DOI QR코드

DOI QR Code

Smartphone Security Using Fingerprint Password

다중 지문 시퀀스를 이용한 스마트폰 보안

  • 배경율 (상명대학교 소프트웨어대학 컴퓨터과학부)
  • Published : 2013.09.30

Abstract

Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

최근 모바일 디바이스와 휴대기기의 발달로 원격접속이 늘어남에 따라 보안의 중요성도 점차 증가되었다. 그러나 기존 패스워드나 패턴과 같은 보안 프로그램은 지나치게 단순할 뿐 아니라 다른 사용자가 쉽게 취득하여 악용할 수 있다는 단점이 있다. 생체인식을 활용한 보안 시스템은 보안성이 강화 되었지만 위조 및 변조가 가능하기 때문에 완전한 해결책을 제시하지 못한다. 본 논문에서는 이러한 문제점을 해결하기 위해 지문인식과 패스워드를 결합하여 보안성을 향상시킬 수 있는 방안을 연구하였다. 제안한 시스템은 하나의 지문이 아니라 다수의 지문을 이용하는 방법으로, 사용자가 패스워드를 입력할 때 여러 지문 중에서 정확한 지문의 순서를 제공하도록 한다. 오늘날 스마트폰은 패스워드나 패턴, 지문을 이용할 수 있지만 패스워드의 강도가 낮거나 패턴이 쉽게 노출되는 등의 문제가 있다. 반면에 제안한 시스템은 다양한 지문의 이용과 패스워드의 연계, 또는 다른 생체인식 시스템과 연결함으로써 매우 강력한 보안장치가 될 수 있다.

Keywords

References

  1. Bae, K. Y. and H. Byun, "Utilization of Fingerprint System in the Mobile E-Government," WORLD-COMPʼ 12, (2012), 557-583.
  2. Galbally, J., R. Cappelli, A. Lumini, D. Maltoni, and J. Fierrez, "Fake Fingertip Generation from a Minutiae Template," Pattern Recognition, ICPR2008(2008), 1-4.
  3. Ju, S. H. and H. S. Seo, "Password Based User Authentication Methodology using Multi-Input on Multi-Touch Environment," Transaction on The Korea Society for Simulation, Vol.20, No.1(2011), 39-49. https://doi.org/10.9709/JKSS.2011.20.1.039
  4. Korea Broadcasting and Communication Committee, '12 3rd Survey for Status of the Smart phone usage, Korea, 2011.
  5. Lee, P. J. and H. C. Moon, "Study on the Security of the Password System," Journal of Korea Communication and Information Security, Vol.1, No.1(1991), 109-118.
  6. Morris, R. and K. Thompson, "Password security : a case history," Communications of the ACM, Vol.22, No.11(1979), 594-597. https://doi.org/10.1145/359168.359172
  7. Park, J. S., How easy to trespass the lock of smart phone, Digital times, 2010. Available at http://www.dt.co.kr/contents.html?article_no=2010102802010351747002(Accessed 06 July, 2013).
  8. Pan, S. B., J. H. Moon, Y. W. Chung, and H. I. Kim, "Technology Trends of the Fingerprint Recognition," Electronics Telecommunication Trends, Vol.16, No.5(2011), 46-54.
  9. Thai, L. H. and H. N. Tam, "Fingerprint recognition using standardized fingerprint model," IJCSI International Journal of Computer Science Issues, Vol.7, Issue 3, No.7(2010), 11-17.
  10. Yoon, B. N. and H. S. Ban, "Information Security in the Public Field-Certificate Service in the Public Field," Journal The Korean Institute of Communications and Information Science, Vol.19, No.8(2002), 20-29.