• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ¿øÇü ½º¸¶Æ®Æù Àá±Ý ÆÐÅÏ ¹æ½Ä Á¦¾È
¿µ¹®Á¦¸ñ(English Title) A proposal of Circular Lock Pattern Method on Smart phone
ÀúÀÚ(Author) ÀÓÁö¿ì   À̽ÂÀç   Àå¿øÁØ   ±ÇÇõµ¿   ¼­È­Á¤   Ji-woo Im   Seung-jay Lee   Won-jun Jang   Hyeok-dong Kwon   Hwa-jeong Seo  
¿ø¹®¼ö·Ïó(Citation) VOL 23 NO. 11 PP. 1471 ~ 1477 (2019. 11)
Çѱ۳»¿ë
(Korean Abstract)
½º¸¶Æ®Æù¿¡´Â ÇöÀç ´Ù¾çÇÑ º¸¾È ¹æ½ÄÀÌ »ç¿ëµÇ°í ÀÖ´Ù. ±×Áß¿¡¼­µµ ÇÉ ¹øÈ£¿Í ÆÐÅÏ Àá±Ý ¹æ½ÄÀº Ãʱ⠽º¸¶Æ®ÆùºÎÅÍ »ç¿ëµÇ¾úÀ» Á¤µµ·Î ¿À·¡ »ç¿ëµÇ¾ú´Ù. ÇÏÁö¸¸ ÆÐÅÏ Àá±Ý ¹æ½ÄÀº ¿À·¡ »ç¿ëµÈ ¸¸Å­ º¸¾ÈÀÌ Ãë¾àÇÏ´Ù. ÇÉ ¹øÈ£ ¹æ½ÄÀÇ º¸¾È °­µµ°¡ ¾à°£ ³ôÀº Á¤µµ¶ó¸é ÆÐÅÏ Àá±Ý ¹æ½ÄÀº Áß°£ Á¤µµ¿¡ ±×Ä£´Ù. ±×·³¿¡µµ ¸¹Àº ½º¸¶Æ®Æù »ç¿ëÀÚµéÀº ÆÐÅÏ Àá±Ý ¹æ½ÄÀ» ÀÌ¿ëÇÏ°í Àִµ¥ ¾ÆÁ÷ »ýüº¸¾ÈÀ» Áö¿øÇÏÁö ¾Ê´Â ±âÁ¾À» »ç¿ëÇÏ´Â »ç¿ëÀÚ°¡ Àֱ⠶§¹®ÀÌ´Ù. »ýüº¸¾ÈÀ» Áö¿øÇÏÁö ¾Ê´Â ±âÁ¾¿¡¼­ Á¦ÀÏ Æí¸®ÇÑ º¸¾È ¹æ½ÄÀº ÆÐÅÏ Àá±Ý ¹æ½ÄÀÌ´Ù. ±×·¯³ª ±âÁ¸ÀÇ ÆÐÅÏ Àá±Ý ¹æ½ÄÀº Shoulder surfing attack°ú Smudge attack¿¡ Ãë¾àÇÏ´Ù. µû¶ó¼­ ÆÐÅÏ Àá±Ý ¹æ½ÄÀÇ Æí¸®¼ºÀ» À¯ÁöÇϸ鼭 µ¿½Ã¿¡ ±âÁ¸ ¹æ½ÄÀÇ Ãë¾àÁ¡À» ÇØ°áÇÏ´Â ¹æ½ÄÀ» Á¦¾ÈÇÏ°íÀÚ ÇÑ´Ù. Á¦¾ÈÇÏ´Â ¹æ½ÄÀº È­¸é¿¡ ¹èÄ¡µÇ´Â °¢°¢ÀÇ Á¡À» ¿øÇüÀ¸·Î ¹èÄ¡ÇÑ µÚ ¹«ÀÛÀ§·Î ¼ýÀÚ¸¦ ºÎ¿©ÇÏ´Â Àá±Ý ¹æ½ÄÀÌ´Ù. º» ¹æ½ÄÀ» µµÀÔÇÏ°Ô µÈ´Ù¸é ±âÁ¸ÀÇ Ãë¾àÁ¡À» »ó´çÈ÷ ÇØ°áÇÒ ¼ö ÀÖ´Ù. Áï, ±âÁ¸ÀÇ ÆÐÅÏ Àá±Ý ¹æ½Ä¿¡ ºñÇØ º¸¾È¼ºÀ» ³ôÀÏ ¼ö ÀÖ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Currently, there are various security methods in smart phone. Among them, pin number and pattern lock were used long as they were used from early smart phone. However, security is weak that much. The security of pin number is slightly high, but the security of conventional pattern lock remains moderate. However, the conventional pattern lock is still used by several people because of convenience. This is because some users¡¯ smart phones don¡¯t support biometric security. The most convenient security method for devices that don¡¯t support biometric security is pattern lock. However, this method is vulnerable to shoulder surfing attack and smudge attack. Therefore, we introduce random pattern lock that solves the vulnerability of the conventional pattern lock while maintaining the convenience of the pattern lock. This is a lock method that places each point placed on the screen in a circular shape and assigns a random number to it. Therefore, If this is introduced, It¡¯s expected to solve vulnerability.
Å°¿öµå(Keyword) º¸¾È Å°Æе堠 ¿øÇü   ÆÐÅÏ Àá±Ý   ÈÞ´ëÆù Àá±Ý   Cell phone Lock   Circle   Patten lock   Security keypad  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå