• Title/Summary/Keyword: 스마트폰 인증

Search Result 312, Processing Time 0.03 seconds

Implementation of lowest Price Shop Search Application based on GPS Sensor (GPS 센서 기반의 최저가 업소 검색 애플리케이션 구현)

  • Lee, Won Joo;Jung, Sang Won;Noh, Young Dan;Yu, Gwang-Sik
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.205-206
    • /
    • 2021
  • 본 논문에서는 스마트 폰의 GPS 센서와 Google Map, 공공데이터를 활용해 사용자 주변의 최저가 업소를 맵에 표기하는 애플리케이션을 개발한다. 이 애플리케이션은 휴대폰 인증을 통한 회원가입 기능을 구현하였으며 안드로이드 GPS 센서를 이용하여 현재 사용자의 위치 주변의 최저가 업소들을 표기한다. 또한 사용자가 검색하고자 하는 업소의 업종을 선택하면 맵에 선택한 업종과 같은 업소들의 위치에 마커를 표시하고 마커를 클릭 시 업소명, 대표메뉴, 가격 등의 정보를 볼 수 있다.

  • PDF

A Mobile Printing System based on User Authentication using NFC Tag (NFC 태그를 이용한 사용자 인증 기반의 모바일 프린팅 시스템)

  • Lee, Eun-Mi;Choi, Ok-Kyung;Yeh, Hong-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.41-43
    • /
    • 2012
  • 스마트 폰의 빠른 보급으로 인하여 공간적 제약 없이 문서를 확인 할 수 있는 환경으로 변화하고 있다. 이러한 변화에 맞추어 모바일 상에서 문서를 확인하고 바로 프린터를 할 수 있는 기술이 각광을 받고 있다. 환경적 변화에 따라 프린터를 통한 개인정보 유출 가능성이 증가되고 있으나 이에 대한 보안 기법은 매우 미미한 상태이다. 이에 따라, 본 연구에서는 모바일 프린팅 시스템에서 개인정보 유출을 줄이고자 차세대 근거리 통신 방법으로 자리 잡고 있는 NFC 태그를 이용한 모바일 단말기와 프린터의 인증을 통하여 프린터 출력물을 이용한 개인정보 유출을 방지하고자 한다.

Design and Implementation of Integrated Viewer App for Multimedia Contents (멀티미디어 콘텐츠를 위한 통합뷰어 앱 설계 및 구현)

  • Lee, Youngki;Kim, Younghwan;Kim, Seongjin;Jung, Changsung;Ko, Kwangman
    • Annual Conference of KIPS
    • /
    • 2014.11a
    • /
    • pp.1021-1022
    • /
    • 2014
  • 최근 인터넷과 스마트 폰 사용시간이 증가함에 따라 편리한 시스템들이 많이 보여 지고 있다. 그중에서 전자책(e-book)은 잘 만들어져 있지만 각 기업마다 DRM(Digital Rights Management) 인증이 걸린 뷰어를 설치해야지 볼 수 있기 때문에 여간 불편한 것이 아니다. 그래서 각기 다른 회사의 e-book이더라도 이용자들의 편리성을 위하여 통합뷰어를 만드는 것에 의의를 두고 있다. 본 논문에서는 다양한 멀티미디어 콘텐츠에 적합한 적합한 통합 뷰터 시스템을 설계하고 구현하였으며, 이 과정에서 다양한 DRM의 인증을 해결할 수 있는 방안을 제시하였다.

An Efficient Authentication Scheme using Bilinear Pairing in NFC-enabled Mobile Payment System (NFC 모바일 결제 시스템에서 Bilinear Pairing을 이용한 효율적인 인증 메커니즘)

  • Chen, Xinyi;Choi, Kyong;Chae, Kijoon
    • Annual Conference of KIPS
    • /
    • 2012.11a
    • /
    • pp.961-964
    • /
    • 2012
  • NFC(Near Field Communication)는 10cm 이내의 거리에서 무선기기 간의 통신을 가능케 해주는 기술로 13.56 Mhz RF(Radio Frequency) 주파수 대역을 이용한 비접촉식 근거리 무선통신의 한 종류이다. 올해 출시되는 대부분의 스마트 폰에서 NFC 기능을 탑재하며, NFC기반의 모바일 결제 서비스가 가장 유망한 결제 방식으로 주목 받고 있다. 소비자는 NFC 모바일 단말기를 가지고 판매자의 POS(Point of Sale) 단말기와 근접 통신을 통해 결제를 진행하는 방식으로 다른 무선 통신 방식 (RFID, Bluetooth 등)보다 보안 취약성이 높지 않지만, 기존의 RFID 환경에서 일어날 수 있는 기술적 취약점과 비슷한 유형의 위협이 충분히 발생할 수 있으므로 유효한 보안 기술이 필요하다. 본 논문은 안전한 NFC 모바일 결제 환경을 구축하기 위한 공개키 알고리즘인 타원곡선 암호ECC(Elliptic Curve Cryptosystem)를 적용한 Bilinear Pairing을 활용해서 효율적이고 보안성도 강력한 인증 메커니즘을 제안한다.

A Study on EAP-AKA Authentication Architecture for WiBro Wireless Network (EAP-AKA를 적용한 WiBro 무선 네트워크의 인증구조 연구)

  • Lim Sun-Hee;Yi Ok-Yeon;Jun Sung-Ik;Han Jin-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4C
    • /
    • pp.441-450
    • /
    • 2006
  • WiBro(Portable Internet Service) is service being capable to provide a high data rate wireless internet access with Personal Subscriber Station under the stationary or mobile environment, anytime and any where. It will fill the gap between very high data rate wireless local area networks and very high mobility cellular systems. The security is an important point of WiBro providing high data and mobile wireless services. This paper proposes user authentication mechanism of WiBro wireless networks applied EAP-AKA authentication protocol. As a result of Wireless authentication based on EAP-AKA, this mechanism is capable to be used in WiBro-WLAN-3GPP interworking scenario as well as the WiBro authentication mechanism.

A Study on Authentication Management and Communication Method using AKI Based Verification System in Smart Home Environment (스마트 홈 환경에서 AKI기반 검증 시스템을 활용한 인증관리 및 통신 기법에 관한 연구)

  • Jin, Byung Wook;Park, Jung Oh;Jun, Moon Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.25-31
    • /
    • 2016
  • With the development of IOT technology and the expansion of ICT services recently, a variety of home network services have been advanced based on wired and wireless high speed telecommunication. Domestic and global companies have been studying on the innovative technology for the users using IOT based technology and the environment for the smart home services has been gradually developed. The users live their lives with more convenience due to the expansions and developments of smart phones. However, the threatening on the security of the smart home network had occurred by various attacks with the connection to the smart environment telecommunication, lack of applications on low powered and light weight telecommunication, and the problems of security guideline. In addition, the solutions are required for the new and variant attacking cases such as data forgery and alteration of the device for disguising approach with ill will. In this article, the safe communication protocol was designed using certification management technique based on AKI which supplemented the weakness of PKI, the existing certification system in the smart environment. Utilizing the signature technique based on ECDSA, the efficiency on the communication performance was improved, and the security and the safety were analyzed on the security threat under the smart home environment.

NFC Payment System Model for Security Privacy and Location Information of User (사용자 개인 정보 및 위치 정보를 보호하기 위한 NFC결제 시스템 모델)

  • Kim, Kyung-Ihl;Jeon, Gwi-su;Chae, Gyoo-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.2
    • /
    • pp.21-26
    • /
    • 2015
  • Recently, NFC technology of short-range wireless communication using a smart phone to perform personal authentication with the electronic payment has been in the spotlight in various fields. However, the security associated with the personal information and the location information is vulnerable because it is easily fused with the existing mobile services and devices. In this paper, we propose a model for NFC payments help protect personal information and location information of NFC payment systems and services in various fields. Proposed model uses tag-based services in order to protect personal information and position information. The proposed model using the tag-based services is the place to check the various features available information in a simple Tag that can be easily accessed.

  • PDF

A Study on Analysis and Countermeasure of Security threat in NFC (NFC 서비스 보안 위협 분석 및 대응방안 연구)

  • Kim, Hyung-Uk;Kim, Hyung-joo;Kang, Jung-ho;Jun, Moon-seog
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.183-191
    • /
    • 2016
  • Most recent trend reveals broader state of provision of NFC service as NFC technology was applied on smartphones which has become core communication tools by providing integrated services such as payment, medical, and personal authentication. Moreover, with integration of original service and NFC technology, new service providers now can handle personal information of original service or can handle other personal information with transition of previous service provider to NFC service provider. Considering current state of security industry along with NFC technology and service, we would like to analyze current stage of security threats and plan the counter strategies to create NFC service structure.

Implementation and Utilization of Decentralized Identity-Based Mobile Student ID (분산 ID 기반 모바일 학생증 구현과 활용)

  • Cho, Seung-Hyun;Kang, Min-Jeong;Kang, Ji-Yun;Lee, Ji-Eun;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1115-1126
    • /
    • 2021
  • In this paper, we developed a mobile student ID providing a self sovereignty identity (SSI) which replaces the conventional plastic-type student ID that includes private information of a student such as a name, a student number, a facial photo, etc. The implemented mobile student ID solves the problem of exposing student's identity due to a loss or a theft of a plastic-type student ID, and it has a structure and process of FRANCHISE model which is developed by a concept of a decentralized Identity(DID) of a Blockchain, in which specialized for convenience as an electronic student ID through an application on a smart phone device. In addition, it protects student's privacy by controlling personal information on oneself. By using a smartphone, not only it easily identifies the student but also it expands to several services such as participation in school events, online authentication, and a student's exchange program among colleges.

Development of Protection Profile for Malware App Analysis Tool (악성 앱 분석 도구 보호프로파일 개발)

  • Jung, Jae-eun;Jung, Soo-bin;Gho, Sang-seok;Baik, Nam-kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.374-376
    • /
    • 2022
  • The Malware App Analysis Tool is a system that analyzes Android-based apps by the AI-based algorithm defined in the tool and detects whether malware code is included. Currently, as the spred of smartphones is activated, crimes using malware apps have increased, and accordingly, security for malware apps is required. Android operating systems used in smartphones have a share of more than 70% and are open-source-based, so not only will there be many vulnerabilities and malware, but also more damage to malware apps, increasing demand for tools to detect and analyze malware apps. However, this paper is proposed because there are many difficulties in designing and developing a malware app analysis tool because the security functional requirements for the malware app analysis tool are not clearly specified. Through the developed protection profile, technology can be improved based on the design and development of malware app analysis tools, safety can be secured by minimizing damage to malware apps, and furthermore, trust in malware app analysis tools can be guaranted through common criteria.

  • PDF