• Title/Summary/Keyword: 개인화 메시지

Search Result 85, Processing Time 0.027 seconds

Shoulder-Surfing Resistant Password Input Method for Mobile Environment (모바일 환경에서 엿보기 공격에 강한 패스워드 입력방법)

  • Kim, Chang-Soon;Youn, Sun-Bum;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.93-104
    • /
    • 2010
  • The advent of various mobile devices and mobile services has caused diversification of information stored in a mobile device, e.g., SMS, photos, movies, addresses, e-mails, digital certificates, and so on. Because mobile devices are lost or stolen easily, user authentication is critical to protect the information stored in mobile devices. However, the current user authentication methods using Personal Identification Numbers (PINs) and passwords are vulnerable to Shoulder Surfing Attacks (SSAs), which enables an attacker to obtain user's information. Although there are already several SSA-resistant authentication methods in the literature, most of these methods lack of usability. Moreover, they are not suitable for use in mobile devices. In this paper, we propose a user friendly password input method for mobile devices which is secure against SSA. We also perform user tests and compare the security and usability of the proposed method with those of the existing password input methods.

Hierarchy Visualization method of SNS User using Fuzzy Relational (퍼지 연관 곱을 이용한 SNS 사용자의 계층적 시각화 방법)

  • Park, Sun;Kwon, JangWoo;Jeong, Min-A;Lee, Yeonwoo;Lee, Seong Ro
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.9
    • /
    • pp.76-84
    • /
    • 2012
  • Visualizations have played an important role in understanding new insights of users of social network for social network analysis. Most of the previous works of visualization focus on representing user's relationship on social network by a complex multi dimension graph. However, this method is difficult to identify the important of relationship to focus on personal user intuitively. Besides, the user's messages to reflect the interrelation between users is insufficient, since most of visualization methods represent the user relationship using information of interaction between nodes on networks. In order to resolve above problem, this paper proposes a new visualization method to visualize user based hierarchy that uses internal relationship of users by fuzzy relational product and external access information of network.

Visualization method of User Hierarchy of among SNS users (소셜 네트워크 서비스 사용자의 계층 시각화 방법)

  • Park, Sun;Jeong, Jong-Geun;Yeu, Moo-Song;Lee, Seong-Ro
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1717-1724
    • /
    • 2012
  • Information of social relationship of users on online is useful information for other services such as recommend information of commercial activity. So, there is a lot of studies analysis with connection to visualization of social network. Most of the previous works of visualization focus on representing user's relationship on social network by a complex multi dimension graph. However, this method is difficult to identify the important of relationship to focus on personal user intuitively. In order to resolve above problem, this paper proposes a new visualization method using the user's correlation and user relationship of network node. The proposed method visualizes the hierarchy relationship of users using the internal relation of network reflecting user's message and external relation of network nodes.

SyncML Data Synchronization System based on Session Manager (세션 매니저를 이용한 SyncML 동기화 시스템)

  • Lee, Byung-Yun;Lee, Gil-Haeng;Cho, Jin-Hyun;Ryu, Soo-Hee;Choi, Hoon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.6
    • /
    • pp.647-656
    • /
    • 2002
  • Synchronization is the process of making replicated data on multiple devices be consistent, i.e., identical with each other. In Dec. 2000, major handheld computer manufacturers including Nokia, Ericsson, IBM published the SyncML protocol specification. In this paper, we describe the CNU SyncML server for PIMS(Personal Information Management System) service that we developed based on the SyncML specification. The server architecture and capabilities of the frames are presented along with the procedure of message processing by each frame. We put the CNU SyncML server to the conformance tests and interoperability tests to confirm its functionality. The session managing mechanism of the CNU SyncML server showed better performance than our previous implementations.

A Traitor Tracing Using an Efficient Key Renewal in Embedded System (임베디드 시스템에서 효율적인 키 갱신을 적용한 Traitor Tracing)

  • Park, Jong-Hyuk;Lee, Deok-Gyu;Yeo, Sang-Soo;Kim, Tai-Hoon;Lee, Seung;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.3
    • /
    • pp.245-254
    • /
    • 2008
  • If the broadcast message is sent, first of all, the privileged users will decode the session key by using his or her personal key, which the user got previously. The user willget the digital information through this session key. As shown above, the user will obtain messages or session keys using the keys transmitted from a broadcaster, which process requires effective ways for the broadcaster to generate and distribute keys. In addition, when a user wants to withdraw or sign up, an effective process to renew a key is required. It is also necessary to chase and check users' malicious activities or attacking others. This paper presents a method called Traitor Tracing to solve all these problems. Traitor tracing can check attackers and trace them. It also utilizes a proactive way for each user to have effective renewal cycle to generate keys.

  • PDF

A Efficient Key Generation and Renewal for Broadcast Encryption (브로드캐스트 암호화에서의 효율적인 키 생성과 갱신 방법)

  • Lee, Deok-Gyu;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.149-156
    • /
    • 2004
  • Broadcast encryption schemes are applied to transmit digital informations of multimedia, software, Pay-TV etc. in public network. Important thing is that only user who is permitted before only must be able to get digital information in broadcast encryption schemes. If broadcast message transfers, users who authority is get digital information to use private key given in the advance by oneself. Thus, user acquires message or session key to use key that broadcaster transmits, broadcaster need process that generation and distribution key in these process. Also, user secession new when join efficient key renewal need. In this paper, introduce about efficient key generation and distribution, key renewal method. Take advantage of two technique of proposal system. One is method that server creates key forecasting user without user's agreement, and another is method that server and user agree each other and create key Advantage of two proposal system because uses a secret key broadcast message decryption do can and renewal is available effectively using one information whatever key renewal later.

A Study on the Accessibility Requirements Analysis Model for the Preventive Safety and Disaster Service Information System - Focusing on the Communication Ability (정보시스템을 통한 생활안전 위험의 예방·대응을 위한 안전약자 요구사항 분석모델 연구 : 의사소통기능을 중심으로)

  • Lee, Yong-Jick;Ji, Seok-yeon;Kim, Sang-hwa
    • The Journal of Korean society of community based occupational therapy
    • /
    • v.10 no.3
    • /
    • pp.1-13
    • /
    • 2020
  • Objective : The purpose of this study is to present an analysis model in developing an inclusive response for safety hazards and disaster preventive information system for vulnerable people to the disaster including persons with disabilities, and those with specific needs. Methods : In this study, the persona analysis method is used to analyze fictitious characters that correspond to various characteristics such as age, disability, environment, occupation, etc. in terms of the scenario of some particular disaster subjects. Based on the user's communication problems derived from the persona analysis, focused group interview and ICF based analysis were implemented to identify needs and arbitration methods. Results : The needs from persona analysis and ICF-based communication items analysis identifies the factors that make each fictitious character difficult in terms of communication in obtaining the benefits consistent with the purpose of the service. The study derives service requirements that can provide arbitration or facilitation methods to increase communication ability of the users. Conclusion : Through the persona analysis method, difficulties that could occur when receiving disaster information using communication devices were identified and analyzed in conjunction with communication problems described in the ICF. In building information services for the prevention of safety hazards and disasters, this study presented a model that uses the persona analysis method and the ICF classification system to derive user requirements for accessible information system.

Secure Key Exchange Protocols against Leakage of Long-tenn Private Keys for Financial Security Servers (금융 보안 서버의 개인키 유출 사고에 안전한 키 교환 프로토콜)

  • Kim, Seon-Jong;Kwon, Jeong-Ok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.119-131
    • /
    • 2009
  • The world's widely used key exchange protocols are open cryptographic communication protocols, such as TLS/SSL, whereas in the financial field in Korea, key exchange protocols developed by industrial classification group have been used that are based on PKI(Public Key Infrastructure) which is suitable for the financial environments of Korea. However, the key exchange protocols are not only vulnerable to client impersonation attacks and known-key attacks, but also do not provide forward secrecy. Especially, an attacker with the private keys of the financial security server can easily get an old session-key that can decrypt the encrypted messages between the clients and the server. The exposure of the server's private keys by internal management problems, etc, results in a huge problem, such as exposure of a lot of private information and financial information of clients. In this paper, we analyze the weaknesses of the cryptographic communication protocols in use in Korea. We then propose two key exchange protocols which reduce the replacement cost of protocols and are also secure against client impersonation attacks and session-key and private key reveal attacks. The forward secrecy of the second protocol is reduced to the HDH(Hash Diffie-Hellman) problem.

Multi-Agent based Hybrid Context-Adaptive System (다중 에이전트기반 Hybrid형 상황 적응 시스템)

  • Cho, Jae-Woo;Lee, Seung-Hwa;Lee, Eun-Seok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07b
    • /
    • pp.532-534
    • /
    • 2005
  • 최근 컴퓨팅 환경의 변화와 함께, 무선 환경에서 발생할 수 있는 다양한 제약사항들을 극복할 수 있는 적응형 시스템에 대한 연구 필요성이 갈수록 높아지고 있다. 본 논문에서는 기존에 다양한 방법으로 연구되고 있는 적응형 시스템들의 단점을 보완하고, 장점을 취합하여, 클라이언트와 프록시 서버에 작업 모듈을 적절히 분산시킨 Hybrid형 시스템을 제안한다. 제안시스템은 주변상황을 인식하고, 이에 대한 대응방안을 결정하는 작업은 클라이언트에서 수행하며, 미디어 콘텐츠를 직접 변경하는 적응 작업은 상대적으로 리소스가 풍부한 프록시 서버에서 수행한다. 이를 통해, 클라이언트와 프록시 서버는 적응에 대한 계산 부하를 적절히 나누어 갖게 되며, 미디어 콘텐츠의 조절뿐만 아니라 실행되고 있는 애플리케이션의 파라매터도 조절이 가능해진다. 또한 클라이언트는 단지 결정에 대한 지시만을 서버로 전송함으로써, 전송되는 메시지의 양을 줄일 수 있고 작업내역과 같은 개인정보 유출을 방지할 수 있다. 본 논문에서는 제안 시스템을 멀티미디어 통신인 '화상회의시스템'에 적용하여 기능을 실험하였으며, 기존의 적응형 시스템들과 기능적 비교를 통해 본 시스템의 유효성을 평가하였다.

  • PDF

Efficient Offered Contents Using Broadcast Encryption (브로드캐스트 암호화를 이용한 효율적인 컨텐츠 제공)

  • 이덕규;이임영
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.65-70
    • /
    • 2004
  • The method of broadcast encryption has been applied to the transmission of digital information such as multimedia, software, and paid TV on the open network. In this broadcast encryption method, only previously authorized users can gain access to digital information. When broadcast message is transmitted, authorized users can first decode the session key using the previously given private key and get digital information using this session key. This way, users retrieve a message or a session key using the key transmitted by broadcasters. For their part, broadcasters need to generate and distribute keys. Broadcasters should also carry out efficient key renewal when users subscribe or un-subscriber. In this paper use a broadcast, and present the DRM model, using that look into the requirement about the contents and apply also the concept of a broadcast encryption. We offer the authority to copy as the number of reproduction to want to the user, and the low so that we were convenient because we used.

  • PDF