Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
¿øÇü ½º¸¶Æ®Æù Àá±Ý ÆÐÅÏ ¹æ½Ä Á¦¾È |
¿µ¹®Á¦¸ñ(English Title) |
A proposal of Circular Lock Pattern Method on Smart phone |
ÀúÀÚ(Author) |
ÀÓÁö¿ì
À̽ÂÀç
Àå¿øÁØ
±ÇÇõµ¿
¼ÈÁ¤
Ji-woo Im
Seung-jay Lee
Won-jun Jang
Hyeok-dong Kwon
Hwa-jeong Seo
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 23 NO. 11 PP. 1471 ~ 1477 (2019. 11) |
Çѱ۳»¿ë (Korean Abstract) |
½º¸¶Æ®Æù¿¡´Â ÇöÀç ´Ù¾çÇÑ º¸¾È ¹æ½ÄÀÌ »ç¿ëµÇ°í ÀÖ´Ù. ±×Áß¿¡¼µµ ÇÉ ¹øÈ£¿Í ÆÐÅÏ Àá±Ý ¹æ½ÄÀº Ãʱ⠽º¸¶Æ®ÆùºÎÅÍ »ç¿ëµÇ¾úÀ» Á¤µµ·Î ¿À·¡ »ç¿ëµÇ¾ú´Ù. ÇÏÁö¸¸ ÆÐÅÏ Àá±Ý ¹æ½ÄÀº ¿À·¡ »ç¿ëµÈ ¸¸Å º¸¾ÈÀÌ Ãë¾àÇÏ´Ù. ÇÉ ¹øÈ£ ¹æ½ÄÀÇ º¸¾È °µµ°¡ ¾à°£ ³ôÀº Á¤µµ¶ó¸é ÆÐÅÏ Àá±Ý ¹æ½ÄÀº Áß°£ Á¤µµ¿¡ ±×Ä£´Ù. ±×·³¿¡µµ ¸¹Àº ½º¸¶Æ®Æù »ç¿ëÀÚµéÀº ÆÐÅÏ Àá±Ý ¹æ½ÄÀ» ÀÌ¿ëÇÏ°í Àִµ¥ ¾ÆÁ÷ »ýüº¸¾ÈÀ» Áö¿øÇÏÁö ¾Ê´Â ±âÁ¾À» »ç¿ëÇÏ´Â »ç¿ëÀÚ°¡ Àֱ⠶§¹®ÀÌ´Ù. »ýüº¸¾ÈÀ» Áö¿øÇÏÁö ¾Ê´Â ±âÁ¾¿¡¼ Á¦ÀÏ Æí¸®ÇÑ º¸¾È ¹æ½ÄÀº ÆÐÅÏ Àá±Ý ¹æ½ÄÀÌ´Ù. ±×·¯³ª ±âÁ¸ÀÇ ÆÐÅÏ Àá±Ý ¹æ½ÄÀº Shoulder surfing attack°ú Smudge attack¿¡ Ãë¾àÇÏ´Ù. µû¶ó¼ ÆÐÅÏ Àá±Ý ¹æ½ÄÀÇ Æí¸®¼ºÀ» À¯ÁöÇÏ¸é¼ µ¿½Ã¿¡ ±âÁ¸ ¹æ½ÄÀÇ Ãë¾àÁ¡À» ÇØ°áÇÏ´Â ¹æ½ÄÀ» Á¦¾ÈÇÏ°íÀÚ ÇÑ´Ù. Á¦¾ÈÇÏ´Â ¹æ½ÄÀº ȸ鿡 ¹èÄ¡µÇ´Â °¢°¢ÀÇ Á¡À» ¿øÇüÀ¸·Î ¹èÄ¡ÇÑ µÚ ¹«ÀÛÀ§·Î ¼ýÀÚ¸¦ ºÎ¿©ÇÏ´Â Àá±Ý ¹æ½ÄÀÌ´Ù. º» ¹æ½ÄÀ» µµÀÔÇÏ°Ô µÈ´Ù¸é ±âÁ¸ÀÇ Ãë¾àÁ¡À» »ó´çÈ÷ ÇØ°áÇÒ ¼ö ÀÖ´Ù. Áï, ±âÁ¸ÀÇ ÆÐÅÏ Àá±Ý ¹æ½Ä¿¡ ºñÇØ º¸¾È¼ºÀ» ³ôÀÏ ¼ö ÀÖ´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
Currently, there are various security methods in smart phone. Among them, pin number and pattern lock were used long as they were used from early smart phone. However, security is weak that much. The security of pin number is slightly high, but the security of conventional pattern lock remains moderate. However, the conventional pattern lock is still used by several people because of convenience. This is because some users¡¯ smart phones don¡¯t support biometric security. The most convenient security method for devices that don¡¯t support biometric security is pattern lock. However, this method is vulnerable to shoulder surfing attack and smudge attack. Therefore, we introduce random pattern lock that solves the vulnerability of the conventional pattern lock while maintaining the convenience of the pattern lock. This is a lock method that places each point placed on the screen in a circular shape and assigns a random number to it. Therefore, If this is introduced, It¡¯s expected to solve vulnerability.
|
Å°¿öµå(Keyword) |
º¸¾È Å°Æеå
¿øÇü
ÆÐÅÏ Àá±Ý
ÈÞ´ëÆù Àá±Ý
Cell phone Lock
Circle
Patten lock
Security keypad
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|