• Title/Summary/Keyword: Secure USB

Search Result 28, Processing Time 0.023 seconds

A Design of Client BBS System for Secure HVA

  • Park, Jae-Kyung;Kim, Young-Ja
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.73-80
    • /
    • 2018
  • In this paper, we propose a new type of client server environment to improve the architecture vulnerable to hacking in an existing client server environment. On the server side, move the existing Web server to the client side and This is a way for clients to communicate only the data they need and suggests a structure that completely blocks the web attack itself to the server. This can completely prevent a server from being hacked, spreading malicious code and hacking data on a server. It also presents a new paradigm that will not affect servers even if malware is infected with client PCs. This paper validates the proposed environment through BBS (Big Bad Stick) hardware in the form of USB on the client side. This study proof that secure services are provided through encryption communication with server-side security equipment, indicating that this study is a system with new security.

Implementation of Embedded Biometrics Technologies : A Case of a Security Token for Fingerprints (임베디드 생체 인식 기술 구현 : 지문 보안 토큰 사례)

  • 김영진;문대성;반성범;정용화;정교일
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.6
    • /
    • pp.39-46
    • /
    • 2003
  • Biometric technologies using biometric information like fingerprints features are in wide use for the secure user authentication in many services including log-in of computer systems, entrance ID and E-commercial security. Nowadays, biometric technologies are ported into small embedded systems like security tokens or smart cards due to the merit of being secure and automatic in comparison with the previous method in user authentication such as using a PIN. In this paper, the security token developed as an embedded system and tile user authentication system implemented and tested using fingerprints information are described. Communications between the security token and tile host are tested and verified with USB. And, execution time and runtime memory on tile security token board was measured and performance improvement was described. In addition, requisites for the transit from the security token to the match-on-card was mentioned.

Vulnerability and Security Requirement Analysis on Security Token and Protection Profile Development based on Common Criteria Version 3.1 (보안토큰의 취약성/보안요구사항 분석 및 CC v3.1 기반 보호프로파일 개발)

  • Kwak, Jin;Hong, Soon-Won;Yi, Wan-Suck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.139-150
    • /
    • 2008
  • Recently, financial institutes and industrial companies are adopted to security token such as OTP, smart card, and USB authentication token and so on for secure system management and user authentication. However, some research institutes have been introduced security weaknesses and problems in security tokens. Therefore, in this paper, we analyses of security functions and security requirements in security token performed by analyses of standardization documents, trends, security problems, attack methods for security tokens. Finally, we propose a CC v.3.1 based security token protection profile.

Secure Tethering Method through Enhanced Authentication for Mobile Communication (향상된 인증기법을 통한 안전한 모바일 테더링 기법)

  • Park, Tae-Sung;Kim, Sung-Yoon;Jun, Moon-Seog
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.81-84
    • /
    • 2010
  • 테더링 서비스(Tethering Service)는 인터넷에 연결된 모바일 장비가 스스로 중계기 역할을 하여 주변의 테더링을 사용하는 장비에 인터넷 접속을 가능케 하는 서비스이다. 즉, 별도의 모무선 모뎀 없이 이동전화를 PC나 휴대기기에 연결해 언제 어디서든 무선 인터넷을 이용할 수 있도록 하는 것이다. 이러한 테더링은 방식에 따라 블루투스, USB 케이블 연결, 무선랜 등이 사용되고 있으며, 이용자들은 스마트 단말기에 노트북 PC를 연결하여 인터넷 서비스를 이용한다. 테더링은 최근 OS3.0이 탑재되어 출시된 스마트 단말기에 테더링 기능이 지원되면서 관심이 급증하고 있다. 그러나 이러한 테더링의 확산은 유저들 사이에선 스마트 단말기 해킹 사이트를 통해 무료로 테더링 서비스를 이용할 수 있는 방법들이 유포되고 있으며, 부적절한 접속 방식으로 인해 사용자가 아닌 다른 유저한테 과금이 청구되는 사례도 있다. 테더링 통신 과정 중 거치는 장비들의 정보를 조작, 변조, 삭제 등이 가능하다. 따라서 본 논문에서는 무선 테더링에서의 상호인증을 통한 안전한 테더링 기법을 제안한다.

  • PDF

A Study of Secure Client System with HVA(High Value Asset) (HVA를 이용한 안전한 클라이언트 시스템 연구)

  • Park, Jae-kyung;Kim, Young-Ga;Lee, Hyung-Su
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.455-456
    • /
    • 2018
  • 본 논문에서는 기존의 클라이언트 서버 환경에서 해킹에 취약한 구조를 개선하고자 새로운 형태의 클라이언트 서버 환경을 제안한다. 서버 측에는 기존의 웹 서버를 클라이언트 측으로 내려서 클라이언트가 필요한 데이터 만을 전달하는 방식으로 서버에 웹 공격 자체가 이루어질 수 없는 구조를 제안한다. 이를 통해 기존의 서버가 해킹을 당해 악성코드를 유포하고 서버의 데이터를 해킹하는 문제를 완전히 차단할 수 있음은 물론 클라이언트 PC에 악성코드가 감염되어도 서버에는 여향을 미치지 않는 새로운 패러다임을 제시하고자 한다. 본 논문에서는 클라이언트 측에 USB형태의 BBS(Big Bad Stick) 하드웨어를 통하여 제안하는 환경을 검증하고 서버 측의 보안장비와의 암호화 통신을 통해 안전한 서비스가 제공됨을 증명하여 본 연구가 새로운 보안성을 갖춘 시스템임을 보인다.

  • PDF

Design and Implementation of Secure Document Loss Prevention System by Real-Time Storage Device Packet Analysis (실시간 저장장치 패킷분석을 통한 안전한 문서 유출 방지 시스템의 설계 및 구현)

  • Kim, Hyun-Min;Kim, Su-Hyun;Lee, Sun-Ho;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1217-1220
    • /
    • 2010
  • 휴대용 저장장치의 발달로 인하여 많은 보안상의 문제점들이 나타나고 있으며, 특히 공공기관 혹은 기업체 내에서 USB메모리 등 보조기억매체를 활용한 정보유출이 갈수록 증가하고 있다. 이에 따라 본 논문에서는 전송이 허가된 문서에 인증패킷의 삽입 후 실시간 패킷분석을 이용하여 휴대용 저장장치로 전송하는 문서의 이동경로 확인 및 허가되지 않은 문서들에 대한 제어가 가능하도록 시스템을 제안하게 되었다.

Secure Management Method for Private Key using Smartphon's Information (스마트폰 고유정보를 이용한 안전한 개인키 관리 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.90-96
    • /
    • 2016
  • The 3390 million people, around 83% of the adult population in Korea use smartphone. Although the safety problem of the certificate has been occurred continuously, most of these users use the certificate. These safety issues as a solution to 'The owner of a mobile phone using SMS authentication technology', 'Biometric authentication', etc are being proposed. but, a secure and reliable authentication scheme has not been proposed for replace the certificate yet. and there are many attacks to steal the certificate and private key. For these reasons, security experts recommend to store the certificate and private key on usb flash drive, security tokens, smartphone. but smartphones are easily infected malware, an attacker can steal certificate and private key by malicious code. If an attacker snatchs the certificate, the private key file, and the password for the private key password, he can always act as valid user. In this paper, we proposed a safe way to keep the private key on smartphone using smartphone's unique information and user password. If an attacker knows the user password, the certificate and the private key, he can not know the smart phone's unique information, so it is impossible to use the encrypted private key. Therefore smartphone user use IT service safely.

Passwordless Protection for Private Key Using USIM Information (USIM 정보를 활용한 패스워드리스 방식의 개인키 보호 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.32-38
    • /
    • 2017
  • Despite the opinion that certificate is useless, half of the population in Korea (approx. 35 million) get an certificate, and use it for internet banking, internet shopping, stock trading, and so on. Most users store their certificates on a usb memory or smartphone, and certificates or passwords stored on such storage media can be easily attacked and used to disguise as legitimate users. Due to these security problem of certificate, a various authentication technologies has been proposed such as smartphone owner authentication using SMS, and a personal authentication using biometric authentication. However, a safe technique is not presented yet without user password, and certificate. In this paper, I proposed a method to secure certificate/private key without a user password using a combination of USIM card and smartphone's information. Even if a hacker gets the user password, the certificate, and the private key, he can not use the certificate. User do not need to remember complex password which is a combination of alphabetic / numeric / special characters, and use his certificate safely.