• Title/Summary/Keyword: ID 인증

Search Result 450, Processing Time 0.034 seconds

Design of Patient Authentication Model in u-healthcare Environment using Coalition ID (연합 ID를 이용한 u-헬스케어 환경의 환자 인증 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.305-310
    • /
    • 2013
  • To provide medical services to patients who have a terminal illness, recent hospital patients to monitor the state of the device attached to the body, the body insertion device is. U-Healthcare Environment and hospital officials indiscriminately exploited by the patient's vital information, however, could threaten the patient's life problems are appearing. In this paper, depending on the level of authority, hospital officials, Union of ID-based authentication model is proposed to use a patient's vital information. Union proposed model identify different authentication system is used in hospitals that exist in various forms in a number of ID information, health / medical information sharing between hospitals without exposure to unnecessary personal information, you can be assured of the anonymity. In particular, with easy access to patient information, hospital officials about the malicious act to protect patient information to access level for the rights granted by third parties to prevent easy access.

A Design on the authentication using the Hash Lock and PKI in RFID/USN (RFID/USN 환경에서 Hash Lock과 PKI 방법을 이용한 인증 프로토콜의 설계)

  • Choi, Yong-Sik;Shin, Seoung-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.127-129
    • /
    • 2005
  • 일방향 해시 함수의 역함수 계산 어려움에 기반한 Hash Lock에 PKI방법을 적용하여 MetaID를 비밀키로써 사용한다. Reader는 미리 등록된 공개키(meta ID를 이용하여 생성된)로 Tag를 인증하고 meta ID로 각 Tag의 유일한 키(k)를 생성하며 이에 해당하는 mela ID = H(k)를 가지고 있다. 이 때 H()는 해쉬함수 이다. Tag는 자신의 비밀키를 이용하여 생성된 meta ID를 Reader에 보내고 Reader는 해당되는 키(k)를 만들어내고 Tag에 보낸다. 이때 Tag는 Reader로부터 보내어진 키(k)를 해쉬값과 자신의 meta ID를 비교하여, 그 값이 동일하면 자신의 ID를 전송한다. 이는 해쉬함수와 PKI만을 사용하므로 효율적이고 저비용으로 구현 가능하다.

  • PDF

Enhanced Password Based User Authentication Mechanism Using Mobile Storage Medium/Channel (이동 저장매체를 활용한 패스워드 기반 사용자 인증 강화 방안)

  • Kim, Seon-Young;Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.533-540
    • /
    • 2014
  • As for the application system or the user authentication scheme that is used in the system, various technologies including simple ID/PW, certificate, fingerprint/iris, phone, security card, and OTP are being used. But simple ID/PW and phone certification lack security features. As for the certificate, fingerprint/iris, and security card/OTP, the weakness in security has been quite strengthened, but there are costs and complexity involved to use these. This paper proposes a new measure of much safer and low-cost user authentication that improves the security level and uses mobile external storage media such as USB that people commonly have.

The Design and Implementation of Single Sign-On Service for Education-related Information Service Platform (교육정보 통합 플랫폼 구현을 위한 통합 사용자 인증 서비스의 설계 및 구현)

  • Park, Jung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.100-109
    • /
    • 2011
  • The study concluded that in order to achieve a single sign-on through the federation ID management method must be used among many other methods so to establish a combined approval service that gives access to education related information provided by the 16 city and provincial offices of education and the KERIS(Korea Education & Research Information Service). The federation ID management method allows the usage of authentication policy and enables transfer of ID information to other institutions through standardized processing. Therefore by establishing single sign-on through the federation ID management method allows individual city and provincial office of education to maintain the already existing approval services while combining user identification database.

Design and Implement of Authentication System for Secure User Management for Secure on Medical ICT Convergence Environment (의료 ICT융합 환경에서 안전한 사용자 관리를 위한 인증시스템 설계 및 구현: 중소형 의료기관을 중심으로)

  • Kim, Yanghoon;Choi, Yean Jung
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.29-36
    • /
    • 2019
  • The convergence of traditional industry and ICT is a combination of security threats and vulnerabilities in ICT and specific industry-specific problems of existing industries, and new security threats and vulnerabilities are emerging. In particular, in the medical ICT convergence industry, various problems regarding user authentication are derived from the medical information system, which is being used for abuse and security weaknesses. According, this study designed and implemented a user authentication system for secure user management in medical ICT convergence environment. Specifically, we design and implement measures to solve the abuse and security weaknesses of ID sharing and to solve the inconvenience of individual ID / PW authentication by performing user authentication using personalized devices based on medical information systems.

Quantum Authentication and Key Distribution protocol based on one-time ID (일회용 ID 기반 양자 인증 및 키 분배 프로토롤)

  • Lee Hwa-Yean;Hong Chang-Ho;Lim Jong-in;Yang Hyung-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.73-80
    • /
    • 2005
  • We propose a Quantum Authentication and Key distribution protocol based on one-time n using one-way Hash function. The designated users can authenticate each other and the arbitrator using their one-time ID and distribute a quantum secret key using remained GHZ states after authentication procedure. Though the help of the arbitrator is needed in the process of authentication and key distribution, our protocol prevents the arbitrator from finding out the shared secret key even if the arbitrator becomes an active attacker. Unconditional security can be proved in our protocol as the other QKD protocols.

A study on the AAA Regional Authentication using renewal ID (갱신 아이디를 이용한 AAA지역 인증 방안에 관한 연구)

  • Kang Seo-Il;Lee Im-Yeong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.172-174
    • /
    • 2005
  • AAA의 프레임워크를 이용한 모바일 단말 노드에 대한 인증 방식이 연구 진행되어지고 있다. AAA의구조에서는 홈임증서버가 다른 네트워크망을 이용하는 사용자를 인증한다. 이때 모바일 노드가 인증을 받고 나서 또 다른 네트워크로 이동하면 다시 홈 인증 서버로부터 인증을 받아야 한다. 그러므로 본 연구에서는 단 하나의 ID와 패스워드를 통해 홈 인증 서버로부터 인증을 받고 난 후에는 다른 서버로 이동하더라도 인증 서비스를 제공받을 수 있도록 한다. 본 제안 방식은 외부 네트워크에서 홈 네트워크의 인증을 받아 오면 다른 외부 네트워크로 이동시 홈네트워크 인증 및 이전의 외부 네트워크의 인증을 제공하여 다시 홈네트워크로 접근하지 않도록 한다. 이와 같은 방식은 갱신 아이디를 사용함으로 인해 서비스가 제공된다.

  • PDF

A Design of Hadoop Security Protocol using One Time Key based on Hash-chain (해시 체인 기반 일회용 키를 이용한 하둡 보안 프로토콜 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.4
    • /
    • pp.340-349
    • /
    • 2017
  • This paper is proposed Hadoop security protocol to protect a reply attack and impersonation attack. The proposed hadoop security protocol is consists of user authentication module, public key based data node authentication module, name node authentication module, and data node authentication module. The user authentication module is issued the temporary access ID from TGS after verifing user's identification on Authentication Server. The public key based data node authentication module generates secret key between name node and data node, and generates OTKL(One-Time Key List) using Hash-chain. The name node authentication module verifies user's identification using user's temporary access ID, and issues DT(Delegation Token) and BAT(Block Access Token) to user. The data node authentication module sends the encrypted data block to user after verifing user's identification using OwerID of BAT. Therefore the proposed hadoop security protocol dose not only prepare the exposure of data node's secret key by using OTKL, timestamp, owerID but also detect the reply attack and impersonation attack. Also, it enhances the data access of data node, and enforces data security by sending the encrypted data.

A Secure Telemedicine System for Smart Healthcare Service (스마트 헬스케어 서비스를 위한 홍채인식기반의 원격의료시스템)

  • Cho, Young-bok;Woo, Sung-Hee;Lee, Sang-Ho;Kim, Min-Kang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.205-214
    • /
    • 2017
  • In this paper, we proposed an iris-based authentication for smart healthcare service in secure telemedicine system. The medical and healthcare information's are very important data in telemedicine system from privacy information. thus, the proposed system provides a secure and convenient authentication method than the traditional ID/PW authentication method to a telemedicine system for age-related chronic diseases. When considering the peculiarities of the use of age-related chronic diseases convenience and healthcare environments, the proposed approach is difficult to secure than traditional ID/PW authentication method with the appropriate means to easily change when stolen or lost to others. In addition, the telemedicine system for the smart healthcare services is one of the types of privacy sensitive medical and health data. it is very important security needs in telemedicine system. Thus we protocol are offer high confidentiality and integrity than existing ID/PW method.

Smart Card and Dynamic ID Based Electric Vehicle User Authentication Scheme (스마트카드 및 동적 ID 기반 전기 자동차 사용자 인증 스킴)

  • Jung, Su-Young;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.7
    • /
    • pp.141-148
    • /
    • 2013
  • Smart grid can two-way communication using ICT(Information & Communication Technology). Also, smart grid can supply to dynamic power that grafted to electric vehicle can activate to electric vehicle charging infrastructure and used to storage battery of home. Storage battery of home can resale to power provider. These electric vehicle charging infrastructure locate fixed on home, apartment, building, etc charging infrastructure that used fluid on user. If don't authentication for user of fluid user use to charging infrastructure, electric charging service can occurred to illegal use, electric charges and leakgage of electric information. In this paper, we propose smartcard and dynamic ID based user authentication scheme for used secure to electric vehicle service in smart grid environment.