DOI QR코드

DOI QR Code

Smartphone User Authentication Algorithm based on Mutual Cooperation in Mobile Environment

모바일 환경에서 상호 협력 기반 스마트폰 사용자 인증 알고리즘

  • Received : 2017.03.21
  • Accepted : 2017.03.28
  • Published : 2017.07.31

Abstract

As the number of smartphone users increases, vulnerability to privacy protection is increasing. This is because personal information is stored on various servers connected to the Internet and the user is authenticated using the same ID and password. Authentication methods such as OTP, FIDO, and PIN codes have been introduced to solve traditional authentication methods, but their use is limited for authentication that requires sharing with other users. In this paper, we propose the authentication method that is needed for the management of shared information such as hospitals and corporations. The proposed algorithm is an algorithm that can authenticate users in the same place in real time using smart phone IMEI, QR code, BLE, push message. We propose an authentication algorithm that can perform user authentication through mutual cooperation using a smart phone and can cancel realtime authentication. And we designed and implemented a mutual authentication system using proposed algorithm.

스마트폰 이용자가 증가함에 따라서 개인정보 보호에 대한 취약점이 증가하고 있다. 개인의 정보를 인터넷에 연결된 여러 서버에 저장하고 동일한 아이디와 비밀번호를 이용하여 인증하는 경우가 많기 때문이다. 전통적인 인증방식을 해결하기 위해 OTP, FIDO, PIN 코드 등의 인증 방식이 도입되었지만 타 사용자와의 공유가 필요한 인증에는 사용이 제한적이다. 본 논문에서는 병원, 기업과 같이 공용으로 정보를 관리하는 곳에서 필요로 하는 인증방식을 제안하였다. 제안한 알고리즘은 스마트폰 IMEI, QR 코드, BLE, 푸쉬 메시지를 이용하여 같은 장소에 있는 사용자끼리 실시간으로 인증을 진행할 수 있는 알고리즘이다. 스마트폰을 이용하여 상호 협력을 통하여 사용자 인증을 진행할 수 있고, 실시간 인증 취소가 가능한 인증 알고리즘을 제안하고 상호 협력 인증 시스템을 설계 및 구현하였다.

Keywords

References

  1. Smartphone Ownership and Internet Usage Continues to Climb in Emerging Economies [Internet]. Available: http://www.pewglobal.org/2016/02/22/smartphone-ownership-and-internet-usage-continues-to-climb-in-emerging-eco nomies/.
  2. S. J. Oh, "A Cross-cultural Study on the Perception Types of Korean and American Users of Smartphone," Journal of the Korean society for Wellness, vol. 11, no. 3, pp. 1-21, Aug. 2016.
  3. S. J. Kim, "Information Security Plan on Cloud Computing - Information Security Management System," Korean Review of Management Consulting, vol. 1, no. 2, pp. 194- 208, Aug. 2010.
  4. H. T. Chae, and S. J. Lee, "Security Policy Proposals through PC Security Solution Log Analysis - Prevention Leakage of Personal Information," Journal of the Korea Institute of Information Security & Cryptology, vol. 24, no. 5, pp. 961-968, Oct. 2014. https://doi.org/10.13089/JKIISC.2014.24.5.961
  5. S. R. Cho, D. S. Choi, S. H. Jin, and H. H. Lee, "Passwordless Authentication Technology-FIDO," Electronics and Telecommunications Trends, vol. 29, no. 4, pp. 101-109, Aug. 2014.
  6. J. Y. Lee, and S. Y. Kang, "Design and Verification of the Integrated Log Analysis System for Enterprise Information Security," Journal of Digital Contents Society, vol. 9, no. 3, pp. 491-498, Sep. 2008.
  7. Y. J. Jeun, "The Medical Information Protection and major Issues," Journal of the Korea Society of Computer and Information, vol. 17, no. 12, pp. 251-258, Dec. 2012. https://doi.org/10.9708/jksci/2012.17.12.251
  8. U. J. Lee, H. Y. Park, and H. C. Shin, "Implementation of a Bluetooth-LE Based Wireless ECG/EMG/PPG Monitoring Circuit and System," Journal of The Institute of Electronics and Information Engineers, vol. 51, no. 6, pp. 261-268, June 2014. https://doi.org/10.5573/ieie.2014.51.6.261
  9. J. H. Park, "A Research on Expansion of Library Service by Using QR Code," Journal of Korean Library and Information Science Society, vol. 43, no. 1, pp. 321-347, Mar. 2012. https://doi.org/10.16981/kliss.43.1.201203.321
  10. S. J. Kim, "Secure Management Method for Private Key using Smartphon's Information," Journal of the Korean Contents Association, vol. 16, no. 8, pp. 90-96, Aug. 2016. https://doi.org/10.5392/JKCA.2016.16.08.090