• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö > Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ

Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ¸Ó½Å·¯´×À» ÀÌ¿ëÇÑ »ç¿ëÀÚ Çൿ ÀÎ½Ä ±â¹ÝÀÇ PIN ÀÔ·Â ±â¹ý ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) A Study of User Behavior Recognition-Based PIN Entry Using Machine Learning Technique
ÀúÀÚ(Author) Á¤Ã¢ÈÆ   Zayabaatar Dagvatur   Àå·æÈ£   ¾ç´ëÇå   ÀÌ°æÈñ   Changhun Jung   Zayabaatar Dagvatur   RhongHo Jang   DaeHun Nyang   KyungHee Lee  
¿ø¹®¼ö·Ïó(Citation) VOL 07 NO. 05 PP. 0127 ~ 0136 (2018. 05)
Çѱ۳»¿ë
(Korean Abstract)
ÀÌ ³í¹®¿¡¼­´Â ½º¸¶Æ®Æù¿¡¼­ »ç¿ëÀÚ ÀÎÁõ ÇÁ·ÎÅäÄÝ¿¡ ¸Ó½Å·¯´×À» »ç¿ëÇÏ´Â ±â¹ýÀ» Á¦¾ÈÇÑ´Ù. ¿ì¸®°¡ Á¦¾ÈÇÏ´Â ±â¹ýÀº »ç¿ëÀÚ°¡ PINÀ» ÀÔ·Â ÇÒ ¶§, PIN »Ó¸¸ ¾Æ´Ï¶ó Ãß°¡ÀûÀ¸·Î ½ºÅ©¸°À» ÅÍÄ¡ÇÏ´Â ½Ã°£ °£°Ý ¹× À§Ä¡¸¦ ÀÎÁõ Á¤º¸·Î ¼öÁýÇÏ¿© ½Äº°ÀÚ·Î »ç¿ëÇÏ´Â ±â¹ýÀÌ´Ù. ¸ÕÀú »ç¿ëÀÚ µî·Ï ´Ü°è¿¡¼­ ´Ù¼öÀÇ »ç¿ëÀÚ ÅÍÄ¡ ½Ã°£ ¹× À§Ä¡ µ¥ÀÌÅ͸¦ ¼öÁý ÇÑ ´ÙÀ½, ±× µ¥ÀÌÅÍ·Î ¸Ó½Å·¯´×À» ÀÌ¿ëÇÏ¿© ¸ðµ¨À» Á¦ÀÛÇÑ´Ù. ±×¸®°í »ç¿ëÀÚ ÀÎÁõ ´Ü°è¿¡¼­ »ç¿ëÀÚ°¡ ÀÔ·ÂÇÑ PINÀ» ºñ±³ÇÏ°í, PINÀÌ ÀÏÄ¡ÇÏ¸é »ç¿ëÀÚÀÇ ÅÍÄ¡ ½Ã°£ ¹× À§Ä¡ µ¥ÀÌÅ͸¦ ¸ðµ¨¿¡ ÀÔ·ÂÇÏ¿© ±âÁ¸¿¡ ¼öÁýÇÑ µ¥ÀÌÅÍ¿Í °Å¸®¸¦ ºñ±³ÇÏ¿©, ±×¿¡ µû¶ó ÀÎÁõ ¼º°ø ¿©ºÎ°¡ °áÁ¤µÈ´Ù. ¿ì¸®´Â »ç¿ë¼º ½ÇÇè°ú º¸¾È¼º ½ÇÇèÀ» ÅëÇÏ¿© ÀÌ ±â¹ýÀ» »ç¿ëÇϴµ¥ Å« ºÒÆíÀÌ ¾ø´Ù´Â °Í(FRR : 0%)°ú, ÀÌÀüÀÇ »ç¿ëµÇ°í ÀÖ´ø PIN ÀÔ·Â ±â¹ýº¸´Ù ¾ÈÀüÇÏ´Ù´Â °Í(FAR : 0%)À» º¸¿´°í, ±×¿¡ µû¶ó ÃæºÐÈ÷ »ç¿ëµÉ ¼ö ÀÖ´Â ±â¹ýÀ̶ó´Â °ÍÀ» È®ÀÎÇÏ¿´´Ù. ¶ÇÇÑ ¼ñ´õ ¼­ÇÎ °ø°Ý ½ÇÇèÀ» ÅëÇÏ¿© PINÀÌ À¯ÃâµÇ¾îµµ º¸¾È »ç°í°¡ ¹ß»ýÇϱâ Èûµé´Ù´Â °Í(FAR : 5%)À» È®ÀÎÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
In this paper, we propose a PIN entry method that combines with machine learning technique on smartphone. We use not only a PIN but also touch time intervals and locations as factors to identify whether the user is correct or not. In the user registration phase, a remote server was used to train/create a machine learning model using data that collected from end-user device (i.e. smartphone). In the user authentication phase, the pre-trained model and the saved PIN was used to decide the authentication success or failure. We examined that there is no big inconvenience to use this technique (FRR: 0%) and more secure than the previous PIN entry techniques (FAR : 0%), through usability and security experiments, as a result we could confirm that this technique can be used sufficiently. In addition, we examined that a security incident is unlikely to occur (FAR: 5%) even if the PIN is leaked through the shoulder surfing attack experiments.
Å°¿öµå(Keyword) ½º¸¶Æ®Æù   ÀÎÁõ ÇÁ·ÎÅäÄÝ   »ç¿ëÀÚ Çൿ ÀνĠ  ¸Ó½Å·¯´×   ÇÉ   Smartphone   Authentication Protocol   User Behavior Recognition   Machine Learning   PIN  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå