在韩国使用多层显示器的简单的基于位置的认证方法

kwangjong ahn, June-Suh Cho
{"title":"在韩国使用多层显示器的简单的基于位置的认证方法","authors":"kwangjong ahn, June-Suh Cho","doi":"10.24052/JBRMR/V13IS04/ART-24","DOIUrl":null,"url":null,"abstract":"The importance of selecting an environment appropriate authentication method is the most crucial decision in designing secure systems. In particular, authentication such as login process is more considering with security threat. This paper introduces the method of location-based authentication using multi-layer display which is the ability to authenticate pc and mobile users based on location-based information they would carry out anyway. The system generates authentication information on multi-layer display by users’ current location information captured by smartphones, PCs, time, and weather information to authenticate users. We develop a simple model and application for how to perform location-based authentication, which is working on the multi-layer display, describe the benefits of our method. Our preliminary findings support that this is a meaningful approach, whether used to increase usability or increase security and simplicity. Corresponding author: June-Suh Cho Email addresses for the corresponding author: jscho@hufs.ac.kr First submission received: 12th April 2019 Revised submission received: 6th May 2019 Accepted: 20th May 2019 Acknowledgement This study was supported by Hankuk University of Foreign Studies Research Fund of 2019. Introduction All the time, security is a major issue in all area including the private and public sector. In particular, authentication such as login process is more considering with security threat. Past years, authentication and authorization can be accomplished in many ways. The importance of selecting an environment appropriate authentication and authorization methods are the most crucial decision in designing secure systems. Each authentication method has advantages and disadvantages in terms of security, usability, and breadth of support. Password-based authentication methods, however, do not provide strong security and their use is not recommended. It is recommended that you use a certificate-based authentication method for all network access methods that support the use of certificates. Mobile devices, such as Smartphones, are more and more used by Internet users for different services including social network services, online shopping, entertainment, etc. User authentication with ID & Password on such devices is not user-friendly and does not offer secure authentication for users. User authentication can be handled using one or more different authentication methods. Some authentication methods such as plain ID/password authentication are easily implemented but are in general weak and primitive. The fact that plain password authentication it is still by far the most widely used form of authentication, gives credence to the seriousness of the lack of security on the Internet, mobile, and within private networks. Journal of Business and Retail Management Research (JBRMR), Vol. 13 Issue 4 July 2019 www.jbrmr.com A Journal of the Academy of Business and Retail Management (ABRM) 257 Other authentication methods may be more complex and require more time to implement and maintain, provide strong and reliable authentication (provided one keeps its secrets secret, i.e. private keys and phrases). That being said, one of the key factors to be considered in determining which method of authentication to implement is usability. The usability factor cannot be ignored when designing authentication systems. If the authentication methods are not deemed usable by those forced to utilize them, then they will avoid using the system or persistently try to bypass them. Usability is a key issue. In Korea, various personal authentication methods are used. Especially, since it has a public certificate issued by an authorized institution such as a bank or government agency that has increased safety, it is used more than ID and password for most personal authentication, and it is required to be used in PC or mobile. However, in order to increase safety, certificates are often required to be updated and renewed, and there is a period of use, which is inconvenient for users. Also, we use public certificates as personal certificates, which are made ActiveX based, which provides security and usability inconveniences. In this paper, to solve this inconvenience, we propose a method to securely authenticate a person without using a public certificate by using location information. As the use of mobile phones increases, discussions about personal authentication of mobile phones will continue and will become even more important. The proposed method can be used on both pc and mobile phone. This paper presents a simple location-based authentication method and system where the method generates authentication information by users’ current location information captured by smartphones, PC, time, and weather information to authenticate users. Background So far, Authentication and authorization are two of the most important security features for pc as well as mobile transaction systems. With the development of the IT industry, information that can identify an individual is essential for everyday activities such as personal financial transactions, individual and corporate contracts, and transactions, and individual and individual contracts. Recently, researchers are interested in location-based authentication to improve security. (Jaros & Kuchta, 2010; Jaros & Kuchta, 2011) (Cho et al., 2006; Hachiya & Bandai, 2013) introduced a system which is a location-based authentication using space dependent information such as service set identifier (SSID) from WLAN access points. (Albayram et al., 2014) proposed a location-based authentication system which builds a location profile for a user based on periodically logged Wi-Fi access point beacons over time and leverages this location. Also, (Li & Bours, 2018) proposed a method to authenticate the user by using WiFi and accelerometer data collected. (Takamizawa & Kaijiri, 2009) proposed and designed an authentication method using location information obtained from mobile telephones that is suitable in web-based education applications. (Jansen & Korolev, 2009) designed a location-based authentication mechanism that involves policy beacons and mobile devices. These policy beacons broadcast and communicate location data to mobile devices using Bluetooth. (Lenzini et al, 2008) analyzed how location information can be used to strengthen access control mechanisms by adding features for defining and enforcing locationbased policies. In general, there are five common authentication methods including Password and PIN-based authentication, SMS based authentication, Symmetric-key authentication, Public-key authentication, and Biometric authentication. First, Password and PIN-based authentication are using a password or Personal Identification Number (PIN) to login is the most common knowledge-based (something you know) authentication method. Second, SMS based authentication is used as a delivery channel for a one-time password (OTP) generated by an information system. The user receives a password through the message shown in the cell phone and enters the password to complete the authentication. Third, Symmetric-key authentication is that user shares a unique, secret key with an authentication server in symmetric key authentication. The user may be required to send a randomly generated message encrypted by the secret key to the authentication server. If the server can match the received encrypted message using its shared secret key, the user is authenticated. A slight variation of this approach is the use Journal of Business and Retail Management Research (JBRMR), Vol. 13 Issue 4 July 2019 www.jbrmr.com A Journal of the Academy of Business and Retail Management (ABRM) 258 of OTP tokens, which generate the OTP on the user side for matching with that generated on the server side. Fourth, Public-key authentication is that Public-key cryptography provides an authentication method that uses a private and public key pair. A private key is kept secretly by the user, while the corresponding public key is commonly embedded in a certificate digitally signed by a certification authority. The certificate is made available to others. Finally, Biometric authentication is a method by which a person's authentication information is generated by digitizing measurements of a physiological or behavioral characteristic. Biometric authentication verifies the user's claimed identity by comparing an encoded value with a stored value of the concerned biometric characteristic. (Mahbub et al., 2016) Biometric recognition is largely studied in computer science. The use of biometric techniques, such as the face, fingerprints, iris, and ears are a solution for obtaining a secure personal authentication method. (Yang & Nanni, 2013) (Ninassi et al., 2018) proposed a method using fingerprint and behavioral biometrics to enhance the security of user authentication. The behavior when entering a pattern-based authentication on the smartphone touch screen is considered as a fast and usable solution for users. The names of countries around the world are slightly different, but they give their numbers to individuals for identification. That is, a personal identification number is assigned for the purpose of providing tax administration services such as social security programs such as pensions and taxation. The United States gives the Social Security Number (SSN), the United Kingdom the National Insurance Number (NIN), and Australia gives the taxpayer the Tax File Number (TFN). Although these numbers are issued for specific administrative services such as welfare or taxation, they have the function of identifying individuals, such as the Korean resident registration number, and they are actually used as such functions. In the United States, public institutions and corporate sites, except financial sites, can be used only by inputting their name, birthday, address, etc. without a clear authentication system. It is diff","PeriodicalId":236465,"journal":{"name":"Journal of Business & Retail Management Research","volume":"118 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"The simple location-based authentication method using multi-layer display in Korea\",\"authors\":\"kwangjong ahn, June-Suh Cho\",\"doi\":\"10.24052/JBRMR/V13IS04/ART-24\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The importance of selecting an environment appropriate authentication method is the most crucial decision in designing secure systems. In particular, authentication such as login process is more considering with security threat. This paper introduces the method of location-based authentication using multi-layer display which is the ability to authenticate pc and mobile users based on location-based information they would carry out anyway. The system generates authentication information on multi-layer display by users’ current location information captured by smartphones, PCs, time, and weather information to authenticate users. We develop a simple model and application for how to perform location-based authentication, which is working on the multi-layer display, describe the benefits of our method. Our preliminary findings support that this is a meaningful approach, whether used to increase usability or increase security and simplicity. Corresponding author: June-Suh Cho Email addresses for the corresponding author: jscho@hufs.ac.kr First submission received: 12th April 2019 Revised submission received: 6th May 2019 Accepted: 20th May 2019 Acknowledgement This study was supported by Hankuk University of Foreign Studies Research Fund of 2019. Introduction All the time, security is a major issue in all area including the private and public sector. In particular, authentication such as login process is more considering with security threat. Past years, authentication and authorization can be accomplished in many ways. The importance of selecting an environment appropriate authentication and authorization methods are the most crucial decision in designing secure systems. Each authentication method has advantages and disadvantages in terms of security, usability, and breadth of support. Password-based authentication methods, however, do not provide strong security and their use is not recommended. It is recommended that you use a certificate-based authentication method for all network access methods that support the use of certificates. Mobile devices, such as Smartphones, are more and more used by Internet users for different services including social network services, online shopping, entertainment, etc. User authentication with ID & Password on such devices is not user-friendly and does not offer secure authentication for users. User authentication can be handled using one or more different authentication methods. Some authentication methods such as plain ID/password authentication are easily implemented but are in general weak and primitive. The fact that plain password authentication it is still by far the most widely used form of authentication, gives credence to the seriousness of the lack of security on the Internet, mobile, and within private networks. Journal of Business and Retail Management Research (JBRMR), Vol. 13 Issue 4 July 2019 www.jbrmr.com A Journal of the Academy of Business and Retail Management (ABRM) 257 Other authentication methods may be more complex and require more time to implement and maintain, provide strong and reliable authentication (provided one keeps its secrets secret, i.e. private keys and phrases). That being said, one of the key factors to be considered in determining which method of authentication to implement is usability. The usability factor cannot be ignored when designing authentication systems. If the authentication methods are not deemed usable by those forced to utilize them, then they will avoid using the system or persistently try to bypass them. Usability is a key issue. In Korea, various personal authentication methods are used. Especially, since it has a public certificate issued by an authorized institution such as a bank or government agency that has increased safety, it is used more than ID and password for most personal authentication, and it is required to be used in PC or mobile. However, in order to increase safety, certificates are often required to be updated and renewed, and there is a period of use, which is inconvenient for users. Also, we use public certificates as personal certificates, which are made ActiveX based, which provides security and usability inconveniences. In this paper, to solve this inconvenience, we propose a method to securely authenticate a person without using a public certificate by using location information. As the use of mobile phones increases, discussions about personal authentication of mobile phones will continue and will become even more important. The proposed method can be used on both pc and mobile phone. This paper presents a simple location-based authentication method and system where the method generates authentication information by users’ current location information captured by smartphones, PC, time, and weather information to authenticate users. Background So far, Authentication and authorization are two of the most important security features for pc as well as mobile transaction systems. With the development of the IT industry, information that can identify an individual is essential for everyday activities such as personal financial transactions, individual and corporate contracts, and transactions, and individual and individual contracts. Recently, researchers are interested in location-based authentication to improve security. (Jaros & Kuchta, 2010; Jaros & Kuchta, 2011) (Cho et al., 2006; Hachiya & Bandai, 2013) introduced a system which is a location-based authentication using space dependent information such as service set identifier (SSID) from WLAN access points. (Albayram et al., 2014) proposed a location-based authentication system which builds a location profile for a user based on periodically logged Wi-Fi access point beacons over time and leverages this location. Also, (Li & Bours, 2018) proposed a method to authenticate the user by using WiFi and accelerometer data collected. (Takamizawa & Kaijiri, 2009) proposed and designed an authentication method using location information obtained from mobile telephones that is suitable in web-based education applications. (Jansen & Korolev, 2009) designed a location-based authentication mechanism that involves policy beacons and mobile devices. These policy beacons broadcast and communicate location data to mobile devices using Bluetooth. (Lenzini et al, 2008) analyzed how location information can be used to strengthen access control mechanisms by adding features for defining and enforcing locationbased policies. In general, there are five common authentication methods including Password and PIN-based authentication, SMS based authentication, Symmetric-key authentication, Public-key authentication, and Biometric authentication. First, Password and PIN-based authentication are using a password or Personal Identification Number (PIN) to login is the most common knowledge-based (something you know) authentication method. Second, SMS based authentication is used as a delivery channel for a one-time password (OTP) generated by an information system. The user receives a password through the message shown in the cell phone and enters the password to complete the authentication. Third, Symmetric-key authentication is that user shares a unique, secret key with an authentication server in symmetric key authentication. The user may be required to send a randomly generated message encrypted by the secret key to the authentication server. If the server can match the received encrypted message using its shared secret key, the user is authenticated. A slight variation of this approach is the use Journal of Business and Retail Management Research (JBRMR), Vol. 13 Issue 4 July 2019 www.jbrmr.com A Journal of the Academy of Business and Retail Management (ABRM) 258 of OTP tokens, which generate the OTP on the user side for matching with that generated on the server side. Fourth, Public-key authentication is that Public-key cryptography provides an authentication method that uses a private and public key pair. A private key is kept secretly by the user, while the corresponding public key is commonly embedded in a certificate digitally signed by a certification authority. The certificate is made available to others. Finally, Biometric authentication is a method by which a person's authentication information is generated by digitizing measurements of a physiological or behavioral characteristic. Biometric authentication verifies the user's claimed identity by comparing an encoded value with a stored value of the concerned biometric characteristic. (Mahbub et al., 2016) Biometric recognition is largely studied in computer science. The use of biometric techniques, such as the face, fingerprints, iris, and ears are a solution for obtaining a secure personal authentication method. (Yang & Nanni, 2013) (Ninassi et al., 2018) proposed a method using fingerprint and behavioral biometrics to enhance the security of user authentication. The behavior when entering a pattern-based authentication on the smartphone touch screen is considered as a fast and usable solution for users. The names of countries around the world are slightly different, but they give their numbers to individuals for identification. That is, a personal identification number is assigned for the purpose of providing tax administration services such as social security programs such as pensions and taxation. The United States gives the Social Security Number (SSN), the United Kingdom the National Insurance Number (NIN), and Australia gives the taxpayer the Tax File Number (TFN). Although these numbers are issued for specific administrative services such as welfare or taxation, they have the function of identifying individuals, such as the Korean resident registration number, and they are actually used as such functions. In the United States, public institutions and corporate sites, except financial sites, can be used only by inputting their name, birthday, address, etc. without a clear authentication system. It is diff\",\"PeriodicalId\":236465,\"journal\":{\"name\":\"Journal of Business & Retail Management Research\",\"volume\":\"118 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-02-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Business & Retail Management Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.24052/JBRMR/V13IS04/ART-24\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Business & Retail Management Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24052/JBRMR/V13IS04/ART-24","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

在设计安全系统时,选择适合环境的身份验证方法是最重要的决策。特别是,登录过程等身份验证更需要考虑安全威胁。本文介绍了一种基于多层显示的基于位置的身份验证方法,该方法是基于pc和移动用户随时可能进行的位置信息进行身份验证的能力。系统通过智能手机、个人电脑捕捉到的用户当前位置信息、时间信息、天气信息,在多层显示屏上生成认证信息,对用户进行认证。我们开发了一个简单的模型和应用程序来实现基于位置的身份验证,这是在多层显示器上工作的,描述了我们的方法的好处。我们的初步发现支持这是一种有意义的方法,无论是用于提高可用性还是提高安全性和简单性。通讯作者:jun - suh Cho通讯作者电子邮件地址:jscho@hufs.ac.kr首次提交:2019年4月12日修改收到:2019年5月6日接受:2019年5月20日致谢本研究由韩国外国语大学2019年研究基金资助。一直以来,安全是包括私营和公共部门在内的所有领域的一个主要问题。特别是,登录过程等身份验证更需要考虑安全威胁。过去几年,身份验证和授权可以通过多种方式完成。在设计安全系统时,选择环境合适的身份验证和授权方法是最重要的决策。每种身份验证方法在安全性、可用性和支持广度方面各有优缺点。但是,基于密码的身份验证方法不能提供强大的安全性,因此不建议使用。对于所有支持使用证书的网络访问方式,建议使用基于证书的认证方式。移动设备,如智能手机,越来越多的互联网用户用于不同的服务,包括社交网络服务,网上购物,娱乐等。在这些设备上使用ID和Password进行用户身份验证并不友好,也不能为用户提供安全的身份验证。用户身份验证可以使用一种或多种不同的身份验证方法来处理。一些身份验证方法,如普通ID/密码身份验证,很容易实现,但通常是弱的和原始的。纯密码身份验证是迄今为止使用最广泛的身份验证形式,这一事实证明了在Internet、移动设备和专用网络中缺乏安全性的严重性。商业和零售管理研究杂志(JBRMR),第13卷第4期2019年7月www.jbrmr.com商业和零售管理学会杂志(ABRM) 257其他认证方法可能更复杂,需要更多的时间来实现和维护,提供强大和可靠的认证(前提是保密其秘密,即私钥和短语)。话虽如此,在确定要实现哪种身份验证方法时要考虑的关键因素之一是可用性。在设计认证系统时,可用性因素是不容忽视的。如果那些被迫使用身份验证方法的人认为这些方法不可用,那么他们将避免使用系统或不断尝试绕过它们。可用性是一个关键问题。在韩国,个人身份验证的方式多种多样。特别是,它拥有银行或政府机关等授权机构颁发的公共证书,因此安全性得到了提高,因此,在大多数个人身份验证中,它的使用比ID和密码更多,而且需要在PC或移动设备上使用。但是,为了增加安全性,证书往往需要更新和续签,并且有使用期限,给用户带来不便。此外,我们使用公共证书作为个人证书,这些证书是基于ActiveX制作的,提供了安全性和可用性方面的不便。为了解决这一问题,本文提出了一种不使用公共证书的方法,即利用位置信息对个人进行安全认证。随着手机使用的增加,关于手机个人认证的讨论将继续,并将变得更加重要。该方法可以在pc机和手机上同时使用。本文提出了一种简单的基于位置的认证方法和系统,该方法通过智能手机、PC机捕捉到的用户当前位置信息、时间和天气信息生成认证信息,对用户进行认证。到目前为止,身份验证和授权是pc和移动交易系统最重要的两个安全特性。 没有明确的认证制度。这很难。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
The simple location-based authentication method using multi-layer display in Korea
The importance of selecting an environment appropriate authentication method is the most crucial decision in designing secure systems. In particular, authentication such as login process is more considering with security threat. This paper introduces the method of location-based authentication using multi-layer display which is the ability to authenticate pc and mobile users based on location-based information they would carry out anyway. The system generates authentication information on multi-layer display by users’ current location information captured by smartphones, PCs, time, and weather information to authenticate users. We develop a simple model and application for how to perform location-based authentication, which is working on the multi-layer display, describe the benefits of our method. Our preliminary findings support that this is a meaningful approach, whether used to increase usability or increase security and simplicity. Corresponding author: June-Suh Cho Email addresses for the corresponding author: jscho@hufs.ac.kr First submission received: 12th April 2019 Revised submission received: 6th May 2019 Accepted: 20th May 2019 Acknowledgement This study was supported by Hankuk University of Foreign Studies Research Fund of 2019. Introduction All the time, security is a major issue in all area including the private and public sector. In particular, authentication such as login process is more considering with security threat. Past years, authentication and authorization can be accomplished in many ways. The importance of selecting an environment appropriate authentication and authorization methods are the most crucial decision in designing secure systems. Each authentication method has advantages and disadvantages in terms of security, usability, and breadth of support. Password-based authentication methods, however, do not provide strong security and their use is not recommended. It is recommended that you use a certificate-based authentication method for all network access methods that support the use of certificates. Mobile devices, such as Smartphones, are more and more used by Internet users for different services including social network services, online shopping, entertainment, etc. User authentication with ID & Password on such devices is not user-friendly and does not offer secure authentication for users. User authentication can be handled using one or more different authentication methods. Some authentication methods such as plain ID/password authentication are easily implemented but are in general weak and primitive. The fact that plain password authentication it is still by far the most widely used form of authentication, gives credence to the seriousness of the lack of security on the Internet, mobile, and within private networks. Journal of Business and Retail Management Research (JBRMR), Vol. 13 Issue 4 July 2019 www.jbrmr.com A Journal of the Academy of Business and Retail Management (ABRM) 257 Other authentication methods may be more complex and require more time to implement and maintain, provide strong and reliable authentication (provided one keeps its secrets secret, i.e. private keys and phrases). That being said, one of the key factors to be considered in determining which method of authentication to implement is usability. The usability factor cannot be ignored when designing authentication systems. If the authentication methods are not deemed usable by those forced to utilize them, then they will avoid using the system or persistently try to bypass them. Usability is a key issue. In Korea, various personal authentication methods are used. Especially, since it has a public certificate issued by an authorized institution such as a bank or government agency that has increased safety, it is used more than ID and password for most personal authentication, and it is required to be used in PC or mobile. However, in order to increase safety, certificates are often required to be updated and renewed, and there is a period of use, which is inconvenient for users. Also, we use public certificates as personal certificates, which are made ActiveX based, which provides security and usability inconveniences. In this paper, to solve this inconvenience, we propose a method to securely authenticate a person without using a public certificate by using location information. As the use of mobile phones increases, discussions about personal authentication of mobile phones will continue and will become even more important. The proposed method can be used on both pc and mobile phone. This paper presents a simple location-based authentication method and system where the method generates authentication information by users’ current location information captured by smartphones, PC, time, and weather information to authenticate users. Background So far, Authentication and authorization are two of the most important security features for pc as well as mobile transaction systems. With the development of the IT industry, information that can identify an individual is essential for everyday activities such as personal financial transactions, individual and corporate contracts, and transactions, and individual and individual contracts. Recently, researchers are interested in location-based authentication to improve security. (Jaros & Kuchta, 2010; Jaros & Kuchta, 2011) (Cho et al., 2006; Hachiya & Bandai, 2013) introduced a system which is a location-based authentication using space dependent information such as service set identifier (SSID) from WLAN access points. (Albayram et al., 2014) proposed a location-based authentication system which builds a location profile for a user based on periodically logged Wi-Fi access point beacons over time and leverages this location. Also, (Li & Bours, 2018) proposed a method to authenticate the user by using WiFi and accelerometer data collected. (Takamizawa & Kaijiri, 2009) proposed and designed an authentication method using location information obtained from mobile telephones that is suitable in web-based education applications. (Jansen & Korolev, 2009) designed a location-based authentication mechanism that involves policy beacons and mobile devices. These policy beacons broadcast and communicate location data to mobile devices using Bluetooth. (Lenzini et al, 2008) analyzed how location information can be used to strengthen access control mechanisms by adding features for defining and enforcing locationbased policies. In general, there are five common authentication methods including Password and PIN-based authentication, SMS based authentication, Symmetric-key authentication, Public-key authentication, and Biometric authentication. First, Password and PIN-based authentication are using a password or Personal Identification Number (PIN) to login is the most common knowledge-based (something you know) authentication method. Second, SMS based authentication is used as a delivery channel for a one-time password (OTP) generated by an information system. The user receives a password through the message shown in the cell phone and enters the password to complete the authentication. Third, Symmetric-key authentication is that user shares a unique, secret key with an authentication server in symmetric key authentication. The user may be required to send a randomly generated message encrypted by the secret key to the authentication server. If the server can match the received encrypted message using its shared secret key, the user is authenticated. A slight variation of this approach is the use Journal of Business and Retail Management Research (JBRMR), Vol. 13 Issue 4 July 2019 www.jbrmr.com A Journal of the Academy of Business and Retail Management (ABRM) 258 of OTP tokens, which generate the OTP on the user side for matching with that generated on the server side. Fourth, Public-key authentication is that Public-key cryptography provides an authentication method that uses a private and public key pair. A private key is kept secretly by the user, while the corresponding public key is commonly embedded in a certificate digitally signed by a certification authority. The certificate is made available to others. Finally, Biometric authentication is a method by which a person's authentication information is generated by digitizing measurements of a physiological or behavioral characteristic. Biometric authentication verifies the user's claimed identity by comparing an encoded value with a stored value of the concerned biometric characteristic. (Mahbub et al., 2016) Biometric recognition is largely studied in computer science. The use of biometric techniques, such as the face, fingerprints, iris, and ears are a solution for obtaining a secure personal authentication method. (Yang & Nanni, 2013) (Ninassi et al., 2018) proposed a method using fingerprint and behavioral biometrics to enhance the security of user authentication. The behavior when entering a pattern-based authentication on the smartphone touch screen is considered as a fast and usable solution for users. The names of countries around the world are slightly different, but they give their numbers to individuals for identification. That is, a personal identification number is assigned for the purpose of providing tax administration services such as social security programs such as pensions and taxation. The United States gives the Social Security Number (SSN), the United Kingdom the National Insurance Number (NIN), and Australia gives the taxpayer the Tax File Number (TFN). Although these numbers are issued for specific administrative services such as welfare or taxation, they have the function of identifying individuals, such as the Korean resident registration number, and they are actually used as such functions. In the United States, public institutions and corporate sites, except financial sites, can be used only by inputting their name, birthday, address, etc. without a clear authentication system. It is diff
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信