• Title/Summary/Keyword: 인증서비스응용

Search Result 213, Processing Time 0.027 seconds

Authentification of User Commands for Centralized Computing System (중앙 집중형 컴퓨팅 시스템의 사용자 명령 인증 시스템 개발)

  • Kim, Y.H.;Kim, S.C.;Won, Y.K.
    • Annual Conference of KIPS
    • /
    • 2002.04b
    • /
    • pp.865-868
    • /
    • 2002
  • Computer Resource의 대용량화 및 인터넷 속도의 발달은 원거리에서 사용자가 인터넷을 통해 서버에 접속하여 컴퓨터를 사용하는 요구를 증가시켰다. 이는 Server-based 원격 컴퓨팅을 활용한 서비스의 연구 개발을 활성화 시켰으며, 최근 들어서는 Thin Client를 기반으로하는 중앙 집중형 원격 데스크탑 시스템(Remote Desktop System)을 꾸준히 발달시켰다. 그러나 단순한 파일 데이터의 접근에 대한 보안만을 제공하는 현재의 보안 체계는 이러한 Server-based 컴퓨팅 환경에서 다수의 사용자에 대한 복잡한 형태의 정보 공유 및 미세한 수준의 접근 권한이 요구되는 경우에는 적합하지 않다. 본 논문에서는 ASP(Application Service Provider) 컴퓨팅 시스템과 같은 중앙 집중형 원격 데스크탑 시스템에 적용하여 하나의 응용 프로그램에 대해 사용자별 세부적인 하위명령 사용 제한을 수행하는 사용자 명령 인증시스템을 제안한다.

  • PDF

Analysis of AKA and handover between UMTS and GSM (UMTS와 GSM사이의 AKA와 핸드오버 분석)

  • 이세광;조승환;이옥연;서창호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.109-127
    • /
    • 2003
  • In this paper, we analyze the network architecture, authentication, and key agreement of GSM and UMTS to compare the handover between the systems. And then, we divide authentication and key agreement procedure of mobile subscribers into several cases and finally analyze the key agreement procedure when a handover occurs in a CS-Domain and a PS-Domain.

A Security Survey and SmartPhone Authentication in Telematics (텔레매틱스에서 보안 동향 및 스마트폰 인증)

  • Yeo, Seong-Gwon;Lee, Keun-Ho
    • Annual Conference of KIPS
    • /
    • 2011.11a
    • /
    • pp.951-954
    • /
    • 2011
  • IT 기술의 발전으로 M2M 시장이 급부상하고 있는 가운데 M2M 응용분야 중 텔레매틱스의 개념 및 차량 네트워크 보안의 취약성을 알아보았다. 차량 및 IT 기술의 융합과 이동통신망 기술의 발전은 사용자에게 제공되는 서비스의 질은 향상 시켰지만, 이로 인한 보안 위험성은 더 많아지고 다양해졌다. 이에 본 논문에서는 텔레매틱스의 새로운 비즈니스 모델과 이로 인해 발생 될 수 있는 차량 이동통신망 보안의 취약성을 분석하였다. 이 중 발생할 수 있는 위장공격을 예방하기 위해 M2M 기기와 스마트폰의 상호 인증 기법을 제시하였다.

Analysis of Security Threats and Air Interface Traffic Performance for IMT-2000 Mobile Systems (IMT-2000 시스템의 보안 위협요소 분석 및 이의 적용에 따른 무선링크 트래픽 분석)

  • Kwon, Soo-Kun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1B
    • /
    • pp.49-55
    • /
    • 2002
  • IMT-2000 mobile system will provide many application services such as mobile internet, wireless electronics commerce applications using air interface with high data rate. These applications require high data integrity, data confidentiality, user authentication, user identity confidentiality and non-repudiation. In this study, we analyze new security threats and air interface traffic performance for IMT-2000 mobile systems. Signal traffic for network access security services requires 0.2kbps~4.5kbps with the conditions of 246~768bits/massage, 0.2~1.0 basic services/sec and the security services of the rate 0.2~1.0 times compared with basic services.

PKI/PMI based Access Control System on IPTV (IPTV에서 PKI/PMI기반의 권한 제어시스템)

  • Shuai, Wang;Jo, In-June
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.781-784
    • /
    • 2009
  • IPTV, which is convergence of Communication and Broadcasting, has improved quickly recently. This service can provide high quality and various services to their customers, such as choosing channels freely, VOD and many kinds of Interactive service. As the technology of IPTV rapid development, more and more people worry about its disadvantages during the spread and apply, for instance, the illegal application, illegal copy, access authority abuse and the danger of the IPTV contents. This paper will provide the solution to solve these problems, through the Public Key Certificate of PKI(Public Key Infrastructure) and the Attribute Certificate of PMI(Privilege Management Infrastructure).

  • PDF

The One Time Biometric Key Generation and Authentication Model for Portection of Paid Video Contents (상용 비디오 콘텐츠 보호를 위한 일회용 바이오메트릭 키 생성 및 인증 모델)

  • Yun, Sunghyun
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.101-106
    • /
    • 2014
  • Most peoples are used to prefer to view the video contents rather than the other contents since the video contents are more easy to understand with both their eyes and ears. As the wide spread use of smartphones, the demands for the contents services are increasing rapidly. To promote the contents business, it's important to provide security of subscriber authentication and corresponding communication channels through which the contents are delivered. Generally, symmetric key encryption scheme is used to protect the contents in the channel, and the session key should be upadated periodically for the security reasons. In addition, to protect viewing paid contents by illegal users, the proxy authentication should not be allowed. In this paper, we propose biometric based user authentication and one time key generation models. The proposed model is consist of biometric template registration, session key generation and chanel encryption steps. We analyze the difference and benefits of our model with existing CAS models which are made for CATV contents protection, and also provides applications of our model in electronic commerce area.

Mutual Authentication Protocol based on the Effective Divided Session for the Secure Transmission of Medical Information in u-Health (유헬스에서 안전한 생체정보전송을 위한 동적인 유효세션기반의 상호인증 프로토콜)

  • Lee, Byung-Mun;Lim, Heon-Cheol;Kang, Un-Ku
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.142-151
    • /
    • 2011
  • All medical information over sensor networks need to transmit and process securely in the u-Health services. The reliability of transmission between u-Health medical sensor devices and gateway is very important issue. When the user moves to other place with u-Health devices, its signal strength is going down and is far from the coverage of gateway. In this case, Malicious user can be carried out an intrusion under the situation. And also rogue gateway can be tried to steal medical information. Therefore, it needs mutual authentication between sensor devices and gateway. In this paper, we design a mutual authentication protocol which divided sessions from an authenticated session are updated periodically. And in order to reduce the traffic overhead for session authentication, we also introduce dynamic session management according to sampling rate of medical sensor type. In order to verify this, we implemented the programs for the test-bed, and got an overall success from three types of experiment.

Development of Smart NFC Security Authenticator(SNSA) (Smart NFC 보안인증기기(SNSA) 개발)

  • Kang, Jeong-Jin;Lee, Yong-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.177-181
    • /
    • 2013
  • As smart devices and OS with communication capabilities based latest NFC (Near Field Communication) have been spreaded, many applications with using existing RFID are being replaced to NFC. Smart NFC technology and existing services and devices can be easily combined convergence and advantage of smart phones, such as authentication and billing, medical care, the creation of a new paradigm of Network Communication are to be expected. By developing H/W, S/W of the Smart NFC Security Authenticator(SNSA), satisfying with wireless communication test results within accepted reference value, analyzing and testing the impact of topology, the signal performance of Daisy Chain Topology was much better than Star Topology's.

Improved at Adaptive Handoff Mechanism for the mobile hosts (휴대용 무선단말기에서 개선된 적응적 핸드오프 기법)

  • Na Geun-Woo;Lee Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.505-509
    • /
    • 2006
  • Recently, wireless Internet service has become generalized, and required the user authentication of a mobile hosts and QoS. However, time required for user authentication during handoff Processes between a wireless LAN system and mobile hosts is long, and is unsuitable for real-time communication and multimedia applications. In this paper. we improved the existing system in order to reduce a lead time of user authentication as they extended a Fast Inter-AP handoff. We use a Mechanism to assume a confidence degree with bases by the time that stayed at individual wireless LAN systems in order to reduce the handoffs. The experiment network shows that it decreases communication load, and improves communication QoS.

  • PDF

A Lightweight Authentication and Key Agreement Protocol in Wireless Sensor Networks (무선센서 네트워크에서 경량화된 인증과 키 동의 프로토콜)

  • Yoon, Sin-Sook;Ha, Jae-Cheol
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.41-51
    • /
    • 2009
  • Recently, there are many researches on security to remove vulnerability which is caused by wireless communication in wireless sensor networks. To guarantee secure communication, we should basically provide key management for each node, mutual authentication and key agreement protocol between two nodes. Although many protocols are presented to supply these security services, some of them require plentiful storage memory, powerful computation and communication capacity. In this paper, we propose a lightweight and efficient authentication and key agreement protocol between two sensor nodes, which is an enhanced version of Juang's scheme. In Juang's protocol, sensor node's information used to share a secret key should be transmitted to registration center via a base station. On the contrary, since node's information in our protocol is transmitted up to only base station, the proposed scheme can decrease computation and communication cost for establishing the shared key between two nodes.

  • PDF