• Title/Summary/Keyword: 스마트 키

Search Result 420, Processing Time 0.023 seconds

Smart Poster Authentication Scheme based on Authentication URL (인증 URL 기반의 스마트 포스터 인증기법)

  • Lee, Jae-Cheol;Park, Chang-Seop
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.91-99
    • /
    • 2014
  • NFC(Near Field Communication) is a wireless data exchange technology in 13.56MHz frequency band between devices. The NFC Forum defines the NDEF(NFC Data Exchange Format) exchanging data format between NFC devices and NFC Tags, the NFC RTD(Record Type Definition) defining the record types in the NDEF messages, the Smart Poster RTD in order to replace current paper posters and the Signature RTD to ensure the authenticity and integrity for NDEF records. But the previous smart poster authentication scheme have the weaknesses of using the PKI(Public Key Infrastructure) with certificates to verify the public key for the smart poster authentication and requiring the additional storage capacity of NFC tags for the authentication path. Therefore in this paper we propose a smart poster authentication scheme and implementation based on the authentication URL, a digital signature and a public key without the PKI and certificates for the smart poster authentication.

System Design for Access to Subway Vent based Bluetooth Smart Door-Lock (지하철 환기구 출입관리를 위한 블루투스 스마트 도어락 시스템)

  • Kim, Tae-Yong;Lee, Dae-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.63-65
    • /
    • 2016
  • In this paper, smart door-lock system to access public facilities will be proposed. An existed door-lock system using physical door-lock, NFC Tag, and RFID could be replaced by our proposed system. Automatic access control management system with security authentication module enables the worker to access public facilities efficiently.

  • PDF

Development of Kid Height Measurement Application based on Image using Computer Vision (컴퓨터 비전을 이용한 이미지 기반 아이 키 측정 애플리케이션 개발)

  • Yun, Da-Yeong;Moon, Mi-Kyeong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.1
    • /
    • pp.117-124
    • /
    • 2021
  • Among growth disorders, 'Short Stature' can be improved through rapid diagnosis and treatment, and for that, it is important to detect early'Short Stature'. It is recommended to measure the height steadily for early detection of 'Short Stature' and checking the kid's growth process, but existing height measurement methods have problems such as time and space limitations, cost occurrence, and difficulty in keeping records. So in this paper, we proposed an 'Development of Kid Height Measurement Application based on Image using computer vision' method using smart phones, a medium that is highly accessible to people. In images taken through a smartphone camera, the kid's height is measured using algorithms from OpenCV, a computer vision library, and the measured heights were printed on the screen through 'a comparison graph with the standard height by gender and age' and 'list by date', made possible to check the kid's growth process. It is expected to measure height anytime, anywhere without time and space limitations and costs through this proposed method, and it is expected to help early detection of 'Short Stature' and other disorder through steady height measurement and confirmation of growth process.

스마트카드의 기준에 관한 연구

  • 이승혁;황선태
    • Proceedings of the CALSEC Conference
    • /
    • 2000.08a
    • /
    • pp.275-289
    • /
    • 2000
  • ㆍ 1. 스마트카드 응용의 성패는 키 관리를 포함한 COS 및 Protocol 보안 문제 ㆍ 2. 다 기 능 스마트카드 구현을 위한 OS의 개발. ㆍ 3. 다 기능 COS를 위한 고집적의 새로운 메모리 개발. ㆍ 4. 빠르고 완벽한 H/W 및 S/W Test 기법/Tool 개발.(중략)

  • PDF

The Distributed Authentication and Key Exchange Protocols for Smartcard (스마트카드에 적용가능한 분산형 인증 및 키 교환 프로토콜)

  • Oh Heung-Ryongl;Yoon Ho-Sun;Youm Heung-Youl
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.17-30
    • /
    • 2005
  • A PAK(Password-Authenticated Key Exchange) protocol is used as a protocol to provide both the mutual authentication and allow the communication entities to share the session key for the subsequent secure communication, using the human-memorable portable short-length password, In this paper, we propose distributed key exchange protocols applicable to a smartcard using the MTI(Matsumoto, Takashima, Imai) key distribution protocol and PAK protocol. If only one server keeps the password verification data which is used for password authentication protocol. then It could easily be compromised by an attacker, called the server-compromised attack, which results in impersonating either a user or a server, Therefore, these password verification data should be distributed among the many server using the secret sharing scheme, The Object of this paper Is to present a password-based key exchange protocol which is to allow user authentication and session key distribution, using the private key in a smartcard and a password typed by a user. Moreover, to avoid the server-compromised attack, we propose the distributee key exchange protocols using the MTI key distribution protocol, And we present the security analysis of the proposed key exchange protocol and compare the proposed protocols with the existing protocols.

  • PDF

Study on the Camera Image Frame's Comparison for Authenticating Smart Phone Users (스마트폰 사용자 인증을 위한 카메라 영상 프레임 비교에 관한 연구)

  • Jang, Eun-Gyeom;Nam, Seok-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.155-164
    • /
    • 2011
  • APP based on the smart phone is being utilized to various scopes such as medical services in hospitals, financing services at banks and credit card companies, and ubiquitous technologies in companies and homes etc. In this service environment, exposures of smart phones cause loss of assets including leaks of official/private information by outsiders. Though secret keys, pattern recognition technologies, and single image authentication techniques are being applied as protective methods, but they have problems in that accesses are possible by utilizing static key values or images like pictures. Therefore, this study proposes a face authentication technology for protecting smart phones from these dangerous factors and problems. The proposed technology authenticates users by extracting key frames of user's facial images by real time, and also controls accesses to the smart phone. Authentication information is composed of multiple key frames, and the user' access is controlled by distinction algorism of similarity utilizing DC values of image's pixel and luminance.

Design and Implementation of Double-Key based Light Weight Security Protocol in Ubiquitous Sensor Network (유비쿼터스 센서 네트워크에서 더블키를 이용한 경량 보안 프로토콜 설계 및 구현)

  • Zhung, Yon-Il;Lee, Sung-Young
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.239-254
    • /
    • 2007
  • Ubiquitous computing supports environment to freely connect to network without restrictions of place and time. This environment enables easy access and sharing of information, but because of easy unauthorized accesses, specified security policy is needed. Especially, ubiquitous sensor network devices use limited power and are small in size, so, many restrictions on policies are bound to happen. This paper proposes double-key based light weight security protocol, independent to specific sensor OS, platform and routing protocol in ubiquitous sensor network. The proposed protocol supports safe symmetric key distribution, and allows security manager to change and manage security levels and keys. This had a strong merit by which small process can make large security measures. In the performance evaluation, the proposed light weight security protocol using double-key in ubiquitous sensor network allows relatively efficient low power security policy. It will be efficient to ubiquitous sensor network, such as smart of ace and smart home.

Design for Position Protection Secure Keypads based on Double-Touch using Grouping in the Fintech (핀테크 환경에서 그룹핑을 이용한 이중 터치 기반의 위치 차단이 가능한 보안 키패드 설계)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.3
    • /
    • pp.38-45
    • /
    • 2022
  • Due to the development of fintech technology, financial transactions using smart phones are being activated. The password for user authentication during financial transactions is entered through the virtual keypad displayed on the screen of the smart phone. When the password is entered, the attacker can find out the password by capturing it with a high-resolution camera or spying over the shoulder. A virtual keypad with security applied to prevent such an attack is difficult to input on a small touch-screen, and there is still a vulnerability in peeping attacks. In this paper, the entire keypad is divided into several groups and displayed on a small screen, touching the group to which the character to be input belongs, and then touching the corresponding character within the group. The proposed method selects the group to which the character to be input belongs, and displays the keypad in the group on a small screen with no more than 10 keypads, so that the size of the keypad can be enlarged more than twice compared to the existing method, and the location is randomly placed, hence location of the touch attacks can be blocked.

Study on Authentication Method Based on MoC Using Fuzzy Vault (퍼지볼트 스킴을 이용한 MoC 기반의 인증 방안 연구)

  • Kim Ae-Young;Seo Seung-Hyun;Lee Sang-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06c
    • /
    • pp.331-333
    • /
    • 2006
  • 중요한 정보의 저장 및 보호하는 기능을 제공하는 스마트카드가 온라인/오프라인에서 대규모 응용에 사용되기 위해서는 강력한 사용자 인증이 요구된다. 이러한 요구는 생체정보의 사용으로 그 효과를 볼 수 있는데, 생체정보의 사용은 사용자 인증을 강력하게 할 뿐만 아니라 외우지 않아도 되는 편리한 비밀키를 제공한다. 동시에 중요한 개인정보인 생체정보 및 처리중의 정보를 스마트카드에 의해서 보호받는 MoC(Match on Card) 방식을 적용받게 된다. 그러나 기존의 MoC방식의 인증 및 키 추출과정에서는 생체정보를 추출하는 과정/방법이 키값의 획일성을 보장하지 못한다는 한계점을 그대로 가지고 있다. 따라서 본 논문에서는 퍼지볼트 스킴을 이용하여 키의 획일성을 확보하면서 생체정보에 대한 보호를 강화시키는 동시에 사용자 인증을 처리하는 방안을 연구하였다.

  • PDF

Data Communication Method Based on Hybrid Encryption in Smartphone (스마트폰에서의 하이브리드 암·복호화 기반 데이터 통신 방법)

  • Jo, Sung-hwan;Kim, Seong-Hoon;Han, Gi-Tae;Lee, Hyo-Seung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.07a
    • /
    • pp.71-74
    • /
    • 2014
  • 스마트폰의 활용 범위가 점점 확장됨에 따라 데이터 통신량도 증가되어 가고 있으며, 데이터 유출을 방지하기 위해 다양한 암 복호화 알고리즘을 필요로 하고 있다. 본 논문에서는 기존의 비대칭 알고리즘과 대칭 알고리즘을 이용한 하이브리드 암 복호화 기반 데이터 교환방법을 제안한다. 비대칭 알고리즘은 RSA방법을 사용하여 상호간에 대칭키의 절반인 반키(Half Key)를 교환할 수 있도록 하였으며, 대칭 알고리즘은 AES를 사용하여 데이터를 암 복호화 할 수 있도록 하였다. 또한 기존의 AES 알고리즘의 S-Box와 키 스케쥴링 과정을 변형하여 무차별 대입 공격에 대해 방어할 수 있도록 하였다. 그 결과 기존의 비대칭 또는 대칭 알고리즘을 단독으로 사용하는 방법보다 안전하고 빠른 보안수준을 보장할 수 있음을 확인하였다.

  • PDF