KR100870202B1 - Method and system of issuing accredited certificate using encrypted image - Google Patents
Method and system of issuing accredited certificate using encrypted image Download PDFInfo
- Publication number
- KR100870202B1 KR100870202B1 KR1020070119724A KR20070119724A KR100870202B1 KR 100870202 B1 KR100870202 B1 KR 100870202B1 KR 1020070119724 A KR1020070119724 A KR 1020070119724A KR 20070119724 A KR20070119724 A KR 20070119724A KR 100870202 B1 KR100870202 B1 KR 100870202B1
- Authority
- KR
- South Korea
- Prior art keywords
- certificate
- user
- image
- server
- issuing
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/42—User authentication using separate channels for security data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Abstract
The present invention provides a method for issuing a public certificate using an encrypted image. In the method for issuing an accredited certificate using an encrypted image of the present invention, the method for issuing an accredited certificate using an encrypted image through a system consisting of a user terminal including an authentication plug-in, an agency server, and an authentication authority server may include: The institution server receives issuance application data including user-specific personal information and user selection image from the agency server, registers the user through the personal information, stores the user selection image, and generates a user identification code. A first step of transmitting to the agency server; A second step of the agency server receiving the user identification code from the certification authority server and issuing the user identification code to the user; A third step of the user terminal generating a signature key pair consisting of a public key and a private key and transmitting the public key and the user identification code to the certification authority server; Step 4-1, wherein the certification authority server checks whether the same as the user registration made in the first step through the user identification code received from the user terminal, by using the public key received from the user terminal. Step 4-2 to generate a public certificate, Step 4-3 to generate an envelope image by encrypting and combining the generated public certificate into the user selection image and transmitting the envelope image to the user terminal A fourth step comprising a fourth to fourth substep; And step 5-1 in which the user terminal decrypts the electronic envelope image received in step 4-4 to extract the public certificate and the user selection image, and extracts the public certificate and the user selected image. And a fifth step of storing the fifth and second substeps.
Description
The present invention relates to a method for issuing an accredited certificate using an encrypted image. In particular, in issuing, renewing, and reissuing an accredited certificate, the present invention inserts an accredited certificate to be issued, renewed, and reissued in an electronic envelope image, thereby preventing hacking and phishing. It is about how to protect the users of the certificate.
Recently, a public key and a private key are divided into encryption and decryption systems using a public key cryptosystem, so that a public key can be accessed by anyone through the directory server unit. It is authenticated by an electronic document created by. The public certificate system using the public key cryptosystem is becoming a basic premise for Internet banking and electronic commerce.
1 and 2 is a signal flow diagram illustrating a certificate issuing procedure and a certificate renewal / reissue process according to the prior art.
The current issuance of the accredited certificate proceeds with a face-to-face verification procedure at the time of initial issuance, verifying the user's identity, providing a security card, and registering it with a CA server. There is no fear of hacking or phishing on this face-to-face verification procedure. However, after the initial issuance procedure, such personal authentication information may be leaked to a hacker or a third party by transmitting personal authentication information online through a network to confirm that the user is a party user without the face-to-face confirmation procedure. There is a possibility. One of the reasons to further increase the risk is that the above personal authentication information is based on a relatively simple means based on several numbers and texts such as account number, password, and security card number, and thus is widely known as hacking such as keyboard hacking or phishing. It is possible to spill by the method. Of course, various financial institutions and certification agencies, such as keyboard hacking or anti-phishing program to provide a reality, but the hacking techniques are also developed, so the conventional certificate issue system has a problem that can not be said to be absolutely secure.
The present invention is to solve the above problems, an object of the present invention, even if the user's personal information is leaked through phishing, hacking, etc. while maintaining the existing certificate issuance, renewal and reissue system, discarded by a third party And it is to provide a method for issuing, renewing and re-issuing an accredited certificate that can prevent misuse of the accredited certificate caused by the reissue.
Another object of the present invention is to provide a recognition that can be used to increase the recognition and intuitiveness of the information, such as the use of the certificate, the use period and the validity period to the user when using the certificate in a variety of types of certificates or mobile phones with small display window It provides a way to issue, renew, and reissue certificates.
Still another object of the present invention is to provide a method for issuing, renewing, and reissuing a private certificate that can use authentication through a private authentication server as a means for authenticating a user in using a website (CP) that provides content. To provide a method that can minimize the damage caused by phishing / hacking.
The method for issuing an accredited certificate using an encrypted image of the present invention for achieving the above object, issuing an accredited certificate using an encrypted image through a system consisting of a user terminal including an authentication plug-in, an agency server, and a certificate authority server. In the method, the certification authority server receives the issuance application data including the user-specific personal information and the user selection image from the agency server, registers the user through the personal information, and stores the user selection image A first step of generating a user identification code and transmitting it to the agency server; A second step of the agency server receiving the user identification code from the certification authority server and issuing the user identification code to the user; A third step of the user terminal generating a signature key pair consisting of a public key and a private key and transmitting the public key and the user identification code to the certification authority server; Step 4-1, wherein the certification authority server checks whether the same as the user registration made in the first step through the user identification code received from the user terminal, by using the public key received from the user terminal. Step 4-2 to generate a public certificate, Step 4-3 to generate an envelope image by encrypting and combining the generated public certificate into the user selection image and transmitting the envelope image to the user terminal A fourth step comprising a fourth to fourth substep; And step 5-1 in which the user terminal decrypts the electronic envelope image received in step 4-4 to extract the public certificate and the user selection image, and extracts the public certificate and the user selected image. And a fifth step of storing the fifth and second substeps.
In a system for issuing a private certificate using an encrypted image of the present invention, in a system consisting of a user terminal including an authentication plug-in, a content provider server (CP server), and a private authentication server, the CP server may be used for each user from the user terminal. Receiving a private certificate issuance request data including information and a user selection image and transmitting the received private certificate issuance request data to the private authentication server; The private authentication server includes a step 2-1 for registering a user through the personal information and storing the user selection image, and a step 2-2 for generating a user identification code and transmitting the generated user identification code to the user terminal. Second step; A third step of the user terminal generating a signature key pair consisting of a public key and a private key and transmitting the public key and the user identification code to the private authentication server; Step 4-1, wherein the standing authentication server confirms whether it is the same as the user registration made in the first step through the user identification code received from the user terminal, by using the public key received from the user terminal. Step 4-2 to generate a private certificate, Step 4-3 to generate an envelope image by encrypting and combining the generated private certificate with the user selection image and transmitting the envelope image to the user terminal. A fourth step comprising a fourth to fourth substep; And step 5-1, wherein the user terminal decodes the envelope image received in step 4-4 to extract a private certificate and the user selected image, and extracts the extracted private certificate and the user selected image. And a fifth step of storing the fifth and second substeps.
Authorized certificate issuing system using the encrypted image of the present invention, including a user terminal, an agency server and a certification authority server, including the authentication plug-in, by collecting the issuance application data including the user's personal information and the user selection image An agency server including an issuing application data management unit for transmitting to the certification authority server and an identification code issuing unit for receiving the user identification code from the certification authority server and issuing the user identification code to the user; A key pair generation unit for generating a key pair for signature consisting of a public key and a private key, and an electronic envelope decryption unit for decrypting an electronic envelope image and extracting an authentication certificate and the user selection image and the extracted authentication certificate and the user selection A user terminal for transmitting a certificate issuance request signal including the public key generated by the key pair generation unit and the user identification code issued by the identification code issuing unit, to the certification authority server; ; And a user DB for storing personal information and the user identification code included in the issuance application data of the user, an image server unit for storing the user selection image included in the issuance application data, and a user for the user who applied for issuance of a certificate. Identification code generation unit for generating an identification code, a user registration confirmation unit for confirming the registration of the user who requested the certificate issuance by confirming the user identification code, public key, reference number and authorization included in the request for issuance of the certificate issued certificate And an electronic envelope image generating unit generating an electronic envelope image by encrypting and combining the generated public certificate with the user-selected image stored in the image server unit. The encrypted envelope image to the user terminal A certification authority server; characterized in that the configuration, including the configuration comprising a.
The method for issuing an accredited certificate using an encrypted image according to the present invention having the above configuration is a personal identification procedure using an image, not a text-based image, so input using a keyboard is not necessary, so it is difficult to obtain personal information using a keyboard hack. In addition, it can prevent the misuse of accredited accredited certificates resulting from the illegal use of third parties. In addition, the prevention of abuse of the accredited certificate has the advantage that it is possible to maintain the existing accredited certificate issuance, renewal and reissue system.
The method for issuing an accredited certificate according to the present invention provides a display screen of a list of accredited certificates by using an image of an electronic envelope, so that various types of accredited certificates exist or when the accredited certificate is used in a mobile phone having a small display window, the use of the accredited certificate to a user It can increase the perception and intuition of information such as user, institution and expiration date.
Private certificate issuing method according to the present invention, the private certificate user using the website (CP) for providing content, issuance of a private certificate that can use the authentication through the private authentication server as an authentication means for identity verification, In the renewal and reissue method, it is possible to provide a method capable of minimizing damage due to phishing / hacking.
An embodiment of the present invention describes a method for issuing an accredited certificate using an encrypted image based on a general accredited certificate issuing system at the filing date. However, the present invention is not limited to this, and since the core technical idea of the present invention is to seal and deliver a public certificate in an encrypted image, the scope of the present invention may be implemented in the following even if the public certificate issuing method is changed in the future. It is not limited to the example.
Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings.
3 is a block diagram of a system for issuing a public certificate using an encrypted image according to the present invention. The system consisting of the
According to the prior art, the certification authority server is interlocked with the
4 and 5 show a signal flow diagram for a method for issuing an accredited certificate according to an embodiment of the present invention. Here, FIG. 4 is a configuration in which the user designates the electronic envelope opening password cipher_open at the time of application for issuing an accredited certificate, and FIG. 5 shows the electronic envelope opening password cipher_open in the
The dotted lines in FIG. 4 are implemented offline. First, a user who wants to be issued an accredited certificate has an application form containing personal information (info_personal), where the electronic envelope opening password (cipher_open) is written in the issuing application, unlike in FIG. 5. Together with the agency (financial institutions and government offices) to submit (S301). Accordingly, the agency checks the identity of the user through the identification document of the issuing applicant (S303).
After the identification, the personal information (info_personal) described above is stored in the
Issuance application data (data_application) including the user's personal information (info_personal), the user selection image (img_select) and the electronic envelope opening password (cipher_open) stored in the
Thereafter, the
The user who has completed the application procedure through the issuance of the guide executes the authentication plug-in through the user terminal to request a certificate issuance to the
The
After the user registration is confirmed or not, the
After the generation, registration, and start of the accredited certificate in the
The
The encryption and hiding of a specific message (certificate in the present invention) such as a picture file is called steganography, and apparently there is no difference between including a password or not, and transmitting the same as a general file. see. Famous for these steganographic tools include F5 (http://wwwrn.inf.tu-dresden.de/~westfeld/f5.html) developed in Germany and a secure engine (http://wwwrn.inf.tu-dresden.de/~westfeld/f5.html) that hides text in larger text. http://www.petitcolas.net/fabien/steganography/mp3stego/), which plant secret messages in MP3s (http://www.securengine.isecurelabs.com/).
As a method for sealing the generated certificate in an electronic envelope image (img_envelope), `` Method and Computer Program Product for Hinding Information in an Indexed Color Image '' of US Patent No. 6,697,498 B2 (Registration Date 2004.2.24) may be adopted. have. However, embodiments of the present invention are not limited to the method according to the US patent, and include embodiments that can be implemented using self steganography techniques having ordinary skill in the art. Steganography method of hiding data in a digital picture file is described in `` Seganalysis of JPEG Images: Breaking the F5 Algorithm '' [ISSN 0302-9743 (Print) 1611-3349 (Online) Volume 2578/2003] (http: // www .ws.binghamton.edu / fridrich / Research /f5.pdf), which is obvious to those skilled in the art, and thus detailed description thereof will be omitted below.
According to one preferred embodiment of the present invention, in the sealing step of the envelope image (img_envelope) in step S359 the electronic envelope image (img_envelope) may include information (info_provider) of the operator of the agency. The information (info_provider) of the service provider means providing a list of information available to the user among services of the service provider. For example, if the service provider is an IPTV service provider, it may be considered to provide channel information that can be provided. The included information info_provider may be extracted by the plug-in installed in the user terminal and used by the user.
After the step (S359) of the
The
First, as illustrated in FIG. 11, the authentication plug-in program displays an image list including an envelope image (img_envelope) and at least one fake image (S901), and prompts the user to select an image according to the user's selection. (S905). Here, it is determined whether the image selected by the user and the user-selected image img_select previously stored in the
Opening the electronic envelope image (img_envelope) and extracting an accredited certificate and a user selection image (img_select) (S373), the
In the above, the case in which the user designates the electronic envelope opening password cipher_open at the time of the application for issuance of the certificate through the signal flow diagram of FIG. 4 was described. In FIG. 5, the electronic envelope opening password (cipher_open) is not included in the application for issuance of a certificate of public certification. Therefore, the electronic envelope opening password cipher_open is not included in the issuing application of step S301 or the issuing application data (data_application) in step S321. Instead, a step (S327) of generating the electronic envelope opening password cipher_open is performed in the
According to a preferred embodiment of the present invention, the
According to another embodiment of the present invention, when the
Up to now, the method of issuing an accredited certificate has been described through the signal flow charts of FIGS. 4 and 5. Hereinafter, a method of updating and reissuing an accredited certificate will be described through the signal flow diagram of FIG.
In order to update or reissue an authorized certificate, the user executes an authentication plug-in in the
The certification authority server (3) receiving the certificate renewal / reissue request data confirms whether the person requesting the certificate renewal / reissue is identical to the person registered as a user in the server, and the certificate certificate renewal / reissue request data In the exemplary embodiment of FIG. 4, the included user selected image img_select and the user registered image registered in the
After the user registration is confirmed whether the public certificate received from the
After the generation, registration, and start of the accredited certificate in the
The
After the step (S559) of sealing the accredited certificate with the electronic envelope image (img_envelope) in the certification authority server (3), the
The
After opening the electronic envelope and extracting the public certificate (S573), the
Through the above method, even when the certification certificate is renewed or reissued, it can be renewed or reissued only by accessing the online without visiting the certification body or agency directly, so that the user of the certification certificate can be facilitated. According to the prior art, when renewing / re-issuing an accredited certificate, reliability is a problem in checking the identity of the user, so that offline confirmation was essential. According to the present invention, an electronic envelope using an image having an extremely difficult hacking characteristic is present. It will be said that the problem of the prior art can be solved since the renewal / reissue process is performed using.
Hereinafter, a method of determining a user selection image (img_select) will be described with reference to FIGS. 15 to 17.
In the first method, the user selection image (img_select) selects an image that is easy for the user to remember from images provided by an agency or a certification authority. Is selected as the user-selected image (img_select). This step may also be possible through the terminal of the agency server (2).
In the second method, the user selection image (img_select) is input to the
In a third method, the user selection image (img_select) is configured in the form of a personal avatar by selecting and combining a basic configuration provided by the agency. Here, as a user selectable element, the user may select and configure a character's gender (or type of animal when represented as an animal), a hairstyle, a top, a bottom, shoes, a hat, and accessories. Providing such various selection elements can increase the complexity of the selection, thereby preventing the unauthorized user from opening the image envelope.
The above three types of user selection image (img_select) selection methods are intended to prevent unauthorized users from knowing which electronic envelopes are used by authorized certificate users. In general, fraudulent users extract personal information (info_personal) by hacking a keyboard input signal. The user selection image (img_select) selected in the above three methods uses an image associative effect. As a means, it has the effect of preventing the theft of another person.
In addition, the user selection image (img_select) may include the logo of the agency, the logo of the certification body, and the expiration date, regardless of each selection method. One embodiment will be described with reference to FIG. 17. The image selected by the user is represented in the middle (shown in the case of the third way avatar), the logo of a financial institution (agent) is displayed at the top of the image, and the certificate issuer (certificate) The logo is represented. The validity period of the accredited certificate is also expressed in the above embodiment on the right side between the user selection image (img_select) and the certification authority logo.
This user selection image (img_select) is not only used for encryption at the time of issuance of the public certificate, but as shown in FIG. 18, the user selection image (img_select) when displaying the list of public certificates in the authentication plug-in installed in the user terminal 1. ) Can be used as a method of displaying together. This configuration has the effect of increasing the recognition and intuition by allowing the user to know the purpose or expiration date of the accredited certificate even by looking at the envelope of the accredited certificate. In addition, as shown in FIG. 19, when the authentication plug-in is displayed in the authentication plug-in, thumbnails of the user selection image (img_select) may be arranged and displayed. Such a configuration would have an effect of further increasing the user's perception and intuition. FIG. 20 illustrates a screen display in the case of selecting a specific public certificate from the list of FIG. 18 or 19, and particularly illustrates a case where a mobile phone is used as the
According to another embodiment of the present invention, the user selection image (img_select) may include a user registration sound recording, and the user registration sound recording may include a guide of the contents of the certification certificate notification or user information (info_personal). . Due to this configuration, the contents can be effectively delivered to the public as well as to the visually impaired.
7 is a signal flow diagram for a private certificate issuing method using an encrypted image of the present invention. According to another embodiment of the present invention, a method for issuing a private certificate using an encrypted image in a system consisting of a
In the configuration of the invention, the
Compared with the issuance application in step 301 of FIG. 4, the step S601 of FIG. 7 may be performed online. Instead, as an essential requirement for identity verification, at least one specific password such as a telephone number, an e-mail address, or a virtual social security number is required. In addition, in step S303, identity verification is a direct face-to-face such as checking an identification card. In step S603 of FIG. 7, the
Similar to transmitting a user identification code (code_identify) such as a reference number and an authorization code to the
3 is a block diagram of a system for issuing a public certificate using an encrypted image of the present invention. The system for the implementation of the present invention is largely composed of a
The
The
In addition, the
Hereinafter, only the specific configuration of the
FIG. 21 is a detailed diagram illustrating the internal configuration of the
The certification authority server (3), the user DB (10) for storing the user's personal information (info_personal, D110) and the user identification code (code_identify, D210B) contained in the user's issuance application data (data_application); An image server unit 20 which stores the user selection image img_select included in the issue application data data_application; An identification code generation unit 30 for generating a user identification code (code_identify, D210A) such as a reference number and an authorization code for the user who applied for the issuance of the public certificate; A user registration confirmation unit 40 for confirming whether or not the user who has requested the issuance of a public certificate by checking the user identification code (codeidentify, comparison between D210B and D210C); An accredited certificate generator 50 generating an accredited certificate by using the public key (D220) included in the accredited certificate issuance request data (data_request); A directory server unit 80 for starting a public key of the public certificate and an OCSP server 90 for starting status information of the public certificate including issuance, revocation, and suspension of the public certificate; An official certificate management unit (70) for registering the generated public certificate in the directory server (80) and initiating a state of the generated public certificate in the OCSP server (90); And an electronic envelope image generation unit 60 generating an electronic envelope image img_envelope by encrypting and combining the generated public certificate with the user selection image img_select stored in the image server unit 6. do.
Hereinafter, the function of the
The
Identification
The user identification code (code_identify, D210) transmitted to the agency server is included in the certificate issuance request data (data_request) issued to the user through the
When the
When it is confirmed in step S351 as a registered user, the user
The public certificate (D300) generated by the public certificate generator (50) is transmitted to the electronic envelope image generator (60), and the electronic envelope image generator (60) receiving the public certificate (D300) is the image server. Receives the user selection image (img_select, D120) stored in the
The configuration and operation of the
Although the preferred embodiments of the present invention have been described in detail above, the scope of the present invention is not limited thereto, and various modifications and improvements of those skilled in the art using the basic concepts of the present invention defined in the following claims are also provided. Should be regarded as belonging to
1 is a signal flow diagram illustrating a conventional accredited certificate issuing process.
2 is a signal flow diagram illustrating a conventional certificate update and reissue process.
3 is a block diagram of a system for issuing a public certificate using an encrypted image according to the present invention.
4 is a signal flow diagram illustrating a process for issuing a public certificate using an encrypted image according to an embodiment of the present invention.
5 is a signal flow diagram illustrating a process for issuing a public certificate using an encrypted image according to another embodiment of the present invention.
6 is a signal flow diagram illustrating a process for updating and re-issuing an accredited certificate using an encrypted image according to the present invention.
7 is a signal flow diagram illustrating a private certificate issuing process using an encrypted image according to the present invention.
8 is a conceptual diagram showing the sealing of the electronic envelope image according to the present invention.
9 is a conceptual diagram showing the opening of the electronic envelope image according to the present invention.
11 to 14 are exemplary views for explaining the opening procedure of the electronic envelope image according to the present invention.
15 to 17 are exemplary views for explaining a method of selecting a user selection image according to the present invention.
18 to 20 is an exemplary view for explaining a method for displaying a list of certified certificates according to the present invention.
21 is an internal configuration diagram of a certification authority server according to the present invention.
Claims (34)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020070119724A KR100870202B1 (en) | 2007-11-22 | 2007-11-22 | Method and system of issuing accredited certificate using encrypted image |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020070119724A KR100870202B1 (en) | 2007-11-22 | 2007-11-22 | Method and system of issuing accredited certificate using encrypted image |
Publications (1)
Publication Number | Publication Date |
---|---|
KR100870202B1 true KR100870202B1 (en) | 2008-12-09 |
Family
ID=40371630
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020070119724A KR100870202B1 (en) | 2007-11-22 | 2007-11-22 | Method and system of issuing accredited certificate using encrypted image |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR100870202B1 (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101637854B1 (en) * | 2015-10-16 | 2016-07-08 | 주식회사 코인플러그 | Certificate issuance system and method based on block chain, certificate authentication system and method based on block chain |
KR101661930B1 (en) * | 2015-08-03 | 2016-10-05 | 주식회사 코인플러그 | Certificate issuance system based on block chain |
KR101661933B1 (en) * | 2015-12-16 | 2016-10-05 | 주식회사 코인플러그 | Ccertificate authentication system and method based on block chain |
KR101680260B1 (en) * | 2015-12-14 | 2016-11-29 | 주식회사 코인플러그 | Certificate issuance system and method based on block chain |
KR101723405B1 (en) * | 2016-07-04 | 2017-04-06 | 주식회사 코인플러그 | Certificate authentication system and method based on block chain |
WO2017171165A1 (en) * | 2015-12-14 | 2017-10-05 | (주)코인플러그 | System for issuing public certificate on basis of block chain, and method for issuing public certificate on basis of block chain by using same |
KR101858653B1 (en) * | 2016-12-30 | 2018-06-28 | 주식회사 코인플러그 | Method for certifying a user by using mobile id through blockchain database and merkle tree structure related thereto, and terminal and server using the same |
WO2019078667A1 (en) * | 2017-10-20 | 2019-04-25 | 정혜진 | Card issuance and payment system and method |
CN112949638A (en) * | 2019-11-26 | 2021-06-11 | 金毛豆科技发展(北京)有限公司 | Certificate image uploading method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1995022810A1 (en) * | 1994-02-17 | 1995-08-24 | Telia Ab | Arrangement and method for a system for administering certificates |
US6009173A (en) | 1997-01-31 | 1999-12-28 | Motorola, Inc. | Encryption and decryption method and apparatus |
KR20030035025A (en) * | 2001-10-29 | 2003-05-09 | 쓰리알소프트(주) | System for providing identification service using official certificate based on Public Key Infrastructure and method thereof |
-
2007
- 2007-11-22 KR KR1020070119724A patent/KR100870202B1/en not_active IP Right Cessation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1995022810A1 (en) * | 1994-02-17 | 1995-08-24 | Telia Ab | Arrangement and method for a system for administering certificates |
US6009173A (en) | 1997-01-31 | 1999-12-28 | Motorola, Inc. | Encryption and decryption method and apparatus |
KR20030035025A (en) * | 2001-10-29 | 2003-05-09 | 쓰리알소프트(주) | System for providing identification service using official certificate based on Public Key Infrastructure and method thereof |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101661930B1 (en) * | 2015-08-03 | 2016-10-05 | 주식회사 코인플러그 | Certificate issuance system based on block chain |
US11082420B2 (en) | 2015-08-03 | 2021-08-03 | Coinplug, Inc. | Certificate issuing system based on block chain |
WO2017022917A1 (en) * | 2015-08-03 | 2017-02-09 | (주)코인플러그 | Certificate issuing system based on block chain |
WO2017065389A1 (en) * | 2015-10-16 | 2017-04-20 | (주)코인플러그 | Accredited certificate issuance system based on block chain and accredited certificate issuance method based on block chain using same, and accredited certificate authentication system based on block chain and accredited certificate authentication method based on block chain using same |
US10885501B2 (en) * | 2015-10-16 | 2021-01-05 | Coinplug, Inc. | Accredited certificate issuance system based on block chain and accredited certificate issuance method based on block chain using same, and accredited certificate authentication system based on block chain and accredited certificate authentication method based on block chain using same |
KR101637854B1 (en) * | 2015-10-16 | 2016-07-08 | 주식회사 코인플러그 | Certificate issuance system and method based on block chain, certificate authentication system and method based on block chain |
WO2017171165A1 (en) * | 2015-12-14 | 2017-10-05 | (주)코인플러그 | System for issuing public certificate on basis of block chain, and method for issuing public certificate on basis of block chain by using same |
US10164779B2 (en) | 2015-12-14 | 2018-12-25 | Coinplug, Inc. | System for issuing public certificate on basis of block chain, and method for issuing public certificate on basis of block chain by using same |
US10848319B2 (en) | 2015-12-14 | 2020-11-24 | Coinplug, Inc. | System for issuing certificate based on blockchain network, and method for issuing certificate based on blockchain network by using same |
US10848318B2 (en) | 2015-12-14 | 2020-11-24 | Coinplug, Inc. | System for authenticating certificate based on blockchain network, and method for authenticating certificate based on blockchain network by using same |
KR101680260B1 (en) * | 2015-12-14 | 2016-11-29 | 주식회사 코인플러그 | Certificate issuance system and method based on block chain |
WO2017104899A1 (en) * | 2015-12-16 | 2017-06-22 | (주)코인플러그 | Block chain-based certificate authentication system and authentication method using same |
KR101661933B1 (en) * | 2015-12-16 | 2016-10-05 | 주식회사 코인플러그 | Ccertificate authentication system and method based on block chain |
KR101723405B1 (en) * | 2016-07-04 | 2017-04-06 | 주식회사 코인플러그 | Certificate authentication system and method based on block chain |
WO2018008800A1 (en) * | 2016-07-04 | 2018-01-11 | (주)코인플러그 | Accredited certificate authentication system based on blockchain, and accredited certificate authentication method based on blockchain, using same |
KR101858653B1 (en) * | 2016-12-30 | 2018-06-28 | 주식회사 코인플러그 | Method for certifying a user by using mobile id through blockchain database and merkle tree structure related thereto, and terminal and server using the same |
WO2019078667A1 (en) * | 2017-10-20 | 2019-04-25 | 정혜진 | Card issuance and payment system and method |
CN112949638A (en) * | 2019-11-26 | 2021-06-11 | 金毛豆科技发展(北京)有限公司 | Certificate image uploading method and device |
CN112949638B (en) * | 2019-11-26 | 2024-04-05 | 金毛豆科技发展(北京)有限公司 | Certificate image uploading method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100910378B1 (en) | System and method for issuing electronically accredited certificate using encrypted image | |
KR100870202B1 (en) | Method and system of issuing accredited certificate using encrypted image | |
CN104270338B (en) | Method and its system that a kind of electronic identity registration and certification are logged in | |
US8145718B1 (en) | Secure messaging system with personalization information | |
CN101897165B (en) | Method of authentication of users in data processing systems | |
KR102177848B1 (en) | Method and system for verifying an access request | |
WO2009101549A2 (en) | Method and mobile device for registering and authenticating a user at a service provider | |
CN109087056A (en) | Electronic contract signs method, apparatus and server | |
US20080201576A1 (en) | Information Processing Server And Information Processing Method | |
JP2006525563A (en) | User and web site authentication method and apparatus | |
CN104662870A (en) | Data security management system | |
CN103036681B (en) | A kind of password safety keyboard device and system | |
JP2007527059A (en) | User and method and apparatus for authentication of communications received from a computer system | |
CN101652782B (en) | Communication terminal device, communication device, electronic card, method for a communication terminal device and method for a communication device for providing a verification | |
KR100908100B1 (en) | Encrypted image data with matryoshka structure and, system and method for mutual synchronization certificating using the same | |
KR101318154B1 (en) | Method of providing image-based user authentication for shared documents, and computer-readable recording medium for the same | |
EP2530868A1 (en) | Method for generating an anonymous routable unlinkable identification token | |
CN109474431A (en) | Client certificate method and computer readable storage medium | |
KR100420735B1 (en) | Mail transmitting/receiving system using watermarking and encoding technique, and method thereof | |
US11671475B2 (en) | Verification of data recipient | |
US20150302506A1 (en) | Method for Securing an Order or Purchase Operation Means of a Client Device | |
van den Broek et al. | Securely derived identity credentials on smart phones via self-enrolment | |
JP4140617B2 (en) | Authentication system using authentication recording medium and method of creating authentication recording medium | |
CN110138547A (en) | Based on unsymmetrical key pond to and sequence number quantum communications service station cryptographic key negotiation method and system | |
WO2023199619A1 (en) | Remote signature system and anti-tamper device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
A302 | Request for accelerated examination | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant | ||
LAPS | Lapse due to unpaid annual fee | ||
R401 | Registration of restoration | ||
FPAY | Annual fee payment |
Payment date: 20120924 Year of fee payment: 5 |
|
FPAY | Annual fee payment |
Payment date: 20131108 Year of fee payment: 6 |
|
FPAY | Annual fee payment |
Payment date: 20141117 Year of fee payment: 7 |
|
FPAY | Annual fee payment |
Payment date: 20160125 Year of fee payment: 8 |
|
FPAY | Annual fee payment |
Payment date: 20170201 Year of fee payment: 9 |
|
FPAY | Annual fee payment |
Payment date: 20171219 Year of fee payment: 10 |
|
FPAY | Annual fee payment |
Payment date: 20190212 Year of fee payment: 11 |