• Title/Summary/Keyword: ID 인증

Search Result 450, Processing Time 0.027 seconds

IP camera security using device unique identifier authentication (Device unique identifier인증을 이용한 IP Camera 인증 보안)

  • Kim, Ji-Hun;Kim, Young-kil;Hong, Man-pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.82-85
    • /
    • 2018
  • The purpose of this paper is to improve the authentication method for IP camera user authentication. Since existing authentication uses knowledge-based authentication method, if ID and PW are exposed to attack by attacker, IP camera becomes defenseless from attacker. The attacker can access the IP Camera and acquire and distribute real time video and voice, which can be exploited as a second crime, and there is a fear of a secret leak when a secret facility is installed. In order to compensate for this vulnerability, this paper proposes a DUI authentication method that identifies and registers a device using DUI (Device Unique Identifier), blocks access to unauthorized devices by subordinating the device to the IP Camera and authenticates only authorized devices.

  • PDF

Enhanced Operator Authentication Method in SCADA Control Network (SCADA제어망에서 강화된 운용자 인증 방안)

  • Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.416-424
    • /
    • 2019
  • The authentication technologies used to access computers in both IT and operational technology (OT) network areas include ID/PW, public certificate, and OTP. These authentication technologies can be seen as reflecting the nature of the business-driven IT network. The same authentication technologies is used in SCADA control networks where the operational technology is centered. However, these authentication technologies do not reflect the characteristics of the OT control network environment, which requires strict control. In this paper, we proposed a new enhanced user authentication method suitable for the OT SCADA control network centered on control information processing, utilizing the physical terminal address and operator location information characteristics of the operator's mobile terminal and control network.

A Design of OpenID System Using ID Management Method User-Centric (사용자 중심 ID 관리 기법을 이용한 OpenID 시스템의 설계)

  • Jeong, Eui-Kyeong;Yun, Cheol-Yong;Kim, Hyun-Chul;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1373-1376
    • /
    • 2009
  • 인터넷의 확산과 웹 2.0 서비스의 등장은 기존 서비스 제공자 중심의 ID 관리를 사용자 중심의 ID 관리 형태로 변화시키는 계기가 되었다. 그러나 기존 사용자 중심 ID 관리 기법은 사용자 인증 및 정보 관리에 대한 문제가 존재한다. 본 논문에서는 서비스 제공자가 필요로 하는 정보만을 사용자가 선별적으로 선택하여 제공함으로서 기존 ID 관리 기법의 문제를 해결할 수 있는 사용자 중심의 ID 관리 기법을 이용한 OpenID 시스템을 제안한다. 또한, 실험 및 비교분석을 통하여 보안성 및 효율성 측면에서 우수함을 확인 할 수 있었다.

Design of An Authentication System Proper for Hybrid Cloud Computing System (하이브리드 클라우드 컴퓨팅 환경에 적합한 인증시스템 설계)

  • Lee, Geuk;Ji, Jae-Won;Chun, Hyun-Woo;Lee, Kyu-Won
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.31-36
    • /
    • 2011
  • Cloud computing is a system which efficiently utilizes resources. In this paper, we propose 2-factor authentication system combing PKI, ID_PW and location information. The proposed method improve the security of hybrid cloud systems and manage resources more safely.

A Study on Authentication Protocol for Secure RFID Tag (RFID Tag 보안을 위한 인증 프로토콜에 관한 연구)

  • Kim, Jeong-Jai;Ahn, Jae-Myung
    • Proceedings of the KAIS Fall Conference
    • /
    • 2008.05a
    • /
    • pp.104-107
    • /
    • 2008
  • 본 논문에서 제안하는 시스템은 기존의 RFID 시스템의 보안성을 높이기 위하여 2차원 배열 기법을 이용하여 안전성을 확보할 수 있게 되었다. 제안하는 시스템은 RFID Tag의 고유 ID 값인 UID값과 2차원 배열을 이용하여 태그와 리더간 인증을 하게 된다. 제안하는 시스템에서 암 복호화를 하기 위해서는 태그의 고유 ID값인 UID값과 관리자가 정의한 키셋을 이용한 암 복호화 과정에서의 안전성을 기존의 다른 시스템과의 비교를 통해 우수함을 입증한다.

  • PDF

Development of Identity-Provider Discovery System leveraging Geolocation Information (위치정보 기반 식별정보제공자 탐색시스템의 개발)

  • Jo, Jinyong;Jang, Heejin;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1777-1787
    • /
    • 2017
  • Federated authentication (FA) is a multi-domain authentication and authorization infrastructure that enables users to access nationwide R&D resources with their home-organizational accounts. An FA-enabled user is redirected to his/her home organization, after selecting the home from an identity-provider (IdP) discovery service, to log in. The discovery service allows a user to search his/her home from all FA-enabled organizations. Users get troubles to find their home as federation size increases. Therefore, a discovery service has to provide an intuitive way to make a fast IdP selection. In this paper, we propose a discovery system which leverages geographical information. The proposed system calculates geographical proximity and text similarity between a user and organizations, which determines the order of organizations shown on the system. We also introduce a server redundancy and a status monitoring method for non-stop service provision and improved federation management. Finally, we deployed the proposed system in a real service environment and verified the feasibility of the system.

일회용 패스워드(OTP: One-Time Password) 기술 분석 및 표준화 동향

  • Choi, Dong-Hyun;Kim, Seung-Joo;Won, Dong-Ho
    • Review of KIISC
    • /
    • v.17 no.3
    • /
    • pp.12-17
    • /
    • 2007
  • 최근 인터넷과 같은 통신 기술이 급속도로 발전함에 따라, 많은 서비스들이 온라인을 통해서 이루어지고 있다. 그러나 인터넷은 개방형 네트워크이기 때문에 공격자에 의한 시스템 침입, 도청 돈과 같은 여러 공격이 쉽게 발생된다. 특히 기존에 오프라인 상에서 이루어지던 은행 거래와 상거래가 인터넷 뱅킹과 전자상거래와 같이 온라인상에서 이루어짐에 따라 그 위험 수준은 더욱 높아지고 있다. 이러한 환경에서 사용자 인증은 안전한 통신을 위한 필수적인 요소라 할 수 있다. 대표적인 인증 방법으로 ID/Password 방식이 사용된다 하지만 ID/Password의 경우 추측이나 도청에 의해 쉽게 공격될 수 있는 단점을 가지고 있다. 이러한 단점을 극복할 수 있는 인증 기법이 매번 새로운 패스워드를 생성하는 일회용 패스워드(OTP: One-Time Password) 기술을 활용한 인증 방법이다. 본 논문에서는 이러한 OTP 기술 분석 및 표준화 동향에 대해 소개하고자 한다.

Design and Implementation of 2D Game Engine based Authentication of GPS Location Information (GPS 위치정보 인증기반 2D 게임엔진 설계 및 구현)

  • Hur, Sung-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.5
    • /
    • pp.1242-1248
    • /
    • 2008
  • In this paper, we propose a multi-stage user authenticating system in which system at first stage, the system authenticate a user through his GPS information and IP address. At second stage, the system authenticate a user based on ID and Password as other systems does. Through the use of proposed system, aged person or children enjoy the game on a much safer environment.

Face Recognition System for the Enhanced Authentication in the Smartwork Environment (스마트워크 환경에서 인증 강화를 위한 얼굴 인식 시스템)

  • Han, Sang-Kon;Yang, Seok-Hwan;Chung, Mok-Dong
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.46-49
    • /
    • 2012
  • 스마트워크 환경에서 널리 보급된 인증 방법인 ID/PW 방식은 구현이 간편하지만, 보안 강도가 약하다는 단점이 있다. 본 논문에서 제안하는 얼굴 인식 인증 시스템은 ID/PW 방법과 함께 인증 강화를 위해 사용된다. 제안 시스템의 주요한 특징은 Android 4.0 등의 얼굴 인식 기술의 단점으로 지적되고 있는 사용자 사진만 사용해서 잠금이 해제되는 의도적인 얼굴 인식 회피시도를 사전에 예방한다. 또한 제안하는 시스템은 기기 검증, 생체 정보 암호화 모듈을 포함하고 있어서 보다 안전한 스마트워크 환경을 제공할 것으로 기대된다.

  • PDF

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.