• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document : 2 / 2

ÇѱÛÁ¦¸ñ(Korean Title) ¸ð¹ÙÀÏ È¯°æ¿¡¼­ »óÈ£ Çù·Â ±â¹Ý ½º¸¶Æ®Æù »ç¿ëÀÚ ÀÎÁõ ¾Ë°í¸®Áò
¿µ¹®Á¦¸ñ(English Title) Smartphone User Authentication Algorithm based on Mutual Cooperation in Mobile Environment
ÀúÀÚ(Author) Á¤Çʼº   Á¶¾çÇö   Pil-Seong Jeong   Yang-Hyun Cho  
¿ø¹®¼ö·Ïó(Citation) VOL 21 NO. 07 PP. 1393 ~ 1400 (2017. 07)
Çѱ۳»¿ë
(Korean Abstract)
½º¸¶Æ®Æù ÀÌ¿ëÀÚ°¡ Áõ°¡ÇÔ¿¡ µû¶ó¼­ °³ÀÎÁ¤º¸ º¸È£¿¡ ´ëÇÑ Ãë¾àÁ¡ÀÌ Áõ°¡ÇÏ°í ÀÖ´Ù. °³ÀÎÀÇ Á¤º¸¸¦ ÀÎÅͳݿ¡ ¿¬°áµÈ ¿©·¯ ¼­¹ö¿¡ ÀúÀåÇÏ°í µ¿ÀÏÇÑ ¾ÆÀ̵ð¿Í ºñ¹Ð¹øÈ£¸¦ ÀÌ¿ëÇÏ¿© ÀÎÁõÇÏ´Â °æ¿ì°¡ ¸¹±â ¶§¹®ÀÌ´Ù. ÀüÅëÀûÀÎ ÀÎÁõ¹æ½ÄÀ» ÇØ°áÇϱâ À§ÇØ OTP, FIDO, PIN ÄÚµå µîÀÇ ÀÎÁõ ¹æ½ÄÀÌ µµÀԵǾúÁö¸¸ Ÿ »ç¿ëÀÚ¿ÍÀÇ °øÀ¯°¡ ÇÊ¿äÇÑ ÀÎÁõ¿¡´Â »ç¿ëÀÌ Á¦ÇÑÀûÀÌ´Ù. º» ³í¹®¿¡¼­´Â º´¿ø, ±â¾÷°ú °°ÀÌ °ø¿ëÀ¸·Î Á¤º¸¸¦ °ü¸®ÇÏ´Â °÷¿¡¼­ ÇÊ¿ä·Î ÇÏ´Â ÀÎÁõ¹æ½ÄÀ» Á¦¾ÈÇÏ¿´´Ù. Á¦¾ÈÇÑ ¾Ë°í¸®ÁòÀº ½º¸¶Æ®Æù IMEI, QR ÄÚµå, BLE, Ǫ½¬ ¸Þ½ÃÁö¸¦ ÀÌ¿ëÇÏ¿© °°Àº Àå¼Ò¿¡ ÀÖ´Â »ç¿ëÀÚ³¢¸® ½Ç½Ã°£À¸·Î ÀÎÁõÀ» ÁøÇàÇÒ ¼ö ÀÖ´Â ¾Ë°í¸®ÁòÀÌ´Ù. ½º¸¶Æ®ÆùÀ» ÀÌ¿ëÇÏ¿© »óÈ£ Çù·ÂÀ» ÅëÇÏ¿© »ç¿ëÀÚ ÀÎÁõÀ» ÁøÇàÇÒ¼ö ÀÖ°í, ½Ç½Ã°£ ÀÎÁõ Ãë¼Ò°¡ °¡´ÉÇÑ ÀÎÁõ ¾Ë°í¸®ÁòÀ» Á¦¾ÈÇÏ°í »óÈ£ Çù·Â ÀÎÁõ ½Ã½ºÅÛÀ» ¼³°è ¹× ±¸ÇöÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
As the number of smartphone users increases, vulnerability to privacy protection is increasing. This is because personal information is stored on various servers connected to the Internet and the user is authenticated using the same ID and password. Authentication methods such as OTP, FIDO, and PIN codes have been introduced to solve traditional authentication methods, but their use is limited for authentication that requires sharing with other users. In this paper, we propose the authentication method that is needed for the management of shared information such as hospitals and corporations. The proposed algorithm is an algorithm that can authenticate users in the same place in real time using smart phone IMEI, QR code, BLE, push message. We propose an authentication algorithm that can perform user authentication through mutual cooperation using a smart phone and can cancel realtime authentication. And we designed and implemented a mutual authentication system using proposed algorithm.
Å°¿öµå(Keyword) º¸¾È   »óÈ£ Çù·Â   ½º¸¶Æ®Æù   ÀÎÁõ   Á¤º¸º¸È£   Certification   Information Security   Mutual Cooperation   Security   Smartphone  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå