Skip to main content
Log in

2-Channel authentication technique using cardiac impulse based OTP

  • Short Contribution
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

As the obligatory use of Active-X and authentication certificate is recently abolished in the country, fintech technology newly receives the attention which enables the easy payment. But, PW based user authentication system is not free from the hacking threat that the third party falsifies the parameter values for the parameter values. In addition, the system is vulnerable against PW information collection for a long time and analogy attack against PW as well. As the countermeasures for this threat, there is a method to use authentication key applying the algorithm to make one time PW using biometrics and current time information. This study suggested OTP configuration technique with new channel using cardiac impulse. Suggested technique is expected to contribute to safe fintech construction.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Park, H.-H., Nho, H.-O., Kim, Y.-H.: The impact of perceived IT threat on convergence information system performance. Int. Conf. Converg. Technol. 6(3), 65–71 (2015)

    Google Scholar 

  2. Lee, K.-H.: A security threats in wireless charger systems in M2M. Int. Conf. Converg. Technol. 4(1), 27–31 (2013)

    Google Scholar 

  3. Go, J.-Y., Lee, K.-H.: SNS disclosure of personal information in M2M environment threats and countermeasures. Int. Conf. Converg. Technol. 5(1), 29–34 (2014)

  4. Jaeseok, P.: Pintech trends and the direction of the corresponding financial institutions. KISDI 99(4), 75–97 (2014)

    Google Scholar 

  5. Lee, S.-H., Lee, D.-W.: FinTech-conversions of finance industry based on ICT. Int. Conf. Converg. Technol. 6(3), 97–102 (2015)

  6. Choi, P., Park, S.-S., Dong-Ggyu, l: Mobile payment and biometric fusion technology trend. KIPS 22(4), 21–28 (2012)

    Google Scholar 

  7. Tepandi, J., Tšahhirov, I., Vassiljev, S.: Wireless PKI security and mobile voting. IEEE Comput. 43(6), 54–60 (2010)

  8. Hong, K., Jung, E.: Hand biometric information recognition system of mobile PhoneImage for mobile security. J. Digital Converg. 12(4), 319–326 (2014)

    Article  Google Scholar 

  9. Kim, H.-K.: A study on the implementation of personal authentication security system using heartbeat. KMMS 12(2), 338–341 (2009)

    Google Scholar 

  10. Moon, J.-K., Kim, J.-M.: Modify of extended API for Smart-TV security. Int. Conf. Converg. Technol. 5(2), 1–6 (2014)

    Google Scholar 

  11. Yun, S.: The biometric signature delegation method with undeniable property. J. Digital Converg. 12(1), 389–395 (2014)

    Article  Google Scholar 

  12. Lee, K.-J., Lee, K.-H.: Authentication scheme using biometrics in intelligent vehicle network. Int. Conf. Converg. Technol. 4(3), 15–20 (2013)

    Google Scholar 

  13. Choo, Y.-S., Jin, B.-W., Park, J.-P., Jun, M.-S.: Design the user authentication framework using u-health system. J. Digital Converg. 13(5), 219–226 (2015)

    Article  Google Scholar 

  14. TTA. Road map for the one time password standards. TTA (2011)

  15. Kim, D.-R.: A study on the OTP generation algorithm for user authentication. J. Digital Converg. 13(1), 283–288 (2015)

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (NRF-2013R1A1A1A05012348)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Keun-Ho Lee.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kang, BS., Lee, KH. 2-Channel authentication technique using cardiac impulse based OTP. J Comput Virol Hack Tech 12, 163–167 (2016). https://doi.org/10.1007/s11416-016-0271-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-016-0271-5

Keywords

Navigation