• Title/Summary/Keyword: Remote User

Search Result 993, Processing Time 0.023 seconds

Security Analysis of a Secure Dynamic ID based Remote User Authentication Scheme for Multi-server Environment (멀티서버를 위한 안전한 동적 ID 기반 원격 사용자 인증 방식에 대한 안전성 분석)

  • Yang, Hyung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.273-278
    • /
    • 2013
  • Recently, user authentication schemes using smart cards for multi-server environment have been proposed for practical applications. In 2009, Liao-Wang proposed a secure dynamic ID based remote user authentication scheme for multi-server environment that can withstand the various possible attacks and provide user anonymity. In this paper, we analyze the security of Liao-Wang's scheme, and we show that Liao-Wang's scheme is still insecure against the forgery attack, the password guessing attack, the session key attack, and the insider attack. In addition, Liao-Wang's scheme does not provide user anonymity between the user and the server.

Image Processing Software Package(IMAPRO) for IBM PC VGA (IBM PC VGA용 화상처리 소프트웨어(IMAPRO))

  • 徐在榮;智光薰
    • Korean Journal of Remote Sensing
    • /
    • v.8 no.1
    • /
    • pp.59-69
    • /
    • 1992
  • The IMAPRO sotfware package was mainly focused to provide an algorithm which is capable of displaying various color composite images on IBM PC, VGA(Video Graphic Array) card with no special hardware. It displays the false color images using a low-cost eight-bit place refresh buffer. This produces similar quality to the one obtained from image board with three eight-bit plane. Also, it provides user friendly menu driven method for the user who are not familier with technical knowladge of image processing. It may prove useful for universities, institute and private company where expensive hardware is not available.

Software Architecture of Contents-based Control for Co-operative Remote Manipulation of Multi-Robots

  • Thuy, Dinh Trong;Kang, Soon-Ju
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.508-511
    • /
    • 2008
  • In this paper, we propose software architecture for conveying contents-based OpenSound Control (OSC) packet from manipulation user interface to cooperative remote multi-robots. The Flash application is used as a controlling user interface and the physical prototyping of multi-robots were developed using physical prototyping toolkit.

Remote Control Apparatus and Display Remote Control System Comprising the Same (원격 제어 장치 및 이를 포함하는 디스플레이 원격 제어 시스템)

  • Yoon, Yeo-Jun;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.165-174
    • /
    • 2006
  • This paper is a matter of remote control apparatus and display remote control system comprising the same. The remote controller is a wireless remote pointing device that is included a function of mouse and a function of remote controller for VOD etc. It is assembled a sending signal part to communicate with display device, a image sensor part to capture a seen of front view and a main body. Also, it includes a control part that analyzes the captured image, calculates a relative moving factor that main body is moved by user, and then controls the mouse cursor on the display device. The remote control apparatus is able to capture a seen of front view, to analyze the captured image, and to move a mouse cursor point on the display device as much as it calculated relative moving factor. Therefor it brings down the cost of production by a product design that is increased user satisfaction. And it, using the patent and the new product design, will make an epoch in development of the remote control system for Ubiquitous broadcasting industry.

  • PDF

Remote Control Apparatus and Display Remote Control System Comprising the Same (원격 제어 장치 및 이를 포함하는 디스플레이 원격 제어 시스템)

  • Yoon, Yeo-Jun;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.161-170
    • /
    • 2007
  • This paper is a matter of remote control apparatus and display remote control system comprising the same. The remote controller is a wireless remote pointing device that is included a function of mouse and a function of remote controller for VOD etc. It is assembled a sending signal part to communicate with display device, a image sensor part to capture a scene of front view and a main body. Also, it includes a control part that analyzes the captured image, calculates a relative moving factor that main body is moved by user, and then controls the mouse cursor on the display device. The remote control apparatus is able to capture a seen of front view, to analyze the captured image, and to move a mouse cursor point on the display device as much as it calculated relative moving factor. Therefor it brings don the cost of production by a product desist that is increased user satisfaction. And it, using the patent and the new product desist, will make an epoch in development of the remote control system for Ubiquitous broadcasting industry.

  • PDF

Improvements of a Dynamic ID-Based Remote User Authentication Scheme (동적 ID 기반 원격 사용자 인증 스킴의 보안성 개선)

  • Young-Do, Joo;An, Young-Hwa
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.303-310
    • /
    • 2011
  • Recently, many user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication process. In 2009, Wang et al. proposed a more effective and secure dynamic ID-based remote user authentication scheme to improve the security weakness of Das et al.'s scheme, and asserted that the improved scheme is secure against independent of password in authentication phase and provides mutual authentication between the user and the remote server. However, in this paper, we analyze the security of Wang et al. scheme and demonstrate that Wang et al.'s scheme is vulnerable to the man-in-the-middle attack and the off-line password guessing attack. In addition, we show that Wang et al. scheme also fails to provide mutual authentication. Accordingly, we propose an improved scheme to overcome these security weakness even if the secrete information stored in the smart card is revealed. Our proposed scheme can withstand the user impersonation attack, the server masquerading attack and off-line password guessing attack. Furthermore, this improved scheme provides the mutual authentication and is more effective than Wang et al.'s scheme in term of the computational complexities.

Zero-knowledge Based User Remote Authentication Over Elliptic Curve (타원곡선상의 영지식기반 사용자 원격인증 프로토콜)

  • Choi, Jongseok;Kim, Howon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.517-524
    • /
    • 2013
  • Although password-based authentication as known as knowledge-based authentication was commonly used but intrinsic problems such as dictionary attack remain unsolved. For that the study on possession-based authentication was required. User remote authentication using smartcard is proceeding actively since Lee et al. proposed user remote authentication using knowledge-based information(password) and possession-base information(smartcard) in 2002. in 2009, Xu et al. proposed a new protocol preserving user anonymity and Shin et al. proposed enhanced scheme with analysis of its vulnerabilities on user anonymity and masquerading attack in 2012. In this paper, we analyze Shin et al. scheme on forward secrecy and insider attack and present novel user authentication based on elliptic curve cryptosystem which is secure against forward secrecy, insider attack, user anonymity and masquerading attack.

Remote User Authentication Scheme using Smart Cards (스마트카드를 이용한 원격 사용자 인증 구조)

  • Choi, Jong-Seok;Shin, Seung-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.2
    • /
    • pp.36-42
    • /
    • 2009
  • In 2005, Chien and Chen proposed a remote user authentication scheme for preserving user anonymity to conquer some problems Das et. al. schemes have. In 2007, Hu et. al. pointed out that their scheme have some problems. Therefore, they proposed a new one and claimed that their scheme overcome all of these problems. However, We will show that Hu et. al. scheme still hold some problems; it cannot resist to denial of service attack and protect the user anonymity. Hence, we propose ours and demonstrate our scheme conquer these problems.

Development of Visual Modeler by using CBD

  • Yoon, Chang-Rak;Seo, Ji-Hun;Kim, Kyung-Ok
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.53-53
    • /
    • 2002
  • According to glowing computing capacity, software in remote sensing has supported diverse processing interfaces from batch interface to high-end user interactive interface. In this paper, component based visual modeler is developed to process batch jobs for high-end users as well as novices. Visual modeler arranges several node groups which are categorized according to their purposes. These nodes carry out elemental unit processes and can be grouped to model. The model represents user specified job which is composed diverse nodes. User can organize models by connecting diverse nodes according to data flow model specification which rules node's connectivity and direction, etc. Furthermore, user defined models can be together to organize much more complex and large model.

  • PDF

Improved User Anonymity Authentication Scheme using Smart Card for Traceability (추적 가능성을 위한 스마트카드 기반의 개선된 사용자 익명성 인증기법)

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.83-91
    • /
    • 2012
  • Authentication schemes preserving user anonymity have first been proposed by Das et al, and most of user anonymity schemes provide user anonymity against outside attacks in the communication channel. In this paper, according to the increasing of personal information exposure incidents by server attack, we propose a new authentication scheme that provides user anonymity against server as well as one against outside attacks in the communication channel. Furthermore, the proposed authentication scheme provides traceability that remote server should be able to trace the malicious user and it also solves the problem of increasing computational load of remote server by solving weakness of wrong password input by mistake.