KR20160088510A - System for mobile confirmation of identity and method for mobile confirmation of identity using the same - Google Patents

System for mobile confirmation of identity and method for mobile confirmation of identity using the same Download PDF

Info

Publication number
KR20160088510A
KR20160088510A KR1020150007580A KR20150007580A KR20160088510A KR 20160088510 A KR20160088510 A KR 20160088510A KR 1020150007580 A KR1020150007580 A KR 1020150007580A KR 20150007580 A KR20150007580 A KR 20150007580A KR 20160088510 A KR20160088510 A KR 20160088510A
Authority
KR
South Korea
Prior art keywords
code
module
user
reader
information
Prior art date
Application number
KR1020150007580A
Other languages
Korean (ko)
Inventor
조승제
Original Assignee
주식회사 피그소프트
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 피그소프트 filed Critical 주식회사 피그소프트
Priority to KR1020150007580A priority Critical patent/KR20160088510A/en
Publication of KR20160088510A publication Critical patent/KR20160088510A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention relates to a mobile identity verification system and a mobile identity verification method using the same, and more particularly, to a mobile identity verification system for providing a random code for a short period of time to prevent identity verification by duplication of an identification card and a mobile identity verification method using the same will be. The present invention prevents identity verification by ID duplication by performing first identity verification with a first code assigned in advance and final identification with a second code that is a random code assigned for a short period of time. In addition, according to the present invention, only a person who owns a user terminal must log in within a predetermined time set in advance so as to be able to register a member, change a user terminal, and change a phone number. .

Description

BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a mobile identity verification system and a mobile identity verification method using the mobile identity identification system.

The present invention relates to a mobile identity verification system and a mobile identity verification method using the same, and more particularly, to a mobile identity verification system for providing a random code for a short period of time to prevent identity verification by duplication of an identification card and a mobile identity verification method using the same will be.

Generally, an ID card is a document proving that each person belongs to a government office, a company, or a school. In the past, card-type ID cards were the main issue, but ID cards using mobile terminals are gradually replacing existing card-type ID cards.

At present, a method of displaying an ID card having a code on a mobile terminal and reading the code to confirm the user is generally used. However, such an ID card using a mobile terminal is vulnerable to copying. For example, in the case of a student ID card, student A sends a copy of the page immediately after executing the student ID application and sends it to student B by messenger B. Student B can freely access the library, etc. with the student ID card transmitted. In addition, in the case of the system using the ID card for payment, the ID card displayed on the user's mobile terminal is captured and transmitted to the other person, so that the ID card can be used for payment by the other person. To solve this problem, some mobile terminals use NFC (Near Field Communication) to identify users. However, although this is a good means, it is provided only in the Android terminal, and is not mounted on the IOS terminal (iPhone), which is not applicable to the IOS terminal. Accordingly, there is a demand for a mobile identification system that can be applied to all terminals and can prevent duplication.

Korean Patent Publication No. 10-2005-0099604 (published on October 14, 2005)

An object of the present invention is to provide a mobile identity verification system that can prevent the use of duplication of identification cards and a mobile identity verification method using the same.

According to another aspect of the present invention, there is provided a communication system including a user terminal for displaying a first code, a reader for recognizing the first code, and a second code reader for recognizing the first code, And the reader compares the second code received and displayed by the user terminal with the second code received from the relay server to confirm the identity of the user holding the user terminal And provides a mobile identification system characterized by

The user terminal is provided with an identity verification module, which comprises a login module, an identification information storage module for receiving and storing the identification information of the user including the first code in the relay server, An identification card display module for displaying the ID card generated by the ID card generation module, a terminal second code receiving module for receiving the second code from the relay server, And a second code display module for displaying a second code received from the terminal second code receiving module.

The reader includes a first code receiving module for receiving a first code from the relay server, a code recognizing module for recognizing a first code displayed by the ID display module, a first code receiving module A second code request module for requesting a second code to the relay server when the first code recognized by the code recognition module is identical to the first code received by the relay server, And a second code authentication module for authenticating a user when a second code received by the reader second code receiving module matches a second code displayed by the second code displaying module.

The relay server includes: a membership subscription module for receiving user information from the user and subscribing to the member; a first code generation module for generating a first code to be allocated to the subscription user; A second code generation module for generating a second code when the second code request module requests the second code, and a second code generation module for generating a second code when the second code request module requests the second code, And a second code transmission module for transmitting the generated second code to the terminal second code reception module and the reader second code reception module, respectively.

Wherein the membership subscription module comprises: a user information input module for receiving user information from the user; a verification unit for checking whether the inputted user information matches the user information stored in the authentication server, Module and a login confirmation module for approving a final membership when the user who has made the user information confirmation module in the member registration waiting state performs a login within a predetermined time set in advance.

According to another aspect of the present invention, there is provided a computer readable recording medium having embodied thereon a program for causing a computer to execute the steps of: determining whether a first code displayed on a user terminal is recognized by a reader and coinciding with a first code stored therein; The relay server generates and transmits a second code to the user terminal and the reader, and the reader recognizes the second code displayed on the user terminal and transmits the second code, which is received from the relay server, Of the mobile communication terminal and the mobile communication terminal.

The method comprising the steps of: recognizing a first code displayed on a user terminal and checking whether the first code matches a first code stored in the reader; receiving user information from a user through a user information input module; If the received user information matches the user information stored in the authentication server or if the user information confirmation module of the relay server checks and matches the user information, The login confirmation module of the relay server confirms whether the login has been performed by receiving the information necessary for login within a predetermined time, and if the login is performed within a predetermined time, the approval of the membership is finally approved.

The login confirmation module confirms whether the login has been performed by inputting information necessary for login within a predetermined time set in advance by the user who is in the membership waiting state through the login module and if the login is performed within a predetermined time, Generating a first code in the relay server between a first code displayed on the user terminal and a first code recognized by the reader and matching with a first code stored in the reader, Transmitting the identification information including the first code to the reader, and generating the identification card in which the user terminal displays the first code with the identification information.

The present invention relates to a mobile identification system for preventing identification by duplication of an identification card by performing a first identification with a first code assigned in advance and a final identification with a second code which is a random code assigned for a short period of time, Provide an identity verification method.

In addition, according to the present invention, only a person who owns a user terminal must log in within a predetermined time set in advance so as to be able to register a member, change a user terminal, and change a phone number. And a mobile identity verification method using the same.

1 is a block diagram of a mobile identification system in accordance with the present invention.
2 is a conceptual diagram of a mobile identification system in accordance with the present invention.
Figure 3 is an illustration of an identification card generated in a mobile identification system in accordance with the present invention;
4 is a flowchart of a mobile identity verification method in accordance with the present invention.

Hereinafter, embodiments of the present invention will be described in detail with reference to the drawings.

It will be apparent to those skilled in the art that the present invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, It is provided to let you know. Like reference numerals refer to like elements throughout.

Figure 1 is a block diagram of a mobile identity verification system in accordance with the present invention, and Figure 2 is a conceptual diagram of a mobile identity verification system in accordance with the present invention.

1, the mobile identity verification system according to the present invention includes a user terminal 100 having an identity verification module 110, a reader 200 for verifying the identity of a user from the user terminal 100, A relay server 300 for relaying the user terminal 100 and the reader 200 and an authentication server 400 for authenticating whether or not the user is registered in the relay server 300.

The user terminal 100 is provided with an identification module 110 to confirm the identity of a user through communication with the reader 200. The embodiment illustrates a smart phone as a user terminal 100. [ In addition, the identity verification module 110, which will be described later, illustrates an application installed in a smart phone. Of course, the present invention is not limited thereto, and the identification module 110 may be provided in a separate terminal.

The identity verification module 110 provides the stored ID information to the reader 200 to allow the reader 200 to verify the identity of the user. To this end, the identity verification module 110 includes a login module 111, an identification information storage module 112, an identification card generation module 113, an identification card display module 114, a terminal second code reception module 115, 2 code display module 116 as shown in FIG.

The login module 111 performs user authentication so that the identity verification module 110 can be used. Here, the login can use an ID and a password, and when applied to a student ID as in the present embodiment, the ID can be an ID number. The present invention illustrates membership in the relay server 300 through a separate terminal, for example, a personal computer. However, the present invention is not limited to this, and it is possible to connect to the relay server 300 through the identity verification module 110 instead of a separate terminal to perform membership registration. Also, when the user performs the login through the login module 111, the stored ID is automatically displayed. Of course, this is a case where only one ID card is stored. If a plurality of ID cards are stored, a screen for selecting one of a plurality of ID cards may be displayed when login is performed.

The ID information storage module 112 receives ID information from the relay server 300 and stores the ID information. If the relay server 300 accesses the relay server 300 through the login module 111 within a predetermined period of time, for example, within one minute after requesting the use of the ID card to the relay server 300, And transmits the ID information to the terminal 100. Also, the ID information storage module 112 stores the ID information transmitted from the relay server 300. Here, the stored ID information includes a first code and may include at least one of user information in addition to the first code.

Figure 3 is an illustration of an identification card generated in a mobile identification system in accordance with the present invention.

The ID card generation module 113 generates an ID card based on the ID card information stored in the ID card storage module 112. The present invention illustrates that the ID card generated by the ID card generation module 113 is a student ID card. Accordingly, as shown in FIG. 3, the ID card generated by the ID card generation module 113 includes a photograph of the user and a first code assigned to the user. In addition, in addition to this, the student's school number and school name can be displayed. However, the present invention is not limited to this, and the information other than the first code may vary depending on the situation.

The ID card display module 114 displays the ID card generated by the ID card generation module 113. As shown in FIG. 3, this embodiment can be displayed as a general student identification card displaying a user picture and a first code. Of course, the ID information may further include student number information and school information. In addition, the first code of the ID card displayed on the ID card display module 114 is read through the reader 200 to be used for confirming the user.

The terminal second code receiving module 115 receives the second code, which is the second code transmitted from the relay server 300. Here, the second code is a code that the reader 200 requests to the relay server 300 after reading the first code, which is the first code, and is a substantial user identification code. That is, the first code, which is the first code, is a code requesting the second code, and the second code is requested to the relay server 300 immediately after the reader 200 reads the first code, And the user terminal 100, respectively.

The second code display module 116 displays the second code received from the relay server 300 on the screen of the user terminal 100. The second code display module 116 displays the second code immediately after receiving the second code. In addition, the reader 200 reads the second code displayed on the screen of the user terminal 100 and confirms that the code is the same as the second code transmitted from the relay server 300, thereby authenticating the user.

The reader 200 is for authenticating a user from the user terminal 100 and includes a first code receiving module 210, a code recognition module 220, a second code request module 230, (240) and a second code authentication module (250).

The first code receiving module 210 receives and stores the first code from the first code transmitting module of the relay server 300. Here, the stored first code is compared with the first code of the user terminal 100 recognized by the code recognition module 220.

The code recognition module 220 reads and recognizes the first code and the second code displayed on the user terminal 100. The reader 200 reads a first code and a second code displayed on the user terminal 100 in substantially one configuration and simply reads a code such as a bar code and a QR code.

The second code request module 230 requests the relay server 300 for the second code. If the first code recognized by the code recognition module 220 is the same as the first code stored in the first code receiving module 210, the second code requesting module 230 requests the relay server 300 to immediately request the second code do.

The reader second code receiving module 240 receives the second code transmitted from the relay server 300. Here, the second code is the same code as the second code received by the terminal second code receiving module 115 described above. That is, the relay server 300 simultaneously transmits the same second code to the user terminal 100 and the reader 200 as soon as the second code request module 230 requests the second code.

The second code authentication module 250 checks whether the second code displayed through the terminal second code display module 116 and the second code received by the reader second code receiving module 240 are the same code. Here, if the two codes are the same, the second code authentication module 250 authenticates the corresponding user as a normal user, but if the two codes are different from each other, the user is determined to be an unauthorized user. For example, when the first user duplicates the ID card generated in his / her terminal by the second user by shooting or the like, the reader 200 recognizes the first code of the duplicated ID card and transmits it to the relay server 300 The terminal of the second user can not receive the second code even if the second code is requested. The present invention performs user authentication using a second code other than the first code displayed on the student ID card. That is, the terminal of the second user using the duplicated student ID does not receive the second code, so that only the first code is still displayed, and the reader 200 displays the first code of the second user terminal 100, The second user compares the second code transmitted by the second user 300 and performs the user authentication. Here, it is impossible to photograph the second code because the second code is displayed and disappears for a very short predetermined time, for example, about one second after the relay server 300 transmits. Further, since the second code is generated randomly every time, it is impossible to use the second code for user authentication even if it is photographed.

The relay server 300 manages user information and relays the user terminal 100 and the reader 200. The relay server 300 includes a member subscription module 310, a first code generation module 320, an ID information transmission module 330, a second code generation module 340, and a second code transmission module 350 .

The membership registration module 310 is for registering a user in the relay server 300 and includes a user information input module 311, a user information confirmation module 312 and a login confirmation module 313. [

The user information input module 311 inputs user information necessary for member registration. Here, the user information includes a user photograph, student number information, telephone number information, and terminal serial information. Of course, if the ID card is not a student ID card, the student ID information may be changed to similar information. For example, an employee ID can be an employee number, and in the case of a civil service ID, it can be a resident registration number. Also, in the case of an employee ID card, the user information may include affiliation information, position / rank information, and name information in addition to employee ID information. In addition, in the case of a civil service certificate, the user information may include member information, position / rank information, and name information in addition to the resident registration number information.

The user information confirmation module 312 confirms whether the user information input through the user information input module 311 is real information. To this end, the user information confirmation module 312 compares the user information input through the user information confirmation module 312 with the user information stored in the authentication server 400 and confirms whether the user information matches. Here, if the user information input through the user information confirmation module 312 matches the user information stored in the authentication server 400, the user is approved for membership, but if not, the membership is rejected.

The login confirmation module 313 confirms whether the user has logged in to his / her terminal after completing membership. In the present invention, after the user completes the membership subscription, the subscription to the terminal is completed after completing the login to the user terminal within a predetermined period of time, for example, one minute.

The first code generation module 320 generates the first code after completion of membership of the user or after the login confirmation module 313 completes the login confirmation of the user. The first code is generated randomly so that it does not overlap with the first code previously assigned to another user. Also, once the first code is generated, it is displayed when the ID card is generated and does not change.

The ID information transmission module 330 transmits the ID information including the first code to the ID information storage module 112 of the user terminal 100 after the user completes the login to his / her terminal within a predetermined time. Herein, the ID information is transmitted to the user terminal 100 and the reader 200, respectively.

The second code generation module 340 generates a second code when the second code request module 230 of the reader 200 requests the second code. Here, it is preferable that the second code is randomly generated without any special pattern. In addition, the second code must be different from the first code.

The second code transmission module 350 transmits the second code generated by the second code generation module 340. The second code transmitted from the second code transmission module 350 is transmitted to the second code reception module 115 as well as the reader second code reception module 240. [ The second code transmitted to the reader second code receiving module 240 and the terminal second code receiving module 115 are the same.

The authentication server 400 confirms whether the user information received by the user information confirmation module 312 of the relay server 300 through the user information input module 311 is information of an actual user. For this purpose, a user information database must be established in the authentication server 400. Also, the authentication server 400 receives the user information from the user information confirmation module 312, compares the user information with the user information stored in the user information database, and notifies the user information confirmation module 312 of the matching result.

Meanwhile, the present invention can be constructed with an access information database storing user access information. The access information database may be constructed in a separate server or in the authentication server 400.

In addition, the relay server 300 may include a user terminal 100 change request module and a user phone number change request module that apply the change when the user terminal 100 is changed or the phone number is changed. Here, when the change request module of the user terminal 100 receives an application for changing the user terminal 100 from the user, the change request module puts the change state of the user terminal 100 in a standby state for a predetermined period of time, for example, (100), the user terminal 100 is finally changed. When the user phone number change request module receives an application for changing the user phone number from the user, the user phone number change request module waits for the change of the user phone number. When the user logs in to the user terminal 100 of the changed phone number within a predetermined time, To complete the change of the user telephone number. Of course, even if the application for changing the user terminal 100 and the application for changing the user's phone number are performed at the same time, when the application is received, the application is put in a standby state and the change is finally completed through login confirmation. Here, when the telephone number is changed, the relay server 300 transmits a character indicating that the telephone number has been changed to both the telephone number before the change and the telephone number after the change, so that the relay server 300 can recognize the change if the change has not been made by the user himself. When the user terminal 100 is lost, the relay server 300 stops the authentication of the corresponding user terminal 100 by connecting to the relay server 300 and requesting the suspension of the use. In this case, when the loss of the user terminal 100 is withdrawn, the user can withdraw the use suspension request and log in within a predetermined time.

Hereinafter, a mobile identity verification method according to the present invention will be described with reference to the drawings. The duplicate description of the mobile identity verification system according to the present invention described above will be omitted or briefly explained.

4 is a flowchart of a mobile identification method according to the present invention.

As shown in FIG. 4, the mobile identity verification method according to the present invention includes a subscription step S1, a step S2 of transmitting identification information, a step S3 of generating an identification card, (S4) generating and transmitting a second code (S5), and confirming a second code (S6).

The subscription step S1 is a subscription to a separate terminal through the subscription module of the relay server. Here, the subscription step S1 includes a step S1-1 of receiving user information, a step S1-2 of confirming user information, and a step S1-3 of confirming a login.

The step (S1-1) of receiving the user information receives the user information from the user through the user information input module.

The step S1-2 of checking the user information is performed by comparing the user information inputted in the step S1-1 of receiving the user information with the user information stored in the authentication server by the user information confirmation module .

In step S1-3 of confirming the login, the user who has completed the member registration through the member registration step S1 receives the information necessary for the login, and confirms that the login is performed. Here, the step S1-3 of confirming the login should be performed within a predetermined time, for example, one minute after the step S1-2 of confirming the user information.

The step S2 of transmitting the ID information is a step in which the relay server transmits the ID information to the user terminal and the reader when the member registration step S1 is passed. At this time, the step S2 of transmitting the ID information as described above is performed when the login step S1-3 is completed within a predetermined time, for example, one minute after the completion of the step S1-2 of confirming the user information do. That is, if the login step (S1-3) is not completed within a predetermined time, the subsequent process including the step (S2) of transmitting the ID information does not proceed, and the step (S1-1) Should be. In addition, the user information may be transmitted in addition to the identification information in the step S2 of transmitting the ID information. Of course, if the first code includes user identification information, it may also transmit only the first code to the reader. That is, the reader receives only the first code, and when the reader recognizes the first code of the user terminal, it may request the second code if the recognized first code is confirmed through communication with the relay server.

The step S3 of generating the ID card passes the member joining step S1, and the ID card generating module generates the ID card. The ID generated here includes the first code generated by the relay server.

In the step S4 of confirming the first code, the reader confirms the first code displayed on the identification card. That is, if the code recognition module of the reader recognizes the first code displayed on the identification card and matches the first code received in the step S2 of transmitting the identification information, the second code is requested to the relay server.

The step S5 of generating and transmitting the second code generates the second code and transmits the second code to the user terminal and the reader, respectively, through the relay server requesting the second code through the step S4 of confirming the first code. Here, the second codes transmitted to the user terminal and the reader are identical to each other, and are randomly generated codes by the relay server.

The step of confirming the second code (S6) compares the second code received from the relay server with the second code displayed on the user terminal to confirm the user. Here, it is preferable that the second code displayed on the user terminal is displayed for only the time recognized by the reader. That is, the user can recognize the user terminal by accessing the reader only once, while the user terminal and the reader recognize the first code and the second code in an instant. Identity cards, such as student ID cards, are often copied to an acquaintance with the user's consent. The present invention randomly generates a second code that is substantially used for user authentication, and displays and disappears only for a short period of time recognized by the reader, so that even if the user agrees, ID card copying is disabled.

Meanwhile, the present invention may further include a step of replacing a user terminal, a step of changing a telephone number, and a step of requesting suspension of use.

It will be apparent to those skilled in the art that various modifications and variations can be made in the present invention without departing from the spirit or scope of the present invention as defined by the appended claims. You will understand.

100: user terminal 110: identity verification module
111: login module 112: identification information storage module
113: ID card generation module 114: ID card display module
115: terminal second code receiving module 116: second code display module
200: reader 210: first code receiving module
220: code recognition module 230: second code request module
240: reader second code receiving module 250: second code authentication module
300: Relay server 310: Subscription module
311: User information input module 312: User information confirmation module
313: login confirmation module 320: first code generation module
330: ID card information transmission module 340: second code generation module
350: second code transmission module 400: authentication server

Claims (8)

A user terminal for displaying a first code,
A reader for recognizing the first code, and
And a relay server for transmitting a second code to the user terminal and the reader when the reader recognizes the first code,
Wherein the reader compares a second code received and displayed by the user terminal with a second code received from the relay server to confirm the identity of the user having the user terminal.
The method according to claim 1,
The user terminal is provided with an identity verification module,
Wherein the identification module comprises:
A login module,
An identification information storage module for receiving and storing ID information of a user including the first code in the relay server,
An ID card generation module for generating an ID card having the first code displayed on the basis of the ID card information,
An identification card display module for displaying the ID card generated by the ID card generation module,
A terminal second code receiving module for receiving the second code from the relay server, and
And a second code display module for displaying a second code received from the terminal second code reception module.
The method of claim 2,
The reader includes:
A first code receiving module for receiving a first code from the relay server;
A code recognition module for recognizing a first code displayed by the ID card,
A second code request module that requests a second code to the relay server when the first code received by the first code receiving module matches the first code recognized by the code recognizing module,
A reader second code receiving module for receiving a second code transmitted from the relay server, and
And a second code authentication module for authenticating a user when a second code received by the reader second code receiving module matches a second code displayed by the second code displaying module. system.
The method of claim 3,
The relay server includes:
A membership subscription module for receiving user information from the user and subscribing to the member,
A first code generation module for generating a first code to be allocated to the registered user,
An ID information transmission module for transmitting ID information including the first code to the user terminal and the reader,
A second code generation module for generating a second code when the second code request module requests a second code, and
And a second code transmission module for transmitting the second code generated by the second code generation module to the terminal second code reception module and the reader second code reception module, respectively.
The method of claim 4,
Wherein the membership subscription module comprises:
A user information input module for receiving user information from the user;
A user information confirmation module for confirming whether the input user information matches the user information stored in the authentication server,
And a login confirmation module for approving a final membership when the user who has been put in the member registration waiting state of the user information confirmation module performs a login within a predetermined time.
Checking whether the first code displayed on the user terminal is recognized by the reader and coinciding with the first code stored in the reader,
When the first code displayed on the user terminal matches the first code stored in the reader, the relay server generates and transmits the second code to the user terminal and the reader, respectively, and
Wherein the reader recognizes a second code displayed on the user terminal and checks whether the second code matches a second code received from the relay server.
The method of claim 6,
Checking whether the first code displayed on the user terminal is recognized by the reader and coinciding with the first code stored in the reader,
Receiving user information from a user through a user information input module,
Setting the user information input through the user information input module to match the user information stored in the authentication server, if the user information confirmation module of the relay server checks and matches the user information,
The login confirmation module of the relay server confirms whether the login has been performed by inputting the information necessary for login within a predetermined time set in advance by the user who is in the membership waiting state through the login module and if the login is performed within a predetermined time, And approving the subscription. ≪ Desc / Clms Page number 21 >
The method of claim 7,
The login confirmation module confirms whether the login has been performed by inputting information necessary for login within a predetermined time set in advance by the user who is in the membership waiting state through the login module and if the login is performed within a predetermined time, , ≪ / RTI &
Checking whether the first code displayed on the user terminal is recognized by the reader and coinciding with the first code stored in the reader,
Generating a first code at the relay server, transmitting identification information including the first code to the user terminal and the reader,
And the user terminal generates the ID card having the first code as the ID information.
KR1020150007580A 2015-01-15 2015-01-15 System for mobile confirmation of identity and method for mobile confirmation of identity using the same KR20160088510A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150007580A KR20160088510A (en) 2015-01-15 2015-01-15 System for mobile confirmation of identity and method for mobile confirmation of identity using the same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150007580A KR20160088510A (en) 2015-01-15 2015-01-15 System for mobile confirmation of identity and method for mobile confirmation of identity using the same

Publications (1)

Publication Number Publication Date
KR20160088510A true KR20160088510A (en) 2016-07-26

Family

ID=56680772

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150007580A KR20160088510A (en) 2015-01-15 2015-01-15 System for mobile confirmation of identity and method for mobile confirmation of identity using the same

Country Status (1)

Country Link
KR (1) KR20160088510A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018124856A1 (en) * 2016-12-30 2018-07-05 주식회사 코인플러그 Method and terminal for authenticating user by utilizing mobile id by means of blockchain database, and server utilizing method and terminal
CN111090848A (en) * 2019-11-05 2020-05-01 深圳市文鼎创数据科技有限公司 Authentication method and authentication device
KR20230049942A (en) 2021-10-07 2023-04-14 한국전자통신연구원 Apparatus and method for verification using mobile id based on user face

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050099604A (en) 2005-09-23 2005-10-14 주식회사 엠투스네트웍스 2d-barcode generating and mobile identification system in ubiquitous environment

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050099604A (en) 2005-09-23 2005-10-14 주식회사 엠투스네트웍스 2d-barcode generating and mobile identification system in ubiquitous environment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018124856A1 (en) * 2016-12-30 2018-07-05 주식회사 코인플러그 Method and terminal for authenticating user by utilizing mobile id by means of blockchain database, and server utilizing method and terminal
CN111090848A (en) * 2019-11-05 2020-05-01 深圳市文鼎创数据科技有限公司 Authentication method and authentication device
KR20230049942A (en) 2021-10-07 2023-04-14 한국전자통신연구원 Apparatus and method for verification using mobile id based on user face

Similar Documents

Publication Publication Date Title
US11108558B2 (en) Authentication and fraud prevention architecture
EP3499795A1 (en) Authentication system and method, and user equipment, authentication server, and service server for performing same method
CN101335619B (en) Authorized using method of disposal dynamic cipher telephone or short message
EP3043306A1 (en) System for convenient person authentication using mobile communication terminal and actual financial card and method therefor
CN104077689A (en) Information verification method, relevant device and system
GB2549371A (en) Access authentication method and system
KR101675728B1 (en) Method and apparatus for processing user authentification using information processing device
US11734544B2 (en) Mobile passport, mobile passport generation system for generating same, and mobile passport certification method
US20120159598A1 (en) User authentication system and method using personal identification number
US20190164167A1 (en) System and Method for Identity Verification of a User
WO2014180345A1 (en) User identity verification and authorization system
JP2017102842A (en) Personal identification system, personal identification information output system, authentication server, personal identification method, personal identification information output method, and program
KR20160088510A (en) System for mobile confirmation of identity and method for mobile confirmation of identity using the same
WO2018176020A1 (en) System and method for confirming a person's identity
KR101603963B1 (en) Authentication method using fingerprint information and certification number, user terminal and financial institution server
CN110582771B (en) Method and apparatus for performing authentication based on biometric information
US10129266B2 (en) Identity information systems and methods
CN104735067A (en) O2O real name registration admittance system and method
US20160342996A1 (en) Two-factor authentication method
CN105095704A (en) Identity recognition method based on multiple dynamic authentication
US20150371227A1 (en) Registering a Mobile User
KR20230049942A (en) Apparatus and method for verification using mobile id based on user face
KR101044518B1 (en) System for certifying autographed document or product using SMS of mobile phone and method thereof
KR102048468B1 (en) System and method for identification of a corporate name user
KR101691163B1 (en) User authentication method and server performing the same

Legal Events

Date Code Title Description
E902 Notification of reason for refusal
E601 Decision to refuse application