• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document : 7 / 34 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) ½º¸¶Æ®ÆùÀ» ÀÌ¿ëÇÑ »ç¿ëÀÚ ÀÎÁõ ¸ÞÄ¿´ÏÁò
¿µ¹®Á¦¸ñ(English Title) User Authentication Mechanism using Smartphone
ÀúÀÚ(Author) Á¤Çʼº   Á¶¾çÇö   Pil-seong Jeong   Yang-hyun Cho  
¿ø¹®¼ö·Ïó(Citation) VOL 21 NO. 02 PP. 0301 ~ 0308 (2017. 02)
Çѱ۳»¿ë
(Korean Abstract)
½º¸¶Æ®ÆùÀÇ ´ëÁßÈ­¿Í ÀÎÅͳÝÀÇ ¹ßÀüÀ¸·Î ¸¹Àº »ç¶÷µéÀÌ ½º¸¶Æ®ÆùÀ» ÀÌ¿ëÇÏ¿© º»ÀÎÈ®ÀÎ ÀÎÁõÀýÂ÷¸¦ ÁøÇàÇÑ´Ù. ½º¸¶Æ®ÆùÀ» ÀÌ¿ëÇÏ¸é °³ÀÎ¿ë µ¥½ºÅ©Å¾ ÄÄÇ»Å͸¦ ÀÌ¿ëÇÏ´Â »óȲº¸´Ù ½±°í ºü¸£°Ô ÀÎÁõÀÌ °¡´ÉÇϱ⠶§¹®ÀÌ´Ù. ÇÏÁö¸¸ ÀÎÅÍ³Ý ÇØÅ· ±â¼ú°ú ¾Ç¼ºÄÚµå ¹èÆ÷ ±â¼úÀÌ ºü¸£°Ô ÁøÈ­ÇÏ°í °ø°ÝÇüŵµ ´õ ´Ù¾çÇØÁü¿¡ µû¶ó¼­ ¸ð¹ÙÀÏ È¯°æ¿¡ ÀûÇÕÇÑ ÀÎÁõ¹æ¹ýÀÌ ¿ä±¸µÇ°í ÀÖ´Ù. ÀÎÁõ¹æ¹ýÀ¸·Î´Â ¼ÒÁö±â¹Ý ÀÎÁõ, Áö½Ä±â¹Ý ÀÎÁõ, »ýü±â¹Ý ÀÎÁõ, ÆÐÅϱâ¹Ý ÀÎÁõ, ´ÙÁß¿ä¼Ò ÀÎÁõ µîÀÇ ¹æ¹ýÀÌ ÀÖ´Ù. º» ³í¹®¿¡¼­´Â ½º¸¶Æ®ÆùÀ» ÀÌ¿ëÇÏ¿© ¼öÁý °¡´ÉÇÑ Á¤º¸¸¦ ÀÎÁõ¿ä¼Ò·Î È°¿ëÇÏ´Â »ç¿ëÀÚ ÀÎÁõ ¸ÞÄ¿´ÏÁòÀ» Á¦¾ÈÇÑ´Ù. Á¦¾È ÀÎÁõ ¸ÞÄ¿´ÏÁòÀ» »ç¿ëÇÏ¸é º»ÀÎÀÇ ½º¸¶Æ®Æù Á¤º¸ ¹× ȯ°æÁ¤º¸¸¦ ¼û±è ÀÎÁõ¿ä¼Ò·Î È°¿ëÇÏ¿© ŸÀο¡°Ô ³ëÃâÀÌ ¾ÈµÈ »óÅ¿¡¼­ ÀÎÁõ°úÁ¤À» ÁøÇàÇÒ ¼ö ÀÖ´Â ÀåÁ¡ÀÌ ÀÖ´Ù. Á¦¾È ÀÎÁõ ¸ÞÄ¿´ÏÁòÀ» ÀÌ¿ëÇÑ »ç¿ëÀÚ ÀÎÁõ ½Ã½ºÅÛÀ» ±¸ÇöÇÏ¿© Àû¿ë¼º, ÆíÀǼº, º¸¾È¼ºÀ» ±âÁØÀ¸·Î È¿¿ë¼ºÀ» Æò°¡ÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
With the popularization of smart phones and the development of the Internet, many people use smart phones to conduct identity verification procedures. smart phones are easier and faster to authenticate than personal desktop computers. However, as Internet hacking technology and malicious code distribution technology rapidly evolve and attack types become more diverse, authentication methods suitable for mobile environment are required. As authentication methods, there are methods such as possessive-based authentication, knowledge-based authentication, biometric-based authentication, pattern-based authentication, and multi-element authentication. In this paper, we propose a user authentication mechanism that uses collected information as authentication factor using smart phone. Using the proposed authentication mechanism, it is possible to use the smart phone information and environment information of the user as a hidden authentication factor, so that the authentication process can be performed without being exposed to others. We implemented the user authentication system using the proposed authentication mechanism and evaluated the effectiveness based on applicability, convenience, and security.
Å°¿öµå(Keyword) º¸¾È¿ä¼Ò   ´ÙÁßÀÎÁõ   ¼û±è¿ä¼Ò   ½º¸¶Æ®Æù   ½º¸¶Æ® ±â±â   Hidden Factor   Multi Factor   Security Factor   Smartphone   Smart Device  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå