DOI QR코드

DOI QR Code

A Study on Integrated ID Authentication Protocol for Web User

웹 사용자를 위한 통합 ID 인증 프로토콜에 관한 연구

  • Shin, Seung-Soo (Dept. of Information Security, Tongmyong University) ;
  • Han, Kun-Hee (Division of Information & Communication Engineering, Baekseok University)
  • 신승수 (동명대학교 정보보호학과) ;
  • 한군희 (백석대학교 정보통신학부)
  • Received : 2015.05.08
  • Accepted : 2015.07.20
  • Published : 2015.07.28

Abstract

Existing Web authentication method utilizes the resident registration number by credit rating agencies separating i-PIN authentication method which has been improved authentication using resident registration number via the real name confirmation database. By improving the existing authentication method, and it provides the available integrated ID authentication on Web. In order to enhance safety, the proposed authentication method by encrypting the user of the verification value, and stores the unique identifier in the database of the certificate authority. Then, the password required to log in to the Web is for receiving a disposable random from the certificate authority, the user does not need to remember a separate password and receives the random number by using the smart phone. It does not save the user's personal information in the database, and it is easy to management of personal information. Only the integration ID needs to be remembered with random number on every time. It doesn't need to use various IDs and passwords if you use this proposed authentication methods.

Keywords

i-PIN;Hash Function;Authentication Protocol;Integrated ID;Web

References

  1. Kwang-Hee Choi, Jong-Chan Ahn, Gang-Shin Lee, Seung-Ho Ahn, "i-PIN 2.0 Service Framework for Replace RRN on The Internet". Korea Institute of Information Security & Cryptology, Review of KIISC, Vol.20, No.6, pp.88-95, 2010.
  2. Chan-Joo Chung, Yoon-Jeong Kim, Jin-Won Kim, Kwang-Jin Park, "Technical Standard and Service Framework for Develop The Alternative(i-PIN) of RRN", Korea Institute of Information Security & Cryptology, Review of KIISC, Vol.18, No.6, pp. 20-27, 2008.
  3. Jung-Dong Kim, Kwan-Tae Cho, Dong-Hoon Lee, "A Study of Online User Identification Based on One-Time Password with Guaranteeing Unlinkability", Korea Institute of Information Security & Cryptology, Journal of The Korea Institute of Information Security & Cryptology, Vol.21, No.5, pp.129-139, 2011.
  4. Seung-Hyun Kim, Seok-Hyun Kim, Seung-Hun Jin, A Study on an Alternation of RNN and Access Control for Offline Environments by using I-PIN, Korea Information Processing Society, Vol.18, No.1, 2011.
  5. Java Card Technology, http://www.oracle.com/technetwork/java/javacard/overview/index.html
  6. KISA, http://www.signgate.com
  7. Chan-Joo Chung, Seung-Joo Kim, Dong-Ho Won, "A Study on The On-line Identification Plan by Using Financial Security OTP", Korea Institute of Information Security & Cryptology, Review of KIISC, Vol.18, No.5, pp.73-83, 2008.
  8. Seung-Hyun Kim, Seok-Hyun Kim, Seung-Hun Jin, "A Study on an Alternation of RNN and Access Control for Offline Environments by using I-PIN", Korea Information Processing Society, Korea Information Processing Society Conference, pp. 840-843, 2011.
  9. Hyung-Hyo Lee, "An Alternative Resident Registration Number System and Management Framework for Privacy Protection", Korean Institute of Information Technology, The Journal of Korean Institute of Information Technology, Vol.8, No.6, pp.49-58, 2010.
  10. Hyung-Hyo Lee, Hee-Man Park, Sang-Rae Cho, Seung-Hun Jin, "The Suggestion for A New On/Off-line Personal Identification Number System Offering The Privacy Safeguards", Korea Institute of Information Security & Cryptology, Review of KIISC, Vol.20, No.1, pp.74-87, 2010.
  11. In-Yong Jang, Heung-Youl Youm, "A Study on Activation Plan of i-PIN for Identification on The Internet", Korea Institute of Information Security & Cryptology, Review of KIISC, Vol.19, No.5, pp. 81-94, 2009.
  12. Yoon-Su Jeong, Yong-Tae Kim, "Security Protocol of u-Healthcare User Information based on i-PIN", Korean Institute of Information Technology, The Journal of Korean Institute of Information Technology, Vol.9, No.10, pp.133-141, 2011.
  13. Yoon-Su Jeong, Sang-Ho Lee, "User Authentication Protocol through Distributed Process for Cloud Environment". Korea Institute of Information Security & Cryptology, Journal of The Korea Institute of Information Security & Cryptology, Vol.22, No.4, pp.841-849, 2012.
  14. Young Seop Ahn, Jeong Kyung Moon, Yeon-i Kang, Hwang Rae Kim, Koo Rack Park, Dong Hyun Kim, "An User Authentication Protocol for Cloud Computing". Korean Society for Internet Information, Korean Society for Internet Information Academic Annual Conference Proceedings, pp.51-52, 2011.
  15. Yoon-Su Jeong, Yong-Tae Kim, "Personal Authentication Protocol of IPTV Game User using PIN Code". The Korea Institute of Information and Communication Engineering, Journal of the Korea Institute of Information and Communication Engineering, Vol.15, No.12, pp.2670-2678, 2011. https://doi.org/10.6109/jkiice.2011.15.12.2670