题名

行動電腦之視覺化身分鑑定研究

并列篇名

A Visual-based Authentication Scheme in Wireless Carry-on Mobile Device Systems

DOI

10.29767/ECS.200809.0003

作者

王旭正(Shiuh-Jeng Wang);張淯閎(Yu-Hong Chang);林曾祥(Jen-Shen Lin);林宜萱(I-Shen Lin)

关键词

身份鑑定 ; 視覺密碼學 ; 鑑定流程 ; 智慧卡 ; Authentication ; Law enforcement ; Wireless carry-on mobile device ; Smart card

期刊名称

Electronic Commerce Studies

卷期/出版年月

6卷3期(2008 / 09 / 30)

页次

320 - 352

内容语文

繁體中文

中文摘要

在本論文研究中,我們提出導入視覺化身分鑑定流程於行動電腦,並以Law Enforcement資訊系統為範例,實際說明鑑定流程的建置過程,並且在無線通訊傳輸環境下,進行安全性分析。而視覺化多重身份鑑定以視覺密碼學為基礎,將分享圖分別儲存於使用者的儲存設備及組織的資料庫中,當雙方持有之影像進行疊合時,即可解密取得資料,同時,並將分享圖用於結合產生時戳與隨機值,可達到確認合法使用者與存取組織真實性的雙重身分鑑定功能。相較於其他以密碼金鑰為基礎之鑑定方式,視覺化多重身分鑑定可達到減少計算成本、簡化鑑定管理、資料權限分級、及減少因人員疏忽使密碼外洩的情形發生等優點。而實際應用上,我們利用智慧卡做為媒介,並建入視覺密碼系統,做為未來連線存取資源之依據。

英文摘要

In this paper, we propose a visual authentication scheme that can be implemented in the mobile systems with the user identity authentication requests. In order to make clear the contributions we did in this paper, following our proposed scheme, an example with a law enforcement case presented to persuade the implementations feasible in wireless carry-on mobile device systems. In our scheme, basically, the shares are separately stored at two sides of user-end and data base of the system side. As long as the two right shared held at the two sides are stacked, the key-important secret is immediately gained. We also give the time stamp and random seed parameters when stacking the shares to succeed the authentication requests for a legitimate user. Compared to the past researches, the cost reduction, more flexible management, secret hierarchy, and easy access control in members and passwords are further offered in this paper study. Besides, the smart card is a key-bridge to make the system operation available whenever the identity authentication is requested, where pre-information is read from the smart card first, the system is then launched the next steps in our scheme.

主题分类 基礎與應用科學 > 資訊科學
社會科學 > 經濟學
参考文献
  1. ANSI/IEEE Std 802.11, 1999 Edition(R2003)(1999).Information technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements—Part 11: Wireless LAN Medium Access Control(MAC)and Physical Layer(PHY)Specifications.
  2. C.N. Yang ,T.S. Chen ,M. H. Ching,(2006)."Embed Additional Private Information into Two-dimensional Bar Codes by the Visual Secret Sharing Scheme,".Integrated Computer-Aided Engineering,2,189-199.
  3. G. Voyatzis ,I. Pitas,(1996)."Applications of Toral Automorphisms in Image Watermarking,".Proceedings of IEEE International Conference of Image Processing,2,237-240.
  4. Hou, Y.C.(2003)."Visual Cryptography for Color Images,".Pattern Recognition,36,1619-1629.
  5. IEEE Std 802.11i-2004,(2004).IEEE Standard for Information Technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements Part11:Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) Specifications Amendment6:Medium Access Control(MAC) Security Enhancements,.
  6. IEEE Std 802.1X-2001,(2001).IEEE Standard for Local and metropolitan area networks Port-Based Network Access Control.
  7. M C.C. Chang ,J. C. Chuang,(2002)."An Image Intellectual Property Protection Scheme for Gray-level Images Using Visual Secret Sharing Strategy,".Pattern Recognition Letters,23,931-941.
  8. M. Burrows, ,M. Abadi ,R. Needham,(1990)."A Logic of Authentication," ACM Trans.Computer System,1,18-36.
  9. Naor M. Shamir,,A.(1994).Springer-Verlag:Lecture Notes in Computer Science.
  10. S. Xu, ,G. Zhang ,H. Zhu,(1997)."On the Properties of Cryptographic Protocols and the Weaknesses of BAN-like Logics,".ACM SIGOPS Operating Systems Review,31,12-23.
  11. Wang, S.J. , Kuo C.H. , Yang, C.H.(2005).International Conference of Information Management (ICIM'2005).Taiwan:Fu Jen Catholic University.