• Title/Summary/Keyword: Web Identity

Search Result 128, Processing Time 0.032 seconds

A Method of Digital Signature Using FIDO2 CTAP (FIDO2 CTAP을 활용한 전자서명 방법)

  • Cho, Han-koo;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1049-1062
    • /
    • 2019
  • The national accredited certificate is a user certificate issued based on the user's personal information, which has been identified in advance, and has become a universal authentication method used for most electronic financial transactions and user authentication. And it contributed a lot to the use of e-government and domestic service. However, due to the lack of web standards on how to use, it was inconvenient to install a separate plug-in, and efforts to improve it have been continued. In this paper, we attempt to solve the problem of certificate usage environment by presenting the certificate digital signature method using the extension of the FIDO2 (Fast Identity Online v2) client to authentication protocol (CTAP) specification.

Measurement of Remediation for Compromised User Account of Web Single Sign-On (SSO) (침해된 웹 SSO 계정 보호를 위한 보안 조치 실험 연구)

  • Nam, Ji-Hyun;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.941-950
    • /
    • 2021
  • Single Sign-On (SSO) service manages user's account passwords from multiple websites so that security in a high level is required. Users who use the SSO service are authenticated through the Identity Provider (IdP) when logging into the website. We present the security requirements that IdP can take in order to minimize the user's risk whose IdP account is compromised. We describe the security threats that arise when the security requirements are not satisfied. Through evaluation, we prove that the attacker's session cannot be canceled even if the user recognizes the attack if the IdP does not satisfy the security requirements.

On Securing Web-based Educational Online Gaming: Preliminary Study

  • Yani, Kadek Restu;Prihatmanto, Ary Setijadi;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.767-770
    • /
    • 2015
  • With the deployment of web-based educational game over the internet, the user's registration becomes a critical element. The user is authenticated by the system using username, password, and unique code. However, it cannot be handled properly because the data is transmitted through insecure channel on the network. Hence, security requirement is needed to avoid identity leakage from malicious user. In this paper, we propose a secure communication approach using SSL protocol for an online game. We also describe the security requirements for our approach. In future work, we intend to configure and implement the SSL protocol by enabling HTTPS in web-based online game.

Going Wilde: Prendick, Montgomery and Late-Victorian Homosexuality in The Island of Doctor Moreau

  • Canadas, Ivan
    • Journal of English Language & Literature
    • /
    • v.56 no.3
    • /
    • pp.461-485
    • /
    • 2010
  • The present paper focuses on a specific aspect of H. G. Wells' The Island of Doctor Moreau (1896), namely the issue of homosexuality, particularly as it concerns Prendick, the novel's primary narrator, and Montgomery, Moreau's assistant on the island, both of whom are implicitly associated with homosexual identity-and suggested to represent various forms of repression or acceptance-their personalities, or psyche, explored in relation to other characters on Moreau's island, particularly the Beast Folk, as well as Doctor Moreau and his treatment of the creatures as an allegory of Victorian anti-sodomy legislation and its most celebrated victim, Oscar Wilde, who had been convicted for male sodomy in 1895, only months prior to the original publication of The Island of Doctor Moreau. In addition, this paper examines an extensive series of allusions to Oscar Wilde and to late-Victorian homosexual scandals, including that author's own conviction, allusions to others involved in the affair-some of which involve situational/plot analogies, while others involve echoes or semantic associations between the names of characters in Moreau and historical figures-as well as allusions and parallels involving the most recognizably biographical of Wilde's works, The Picture of Dorian Gray (1890). The deliberate, complex web of allusions and ironic implications of homosexuality, presented in this essay, thus, expands considerably upon existing scholarly work on a range of matters concerning homosexual identity and conduct within the context of social conventions and legislation in the late-Victorian period, as well as more broadly, in scientific and humanistic terms. In this respect, one key aspect of this essay is the exploration of the novel's setting of Noble's Island, which, among other things, includes topographical allusions to nineteenth-century scientific theories of anatomical anomalies in pederasts-namely those of the eminent French forensic medical scientist, Ambroise Tardieu (1818-1879), whose underlying framework of physiological adaptation, moreover, intersected with the scientific interests of Wells and of his protagonist. Beyond this, it is shown that, in Moreau, there is as a web of allusions to homosexual practice and those same anomalies, involving the character of Montgomery and his name.

Design of Military Information System User Authentication System Using FIDO 2.0-based Web Browser Secure Storage (FIDO 2.0 기반의 웹 브라우저 안전 저장소를 이용하는 군 정보체계 사용자 인증 시스템 설계 및 구현)

  • Park, Jaeyeon;Lee, Jaeyoung;Lee, Hyoungseok;Kang, Jiwon;Kwon, Hyukjin;Shin, Dongil;Shin, Dongkyoo
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.43-53
    • /
    • 2019
  • Recently, a number of military intranet infiltrations suspected of North Korea have been discovered. There was a problem that a vulnerability could occur due to the modification of user authentication data that can access existing military information systems. In this paper, we applied mutual verification technique and API (Application Programming Interface) forgery / forgery blocking and obfuscation to solve the authentication weakness in web browsers that comply with FIDO (Fast IDentity Online) standard. In addition, user convenience is improved by implementing No-Plugin that does not require separate program installation. Performance tests show that most browsers perform about 0.1ms based on the RSA key generation rate. In addition, it proved that it can be used for commercialization by showing performance of less than 0.1 second even in the digital signature verification speed of the server. The service is expected to be useful for improving military information system security as an alternative to browser authentication by building a web secure storage.

A Study on the Identification of fake Estimate Service using DID (분산신원증명 기술을 활용한 허위 부동산 매물정보 검출에 관한 연구)

  • Moon, Jeong-Kyung;Kim, Jin-Mook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.649-651
    • /
    • 2021
  • In recent years, O2O services for real estate sales are widely distributed in web platforms and apps. This allows sellers, buyers, and real estate brokers to quickly and conveniently conduct real estate sales and charter contracts. However, in the O2O-based real estate sales information system, it wastes time and money for real estate buyers due to the posting of fake information, partial correction of the sales information, and intentional non-posting of the sales information. Therefore, we propose a method of detecting the false or not of real estate property information that can occur on the web platform, and design and implement a proposal system for this. To this end, we propose a method of detecting personal identity and property information based on DID, a distributed identity authentication protocol. The false real estate sales information detection system proposed by us can determine the existence of real estate sales information, partially correct the false sales information, or prove whether or not intentionally unpublished in three steps.

  • PDF

Understanding and Applicability of Identity-in-practice Theory (실행 과정에서의 정체성 이론의 이해와 적용 방안)

  • Kim, Jong-Uk;Kim, Chan-Jong
    • Journal of The Korean Association For Science Education
    • /
    • v.41 no.3
    • /
    • pp.267-281
    • /
    • 2021
  • The shift in the perspective on learning as participation draws attention to learners' identity work. This manuscript foregrounds the ongoing and fluid processes of identity, and focuses on the structure surrounding learners where identity work occurs and the expression of individual agency. From the perspective of learning as participation, we introduce Holland et al. (1998) identity-in-practice theory, as the theoretical lens that dialectically describes structure, agency and identity. The concepts representing this theory are 'figured world', 'positionality' and 'authoring self'. The figured world is a web of meaning encompassing the continuous construct/reconstruct through human actions and also exerts as the social force that shapes human actions. 'Positionality' on the other hand, means an understanding of one's social position in the world. The notion of 'authoring self', is a dimension that synthesizes the above two concepts, which describes the improvisation of one's self through the orchestration and collaboration of various social voices. Next, we analyzed and described various cases of this theory that we found within the scope of science education. However, due to the nature of this theory, which takes a sociocultural approach, international research studies cannot be simply applied to the Korean context. Therefore, we sought to expand the applicability of this theory as a methodological tool, by discussing the directions in which this theory can be used in a domestic context. It is intended that the introduction of this theory, which emphasizes multi-layered, continuous and cumulative identity work, will be used as a resource to further expand the horizon of science education reform that is required for the times.

A Study on the information architecture and menu design in the type of web sites (웹사이트의 유형 분류에 따른 정보 설계 및 메뉴디자인의 특성 연구)

  • 배윤선;이현주
    • Archives of design research
    • /
    • v.16 no.1
    • /
    • pp.241-250
    • /
    • 2003
  • With the increasing number and variety of internet users as well as the development of internet technology, web contents have been taking a more comprehensive, integrated, and practical form. This change has brought to our attention the importance of the information architecture and menu design, both of which are required for the users to navigate vast amount of data promptly, correctly and easily for effective communication in the web sites. In this study, web sites were categorized by the service levels provided to the users, and sampling was performed accordingly. Then, information architecture, the layout and the presentation of the menu design were analyzed. The result of the analysis show that there are distinguishable characteristics in how the menus were expressed and designed, and that these characteristics reflect the users' characteristics in the web interface menu design. With the result of this study, we present a guideline for information architecture and web interface menu design, which reflects user characteristics thereby strengthening usability. Using this guideline, we expect the development of web interface design which should support more efficient communication on the web.

  • PDF

The Study on Color Image Analysis According to Web Site Types (웹 사이트 유형별 색채이미지 분석에 관한 연구)

  • Youn, KyoungSook;Ryu, NamHoon;Kim, EungKon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.668-674
    • /
    • 2008
  • When various kinds of contents are developed in accordance with higher rate of Internet use to have quality conditions, added values can be elevated in genuinely strong power of Internet. As soon as visiting web site on Internet, men are invited to visit corresponding information web site by a variety of techniques and colors. The visual expression is thought to be important, and color plans of web designs play an important role. This is because the color decides on images of web design to transfer sense as an important element. The paper selected colors by each type of web site and investigated color images. The purpose of the paper is to classify local web sites by each type, for instance, identity, information/community, entertainment, shopping and learning, etc and to suggest directions of color image plan by each type of web site.

  • PDF

The Reliable Communication Method for Self-Sovereign Identity Ecosystems (자기주권 신원 생태계를 위한 신뢰할 수 있는 통신 방법)

  • Chio, Gyu Hyun;Kim, Geun-Hyung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2022
  • With the recent increase in interest in metaverse in which virtual and physical spaces are digitally fused, many activities in physical spaces are expected to take place in web-based virtual spaces. Therefore, there is a need for research on a self-sovereign identity system that can secure privacy and mutual trust in a DID(decentralized identifier)-based virtual space environment. We, in this paper, developed and validated a reliable communication method consisting of DIDComm messages, a procedure for generating distributed identifiers, asymmetric keys, and DID documents based on Hyperledger Indy and DIDComm open sources. The developed communication method can be applied to verify each other by exchanging additional information and verifiable credentials for trust among communication participants.