»ó´Ü¿©¹é
HOME Çлý±âÀÚ´Ü
Development of Authentication TechnologySafety system for modern people
JEA YOUNG LEE Student Reporter | ½ÂÀÎ 2019.07.08 10:24
 JEA YOUNG LEE Student Reporter     International School of Beijing 11th

Since the 1960s, various safety systems have been installed on locations where classified information is contained. With the range of simple numerical passwords to face authentication, the safety system has been considered as one of the most needed requirements in our lives.

They have constantly been more detailed and accurate along with the development of society. How far could they be developed?

About 60 years ago, computers were not common instruments since their size was extremely large and their price was significantly high to be installed in households. The only places that had computers at that time were universities and industries.

Since the number of computers was quite low compared to the number of users, a system called Compatible Time-Sharing System (CTSS) was introduced. Through the use of this system, it became possible for the users to separate their files from others in a single computer. However, since they used a fixed terminal of the main frame of the computer, users could have access to other users’ files.

In order to solve this problem, Fernando Corbató, a researcher in Massachusetts Institute of Technology (MIT) installed a system where users could set passwords for each of their files, and this system is still being used today in computers, phones, and other electronic devices.

In the 1980s, a new system of a higher security level where passwords can be changed whenever the device is used has been introduced.

When a user finds the password of another user, it was possible for him to constantly have access to the other user’s files. In order to fix this problem, One-time passwords (OTP) was introduced. OTP can change passwords in numerous ways.

The previous password can mix its order to create a new password, the password before the previous password can mix its order to create a new password, and also new passwords can be automatically created after a certain amount of time.

Today, OTP is less frequently used than numerical passwords, but it is still used in various software to increase the security level for important content.

Since 2010, along with the development of smartphone technology, the safety systems for smartphones have improved. Smartphones not only have numerical or alphabetical passwords but also have fingerprint and face authentication that have relatively greater security level.

Fingerprint and face authentication were originally introduced in large companies in order to allow only related people to enter the companies; however, today, with Touch ID and Face ID from Apple and fingerprint and face recognition option from Samsung, fingerprint and face authentication are used to only allow the user of the phone to have access.

It is possible to state that the security level for our personal information has reached the highest point. 

As such, the safety systems have been constantly developed throughout. By overcoming the limitations of the previous safety systems, they increased their security level.

It is intriguing how the new safety system would develop upon the current safety systems of the highest level.

 

º¸¾È ±â¼ú·ÂÀÇ ¹ßÀü

Çö´ëÀÎÀÇ »îÀÇ À¯¿ëÇÑ º¸¾È ½Ã½ºÅÛ

¹Ì¤ýÁß ¹«¿ªÇù»óÀÌ Áö¿¬µÇ´Â °¡Àå Å« ¿øÀÎ Áß Çϳª°¡ Áö½ÄÀç»ê±ÇÀ» µÑ·¯½Ñ °¥µîÀÌ´Ù. ¹Ì±¹Àº Áß±¹ ±â¾÷À», Áß±¹Àº ¹Ì±¹ ±â¾÷À» °ø°ÝÇϰųª °æ°íÇÏ°í ÀÖ´Ù. ¹Ì¤ýÁß ÆÐ±Ç ´ÙÅùÀÌ °á±¹ ±â¼úÀüÀïÀ̶ó´Â °ÍÀ» Àß º¸¿©ÁØ´Ù. Áö½ÄÀç»ê±ÇÀ» ÁöÅ°±â À§ÇÑ ³ë·ÂµéÀÌ ±× ¾î´À ¶§º¸´Ù Àý½ÇÇÏ´Ù.

960³âºÎÅÍ ¿À´Ã³¯±îÁö, Áß¿äÇÑ Á¤º¸µéÀÌ ´ã±ä °÷¿¡´Â ¹Ýµå½Ã ´Ù¾çÇÑ º¸¾È ÀåÄ¡µéÀÌ »ç¿ëµÇ¾î¿Ô´Ù.

´Ü¼øÇÑ ¼ýÀÚ ºñ¹Ð¹øÈ£¿¡¼­ºÎÅÍ ¾È¸é ÀνĿ¡ À̸£±â±îÁö öÀúÇÑ º¸¾È ½Ã½ºÅÛÀº ¿ì¸® »ýÈ°¿¡ ¾ø¾î¼­´Â ¾ÈµÉ ÇʼöÇ° Áß Çϳª·Î Àνĵǰí ÀÖ´Ù. 

¸ØÃßÁö ¾Ê°í ´õ¿í ¼¶¼¼ÇÏ°í Á¤È® ÇØÁö´Â ÀÌ ½Ã½ºÅÛÀº °ú¿¬ ¾îµð±îÁö ¹ßÀüµÉ±î?

¾à 60³â Àü ÄÄÇ»ÅÍ´Â ¼Õ½±°Ô Á¢±Ù ÇÒ ¼ö ÀÖ´Â ±â°è°¡ ¾Æ´Ï¾ú´Ù. Áý ¾È¿¡ ¼³Ä¡Çϱ⿡´Â ºÎÇÇ°¡ ³Ê¹« Å©°í  °¡°Ýµµ ¸Å¿ì ³ô¾Ò´Ù. ÀÌ·¯ÇÑ ÄÄÇ»Å͸¦ »ç¿ëÇÏ´Â °÷Àº ´ëºÎºÐ ´ëÇб³³ª ¶Ç´Â ´ë±â¾÷ À̾ú´Ù.

µû¶ó¼­ »ç¿ëÀÚ¿¡ ºñÇØ ÅξøÀÌ ºÎÁ·ÇÑ ÄÄÇ»ÅÍ ¶§¹®¿¡ óÀ½À¸·Î µîÀåÇÑ ½Ã½ºÅÛÀÌ Compatible Time-Sharing System(CTSS)ÀÌ´Ù. ÀÌ ½Ã½ºÅÛÀ» ÅëÇؼ­ ¸¹Àº »ç¿ëÀÚµéÀº ÇÑ ÄÄÇ»ÅÍ ¾È¿¡ °¢ÀÚ°¡ »ç¿ëÇÒ ¹®¼­µéÀ» µû·Î ºÐÇÒÇÒ ¼ö ÀÖ¾ú´Ù. 

ÇÏÁö¸¸, »ç¿ëÀÚµéÀº ¸ÞÀÎ ÇÁ·¹ÀÓ¿¡ °íÁ¤µÈ Å͹̳ÎÀ» »ç¿ëÇϱ⠶§¹®¿¡ ´Ù¸¥ »ç¿ëÀÚÀÇ ¹®¼­µéµµ ¾î´À Á¤µµ Á¢±ÙÀÌ °¡´ÉÇß´Ù. ÀÌ·¯ÇÑ ¹®Á¦¸¦ ÇØ°áÇϱâ À§ÇØ Massachusetts Institute of Technology (MIT)ÀÇ ¿¬±¸¿ø(ÀÌ)Fernando Corbato°¡ óÀ½ ¹®¼­ °£¿¡ ºñ¹Ð¹øÈ£¸¦ ¼³Á¤ÇÏ´Â ½Ã½ºÅÛÀ» µµÀÔÇß°í, ÀÌ ºñ¹Ð¹øÈ£´Â ÇöÀç±îÁö ÄÄÇ»ÅÍ, ÇÚµåÆù µî ´Ù¾çÇÑ ÀüÀÚ±â±â¿¡ »ç¿ëµÇ°í ÀÖ´Ù.

20³âµÚÀÎ 1980³â¿¡´Â ÇÑÃþ ´õ º¸¾Èü°è¸¦ °­È­½ÃŲ ÀÏȸ¿ë ºñ¹Ð¹øÈ£°¡ °³¹ßµÇ¾ú´Ù. ÇÑ »ç¿ëÀÚÀÇ ºñ¹Ð¹øÈ£¸¦ ´Ù¸¥ »ç¿ëÀÚ°¡ ¾Ë°Ô µÇ¸é, ±× ºñ¹Ð¹øÈ£·Î °è¼Ó Á¢±ÙÀÌ °¡´ÉÇ߱⿡, ÀÌ ºÎºÐÀ» º¸¾ÈÇϱâ À§ÇØ ¿¬±¸¿øµéÀº ƯÁ¤ »óȲ ¼Ó¿¡¼­ °è¼Ó ´Þ¶óÁö´Â ºñ¹Ð¹øÈ£¸¦ ¸¸µé¾î³Â´Ù. 

ÀÌ ½Ã½ºÅÛÀÌ ÇöÀç±îÁöµµ »ç¿ëµÇ´Â One-time passwords (OTP)ÀÌ´Ù. OTP´Â ´Ù¾çÇÑ Á¶°Çµé ¼Ó¿¡¼­ °è¼ÓÇؼ­ ºñ¹Ð¹øÈ£¸¦ ¹Ù²Ü ¼ö ÀÖ´Ù. ÇöÀç ºñ¹Ð¹øÈ£ÀÇ ¼ø¼­°¡ º¯È­µÇ¾î¼­ ´ÙÀ½ ºñ¹Ð¹øÈ£°¡ ¼³Á¤µÇ°í, ¶Ç ÇöÀç ºñ¹Ð¹øÈ£ ÀüÀÇ ºñ¹Ð¹øÈ£ÀÇ ¼ø¼­°¡ º¯È­Çؼ­ ´ÙÀ½ ºñ¹Ð¹øÈ£°¡ ¼³Á¤ÀÌ µÇ¸ç, ƯÁ¤ ½Ã°£ÀÌ Áö³ª¸é ºñ¹Ð¹øÈ£°¡ ÀÚµ¿ÀûÀ¸·Î ¹Ù²î°Ô ¼³Á¤ÀÌ µÇ±âµµ ÇÑ´Ù. ÀϹÝÀûÀÎ ¼ýÀÚ ºñ¹Ð¹øÈ£º¸´Ù´Â »ç¿ë Ƚ¼ö°¡ ÀûÁö¸¸, ´Ù¾çÇÑ ¼ÒÇÁÆ®¿þ¾îµéÀÌ ÀÌ ½Ã½ºÅÛÀ» žÀçÇؼ­ º¸¾È °­µµ¸¦ ³ôÀδÙ.

2010³âÀ» ½ÃÀÛÀ¸·Î, ½º¸¶Æ®ÆùÀÇ ¹ßÀü°ú ´õºÒ¾î¼­ ½º¸¶Æ®Æù¿¡ ¼³Ä¡µÈ º¸¾È ½Ã½ºÅ۵鵵 ´õ¿í °­µµ°¡ ³ô¾ÆÁö±â ½ÃÀÛÇß´Ù. ´Ü¼øÇÑ ¼ýÀÚ ¶Ç´Â ±ÛÀÚ ºñ¹Ð¹øÈ£¿¡¼­ ¹þ¾î³ª, ÀÌÁ¦´Â Áö¹® Àνİú ¾È¸é ÀνÄÀ» »ç¿ëÇؼ­ ±â±âÀÇ »ç¿ëÀÚ¸¦ ÀÎÁõÇÑ´Ù.

Áö¹® ÀνÄ, ¾È¸é ÀÎ½Ä µîÀº ¿ø·¡ ´ëÇü ȸ»çµé¿¡ ¼³Ä¡µÇ¾î, ƯÁ¤ Àοøµé¸¸ ȸ»ç¿¡ ÃâÀÔÀÌ °¡´ÉÇÏ°Ô Çϱâ À§ÇØ »ç¿ëÀÌ µÇ¾úÁö¸¸, ¾ÖÇûçÀÇ Touch ID ¿ÍFace ID, »ï¼º»ç »ï¼ºÀüÀÚÀÇ Áö¹®°ú ¾ó±¼ÀÎ½Ä ¼¾¼­¸¦ Åä´ë·Î ÀÌÁ¦´Â ÈÞ´ë¿ë ±â±â¿¡±îÁö ÃÖ÷´Ü º¸¾È ½Ã½ºÅÛÀÌ Å¾ÀçµÇ±â ½ÃÀÛÇß´Ù. ¿À´Ã³¯ °³°³ÀÎÀÇ »ç»ýÈ°À» º¸È£ÇÒ ¼ö ÀÖ´Â ´É·ÂÀÌ ÃÖ´ëÄ¡¿¡ ´Ù´Ù¸¥ °ÍÀÌ´Ù.

ÀÌó·³, º¸¾È ½Ã½ºÅÛÀÇ ±â¼ú·ÂÀº ³ª³¯ÀÌ ¹ßÀüÇØ ³ª°¡°í ÀÖ´Ù. °¢Á¾ ÇÑ°èµéÀ» º¸¿ÏÇØ ³ª°¡¸ç, º¸¾È ½Ã½ºÅÛÀÇ °­µµ´Â Á¡Â÷ °­ÇØÁö°í ÀÖ´Ù. ´ÙÀ½¿¡ ¼±º¸ÀÏ  º¸¾È ½Ã½ºÅÛÀº ÇöÀçÀÇ º¸¾È ½Ã½ºÅÛÀÇ ¾î¶°ÇÑ Á¡À» º¸¿Ï ¹ßÀüÇÒ °ÍÀÎÁö  ±â´ëµÈ´Ù.

JEA YOUNG LEE Student Reporter  gnpost@naver.com

<ÀúÀÛ±ÇÀÚ © °­³²Æ÷½ºÆ®, ¹«´Ü ÀüÀç ¹× Àç¹èÆ÷ ±ÝÁö>

iconÀαâ±â»ç
½Å¹®»ç¼Ò°³¤ý±â»çÁ¦º¸¤ý±¤°í¹®ÀǤýºÒÆí½Å°í¤ý°³ÀÎÁ¤º¸Ãë±Þ¹æħ¤ýû¼Ò³âº¸È£Á¤Ã¥¤ýÀ̸ÞÀϹ«´Ü¼öÁý°ÅºÎ
¼­¿ï½Ã °­³²±¸ ¼±¸ª·Î 704, 10Ãþ 593È£(û´ãµ¿, û´ãº¥Ã³ÇÁ¶óÀÚ)  |  ´ëÇ¥ÀüÈ­ : 02)511-5877   |  ¹ßÇàÀÏÀÚ : 1995³â 4¿ù 6ÀÏâ°£
µî·ÏÀÏÀÚ : 2018³â 2¿ù 28ÀÏ  |  µî·Ï¹øÈ£ : ¼­¿ï ¾Æ 04996  |  È¸Àå : Á¶¾çÁ¦  |   ¹ßÇàÀÎ : Á¶ÀÎÁ¤  |  ÆíÁýÀÎ : Á¶ÀÎÁ¤
û¼Ò³âº¸È£Ã¥ÀÓÀÚ : Á¶¾çÁ¦
Copyright © 2024 °­³²Æ÷½ºÆ®. All rights reserved.
Back to Top