• Title/Summary/Keyword: ID Card

Search Result 130, Processing Time 0.025 seconds

A Secure User Authentication Scheme using ID-based Bilinear Pairing based on Smart Card (스마트카드 기반 ID-based Bilinear Pairing을 이용한 안전한 사용자 인증 스킴)

  • Chen, Xinyi;Choi, Kyong;Chae, Kijoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.679-682
    • /
    • 2013
  • 스마트카드는 편리성과 안전성의 특성으로 인해 원격 시스템 인증에 다양하게 사용된다. 카드를 사용해서 통신하는 분야에서는 스마트카드에 대한 보안과 카드 소지자의 인증이 매우 중요하다. 기존 패스워드와 스마트카드를 이용한 원격 사용자 인증 기법은 공격자에 의해서 정당한 아이디와 패스워드 쌍을 쉽게 만들 수 있게 됨으로써 위장 공격이 가능한 취약점이 존재한다. 본 연구에서는 카드 보안 기술의 특징을 기반으로 하여 안전하고 편리한 사용자 인증 서비스를 제공하기 위해 키 생성 알고리즘인 ID-based Bilinear Pairing 암호방식을 이용해서 스마트카드 사용자와 서버 사이에 인증 스킴을 제안한다.

Financial violations by messenger hacking (Internet banking) Attack Analysis (메신저 해킹을 통한 금융침해(인터넷뱅킹) 공격 분석)

  • Roo, Kyong-Ha;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.451-455
    • /
    • 2012
  • In this paper, Nateon, MSN Messenger, including how to hack into the most intimate acquaintance formed as follows, for hacking (keyloggers, remote monitoring, etc.) by sending a bank and ID, PW, certificate, security card, etc. personal financial information obtained after the withdrawal of the account balance to have a personal financial analysis infringement attack vulnerable elements found in internet banking, the vulnerabilities and countermeasures concerning the prevention of accidents, including violations by seeking a more secure Internet banking personal Internet Banking is to devise a deal.

  • PDF

Face Feature Extraction for Face Recognition (얼굴 인식을 위한 얼굴 특징점 추출)

  • Yang, Ryong;Chae, Duk-Jae;Lee, Sang-Bum
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.12
    • /
    • pp.1765-1774
    • /
    • 2002
  • A face recognition is currently the field which many research have been processed actively. But many problems must be solved the previous problem. First, We must recognize the face of the object taking a location various lighting change and change of the camera into account. In this paper, we proposed that new method to fund feature within fast and correct computation time after scanning PC camera and ID card picture. It converted RGB color space to YUV. A face skin color extracts which equalize a histogram of Y ingredient without the luminance. After, the method use V' ingredient which transformes V ingredient of YUV and then find the face feature. The reult of the experiment shows getting correct input face image from ID Card picture and PC camera.

  • PDF

A Study on the Fingerprint Recognition Algorithm Using Enhancement Method of Fingerprint Ridge Structure (지문 융선 구조의 향상기법을 사용한 지문인식 알고리즘에 관한 연구)

  • 정용훈;노정석;이상범
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.647-660
    • /
    • 2003
  • The present of state is situation that is realized by necessity of maintenance of public security about great many information is real condition been increasing continually in knowledge info-age been situating in wide field of national defense, public peace, banking, politics, education etc. Also, loss or forgetfulness, and peculation by ID for individual information and number increase of password in Internet called that is sea of information is resulting various social problem. By alternative about these problem, including Biometrics, several authentication systems through sign(Signature), Smart Card, Watermarking technology are developed. Therefore, This paper shows that extract factor that efficiency can get into peculiar feature in physical features for good fingerprint recognition algorithm implementation with old study finding that take advantage of special quality of these fingerprint.

  • PDF

A Brokered Authentication Scheme Based on Smart-Card for Multi-Server Authentication (다중서버 인증을 위한 스마트카드 기반 중재 인증 기법 연구)

  • Kim, Myungsun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.3
    • /
    • pp.190-198
    • /
    • 2013
  • Since the facilities for the remote users tend to be deployed in distributed manner, authentication schemes for multi-server communication settings, which provide various web services, are required for real-world applications. A typical way to authenticate a remote user relies on password authentication mostly. However, this method is vulnerable to attacks and inconvenient as the system requires users to maintain different identities and corresponding passwords. On the other hand, the user can make use of a single password for all servers, but she may be exposed to variants of malicious attacks. In this paper, we propose an efficient and secure authentication scheme based on a brokered authentication along with smart-cards in multi-server environment. Further we show that our scheme is secure against possible attacks and analyze its performance with respect to communication and computational cost.

IC-CARD TYPE ELECTRONIC MONEY AND IMPROVEMENT POLICY (IC카드헝 전자화폐 도입방안의 문제점과 개선책)

  • 박근수
    • The Journal of Information Technology
    • /
    • v.3 no.1
    • /
    • pp.73-88
    • /
    • 2000
  • Dramatic changes are beginning to occur in plastic card technologies today in the fields of banking, health care, id-cards and more. Advanced card technologies such as IC-card are playing an increasingly important role in new and innovation system. The merit of IC-card are more capacity, more secure, more reliable, quick and easy to update, secure offline processing, enabling technology etc than magnetic stripe card. And so many countries began using experiment of IC- card and our country began October 13 in Cheju island. Then there are three types using-experiment (K-cash, VISA-cash, MONDEX) in Korea. There are some problems such as standards, widely using, high cost, double investment etc. I think that important things in IC-card using is an international- standardizations and issuing corporation.

  • PDF

A Secure Micro-Payment Protocol based on Credit Card in Wireless Internet (무선인터넷에서 신용카드기반의 안전한 소액 지불 프로토콜)

  • Kim Seok mai;Kim Jang Hwan;Lee Chung sei
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1692-1706
    • /
    • 2004
  • Recently, there are rapid development of information and communication and rapid growth of e-business users. Therefore we try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. Wireless e-business adopts credit card WPP protocol and AIP protocol proposed by ASPeCT. WAP, one of the protocol used by WPP has weakness of leaking out information from WG which conned wire and wireless communication. certification chain based AIP protocol requires a lot of computation time and user IDs are known to others. We propose a Micro-Payment protocol based on credit card. Our protocol use the encryption techniques of the public key with ID to ensure the secret of transaction in the step of session key generation. IDs are generated using ECC based Weil Paring. We also use the certification with hidden electronic sign to transmit the payment result. The proposed protocol solves the privacy protection and Non-repudiation p개blem. We solve not only the safety and efficiency problem but also independent of specific wireless platform. The protocol requires the certification organization attent the certification process of payment. Therefore, other domain provide also receive an efficient and safe service.

Problem Analysis and Enhancement of 'An Improved of Enhancements of a User Authentication Scheme'

  • Mi-Og Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.53-60
    • /
    • 2024
  • In this paper, we analyze the authentication scheme of Hwang et al. proposed in 2023 and propose a new authentication scheme that improves its problems. Hwang et al. claimed that their authentication scheme was practical and secure, but as a result of analysis in this paper, it is possible to attack the password/ID guessing attack and session key disclosure attack due to insider attack and stolen smart card attack. In addition, Hwang et al.'s authentication scheme, which provides user anonymity, does not provide user untraceability due to its unstable design. The proposed authentication scheme, which improves these problems, not only provides user untraceability, but also is secure for stolen smart card attack, insider attack, session key disclosure attack, and replay attack. In addition, except for one fuzzy extraction operation, it shows the same complexity or very similar one as related authentication schemes. Therefore, the proposed authentication scheme can be said to be an authentication scheme with safety and practicality.

A Attendance-Absence Checking System using the Self-organizing Face Recognition (자기조직형 얼굴 인식에 의한 학생 출결 관리 시스템)

  • Lee, Woo-Beom
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.72-79
    • /
    • 2010
  • A EAARS(Electronic Attendance-Absence Recording System) is the important LSS(Learning Support System) for blending a on-line learning in the face-to-face classroom. However, the EAARS based on the smart card can not identify a real owner of the checked card. Therefore, we develop the CS(Client-Sever) system that manages the attendance-absence checking automatically, which is used the self-organizing neural network for the face recognition. A client system creates the ID file by extracting the face feature, a server system analyzes the ID file sent from client system, and performs a student identification by using the Recognized weight file saved in Database. As a result, The proposed CS EAARS shows the 92% efficiency in the CS environment that includes the various face image database of the real classroom.

Security Analysis of a Secure Dynamic ID based Remote User Authentication Scheme for Multi-server Environment (멀티서버를 위한 안전한 동적 ID 기반 원격 사용자 인증 방식에 대한 안전성 분석)

  • Yang, Hyung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.273-278
    • /
    • 2013
  • Recently, user authentication schemes using smart cards for multi-server environment have been proposed for practical applications. In 2009, Liao-Wang proposed a secure dynamic ID based remote user authentication scheme for multi-server environment that can withstand the various possible attacks and provide user anonymity. In this paper, we analyze the security of Liao-Wang's scheme, and we show that Liao-Wang's scheme is still insecure against the forgery attack, the password guessing attack, the session key attack, and the insider attack. In addition, Liao-Wang's scheme does not provide user anonymity between the user and the server.