바로가기메뉴

본문 바로가기 주메뉴 바로가기

Study on the Connection with Public Authentication and Bio Authentication

Journal of The Korea Internet of Things Society / Journal of The Korea Internet of Things Society, (P)2799-4791;
2015, v.1 no.1, pp.39-44
https://doi.org/10.20465/kiots.2015.1.1.039
Ryu, Gab-Sang

Abstract

Organization is increasing the authorizing process to use public certificate and bio information. Certificate, has evolved to be able to parallel distributes the bio authentication and portable bio-authentication device. Authentication using an individual's PC and smart devices continue to generalize, while convenience for authentication is increased by comparison Study on cooperation with the security at the network level's a weak situation. If ask authentication method through the cooperation of the public certificate and bio information work with current network access control, there is a possibility to develop a more powerful security policy. by cooperation weaknesses against vulnerable personal authentication techniques on security token in a reliable and secure personal authentication techniques, such as bio-recognition, Bio Information for identification and to prevent exposing a methodology suggest to validate whether or not to carry out in this paper. In addition, organize the scenario that can work with the 802.1x network authentication method, and presented a proposal aimed at realization.

keywords
사물인터넷, 공인인증서, 바이오인증, 정보보호

Reference

1.

Weilin Xu. (2010). 802.1x relay: A new model for authentication of nat-enabled router . Circuits,Communications and System (PACCS), 2010 Second Pacific-Asia Conference on.

2.

Tae-Yoon Kim. An Efficient user authentication method in PKI system based on 802.1x.

3.

Hyun-Suk Choi. Information Security in IEEE 802.1x Wireless LAN.

4.

In Bum Kim. (2010). A Study on Enforce the Policy of User Certification in Public Certificate System. Journal of information and security, 10(4), 69-76.

5.

Junghyun Lee. (2010). A Study on Certificate-based Personal Authentification System for Preventing Private Information Leakage through Internet. Journal of information and security, 10(4), 1-11.

6.

Kyoung-Soon Hong. (2011). Accessibility Evaluation of Accredited Certificate Subscriber Software. The Journal of the Korea Contents Association, 11, 240-253.

7.

Sun-Woo Park. (2012). Security Analysis on Digital Signature Function Implemented in Electronic Documents Software. Journal of the Korean Institute of Information Security and Cryptology, 22(5), 945-957.

8.

9.

Changhyun No. Study on the application of HSM to GPKI digital certification system.

10.

Hanna Choi. (2009). Improved Security for Fuzzy Fingerprint Vault Using Secret Sharing over a Security Token and a Server. Journal of the Korean Institute of Information Security and Cryptology, 19(1), 63-70.

11.

Yong-Nyuo Shin. (2012). Privacy Preserving User Authentication Using Biometric Hardware Security Module. Journal of Korean institute of information technology, 22(2), 347-3556.

12.

ISO/IEC 24761-Security techniques-ACBio, Authentication Context for Biometrics.

13.

Yong-Nyuo Shin. (2011). Operational Management for Biometrics Hardware Security Module and PKI. Journal of Korean institute of information technology, 9(51), 207-216.

14.

Hyo-Bin Lee. Watermarking technique for biometric images security.

15.

Yooyoung Lee. (2007). Conformance Test Suite for CBEFF Biometric Information Records . Theory, Applications, and Systems, 2007. BTAS 2007.

Journal of The Korea Internet of Things Society