• Title/Summary/Keyword: Authentication Service application

Search Result 133, Processing Time 0.026 seconds

A Secure BLE Integration Authentication System for a BLE Device Control Server based on Physical Web and Eddystone (Physical Web과 Eddystone 기반 BLE 디바이스 컨트롤 서버를 위한 안전한 BLE 통합 인증 시스템)

  • Nam, ChoonSung;Jung, Hyunhee;Shin, Dongryeol
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1094-1103
    • /
    • 2016
  • Physical Web and Eddystone can be serviced by a single integrated application on the device by using their servers' URL. However, they have a limitation that their servers must be customized for service characteristics on a case by case basis. In other words, regardless of the service selected for BLE, it should have a modified linkage application for each device. Hence, we think that a new integrated service platform, which is able to link and support its Beacon from the central server and is also able to support its application, is needed for achieving better service quality. This platform consists of push (Broadcasting for Beacon service) parts and pull (Connection) parts to establish communication. Especially, Pull should be operated and controlled under the authorization (secure) management for safe and trustable communication. It means that BLE must have its new authorization communications protocol to protect its data as much as possible. In this paper, we propose a BLE integrated authorization protocol for a BLE device control server based on Physical Web and Eddystone.

A Study on Smart Tourism Based on Face Recognition Using Smartphone

  • Ryu, Ki-Hwan;Lee, Myoung-Su
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.4
    • /
    • pp.39-47
    • /
    • 2016
  • This study is a smart tourism research based on face recognition applied system that manages individual information of foreign tourists to smartphone. It is a way to authenticate by using face recognition, which is biometric information, as a technology applied to identification inquiry, immigration control, etc. and it is designed so that tourism companies can provide customized service to customers by applying algorism to smartphone. The smart tourism system based on face recognition is a system that prepares the reception service by sending the information to smartphone of tourist service company guide in real time after taking faces of foreign tourists who enter Korea for the first time with glasses attached to the camera. The smart tourism based on face recognition is personal information recognition technology, speech recognition technology, sensing technology, artificial intelligence personal information recognition technology, etc. Especially, artificial intelligence personal information recognition technology is a system that enables the tourism service company to implement the self-promotion function to commemorate the visit of foreign tourists and that enables tourists to participate in events and experience them directly. Since the application of smart tourism based on face recognition can utilize unique facial data and image features, it can be beneficially utilized for service companies that require accurate user authentication and service companies that prioritize security. However, in terms of sharing information by government organizations and private companies, preemptive measures such as the introduction of security systems should be taken.

Java Card-based User Authentication and Personalized IPTV Services in 3G Mobile Environment (개인 맞춤형 IPTV 서비스를 위한 자바카드 기반의 사용자 인증 메커니즘)

  • Park, Youn-Kyoung;Lim, Sun-Hee;Yun, Seung-Hwan;Yi, Ok-Yeon;Lee, Sang-Jin
    • Journal of Broadcast Engineering
    • /
    • v.13 no.4
    • /
    • pp.528-543
    • /
    • 2008
  • Internet Protocol Television (IPTV) provides an interactive and personalized service for realizing integrated broadcasting and telecommunication services. Set-top box (SIB) connected to TV is an essential component required for IPTV and has a unique hardware identifier used in identification and authentication. It means that subscriber authentication based on box-level identification is inconsistent with IPTV's main intention of providing personalized services. The proposed solution is to provide an opportunity to use the flexible user-centric authentication mechanism through Java Card applets in IPTV application server and 3G networks. This paper suggests personalized services by moving the user's private data and authentication management beyond the STB to a truly personalized device, the ubiquitous mobile phone. In addition, this paper presents effectiveness and security analysis for verifying the proposal.

A Routing Security Authentication using S-EKE in MANET Environments (MANET 환경에서 S-EKE를 이용한 라우팅 보안 인증)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.4
    • /
    • pp.433-438
    • /
    • 2014
  • The demanding in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on MANET and the application of MANET has been paid much attention as a Ubiquitous computing which is growing fast in the field of computer science. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing but have vulnerable points, about lack of dynamic network topology due to mobility, network scalability, passive attacks, and active attacks which make it impossible to manage continuous security authentication service. In this study, proposes S-EKE authentication mechanism for a robust authentication based on MANET and through identify wireless environment security vulnerabilities, currently being used in OTP S/Key and DH-EKE analyzes.

I2DM : An Improved Identity Management Protocol for Internet Applications in Mobile Networks (모바일 네트워크에서 인터넷 응용을 위한 향상된 ID관리 프로토콜)

  • Park, In-Shin;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to rapid spread of smart phones and SNS(Social Network Service), using of Internet applications has increased and taking up bandwidth more than 3G network's capacity recently. This caused reduction of speed and service quality, and occurred strong needs that backbone network company to increasing investment costs. Also a great rise of mobile network users causing identity management problems on mobile service provider through mobile network. This paper proposes advanced IDM3G[1] - to solve user ID management and security problems on mobile internet application services over 3G network and more - authentication management protocol. $I^2DM$ protocol breakup loads which made by existing IDM3G protocol's mutual authentication via mobile operator, via sending some parts to internet application service provider, enhancing mobile and ID management of service provider and network load and process load from information handling and numbers of transmitting packets, to suggest more optimized protocol against further demanding of 3G mobile network.

A Study on the Methods of Fault Analysis for Security Improvement of National Education Information System(NEIS) (교육행정정보시스템의 보안성 개선을 위한 결함 분석 방법에 관한 연구)

  • Lyu, Min-Wan;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1970-1979
    • /
    • 2017
  • Computerization of educational administration following educational informatization of government has been steadily improved for the purpose of teachers' offload and job efficiency, finally resulting that NEIS(National Education Information System) has been completed. The NEIS consists of Nationwide service of NEIS, Business portal system of NEIS, Authentication management system and so on. Students, parents and civil petitioners handle civil affairs through Nationwide service of NEIS and teachers and persons of task conduct theirs business by accessing the Business portal system of NEIS. At this time, users have to obtain their certification from Authentication management system. Previous Studies were mainly focused on the evaluation about its performance according to the introduction of NEIS. But from now on there is a growing interest in security assessment and an efficient method for security improvement to check if NEIS works properly. Therefore, in this thesis, we'll propose an analytic framework in which security assessment is carried out after comprehending the fault structures through performing Fault Fishbone Analysis based on the Fault Tree Analysis. As a result of the system applied, the system had the highest rate of improvement to 47.7 percent.

IP router-based W-PAN (Wireless Personal Area Network) Authentication Control Technology (IP 공유기 기반 W-PAN(Wireless Personal Area Network) 인증 제어기술 개발)

  • Choi, Jung-In;Lee, Sun-Sook;Lee, Ha-Kyung;Lee, Jun-Hyeong;Jeong, Jung-Su;Young, Hwan-Seung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.07a
    • /
    • pp.311-313
    • /
    • 2013
  • 본 논문에서는 W-PAN 환경에서 IP공유기를 표준설계하고 구현하며 효율적인 실시간 사용자 웹기반 인증 기법을 연구하였다. 또한 W-PAN Device & Service Application 인증과 접근, 권한제어를 위한 인증 Client 모듈과 Server 모듈, Supplicant를 개발하고 제안하였다. 이를 통해 IP 공유기 기반 환경에서의 W-PAN 환경에서 인증 제어 솔루션에 대한 개발로 생산되는 단말기의 서비스 품질을 향상시키고 무선 접속 기술을 표준화 할 수 있다. 또한 유해한 트래픽을 검색하고 보호하는 안정적인 시스템 관리가 가능해졌다. W-PAN Device와 Service Application 인증, 접근 및 권한 제어를 위한 인증 시스템의 플랫폼 구축으로 향후 관련 기술의 통합과 융합 기술을 적용할 수 있는 능력을 확보하였다.

  • PDF

Development of Secure Access Control System for Location Information on Smart Phone (스마트폰 위치정보에 대한 안전한 접근제어 시스템 개발)

  • Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.139-147
    • /
    • 2011
  • More convenient and value-added application services can be provided to user in case of using location-based service on Smart phone. However, privacy problem will be happen when an application disclosures the personal location information. Therefore, each user should securely control and manage his own personal location information by specifying access control list and profiles. In this study, we implemented personal location information self-control protocol and developed secure personal location management system with OTP based authentication procedure.

Authentication Algorithm using Random Graphic Code (무작위적인 그래픽 코드를 이용한 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.63-69
    • /
    • 2019
  • Using a smartphone allows quick and easy authentication and payment. However, smartphone security threats are evolving into a variety of new hacking technologies, and are changing to attacks specific to the mobile environment. Therefore, there is a demand for an authentication method suitable for a mobile environment. In order to solve security weaknesses in knowledge-based authentication, many companies provide two-step authentication services such as OTP(One Time Password) to provide authentication services such as finance, games, and login. Although OTP service is easy to use, it is easy to duplicate random number table and has a disadvantage that can be reused because it is used as valid value within time limit. In this paper, we propose a mechanism that enables users to quickly and easily authenticate with high security using the authentication method that recognizes special characters through smartphone's dedicated application.

Design of Military Information System User Authentication System Using FIDO 2.0-based Web Browser Secure Storage (FIDO 2.0 기반의 웹 브라우저 안전 저장소를 이용하는 군 정보체계 사용자 인증 시스템 설계 및 구현)

  • Park, Jaeyeon;Lee, Jaeyoung;Lee, Hyoungseok;Kang, Jiwon;Kwon, Hyukjin;Shin, Dongil;Shin, Dongkyoo
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.43-53
    • /
    • 2019
  • Recently, a number of military intranet infiltrations suspected of North Korea have been discovered. There was a problem that a vulnerability could occur due to the modification of user authentication data that can access existing military information systems. In this paper, we applied mutual verification technique and API (Application Programming Interface) forgery / forgery blocking and obfuscation to solve the authentication weakness in web browsers that comply with FIDO (Fast IDentity Online) standard. In addition, user convenience is improved by implementing No-Plugin that does not require separate program installation. Performance tests show that most browsers perform about 0.1ms based on the RSA key generation rate. In addition, it proved that it can be used for commercialization by showing performance of less than 0.1 second even in the digital signature verification speed of the server. The service is expected to be useful for improving military information system security as an alternative to browser authentication by building a web secure storage.