Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)
ÇѱÛÁ¦¸ñ(Korean Title) |
½º¸¶Æ®ÆùÀ» ÀÌ¿ëÇÑ »ç¿ëÀÚ ÀÎÁõ ¸ÞÄ¿´ÏÁò |
¿µ¹®Á¦¸ñ(English Title) |
User Authentication Mechanism using Smartphone |
ÀúÀÚ(Author) |
Á¤Çʼº
Á¶¾çÇö
Pil-seong Jeong
Yang-hyun Cho
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 21 NO. 02 PP. 0301 ~ 0308 (2017. 02) |
Çѱ۳»¿ë (Korean Abstract) |
½º¸¶Æ®ÆùÀÇ ´ëÁßÈ¿Í ÀÎÅͳÝÀÇ ¹ßÀüÀ¸·Î ¸¹Àº »ç¶÷µéÀÌ ½º¸¶Æ®ÆùÀ» ÀÌ¿ëÇÏ¿© º»ÀÎÈ®ÀÎ ÀÎÁõÀýÂ÷¸¦ ÁøÇàÇÑ´Ù. ½º¸¶Æ®ÆùÀ» ÀÌ¿ëÇÏ¸é °³ÀÎ¿ë µ¥½ºÅ©Å¾ ÄÄÇ»Å͸¦ ÀÌ¿ëÇÏ´Â »óȲº¸´Ù ½±°í ºü¸£°Ô ÀÎÁõÀÌ °¡´ÉÇϱ⠶§¹®ÀÌ´Ù. ÇÏÁö¸¸ ÀÎÅÍ³Ý ÇØÅ· ±â¼ú°ú ¾Ç¼ºÄÚµå ¹èÆ÷ ±â¼úÀÌ ºü¸£°Ô ÁøÈÇÏ°í °ø°ÝÇüŵµ ´õ ´Ù¾çÇØÁü¿¡ µû¶ó¼ ¸ð¹ÙÀÏ È¯°æ¿¡ ÀûÇÕÇÑ ÀÎÁõ¹æ¹ýÀÌ ¿ä±¸µÇ°í ÀÖ´Ù. ÀÎÁõ¹æ¹ýÀ¸·Î´Â ¼ÒÁö±â¹Ý ÀÎÁõ, Áö½Ä±â¹Ý ÀÎÁõ, »ýü±â¹Ý ÀÎÁõ, ÆÐÅϱâ¹Ý ÀÎÁõ, ´ÙÁß¿ä¼Ò ÀÎÁõ µîÀÇ ¹æ¹ýÀÌ ÀÖ´Ù. º» ³í¹®¿¡¼´Â ½º¸¶Æ®ÆùÀ» ÀÌ¿ëÇÏ¿© ¼öÁý °¡´ÉÇÑ Á¤º¸¸¦ ÀÎÁõ¿ä¼Ò·Î È°¿ëÇÏ´Â »ç¿ëÀÚ ÀÎÁõ ¸ÞÄ¿´ÏÁòÀ» Á¦¾ÈÇÑ´Ù. Á¦¾È ÀÎÁõ ¸ÞÄ¿´ÏÁòÀ» »ç¿ëÇÏ¸é º»ÀÎÀÇ ½º¸¶Æ®Æù Á¤º¸ ¹× ȯ°æÁ¤º¸¸¦ ¼û±è ÀÎÁõ¿ä¼Ò·Î È°¿ëÇÏ¿© ŸÀο¡°Ô ³ëÃâÀÌ ¾ÈµÈ »óÅ¿¡¼ ÀÎÁõ°úÁ¤À» ÁøÇàÇÒ ¼ö ÀÖ´Â ÀåÁ¡ÀÌ ÀÖ´Ù. Á¦¾È ÀÎÁõ ¸ÞÄ¿´ÏÁòÀ» ÀÌ¿ëÇÑ »ç¿ëÀÚ ÀÎÁõ ½Ã½ºÅÛÀ» ±¸ÇöÇÏ¿© Àû¿ë¼º, ÆíÀǼº, º¸¾È¼ºÀ» ±âÁØÀ¸·Î È¿¿ë¼ºÀ» Æò°¡ÇÏ¿´´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
With the popularization of smart phones and the development of the Internet, many people use smart phones to conduct identity verification procedures. smart phones are easier and faster to authenticate than personal desktop computers. However, as Internet hacking technology and malicious code distribution technology rapidly evolve and attack types become more diverse, authentication methods suitable for mobile environment are required. As authentication methods, there are methods such as possessive-based authentication, knowledge-based authentication, biometric-based authentication, pattern-based authentication, and multi-element authentication. In this paper, we propose a user authentication mechanism that uses collected information as authentication factor using smart phone. Using the proposed authentication mechanism, it is possible to use the smart phone information and environment information of the user as a hidden authentication factor, so that the authentication process can be performed without being exposed to others. We implemented the user authentication system using the proposed authentication mechanism and evaluated the effectiveness based on applicability, convenience, and security.
|
Å°¿öµå(Keyword) |
º¸¾È¿ä¼Ò
´ÙÁßÀÎÁõ
¼û±è¿ä¼Ò
½º¸¶Æ®Æù
½º¸¶Æ® ±â±â
Hidden Factor
Multi Factor
Security Factor
Smartphone
Smart Device
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|