• Title/Summary/Keyword: 사용자인증

Search Result 2,488, Processing Time 0.029 seconds

FIDO Platform of Passwordless Users based on Multiple Biometrics for Secondary Authentication (암호 없는 사용자의 2차 인증용 복합생체 기반의 FIDO 플랫폼)

  • Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.65-72
    • /
    • 2022
  • In this paper, a zero trust-based complex biometric authentication was proposed in a passwordless environment. The linkage of FIDO 2.0 (Fast IDENTITY Online) transaction authentication platforms was designed in conjunction with metaverse. In particular, it was applied with the location information of a smart terminal according to a geomagnetic sensor, an accelerator sensor, and biometric information for multi-factor authentication(MFA). At this time, a FIDO transaction authentication platform was presented for adaptive complex authentication with user's environment through complex authentication with secondary authentication based on situational awareness such as illuminance and temperature/humidity. As a result, it is possible to authenticate secondary users based on zero trust with behavior patterns such as fingerprint recognition, iris recognition, face recognition, and voice according to the environment. In addition, it is intended to check the linkage result of the FIDO platform for complex integrated authentication and improve the authentication accuracy of the linkage platform for transaction authentication using FIDO2.0.

A Robust and Secure Remote User Authentication Scheme Preserving User Anonymity (사용자 익명성을 보장하는 안전하고 개선된 원격 사용자 인증스킴)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.2
    • /
    • pp.81-93
    • /
    • 2013
  • Remote user authentication is a method, in which remote server verifies the legitimacy of a user over an common communication channel. Currently, smart card based remote user authentication schemes have been widely adopted due to their low computational cost and convenient portability for the mutual authentication. 2009 years, Wang et al.'s proposed a dynamic ID-based remote user authentication schemes using smart cards. They presented that their scheme preserves anonymity of user, has the feature of storing password chosen by the server, and protected from several attacks. However, in this paper, I point out that Wang et al.'s scheme has practical vulnerability. I found that their scheme does not provide anonymity of a user during authentication. In addition, the user does not have the right to choose a password. And his scheme is vulnerable to limited replay attacks. In particular, the parameter y to be delivered to the user is ambiguous. To overcome these security faults, I propose an enhanced authentication scheme, which covers all the identified weakness of Wang et al.'s scheme and an efficient user authentication scheme that preserve perfect anonymity to both the outsider and remote server.

A S/KEY Based Secure Authentication Protocol Using Public Key Cryptography (공개키를 적용한 S/KEY 기반의 안전한 사용자 인증 프로토콜)

  • You, Il-Sun;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.763-768
    • /
    • 2003
  • In this paper, we propose a S/KEY based authentication protocol using smart cards to address the vulnerebilities of both the S/KEY authentication protocol and the secure one-time password protpcol which YEH, SHEN and HWANG proposed [1]. Because out protpcel is based on public key, it can authenticate the server and distribute a session key without any pre-shared secret. Also, it can prevent off-line dictionary attacks by using the randomly generated user is stored in the users smart card. More importantly, it can truly achieve the strength of the S/KEY scheme that no secret information need be stored on the server.

A Study on the Kerberos support Key Recovery (키 복구를 제공하는 Kerberos에 관한 연구)

  • Lee, Yong-Ho;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.881-884
    • /
    • 2002
  • Kerberos 시스템은 MIT에서 Athena 프로젝트의 일환으로 개발된 인증 시스템으로 인증되지 않은 사용자들의 불법 접속을 방지하고, 인증된 사용자에게 서비스 이용 권한을 제공하려는 목적을 가지고 있다. 이 시스템은 인증 서버(AS: Authentication Server)와 티켓 승인 서버(TGS: Ticket Granting Server) 그리고 서비스 제공 서버(SPS; Service Provide Server)로 구성된다. 사용자는 서비스 제공 서버와 관용 암호 알고리즘에 사용할 비밀키를 공유하고, 이를 이용하여 서비스를 제공받는다. 본 논문에서는 키 복구 기능과 향상된 인증 서비스를 제공하는 Kerberos 시스템을 제안한다. 제안하는 시스템은 사용자와 서비스 제공 서버간에 키 분배를 수행하고, 서비스 제공 서버는 분배된 키를 이용하여 서비스를 제공한다. 이때 분배된 키는 사용자의 요청에 따라 인증 서버와 티켓-승인 서버에 의해 복구될 수 있다.

  • PDF

A User Authentication Technique Based on Self Recording History (본인 이력 기반 사용자 인증 방법)

  • Kyung, Ho Yun;Park, JiSu;Shon, Jin Gon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.467-470
    • /
    • 2014
  • 온라인 서비스가 증가하고 있으며, 그에 따른 개인의 서비스 계정도 늘어나고 있다. 하지만 지속적으로 늘어나는 서비스 계정의 의해, 관리의 어려움과 노출 위험성이 커지고 있다. 해결책으로 보안도 유지하면서 다양한 온라인 서비스의 종류에 구애 없이 하나의 통합된 사이트를 통해서 계정정보를 관리하면 편리할 것이다. 그래서 ID/PW 방식의 사용자 인증에 감사 가능을 결합한 본인 이력 기반 사용자 인증 방법을 제안한다. 본인이 생성한 비밀번호 이력 정보에 다양한 옵션을 설정할 수 있도록 하여 사용자 인증에 사용하고, 검증 과정에 본인이 직접 참여하는 메커니즘을 결합하여 본인 이력 기반 사용자 인증 방법이 완성된다. 제안 방식을 현재 인테넷뱅킹에서 사용 중인 인증 방식들과 보안성을 비교 검증하였다.

The Design of an Authentication System using Smart Card and Fingerprint (스마트 카드와 지문을 이용한 인증 시스템 설계)

  • 손인구;민경진;류은경;유기영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.500-502
    • /
    • 2003
  • 본 논문에서는 다양한 응용 분야에 이용되는 스마트 카드의 보안성을 높이기 위하여 스마트 카드와 무선 단말기, 무선 단말기와 사용자간의 인증을 구분하여 설계하였다. 기존의 스마트 카드와 지문을 이용한 인증 시스템은 스마트 카드내의 지운 정보의 유출이나 스마트 카드 상에서 지문 매칭시 현실적인 문제뿐 안 아니라 카드와 단말기 양측을 모두 인증하는데 어려움이 있었다. 그래서 본 논문은 기존의 스마트 카드와 단말기의 양방향 인증 등을 이용하지 않고, 스마트 카드가 무선 단말기를 인증한 다음. 우선 단말기에 부착된 지문 센서를 이용해 입력된 사용자의 지문 정보로 단말기가 사용자 인증을 하도록 하였다. 제안된 인증 시스템은 스마트 카드 및 지문을 이용하여 사용자측(스마트 카드와 카드 소유자)과 단말기간의 상호인증을 제공한다. 이러한 이중 인증 메카니즘을 무선 인터넷 환경에서 보다 안전한 인증 시스템을 제공할 수 있을 것이다.

  • PDF

Implementation of a Secure Wireless LAU System using AP Authentication and Dynamic Key Exchange (AP 인증 및 동적 키 분배를 이용한 안전한 무선랜 시스템 구현)

  • Lee, Jong-Hu;Lee, Myung-Sun;Ryou, Jae-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.497-508
    • /
    • 2004
  • The existing wireless LAN standard IEEE802.11b has many vulnerabilities from security point of view. The authentication mechanisms in IEEE802.11b have many vulnerabilities. As a result to complement the weak of IEEE802.11b authentication, the IEEE802.1x had been developed in the sense of providing strong user authentication with appropriate mechanism. But this mechanism does not perform AP authentication and there are also some weak points. And in confidentiality and message Integrity case, WEP is weak from key stream reuse attack, IV reuse attack and so on. For that reason, in this paper we propose secure wireless LAN system. Our system provides strong user authentication, confidentiality, and message integrity based on existing IEEE802.1x framework and TLS.

Integrated Authentication Protocol of Financial Sector that Modified OAuth2.0 (OAuth2.0을 변형한 금융권 통합인증 프로토콜)

  • Jung, Kyu-Won;Shin, Hye-seong;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.373-381
    • /
    • 2017
  • Currently, various types of user authentication methods based on public certificates are used in domestic financial transactions. Such an authorized certificate method has a problem that a different security module must be installed every time a user connects an individual financial company to a web server. Also, the financial company relying on this authentication method has a problem that a new security module should be additionally installed for each financial institution whenever a next generation authentication method such as biometric authentication is newly introduced. In order to solve these problems, we propose an integrated authentication system that handles user authentication on behalf of each financial institution in financial transactions, and proposes an integrated authentication protocol that handles secure user authentication between user and financial company web server. The new authentication protocol is a modified version of OAuth2.0 that increases security and efficiency. It is characterized by performing a challenge-response protocol with a pre-shared secret key between the authentication server and the financial company web server. This gives users a convenient and secure Single Sign-On (SSO) effect.

A Study on Authentication using Image Synthesis (이미지 합성을 이용한 인증에 대한 연구)

  • Kim, Suhee;Park, Bongjoo
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.19-25
    • /
    • 2004
  • This research develops an algorithm using image synthesis for a server to authenticate users and implements it. The server creates cards with random dots for users and distribute them to users. The server also manages information of the cards distributed to users. When there is an authentication request from a user, the server creates a server card based on information of the user' s card in real time and send it to the user. Different server card is generated for each authentication. Thus, the server card plays a role of one-time password challenge. The user overlaps his/her card with the server card and read an image(eg. a number with four digits) made up from them and inputs the image to the system. This is the authentication process. Keeping security level high, this paper proposes a technique to generate the image clearly and implements it.

  • PDF

An efficient user authentication protocol for cloud computing environments (클라우드 컴퓨팅 환경에서 효과적인 사용자 인증 프로토콜)

  • Moon, Jeong-Kyung;Kim, Jin-Mook;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2353-2359
    • /
    • 2011
  • The request of Green-IT technology and recommend of computer hardware resource are increasing explosively. So, necessity of Cloud computing is increasing rapidly. Berkeley Univ. announced teens constituent that threat Cloud computing in 2009 and problem for user authentication should be solved as is urgentest among them. So, We wish to propose effective user authentication protocol in Cloud computing environment. Secure safety for user quotation through Kerberos's ticket issue that is existent representative user authentication techniques, and defined authentication procedure of two steps that flow user authentication and service authentication through PKI's. Is uncomplicated structurally more than efficiency for certification protocol and examination result about safety, existent PKI that propose and simplify achievement procedure and system configuration more than Kerberos and reduced response time.