping with Google Glass or Shoulder Surfing Attack. As existing secure keypads place the same letters in a set order except for few keys, considering handy input, they are vulnerable to attacks from Google Glass and Shoulder Surfing Attack. Secure keypads are able to improve security by rearranging various shapes and locations. In this paper, we propose secure keypads that generates 13 different shapes and sizes of Tetris and arranges keypads to be attached one another. Since the keypad arranges different shapes and sizes like the game, Tetris, for the virtual keypad to be different, it is difficult to infer the inputted password because of changes in size even though the attacker knows the touch location information.

Implementation of Secure Keypads based on Tetris-Form Protection for Touch Position in the Fintech (핀테크에서 터치 위치 차단을 위한 테트리스 모양의 보안 키패드의 구현)

  • Mun, Hyung-Jin;Kang, Sin-Young;Shin, ChwaCheol
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.144-151
    • /
    • 2020
  • User-authentication process is necessary in Fintech Service. Especially, authentication on smartphones are carried out through PIN which is inputted through virtual keypads on touch screen. Attacker can analogize password by watching touched letter and position over the shoulder or using high definition cameras. To prevent password spill, various research of virtual keypad techniques are ongoing. It is hard to design secure keypad which assures safety by fluctuative keypad and enhance convenience at once. Also, to reconfirm user whether password is wrongly pressed, the inputted information is shown on screen. This makes the password easily exposed through high definition cameras or Google Class during recording. This research analyzed QWERTY based secure keypad's merits and demerits. And through these features, creating Tetris shaped keypad and piece them together on Android environment, and showing inputted words as Tetris shape to users through smart-screen is suggested for the ways to prevent password spill by recording.

A Proposal for Matrix Shape Security Keypad for the Nintendo Switch (향상된 보안의 닌텐도 스위치 행렬 형태 보안 키패드 제안)

  • Kwon, Hyeok-dong;Kwon, Yong-bin;Choi, Seung-ju;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1152-1159
    • /
    • 2019
  • The Nintendo Switch(NSW), which appeared as an 8th generation console, has succeeded worldwide as a hybrid gaming console. The NSW has E-shop itself, users can sign in to their account and purchase games. The keypad built in the NSW is similar to QWERTY keyboard. In the password input field the input information is hidden, but it's possible to get the value entered from the keypad with shoulder surfing attack. Because of the NSW with many party or family games, there is a high probability that someone else is watching the screen nearby, which acts as a vulnerability in account security. Thus we designed the new keypad which improve from this issue. In this paper, we check the problem about the keypad which built in the NSW, we present the proposed keypad and the compared to the built in keypad by showing the test result of unspecified individuals use.

Research of Secret Communication Using Quantum key Distribution and AES (양자키 교환과 AES를 이용한 비밀통신 연구)

  • Choung, Young-Chul;Rim, Kwang-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.84-90
    • /
    • 2014
  • Secret communication has developed from analogue communication to digital one. Secret communication which is based on digital communication has been designed succeeding safety of one-time pad. One-time pad's safety is attributed to the security of secret key's mutual storage and mutual synchronization that is the key's interchange basis is one of the essential factors. This manuscript examines mathematical stability of BB84 algorithm which is one of the quantum cryptography system, and conducts transmission of quantum key. The created key suggests One-time Pad algorithm which interchanges ciphertext implemented AES's 64th round.

A Study on the Vulnerability of Security Keypads in Android Mobile Using Accessibility Features (안드로이드 접근성(Accessibility) 기능을 이용한 보안키패드의 취약점 공격 및 대응 방안)

  • Lee, Jung-Woong;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.177-185
    • /
    • 2016
  • As the fintech industry is growing at an incredible rate, mobile phones are positioned as the most important tool for financial transaction. However, with a rising number of malware applications, the types of attack and illegal access to mobile device are becoming more diverse and sophisticated. This paper studies the potential keylogger attack by exploiting the Accessibility Service in Android framework. This type of attack allows the malicious individual to use keylogger on the victim's Android mobile phone to steal passwords during mobile financial transaction regardless of security keypad setting. Lastly the paper proposes solutions to counter these types of attack by verifying the accessibility usage and amending the application guideline for accessibility.

Easy Keypad - Soft Keyboard for Login Information Input in Smart Devices (쉬운 키패드 - 스마트 기기에서 사용하는 로그인 정보 입력만을 위한 소프트키보드)

  • Koh, Hyung Dae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.2
    • /
    • pp.107-120
    • /
    • 2014
  • In this paper, we suggest a soft keyboard, called easy keypad, that we use only for login information input in smart devices. Especially, as easy keypad is applied to MTS(Mobile Trading System) we suggest easy keypad in MTS. Easy keypad UI in MTS represents 20 letters and users input login information by using 20 letters. We suggest protocol which decides letters represented in easy keypad UI, which is code for users to input login information by using 20 letters. We analyze easy keypad's safe degree for soft keyboard security threat, especially when it comes to point hacking, we suggest comparison among original soft keyboard's safe degree. Also we suggest mathematical fomula for measuring soft keyboard's convenience and then we analyze the result of soft keyboard's convenience by the presented mathematical formula.

A Study on Interface Design for File management in Mass storage Mobile phone - Focused on apply User's prior experience in Windowexplorer - (대용량 휴대전화에서의 파일관리를 위한 인터페이스 디자인에 관한연구 -사용자의 윈도우탐색기 사용 경험적용을 중심으로-)

  • Lee, Chang-Hee;Hahm, Won-Sik;Jung, Ji-Hong
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02b
    • /
    • pp.557-562
    • /
    • 2006
  • 휴대전화는 용도적인 측면에서 PC와 유사해 지고 있으며 네트워크 기술의 발달로 다 수의 파일들을 다룰 수 있을 것으로 전망되고 있다. 그러나 휴대전화는 PC와는 다른UI특징을 가지고 있으며 이러한 차이는 다 수 파일의 관리나 이와 관련된 복잡한 태스크 수행 시 문제점이 예상된다. 본 연구는 사용자의 선험적 지식을 바탕으로 휴대전화의 UI특징에 적합한 효용성 있는 파일관리 UI가 무엇인지 알아보는 것에 목적이 있다. 이에 따라 사용자의 선험적 지식이 있는 윈도우탐색기의 사용행태 조사를 통해 자주 수행하는 태스크와 메타포어를 분석하여 휴대전화와 비교, 문제점 과 해결방안을 도출하였다. 이를 바탕으로 프로토타입을 제작하여 사용자 평가를 통해 가로방향의 페이지 분할 방식과 * 또는 #키와의 중복을 활용한 단축키 제공, 일괄적인 옵션 메뉴의 제공은 사용자가 익숙해져 있는 4방향 네비게이션 키와 12 숫자 키패드를 입력장치로 사용하는 휴대전화에서 파일관리 시 효용성이 있음을 알 수 있었다.

  • PDF

Real-Time Hand Pose Tracking and Finger Action Recognition Based on 3D Hand Modeling (3차원 손 모델링 기반의 실시간 손 포즈 추적 및 손가락 동작 인식)

  • Suk, Heung-Il;Lee, Ji-Hong;Lee, Seong-Whan
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.12
    • /
    • pp.780-788
    • /
    • 2008
  • Modeling hand poses and tracking its movement are one of the challenging problems in computer vision. There are two typical approaches for the reconstruction of hand poses in 3D, depending on the number of cameras from which images are captured. One is to capture images from multiple cameras or a stereo camera. The other is to capture images from a single camera. The former approach is relatively limited, because of the environmental constraints for setting up multiple cameras. In this paper we propose a method of reconstructing 3D hand poses from a 2D input image sequence captured from a single camera by means of Belief Propagation in a graphical model and recognizing a finger clicking motion using a hidden Markov model. We define a graphical model with hidden nodes representing joints of a hand, and observable nodes with the features extracted from a 2D input image sequence. To track hand poses in 3D, we use a Belief Propagation algorithm, which provides a robust and unified framework for inference in a graphical model. From the estimated 3D hand pose we extract the information for each finger's motion, which is then fed into a hidden Markov model. To recognize natural finger actions, we consider the movements of all the fingers to recognize a single finger's action. We applied the proposed method to a virtual keypad system and the result showed a high recognition rate of 94.66% with 300 test data.

The Influence of Altering Mobile Phone Interface on the Generation of Mental Model (모바일 폰의 인터페이스 변경이 멘탈모델 형성에 미치는 영향)

  • Park, Ye-Jin;Kim, Bon-Han
    • Science of Emotion and Sensibility
    • /
    • v.11 no.4
    • /
    • pp.575-588
    • /
    • 2008
  • This study is to inquire respective patterns of mental models caused by wrongful usages which can be experienced when a user who is used to a keypad-based mobile phone starts using a touch screen mobile phone and to find out the features of the user's logical process of correcting such wrongful usages to a new mental model. In addition, design improvement to be considered for easy generation of the mental model regarding touch screen mobile phones was reviewed in this study. We set up test subjects for the most frequently used seven high priority functions among touch screen phone functions and carried out the subject assessment together with interview surveys after the video observation experiment. Our test results show that test subjects who were used to keypad-based mobile phones tend to use operation knowledge related to the computer operational system(Window) or the web browse, navigation including Tap or Double Tap in order to correct the mental model when a wrongful usage is made. In addition, the result of comparison and analysis of the subject assessment and the video observation experiment data shows that wrongful usages of touch screen mobile phones mostly occurred in the field of 'information feedback' and 'navigation' among mobile phone components.

  • PDF

Research of Soft-Interface Creation and Provision Methodology According to Applications Based on Mobile Device Environment (모바일 디바이스 환경에서 어플리케이션에 따른 소프트 인터페이스 제작 및 제공 방안 연구)

  • Cho, Changhee;Park, Sanghyun;Lee, Sang-Joon;Kim, Jinsul
    • Journal of Digital Contents Society
    • /
    • v.14 no.4
    • /
    • pp.513-519
    • /
    • 2013
  • In this paper, we provide interfaces according to user application environments and provide tools through web-site that users can create interface to apply a wide range of application environment. HTML5 is used in the creation processing, so users can create various interfaces by dragging mouse and apply it to multimedia, game applications as well as documents by using the ASCII code and key events that are provided in the Android OS. Database of interfaces is stored in HDFS (Hadoop Distributed File System) based on Hadoop for management and users can have their own designed interface or select interfaces through simple login any time. In order to provide interface quickly, HIVE based on Hadoop is used for search and the data is provided in XML file which smart mobile can process quickly.