• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ½º¸¶Æ®Æù°ú ½º¸¶Æ®¿öÄ¡¸¦ È°¿ëÇÑ »ç¿ëÀÚ ÀÎÁõ ±â¹ý
¿µ¹®Á¦¸ñ(English Title) User Authentication Method Using Smartphone and Smartwatch
ÀúÀÚ(Author) ¼­È­Á¤   Hwa-jeong Seo  
¿ø¹®¼ö·Ïó(Citation) VOL 21 NO. 11 PP. 2109 ~ 2114 (2017. 11)
Çѱ۳»¿ë
(Korean Abstract)
°³ÀÎ ½Äº° ¹øÈ£´Â °³ÀÎÈ­µÈ ±×¸®°í »ó¾÷ÀûÀÎ ¼­ºñ½º »ó¿¡¼­ÀÇ »ç¿ëÀÚ ÀÎÁõ¿¡ °¡Àå º¸ÆíÀûÀ¸·Î »ç¿ëµÇ´Â ±â¼úÀÌ´Ù. µû¶ó¼­ »ç¿ëÀÚ´Â ÀÚ½ÅÀÌ »ç¿ëÇÏ°íÀÚ ÇÏ´Â ¼­ºñ½º¿¡ Á¢±ÙÇÒ ¶§ PIN Á¤º¸¸¦ ÀÔ·ÂÇÏ°í »ç¿ëÀÚ ÀÎÁõÀ» ¼öÇàÇØ¾ß ÇÑ´Ù. ÇÏÁö¸¸ °³ÀÎ ½Äº° ¹øÈ£ ÀԷ°úÁ¤Àº »ç¿ëÀÚ°¡ ¸Å¹ø ÀÔ·ÂÀ» ÇØ¾ß ÇÏ´Â ºÎ´ã°¨À» ÁÙ »Ó ¾Æ´Ï¶ó °ø°ÝÀÚ°¡ ¾î±ú³Ê¸Ó°ø°ÝÀ» ½ÃµµÇÒ °æ¿ì º¸¾ÈÀÌ Ãë¾àÇØ Áö´Â ¹®Á¦Á¡À» °¡Áö°í ÀÖ´Ù. ÀÌ·¯ÇÑ ¹®Á¦Á¡À» ÇØ°áÇϱâ À§ÇØ ½º¸¶Æ®Æù°ú ½º¸¶Æ®¿öÄ¡¸¦ ÀÌ¿ëÇÑ ÀÎÁõ ±â¹ýÀ» ¼Ò°³ÇÑ´Ù. ¸ÕÀú ±âÁ¸ÀÇ ±â¹ý¿¡¼­ ½º¸¶Æ®¿öÄ¡ÀÇ ¼¾¼­ Á¤º¸¸¸À» ÅëÇØ ºÐ¼®ÇÏ´Â °æ¿ìÀÇ ¹®Á¦Á¡¿¡ ´ëÇÏ¿© È®ÀÎÇغ¸¾Ò´Ù. À̸¦ ¹ÙÅÁÀ¸·Î ½º¸¶Æ®Æù°ú ½º¸¶Æ®¿öÄ¡ ¸ðµÎ¿¡¼­ »ç¿ëÀÚÀÇ ¼¾¼­ Á¤º¸¸¦ ¼öÁýÇÏ°í À̸¦ ÅëÇØ ÀÎÁõÇÏ´Â ¹æ¹ýÀ» Á¦¾ÈÇÏ¿´´Ù. ¸¸¾à °üÂûµÈ °¡¼Óµµ ¼¾¼­ Á¤º¸°¡ ³ôÀº ¿¬°ü¼ºÀ» º¸ÀÌ°Ô µÉ °æ¿ì »ç¿ëÀÚ ÀÎÁõÀÌ ¼º°øÀûÀ¸·Î ÀÌ·ç¾îÁö°Ô µÈ´Ù. ÀÎÁõ ±â¹ý¿¡ ´ëÇÑ Å×½ºÆ®¸¦ À§ÇØ »ï¼º °¶·°½Ã ³ëÆ®5¿Í ¼Ò´Ï ½º¸¶Æ®¿öÄ¡2¸¦ »ç¿ëÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
Personal Identification Number (PIN) is the most common user-authentication method for the access control of private and commercial applications. The users need to enter PIN information to the applications whenever the users get access to the private services. However, the process imposes a burden on the users and is vulnerable to the potential shoulder-surfing attacks. In order to resolve both problems, we present a continuous authentication method for both smartphone and smartwatch, namely, synchronized authentication. First we analyze the previous smartwatch based authentication and point-out some shortcomings. In the proposed method, we verify the validity of user by analyzing the combined acceleration data of both smartphone and smartwatch. If the monitored sensor data shows the high correlations between them, the user is successfully authenticated. For the authentication test, we used the Samsung Galaxy Note5 and Sony Smartwatch2.
Å°¿öµå(Keyword) ÀÎÁõ   °³ÀÎ ½Äº° ¹øÈ£   °¡¼Óµµ ¼¾¼­   ½º¸¶Æ®Æù   ½º¸¶Æ®¿öÄ¡   Authentication   Personal Identification Number   Acceleration Sensor   Smartphone   Smartwatch  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå