• Title/Summary/Keyword: 스마트폰 인증

Search Result 312, Processing Time 0.034 seconds

A Study on Zero Knowledge Proof Blockchain Personal Information Authentication Using Smartphone (스마트폰을 이용한 영지식증명 블록체인 개인정보 인증에 관한 연구)

  • Lee Kwangkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.37-44
    • /
    • 2023
  • In the future society, a means to verify the identity of the information owner is required at the beginning of most services that the information owner encounters, and the emergence and gradual spread of digital identification that proves the identity of the information owner is essential. In addition, as the utilization value of personal information increases, discussions on how to provide personal information are active. Therefore, there is a need for a personal information management method necessary for building a hyper-connected society that is safe from various hacking, forgery, alteration, and theft by allowing the owner to directly manage and provide personal information management. In this study, a decentralized identity information management model that overcomes the problems and limitations of the centralized identity management method of personal information and manages and selectively provides personal information by the information owner himself and implemented a smart personal information provision system(SPIPS: Smart Personal Information Provision System) using a smartphone.

Health Management System for u-Wellness (u-Wellness 을 위한 건강 관리 시스템)

  • Seo, Hyun-Su;Lee, Kyu-Ho;Shin, Seung-Jung;Ryu, Dae-Hyun
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.1139-1140
    • /
    • 2011
  • 본 논문에서는 사용자의 스마트폰을 개인을 식별하는 인증장치(Handle)로 사용하고 이 장치를 통해 체지방 분석, 건강관리 전문가의 처방기록을 받고 받은 기록을 바탕으로 운동기구들과 Wi-Fi 통신을 통하여 운동량을 측정 및 관리하는 구현을 하였다. 건강관리 전문가의 처방을 통해 사용자의 최적화된 운동량을 체크하여 효율적인 운동을 한다. 본 시스템은 체지방 측정기계와 전문가의 측정 결과를 수치화 하고 운동기구들의 이용 횟수를 데이터베이스에 구축하고 자동 스케줄 관리를 한다.

Extended OTP Mechanism For Mobile Financial Services (모바일 금융 서비스를 위한 확장된 OTP 메커니즘)

  • Han, Changyun;Lim, Naseok;Choi, Okkyung;Hong, Manpyo
    • Annual Conference of KIPS
    • /
    • 2011.11a
    • /
    • pp.762-764
    • /
    • 2011
  • 스마트폰 보급의 확산으로 모바일 금융 서비스 이용자 수는 증가하고 모바일 금융 보안에 대한 중요성이 증가되고 있는 실정이지만 해마다 다양해지는 금융 공격에 대비하기는 결코 쉽지 않다. 최근 주로 사용되고 있는 금융 보안 인증 방식인 OTP(One-Time Password)는 세션 공격에 대한 보안 대비가 가능하지만 차별화된 OTP 생성 메커니즘을 적용하는 것이 힘든 단점이 있다. 본 연구에서는 이러한 기존 방식의 문제점을 해결하기 위해 확장된 OTP 메커니즘을 이용한 새로운 금융 보안 방식을 제안하고자 한다. 제안 방식은 센서 네트워크를 금융 보안 알고리즘에 적용시킨 위치 기반 동기화 방식의 OTP 생성 메커니즘으로서 다양한 금융 해킹과 공격 기법에 대비가 가능하다.

Analysis of biometric information using watermarking technology (워터마크 기술을 이용한 생체정보의 비교 분석)

  • Lee, Hyeon-ji;Moon, jeong-eun;Seo, Young-ho
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2020.11a
    • /
    • pp.388-391
    • /
    • 2020
  • 최근 스마트폰과 어플리케이션의 기술 발전으로 일상생활에서 은행의 주거래 혹은 보안인증으로 생체정보를 이용하는 것이 급격히 확대되고 있다. 이러한 생체정보 보호를 위해 디지털 콘텐츠 내에 저작권자의 정보를 삽입하여 정보를 보호하는 기술인 워터마킹 기술을 도입하여 생체정보의 복제 혹은 도용 시에 발생할 수 있는 문제를 예방하는 것이 본 연구의 목적이다. 본 논문에서는 홍채 이미지에 DWT를 적용한후 QIM 방식을 이용해 임의의 QR코드로 워터마크를 삽입하여 홍채 코드를 추출한후 워터마크를 삽입하기 전의 홍채코드와 삽입 후의 홍채코드를 PSNR 통해 비교 분석하고 Stirmark 에서 제공하는 강인성 테스트를 이용해 강인성의 정도를 알아본다.

  • PDF

A Design and Implementation of Temperature-based Coordination Recommendation Application (체감 온도 기반의 코디 추천 애플리케이션 설계 및 구현)

  • Won Joo Lee;Chae-Ryeong Han;Seo-Young Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.187-188
    • /
    • 2023
  • 본 논문에서는 안드로이드 플랫폼 기반의 스마트폰에 내장된 GPS 센서와 카카오 로그인 API, 기상청 API, 유튜브 라이브러리, 크롤링을 활용한 체감 온도 기반 코디 추천 애플리케이션을 설계하고 구현한다. 카카오 로그인 API를 활용한 제삼자 로그인 인증 방식을 사용하고 사용자별 체질 정보를 입력받아 개인화된 옷차림 정보를 제공하도록 구현한다. 또한 GPS 센서로 받아온 위치 정보를 기상청 API와 연동하여 사용자의 현재 위치에 해당하는 날씨 정보와 체감 온도를 계산하여 제공하도록 구현한다. 그리고 유튜브 라이브러리를 사용하여 유튜브 코디 영상을 제공하여 사용자의 코디에 도움을 주도록 구현한다.

  • PDF

A Development of Maritime Search and Rescue Supporting System using Smartphone Application (스마트폰 어플리케이션을 활용한 해상 구조 지원 시스템 개발)

  • Hwang, Hun-Gyu;Kim, Bae-Sung;Woo, Yun-Tae;Shin, Il-Sik;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.804-810
    • /
    • 2017
  • Distress accidents occur annually by and failure of sea rescue and time delay lead to fatal accident. In the event of maritime distress, most of the equipments used for search and rescue are in responsible for the position of ships. An MOB equipment is a representative equipment for lifesaving and uses AIS communication method. However, the MOB equipment has problems of interference with existing vessel traffic process and it is difficult to apply because there is no proper certification standard. Therefore, this paper proposes a maritime search and rescue supporting system using smartphone. Utilizing the widely constructed IT infrastructure, it collects position information of the fishing boat and leisure ship using GPS embedded in the smartphone. Also the developed system supports to participate in the rescue by sending the information about the occurrence of the survivor in a certain area to the ship operator.

An Incremental Elimination Method of EEG Samples Collected by Single-Channel EEG Measurement Device for Practical Brainwave-Based User Authentication (실용적 뇌파 기반 사용자 인증을 위한 단일 채널 EEG 측정 장비를 통해 수집된 EEG 샘플의 점진적 제거 방법)

  • Ko, Han-Gyu;Cho, Jin-Man;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.383-395
    • /
    • 2017
  • Brainwave-based user authentication technology has advantages such as changeability, shoulder-surfing resistance, and etc. comparing with conventional biometric authentications, fingerprint recognition for instance which are widely used for smart phone and finance user authentication. Despite these advantages, brainwave-based authentication technology has not been used in practice because of the price for EEG (electroencephalography) collecting devices and inconvenience to use those devices. However, according to the development of simple and convenient EEG collecting devices which are portable and communicative by the recent advances in hardware technology, relevant researches have been actively performed. However, according to the experiment based on EEG samples collected by using a single-channel EEG measurement device which is the most simplified one, the authentication accuracy decreases as the number of channels to measure and collect EEG decreases. Therefore, in this paper, we analyze technical problems that need to be solved for practical use of brainwave-based use authentication and propose an incremental elimination method of collected EEG samples for each user to consist a set of EEG samples which are effective to authentication users.

A Camera Image Authentication Using Image Information Copyright Signature for Mobile Device without Distortion (무왜곡 휴대용 단말기 영상정보 권한서명을 이용한 카메라 영상 인증)

  • Han, Chan-Ho;Moon, Kwang-Seok
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.15 no.2
    • /
    • pp.30-36
    • /
    • 2014
  • Quality and resolution of camera in mobile device is improved significantly. In this paper, we propose block-based information hide techniques without image distortion for mobile device to solve image degradation in conventional watermarking methods. Information of image is composed with text such as camera maker, model, date, time, etc. Each text is converted to $8{\times}8$ pixel blocks and is added to the bottom of image. Generally image including block based information for image authentication are compressed using JPEG in mobile device. The vertical line value in JPEG header is modified by original size of image sensor. This technique can hide the block based authentication information using general decoder. In the experimental results, JPEG file size is slightly increased within 0.1% for the proposed block based authentication information encoding. Finally proposed methods can be adopted for various embedded systems using medical image, smart phone and DSLR camera.

Implementation of Secure Keypads based on Tetris-Form Protection for Touch Position in the Fintech (핀테크에서 터치 위치 차단을 위한 테트리스 모양의 보안 키패드의 구현)

  • Mun, Hyung-Jin;Kang, Sin-Young;Shin, ChwaCheol
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.144-151
    • /
    • 2020
  • User-authentication process is necessary in Fintech Service. Especially, authentication on smartphones are carried out through PIN which is inputted through virtual keypads on touch screen. Attacker can analogize password by watching touched letter and position over the shoulder or using high definition cameras. To prevent password spill, various research of virtual keypad techniques are ongoing. It is hard to design secure keypad which assures safety by fluctuative keypad and enhance convenience at once. Also, to reconfirm user whether password is wrongly pressed, the inputted information is shown on screen. This makes the password easily exposed through high definition cameras or Google Class during recording. This research analyzed QWERTY based secure keypad's merits and demerits. And through these features, creating Tetris shaped keypad and piece them together on Android environment, and showing inputted words as Tetris shape to users through smart-screen is suggested for the ways to prevent password spill by recording.

An Anonymous Authentication Scheme for Health Information Push Service Based on Indoor Location in Hospital (병원 실내 위치기반 의료정보 푸쉬 서비스를 위한 익명 인증 스킴)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5C
    • /
    • pp.410-419
    • /
    • 2012
  • This paper proposes a secure and efficient anonymous authentication scheme for health information push service based on indoor location in hospital. The proposed scheme has the following benefits: (1)It is just based on a secure one-way hash function for avoiding complex computations for both health care operations users and health care centers. (2)It does not require sensitive verification table which may cause health care centers to become an attractive target for numerous attacks(e.g., insertion attacks and stolen-verifier attacks), (3)It provides higher security level (e.g., secure mutual authentication and key establishment, confidential communication, user's privacy, simple key management, and session key independence). As result, the proposed scheme is very suitable for various location-based medical information service environments using lightweight-device(e.g., smartphone) because of very low computation overload on the part of both health care operations users and health care centers.