• Title/Summary/Keyword: 디바이스 ID

Search Result 47, Processing Time 0.019 seconds

A Study on Characteristics of Wet Oxide Gate and Nitride Oxide Gate for Fabrication of NMOSFET (NMOSFET의 제조를 위한 습식산화막과 질화산화막 특성에 관한 연구)

  • Kim, Hwan-Seog;Yi, Cheon-Hee
    • The KIPS Transactions:PartA
    • /
    • v.15A no.4
    • /
    • pp.211-216
    • /
    • 2008
  • In this paper we fabricated and measured the $0.26{\mu}m$ NMOSFET with wet gate oxide and nitride oxide gate to compare that the charateristics of hot carrier effect, charge to breakdown, transistor Id_Vg curve, charge trapping, and SILC(Stress Induced Leakage Current) using the HP4145 device tester. As a result we find that the characteristics of nitride oxide gate device better than wet gate oxide device, especially hot carrier lifetime(nitride oxide gate device satisfied 30 years, but the lifetime of wet gate oxide was only 0.1 year), variation of Vg, charge to breakdown, electric field simulation and charge trapping etc.

An AAA Mechanism using ID-based Ticket offer Anonymity (익명성을 지원하는 ID기반 티켓을 이용한 AAA 메커니즘)

  • Moon, Jong-Sik;Paek, Chang-Hyun;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.87-98
    • /
    • 2007
  • AAA protocol is an information protection technology which systematically provides authentication, authorization and accounting function not only in the existing wire network but also in the rapidly developing wireless network, various services and protocol. Nowadays, standardization of the various application services is in progress with the purpose of AAA standardization fer the mobile user in the wireless network. And various researches are being conducted fur using AAA in the roaming service and mobile IPv6 network between heterogeneous networks. In this paper uses OTP and ID-based ticket for user authentication in the mobile device under the ubiquitous environment, and service is seamlessly provided even though the mobile device moves from the home network to the foreign network. In addition, with the ticket renewed from the foreign network, the overhead of the home authentication server can be reduced, and provides anonymity of service through the anonymity ID.

Proposal for a Custody and Federated Service Model for the Decentralized Identity (분산 ID 보관 및 연계 서비스 모델 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.513-525
    • /
    • 2020
  • Until today, the personal information of subjects has been centralized in many companies or institutions. However, in recent days, the paradigm has gradually changed in the direction that subjects control their personal information and persue their self-sovereignty. Globally, individual data sovereignty is strengthened by the European Union's General Data Protection Regulation(GDPR) and the US California Consumer Privacy Act(CCPA). In Korea, a few alliances consist of various companies are creating technology research and service application cases for decentralized ID service model. In this paper, the current decentralized ID service model and its limitations are studied, and a improved decentralized ID service model that can solve them is proposed. The proposed model has a function of securely storing decentralized ID to the third party and a linkage function that can be interoperated even if different decentralized ID services are generated. In addition, a more secure and convenient model by identifying the security threats of the proposed model and deriving the security requirements, is proposed. It is expected that the decentralized ID technology will be applied not only to the proof of people but also to the device ID authentication management of the IoT in the future.

A Study on the HMD-AR Interaction System Combining Optical Camera Communication to Provide Location-based Service for Tourist in Jeonju Hanok Village (전주 한옥마을 관광객의 위치 기반 서비스 제공을 위한 광카메라통신 접목형 HMD-AR 인터렉션 시스템에 관한 연구)

  • Min, Byung-Jun;Choi, Jin-Yeong;Cha, Jae-Sang;Choi, Bang-Ho;Cho, Ju-Phil
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.445-451
    • /
    • 2018
  • In this paper, we propose an HMD-AR interaction system that combines optical camera communication to provide location-based service for tourists in Jeonju Hanok Village. The proposed system receives optical camera communication data from Light infrastructure existing in Jeonju Hanok Village and provides service through ID information along with its own location information. We researched optical camera communication technology and smart device based HMD-AR system and constructed the actual HMD-AR system and tested it. The proposed system is expected that it will be applied to various tourist attractions by utilizing the proposed system in the future, and it is expected to be used as a valuable feedback for smart device based HMD-AR.

Design of Blockchain Application based on Fingerprint Recognition Module for FIDO User Authentification in Shoppingmall (지문인식 모듈 기반의 FIDO 사용자 인증기술을 이용한 쇼핑몰에서 블록체인 활용 설계)

  • Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.65-72
    • /
    • 2020
  • In this paper, a USB module with fingerprint recognition was designed as a distributed node of blockchain on distributed ID (DID, distributed ID) for user identification. This biometric-linked fingerprint recognition device was verified for the real-time authentication process of authentication transaction with FIDO(Fast IDentity Online) server. Blockchain DID-based services were proposed like as a method of individual TV rating survey, and recommending service for customized shopping channels, and crypto-currency, too. This DID based remote service can be improved by recognizing of channel-changing information through personal identification. The proposed information of production purchase can be shared by blockchain. And customized service can be provided for the utilization of purchase history in shoppingmall using distributed ID. As a result, this blockchain node-device and Samsung S10 Key-srore with FIDO service can be certified for additional transactions through various biometric authentication like fingerprint, and face recognition.

Interface Construction for Printout Security Management System (출력물 보안 관리 시스템을 위한 인터페이스 구축)

  • Hon, Jung-Soo;Kim, Gui-Jung
    • Journal of Digital Convergence
    • /
    • v.16 no.10
    • /
    • pp.235-241
    • /
    • 2018
  • The printout management system should analyze the pattern of existence of personal information (resident number, card number) in the output log and users should be provided with functions such as warning message pop-up, forced printing termination, mailing to administrator, independently logs management. Authentication management can also be performed only by registered users by installing an agent on a user PC, and it should have a restriction function to permit or deny work according to user information. In addition, when printing/copying/scanning using this equipment, it is possible to use document printing and multifunction copier after ID card authentication and ID/PW should be input to device when ID card is not used. In this study, we developed these interfaces with WOWSOFT co., Ltd, a security company that has better technology than the existing printout security methods, to construct the printout management system. Also we designed the interface of basic functions necessary for printout management and contributed to the establishment of printout management system.

미래 스마트시티에서의 바이오인식 기술표준화

  • Kim, Jason
    • Review of KIISC
    • /
    • v.32 no.4
    • /
    • pp.135-146
    • /
    • 2022
  • 포스트 코로나시대에는 다가올 디지털 인프라 사회에서의 스마트시티에서 안전하고 편리한 사이버 경제활동을 구현하기 위해서는 특히 비대면 디지털 환경에서 바이오인식기술의 중요성은 증대될 것으로 전망된다. 이에 따라 바이오인식 관련 국제표준화기구인 ISO/IEC JTC1 SC37(Biometrics)/SC27(Security)과 ITU-T SG17 Q10(ID Management & Telebiometrics) 등 바이오인식기술 국제 표준화 동향과 아시아바이오인식협의회(Asian Biometric Consoritum) 사실 표준화 현황을 면밀히 분석하여, 모바일기기·웨어러블 디바이스 응용분야, 디지털 헬스케어분야, 자율주행 응용분야, 국제공통·국가공용 ID카드분야, 동물보호 공학분야 등 미래의 스마트시티에서 활용될 바이오인식기술에 대한 전망과 함께 관련되는 국제표준에 대한 주요내용과 적용분야를 제안하고자 한다. 이를 통하여 향후 디지털 사회로의 대전환 시대가 도래함에 따른 생체인식기술을 적용한 스마트시티의 발전전망을 고찰하고자 한다.

Main/Sub Device Authentication and Authorization Protocol in Ubiquitous Office Network (유비쿼터스 오피스 네트워크에서의 Main/Sub 디바이스 인증/인가 프로토콜)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.105-118
    • /
    • 2009
  • In modern society, as the rapid development of IT technology combined with the computer-based high-speed communication networks makes it possible to provide a wide spectrum of services and devices, we have been confronting a new cultural transformation era, referred to as the information society. However, the requirements to be considered in security aspect have became more complicated and diversified, and there remains the same security weaknesses as in the existing media or protocol. Particularly, the office network device with roaming is susceptible to the different kinds of attacks such as terminal hacking, virus attacks, and information leakage because the computing capacity is relatively low and the loading of already developed security functions is difficult. Although developed as one solution to this problems, PKI security authentication technology isn't suitable for multi-domain environments providing uonments proffice network service, and so the development of a novel authentication system is needed. Therefore, in this paper researched the roaming and device authentication/auth for multitechnology using an ID-based public key, authorization ticket, and Sub-device ticket with a purpose to contribute to the development of the secured and efficient technology.

Practical Biasing Power Analysis breaking Side Channel Attack Countermeasures based on Masking-Shuffling techniques (마스킹-셔플링 부채널 대응법을 해독하는 실용적인 편중전력분석)

  • Cho, Jong-Won;Han, Dong-Guk
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.9
    • /
    • pp.55-64
    • /
    • 2012
  • Until now, Side Channel Attack has been known to be effective to crack decrypt key such as smart cards, electronic passports and e-ID card based on Chip. Combination of Masking and shuffling methods have been proposed practical countermeasure. Newly, S.Tillich suggests biased-mask using template attack(TA) to attack AES with masking and shuffling. However, an additional assumption that is acquired template information previously for masking value is necessary in order to apply this method. Moreover, this method needs to know exact time position of the target masking value for higher probability of success. In this paper, we suggest new practical method called Biasing Power Analysis(BPA) to find a secret key of AES based on masking-shuffling method. In BPA, we don't use time position and template information from masking value. Actually, we do experimental works of BPA attack to 128bit secret key of AES based on masking-shuffling method performed MSP430 Chip and we succeed in finding whole secret key. The results of this study will be utilized for next-generation ID cards to verify physical safety.

Classification of Online Tracking Technology and Implications in User Perspective (온라인 트래킹 기술 분류 및 이용자 관점에서의 시사점)

  • Lee, Bohan;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.159-172
    • /
    • 2018
  • This study searched and analyzed online tracking technologies. It tried to understand what to consider when establishing policies related to online tracking. Online tracking technologies were classified into 'general cookies', 'super cookies', 'fingerprinting', 'device ID tracking' and 'cross-device tracking'. Political considerations should include the layers of online tracking, the subjects of tracking technology, purpose of use, duration and storage format of information, and development of technology. The implications of this study are as follows: first, policy makers and industry should be aware that the degree of risk perceived by users may vary according to the characteristics of online tracking technology. Secondly, it is necessary to understand factors that affect the classification of online tracking technology. Finally, in the industry, preemptive measures such as building an integrated privacy system are needed to relieve anxiety of users and to build trust.