KR20150006980A - Apparatus and method for processing user authentication using random pattern - Google Patents
Apparatus and method for processing user authentication using random pattern Download PDFInfo
- Publication number
- KR20150006980A KR20150006980A KR20130080674A KR20130080674A KR20150006980A KR 20150006980 A KR20150006980 A KR 20150006980A KR 20130080674 A KR20130080674 A KR 20130080674A KR 20130080674 A KR20130080674 A KR 20130080674A KR 20150006980 A KR20150006980 A KR 20150006980A
- Authority
- KR
- South Korea
- Prior art keywords
- authentication
- authentication pattern
- pattern
- user
- random
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
A user authentication processing apparatus according to the present invention includes a storage device storing a user authentication application and a processor executing a user authentication application, the storage device storing a password authentication pattern connecting a plurality of points set by a user, The processor executes an authentication process in accordance with an input of an authentication pattern of a user at the time of execution of the user authentication application, and after a user inputs an authentication pattern, a random number Generates an authentication pattern, and induces the user to input the random authentication pattern.
Description
The present invention relates to an apparatus and a method for processing a user authentication using a random pattern.
The mobile environment is rapidly becoming more sophisticated and universal. Mobile environment refers to the hardware, software, network, and service environment in which mobile devices such as notebooks, cell phones, smart phones, and tablet PCs are related. In the mobile environment, there is an advantage that the function of the fixed device can be used without any place and time.
However, since it can be used in a public place as well as a personal place, there is a high possibility that a password and an input pattern due to a shoulder surfing attack and a smudge attack are leaked There are disadvantages. Especially, in the case of the smear attack, the pattern that the user should know only can be exposed to the other person through the fingerprint which remains on the display, and development of a research that can prepare for this is needed.
In this regard, Korean Patent Laid-Open Publication No. 2013-0006986 (entitled "Mobile terminal and control method thereof") discloses a touch gesture pattern for unlocking a screen of an actual touch screen, a touch gesture pattern The present invention proposes a portable terminal capable of releasing the screen lock using a touch gesture pattern in which patterns are combined, and a control method thereof.
However, since the touch gesture pattern irrelevant to the screen unlocking can be distinguished from the touch gesture pattern for unlocking the screen, there is a problem that the original touch gesture pattern for unlocking the screen can leak.
SUMMARY OF THE INVENTION It is an object of the present invention to provide a user authentication apparatus and method for generating a pattern that is safe from a smear attack when a pattern for user authentication is input .
As a technical means for achieving the above technical object, a user authentication processing apparatus according to the first aspect of the present invention includes a storage device storing a user authentication application and a processor executing a user authentication application, Wherein the processor executes an authentication process in accordance with an input of an authentication pattern of a user at the time of execution of the user authentication application, and after inputting the authentication pattern of the user, Generates a random authentication pattern via a certain number of points among the plurality of points constituting the pattern, and derives the input of the random authentication pattern by the user.
According to a second aspect of the present invention, there is provided a method of processing a user authentication through a user authentication processing apparatus, the method comprising: performing authentication processing according to a user's authentication pattern input; Generating a random authentication pattern via a certain number of points among the plurality of points constituting the pattern, and inducing the user to input the random authentication pattern.
According to the above-mentioned object of the present invention, the user can prevent the fingerprint authentication station from being exposed by the fingerprint authentication station by partially overlapping the fingerprint authentication station generated at the time of inputting the password authentication pattern and the fingerprint authentication station generated at the time of inputting the random authentication pattern can do.
1 is a diagram for explaining a configuration of a user authentication processing apparatus according to an embodiment of the present invention.
2 is a view for explaining an example of a cryptographic authentication pattern and a random authentication pattern according to an embodiment of the present invention.
3 is an example of a guide for inputting a random authentication pattern according to an embodiment of the present invention.
FIG. 4 is a view for explaining an example of a screen in which a password authentication pattern and a random authentication pattern are input according to an embodiment of the present invention.
5 is a flowchart illustrating a method for authenticating a user through a user authentication processing apparatus according to an embodiment of the present invention.
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings, which will be readily apparent to those skilled in the art. The present invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. In order to clearly illustrate the present invention, parts not related to the description are omitted, and similar parts are denoted by like reference characters throughout the specification.
Throughout the specification, when a part is referred to as being "connected" to another part, it includes not only "directly connected" but also "electrically connected" with another part in between . Also, when an element is referred to as "comprising ", it means that it can include other elements as well, without departing from the other elements unless specifically stated otherwise.
1 is a diagram for explaining a configuration of a user authentication processing apparatus according to an embodiment of the present invention.
At this time, in the embodiment of the present invention, it is assumed that the user
1, the configuration of the user
In addition, the user
The user
The user
The
As shown in FIG. 2 (a), the
Meanwhile, the
Referring again to Figure 1, the
First, the
The
In addition, the
In addition, the
The
At this time, the
In addition, the
In addition, the
3 is an example of a guide for inputting a random authentication pattern according to an embodiment of the present invention.
A
FIG. 4 is a view for explaining an example of a screen in which a password authentication pattern and a random authentication pattern are input according to an embodiment of the present invention.
As shown in FIG. 4, when the authentication pattern is input by the user, the local stations of the
5 is a flowchart illustrating a method for authenticating a user through a user authentication processing apparatus according to an embodiment of the present invention.
In step S110, authentication processing according to the user's authentication pattern input can be performed. At this time, if the authentication pattern and the password authentication pattern input by the user coincide with each other, the authentication can be approved. Here, the password authentication pattern is a secret password for user authentication, and can be generated by connecting a plurality of points.
In step S120, after inputting the authentication pattern of the user, a random authentication pattern is generated via a certain number of points among the plurality of points constituting the password authentication pattern previously set by the user, . At this time, the
In step S120, the connection order of the points constituting the random authentication pattern is randomly set and generated, but can be set different from the connection order of the points constituting the password authentication pattern. That is, the connection order of the points constituting the random authentication pattern and the connection order of the points constituting the password authentication pattern are set to be different from each other, so that the mark left when inputting the password authentication pattern can be minimized.
In step S130, auxiliary authentication processing according to the authentication pattern input by the user along with the random authentication pattern can be performed. At this time, when an authentication pattern passing through a certain number of points constituting the random authentication pattern is inputted, authentication can be approved. For example, when a random authentication pattern composed of five points is generated, it is possible to generate a random authentication pattern with at least three delegations so that authentication is permitted.
Further, in step S130, if the point constituting the random authentication pattern and the point constituting the authentication pattern coincide with each other, the authentication can be approved. That is, if the points of the authentication pattern input by the user and the points of the random authentication pattern are the same, the authentication can be approved regardless of the input order. For example, when the random authentication pattern is composed of P1, P2, P3, P4, P5 and P6 ', the authentication pattern inputted by the user is' P1 → P2 → P3 → P4 → P5 → P6' P1, P2, P3, P4, P5, P6 'are included regardless of the input order, such as P1 → P4 → P5 → P3 → P6 or P6 → P3 → P5 → P2 → P4 → P1 If so, user authorization can be granted.
In step S130, if the connection order of the points constituting the random authentication pattern and the connection order of the points constituting the authentication pattern coincide, the authentication can be approved. That is, if the points of the authentication pattern inputted by the user are the same as the points of the random authentication pattern, and the input order is also the same, the authentication can be approved. For example, when the random authentication pattern is 'P2 → P1 → P4 → P5 → P3 → P6', authentication is only performed when the authentication pattern input by the user is also 'P2 → P1 → P4 → P5 → P3 → P6' You can approve.
One embodiment of the present invention may also be embodied in the form of a recording medium including instructions executable by a computer, such as program modules, being executed by a computer. Computer readable media can be any available media that can be accessed by a computer and includes both volatile and nonvolatile media, removable and non-removable media. In addition, the computer-readable medium may include both computer storage media and communication media. Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Communication media typically includes any information delivery media, including computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave, or other transport mechanism.
It will be understood by those skilled in the art that the foregoing description of the present invention is for illustrative purposes only and that those of ordinary skill in the art can readily understand that various changes and modifications may be made without departing from the spirit or essential characteristics of the present invention. will be. It is therefore to be understood that the above-described embodiments are illustrative in all aspects and not restrictive. For example, each component described as a single entity may be distributed and implemented, and components described as being distributed may also be implemented in a combined form.
The scope of the present invention is defined by the appended claims rather than the detailed description and all changes or modifications derived from the meaning and scope of the claims and their equivalents are to be construed as being included within the scope of the present invention do.
100: user authentication processing device 110: storage device
120: Processor 200: Password Authentication Pattern
300: random authentication pattern
Claims (17)
A storage device in which the user authentication application is stored and
A processor for executing a user authentication application,
Wherein the storage device stores a password authentication pattern connecting a plurality of points set by a user,
Wherein the processor executes an authentication process in accordance with an input of an authentication pattern of a user at the time of execution of the user authentication application and passes through a certain number of points among a plurality of points constituting the password authentication pattern after inputting the authentication pattern of the user And generates a random authentication pattern to guide the user to input the random authentication pattern.
Wherein the processor generates a random authentication pattern including at least half of a plurality of points constituting the password authentication pattern, wherein at least one point constituting the random authentication pattern is not included in the password authentication pattern Authentication processing device.
Wherein the processor generates a random authentication pattern composed of the same number of points as the number of points constituting the password authentication pattern.
Wherein the processor sets the connection order of the points constituting the random authentication pattern by randomly setting and sets the connection order of the points constituting the random authentication pattern different from the connection order of the points constituting the password authentication pattern.
Wherein the processor approves the authentication when the authentication pattern input by the user matches the password authentication pattern.
Wherein the processor accepts authentication when an authentication pattern input by the user along the random authentication pattern passes through a certain number of points among a plurality of points constituting the random authentication pattern.
Wherein the processor approves the authentication when the point constituting the random authentication pattern and the point constituting the authentication pattern inputted by the user agree with the random authentication pattern.
Wherein the processor approves the authentication when the connection order of the points constituting the random authentication pattern and the connection order of the points constituting the authentication pattern are identical.
Performing an authentication process according to a user's input of an authentication pattern and
Generating a random authentication pattern via a certain number of points among a plurality of points constituting a password authentication pattern preset by the user after inputting the authentication pattern of the user to induce the user to input the random authentication pattern A user authentication processing method.
Wherein the step of deriving the random authentication pattern generates a random authentication pattern including at least half of a plurality of points constituting the encrypted authentication pattern, Is not included in the user authentication processing method.
Wherein the step of deriving the random authentication pattern generates a random authentication pattern composed of the same number of points as the number of points constituting the password authentication pattern.
Wherein the random authentication pattern input is generated by randomly setting a connection order of points constituting the random authentication pattern, wherein the connection order is different from a connection order of points constituting the password authentication pattern.
Wherein the step of performing the authentication processing accepts the authentication when the authentication pattern and the password authentication pattern input by the user coincide with each other.
And performing a secondary authentication process according to an authentication pattern input by the user along with the random authentication pattern.
Wherein the step of performing the auxiliary authentication processing includes accepting authentication when an authentication pattern via a predetermined number of points constituting the random authentication pattern is input.
Wherein the step of performing the auxiliary authentication processing approves the authentication when the point constituting the random authentication pattern and the point constituting the authentication pattern coincide with each other.
Wherein the step of performing the auxiliary authentication processing includes approving the authentication when the connection order of the points constituting the random authentication pattern and the connection order of the points constituting the authentication pattern are identical.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20130080674A KR20150006980A (en) | 2013-07-10 | 2013-07-10 | Apparatus and method for processing user authentication using random pattern |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20130080674A KR20150006980A (en) | 2013-07-10 | 2013-07-10 | Apparatus and method for processing user authentication using random pattern |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20150006980A true KR20150006980A (en) | 2015-01-20 |
Family
ID=52570086
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR20130080674A KR20150006980A (en) | 2013-07-10 | 2013-07-10 | Apparatus and method for processing user authentication using random pattern |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20150006980A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10496852B1 (en) * | 2016-07-12 | 2019-12-03 | Symantec Corporation | Systems and methods of dynamic obfuscation pattern generation for preventing smudge attacks on touch screen devices |
US11507268B2 (en) * | 2019-02-05 | 2022-11-22 | Banks And Acquirers International Holding | Method for validating at least one datum entered on a terminal, corresponding computer program product, device and terminal |
-
2013
- 2013-07-10 KR KR20130080674A patent/KR20150006980A/en not_active Application Discontinuation
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10496852B1 (en) * | 2016-07-12 | 2019-12-03 | Symantec Corporation | Systems and methods of dynamic obfuscation pattern generation for preventing smudge attacks on touch screen devices |
US11507268B2 (en) * | 2019-02-05 | 2022-11-22 | Banks And Acquirers International Holding | Method for validating at least one datum entered on a terminal, corresponding computer program product, device and terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10609026B2 (en) | Data communication method using secure element and electronic system adopting the same | |
US9098850B2 (en) | System and method for transaction security responsive to a signed authentication | |
JP6818679B2 (en) | Secure host card embroidery credentials | |
CN104156642B (en) | A kind of security password input system and method based on safe touch screen control chip | |
US9779232B1 (en) | Trusted code generation and verification to prevent fraud from maleficent external devices that capture data | |
CN109313690A (en) | Self-contained encryption boot policy verifying | |
CN108781210A (en) | Mobile device with credible performing environment | |
CN103886246B (en) | The method and apparatus for supporting the dynamic that authentication device guides safely to change | |
EP3142055A1 (en) | Web based payment service providing apparatus, method, system, and non-transitory computer readable storage medium storing computer program recorded thereon | |
CN105631655A (en) | HCE-based mobile payment method, device and mobile terminal | |
CN105635168A (en) | Off-line transaction device and security key using method thereof | |
CN105975867A (en) | Data processing method | |
CN103678962A (en) | Personal information management method and device and terminal | |
CN109214166A (en) | Smart machine authentication control method and system | |
JP2016045927A (en) | User authentication method, system and storage medium for service account | |
US9619636B2 (en) | Apparatuses and methods for secure display on secondary display device | |
KR20150006980A (en) | Apparatus and method for processing user authentication using random pattern | |
CN111093190B (en) | Method, device, system, electronic equipment and storage medium for writing key data | |
CN110336669B (en) | Information encryption method and device and electronic equipment | |
KR102503526B1 (en) | Apparatus and method for providing authentication service | |
JP6318868B2 (en) | Authentication system and portable communication terminal | |
KR101459283B1 (en) | 2 Channel authentication device and method | |
CN107735788A (en) | Automatic supply equipment is to access account | |
KR101103634B1 (en) | Method for attestating credit card company server and that server | |
US10263972B1 (en) | Authenticating by labeling |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
N231 | Notification of change of applicant | ||
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |