KR20160088510A - System for mobile confirmation of identity and method for mobile confirmation of identity using the same - Google Patents
System for mobile confirmation of identity and method for mobile confirmation of identity using the same Download PDFInfo
- Publication number
- KR20160088510A KR20160088510A KR1020150007580A KR20150007580A KR20160088510A KR 20160088510 A KR20160088510 A KR 20160088510A KR 1020150007580 A KR1020150007580 A KR 1020150007580A KR 20150007580 A KR20150007580 A KR 20150007580A KR 20160088510 A KR20160088510 A KR 20160088510A
- Authority
- KR
- South Korea
- Prior art keywords
- code
- module
- user
- reader
- information
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 238000012790 confirmation Methods 0.000 title claims description 29
- 238000012795 verification Methods 0.000 claims abstract description 35
- 230000005540 biological transmission Effects 0.000 claims description 10
- 238000012508 change request Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 125000002066 L-histidyl group Chemical group [H]N1C([H])=NC(C([H])([H])[C@](C(=O)[*])([H])N([H])[H])=C1[H] 0.000 description 3
- 239000000725 suspension Substances 0.000 description 3
- 238000010295 mobile communication Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Tourism & Hospitality (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention relates to a mobile identity verification system and a mobile identity verification method using the same, and more particularly, to a mobile identity verification system for providing a random code for a short period of time to prevent identity verification by duplication of an identification card and a mobile identity verification method using the same will be. The present invention prevents identity verification by ID duplication by performing first identity verification with a first code assigned in advance and final identification with a second code that is a random code assigned for a short period of time. In addition, according to the present invention, only a person who owns a user terminal must log in within a predetermined time set in advance so as to be able to register a member, change a user terminal, and change a phone number. .
Description
The present invention relates to a mobile identity verification system and a mobile identity verification method using the same, and more particularly, to a mobile identity verification system for providing a random code for a short period of time to prevent identity verification by duplication of an identification card and a mobile identity verification method using the same will be.
Generally, an ID card is a document proving that each person belongs to a government office, a company, or a school. In the past, card-type ID cards were the main issue, but ID cards using mobile terminals are gradually replacing existing card-type ID cards.
At present, a method of displaying an ID card having a code on a mobile terminal and reading the code to confirm the user is generally used. However, such an ID card using a mobile terminal is vulnerable to copying. For example, in the case of a student ID card, student A sends a copy of the page immediately after executing the student ID application and sends it to student B by messenger B. Student B can freely access the library, etc. with the student ID card transmitted. In addition, in the case of the system using the ID card for payment, the ID card displayed on the user's mobile terminal is captured and transmitted to the other person, so that the ID card can be used for payment by the other person. To solve this problem, some mobile terminals use NFC (Near Field Communication) to identify users. However, although this is a good means, it is provided only in the Android terminal, and is not mounted on the IOS terminal (iPhone), which is not applicable to the IOS terminal. Accordingly, there is a demand for a mobile identification system that can be applied to all terminals and can prevent duplication.
An object of the present invention is to provide a mobile identity verification system that can prevent the use of duplication of identification cards and a mobile identity verification method using the same.
According to another aspect of the present invention, there is provided a communication system including a user terminal for displaying a first code, a reader for recognizing the first code, and a second code reader for recognizing the first code, And the reader compares the second code received and displayed by the user terminal with the second code received from the relay server to confirm the identity of the user holding the user terminal And provides a mobile identification system characterized by
The user terminal is provided with an identity verification module, which comprises a login module, an identification information storage module for receiving and storing the identification information of the user including the first code in the relay server, An identification card display module for displaying the ID card generated by the ID card generation module, a terminal second code receiving module for receiving the second code from the relay server, And a second code display module for displaying a second code received from the terminal second code receiving module.
The reader includes a first code receiving module for receiving a first code from the relay server, a code recognizing module for recognizing a first code displayed by the ID display module, a first code receiving module A second code request module for requesting a second code to the relay server when the first code recognized by the code recognition module is identical to the first code received by the relay server, And a second code authentication module for authenticating a user when a second code received by the reader second code receiving module matches a second code displayed by the second code displaying module.
The relay server includes: a membership subscription module for receiving user information from the user and subscribing to the member; a first code generation module for generating a first code to be allocated to the subscription user; A second code generation module for generating a second code when the second code request module requests the second code, and a second code generation module for generating a second code when the second code request module requests the second code, And a second code transmission module for transmitting the generated second code to the terminal second code reception module and the reader second code reception module, respectively.
Wherein the membership subscription module comprises: a user information input module for receiving user information from the user; a verification unit for checking whether the inputted user information matches the user information stored in the authentication server, Module and a login confirmation module for approving a final membership when the user who has made the user information confirmation module in the member registration waiting state performs a login within a predetermined time set in advance.
According to another aspect of the present invention, there is provided a computer readable recording medium having embodied thereon a program for causing a computer to execute the steps of: determining whether a first code displayed on a user terminal is recognized by a reader and coinciding with a first code stored therein; The relay server generates and transmits a second code to the user terminal and the reader, and the reader recognizes the second code displayed on the user terminal and transmits the second code, which is received from the relay server, Of the mobile communication terminal and the mobile communication terminal.
The method comprising the steps of: recognizing a first code displayed on a user terminal and checking whether the first code matches a first code stored in the reader; receiving user information from a user through a user information input module; If the received user information matches the user information stored in the authentication server or if the user information confirmation module of the relay server checks and matches the user information, The login confirmation module of the relay server confirms whether the login has been performed by receiving the information necessary for login within a predetermined time, and if the login is performed within a predetermined time, the approval of the membership is finally approved.
The login confirmation module confirms whether the login has been performed by inputting information necessary for login within a predetermined time set in advance by the user who is in the membership waiting state through the login module and if the login is performed within a predetermined time, Generating a first code in the relay server between a first code displayed on the user terminal and a first code recognized by the reader and matching with a first code stored in the reader, Transmitting the identification information including the first code to the reader, and generating the identification card in which the user terminal displays the first code with the identification information.
The present invention relates to a mobile identification system for preventing identification by duplication of an identification card by performing a first identification with a first code assigned in advance and a final identification with a second code which is a random code assigned for a short period of time, Provide an identity verification method.
In addition, according to the present invention, only a person who owns a user terminal must log in within a predetermined time set in advance so as to be able to register a member, change a user terminal, and change a phone number. And a mobile identity verification method using the same.
1 is a block diagram of a mobile identification system in accordance with the present invention.
2 is a conceptual diagram of a mobile identification system in accordance with the present invention.
Figure 3 is an illustration of an identification card generated in a mobile identification system in accordance with the present invention;
4 is a flowchart of a mobile identity verification method in accordance with the present invention.
Hereinafter, embodiments of the present invention will be described in detail with reference to the drawings.
It will be apparent to those skilled in the art that the present invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, It is provided to let you know. Like reference numerals refer to like elements throughout.
Figure 1 is a block diagram of a mobile identity verification system in accordance with the present invention, and Figure 2 is a conceptual diagram of a mobile identity verification system in accordance with the present invention.
1, the mobile identity verification system according to the present invention includes a
The
The
The
The ID
Figure 3 is an illustration of an identification card generated in a mobile identification system in accordance with the present invention.
The ID
The ID
The terminal second
The second code display module 116 displays the second code received from the
The
The first
The
The second
The reader second
The second
The
The
The user
The user
The
The first
The ID
The second
The second
The
Meanwhile, the present invention can be constructed with an access information database storing user access information. The access information database may be constructed in a separate server or in the
In addition, the
Hereinafter, a mobile identity verification method according to the present invention will be described with reference to the drawings. The duplicate description of the mobile identity verification system according to the present invention described above will be omitted or briefly explained.
4 is a flowchart of a mobile identification method according to the present invention.
As shown in FIG. 4, the mobile identity verification method according to the present invention includes a subscription step S1, a step S2 of transmitting identification information, a step S3 of generating an identification card, (S4) generating and transmitting a second code (S5), and confirming a second code (S6).
The subscription step S1 is a subscription to a separate terminal through the subscription module of the relay server. Here, the subscription step S1 includes a step S1-1 of receiving user information, a step S1-2 of confirming user information, and a step S1-3 of confirming a login.
The step (S1-1) of receiving the user information receives the user information from the user through the user information input module.
The step S1-2 of checking the user information is performed by comparing the user information inputted in the step S1-1 of receiving the user information with the user information stored in the authentication server by the user information confirmation module .
In step S1-3 of confirming the login, the user who has completed the member registration through the member registration step S1 receives the information necessary for the login, and confirms that the login is performed. Here, the step S1-3 of confirming the login should be performed within a predetermined time, for example, one minute after the step S1-2 of confirming the user information.
The step S2 of transmitting the ID information is a step in which the relay server transmits the ID information to the user terminal and the reader when the member registration step S1 is passed. At this time, the step S2 of transmitting the ID information as described above is performed when the login step S1-3 is completed within a predetermined time, for example, one minute after the completion of the step S1-2 of confirming the user information do. That is, if the login step (S1-3) is not completed within a predetermined time, the subsequent process including the step (S2) of transmitting the ID information does not proceed, and the step (S1-1) Should be. In addition, the user information may be transmitted in addition to the identification information in the step S2 of transmitting the ID information. Of course, if the first code includes user identification information, it may also transmit only the first code to the reader. That is, the reader receives only the first code, and when the reader recognizes the first code of the user terminal, it may request the second code if the recognized first code is confirmed through communication with the relay server.
The step S3 of generating the ID card passes the member joining step S1, and the ID card generating module generates the ID card. The ID generated here includes the first code generated by the relay server.
In the step S4 of confirming the first code, the reader confirms the first code displayed on the identification card. That is, if the code recognition module of the reader recognizes the first code displayed on the identification card and matches the first code received in the step S2 of transmitting the identification information, the second code is requested to the relay server.
The step S5 of generating and transmitting the second code generates the second code and transmits the second code to the user terminal and the reader, respectively, through the relay server requesting the second code through the step S4 of confirming the first code. Here, the second codes transmitted to the user terminal and the reader are identical to each other, and are randomly generated codes by the relay server.
The step of confirming the second code (S6) compares the second code received from the relay server with the second code displayed on the user terminal to confirm the user. Here, it is preferable that the second code displayed on the user terminal is displayed for only the time recognized by the reader. That is, the user can recognize the user terminal by accessing the reader only once, while the user terminal and the reader recognize the first code and the second code in an instant. Identity cards, such as student ID cards, are often copied to an acquaintance with the user's consent. The present invention randomly generates a second code that is substantially used for user authentication, and displays and disappears only for a short period of time recognized by the reader, so that even if the user agrees, ID card copying is disabled.
Meanwhile, the present invention may further include a step of replacing a user terminal, a step of changing a telephone number, and a step of requesting suspension of use.
It will be apparent to those skilled in the art that various modifications and variations can be made in the present invention without departing from the spirit or scope of the present invention as defined by the appended claims. You will understand.
100: user terminal 110: identity verification module
111: login module 112: identification information storage module
113: ID card generation module 114: ID card display module
115: terminal second code receiving module 116: second code display module
200: reader 210: first code receiving module
220: code recognition module 230: second code request module
240: reader second code receiving module 250: second code authentication module
300: Relay server 310: Subscription module
311: User information input module 312: User information confirmation module
313: login confirmation module 320: first code generation module
330: ID card information transmission module 340: second code generation module
350: second code transmission module 400: authentication server
Claims (8)
A reader for recognizing the first code, and
And a relay server for transmitting a second code to the user terminal and the reader when the reader recognizes the first code,
Wherein the reader compares a second code received and displayed by the user terminal with a second code received from the relay server to confirm the identity of the user having the user terminal.
The user terminal is provided with an identity verification module,
Wherein the identification module comprises:
A login module,
An identification information storage module for receiving and storing ID information of a user including the first code in the relay server,
An ID card generation module for generating an ID card having the first code displayed on the basis of the ID card information,
An identification card display module for displaying the ID card generated by the ID card generation module,
A terminal second code receiving module for receiving the second code from the relay server, and
And a second code display module for displaying a second code received from the terminal second code reception module.
The reader includes:
A first code receiving module for receiving a first code from the relay server;
A code recognition module for recognizing a first code displayed by the ID card,
A second code request module that requests a second code to the relay server when the first code received by the first code receiving module matches the first code recognized by the code recognizing module,
A reader second code receiving module for receiving a second code transmitted from the relay server, and
And a second code authentication module for authenticating a user when a second code received by the reader second code receiving module matches a second code displayed by the second code displaying module. system.
The relay server includes:
A membership subscription module for receiving user information from the user and subscribing to the member,
A first code generation module for generating a first code to be allocated to the registered user,
An ID information transmission module for transmitting ID information including the first code to the user terminal and the reader,
A second code generation module for generating a second code when the second code request module requests a second code, and
And a second code transmission module for transmitting the second code generated by the second code generation module to the terminal second code reception module and the reader second code reception module, respectively.
Wherein the membership subscription module comprises:
A user information input module for receiving user information from the user;
A user information confirmation module for confirming whether the input user information matches the user information stored in the authentication server,
And a login confirmation module for approving a final membership when the user who has been put in the member registration waiting state of the user information confirmation module performs a login within a predetermined time.
When the first code displayed on the user terminal matches the first code stored in the reader, the relay server generates and transmits the second code to the user terminal and the reader, respectively, and
Wherein the reader recognizes a second code displayed on the user terminal and checks whether the second code matches a second code received from the relay server.
Checking whether the first code displayed on the user terminal is recognized by the reader and coinciding with the first code stored in the reader,
Receiving user information from a user through a user information input module,
Setting the user information input through the user information input module to match the user information stored in the authentication server, if the user information confirmation module of the relay server checks and matches the user information,
The login confirmation module of the relay server confirms whether the login has been performed by inputting the information necessary for login within a predetermined time set in advance by the user who is in the membership waiting state through the login module and if the login is performed within a predetermined time, And approving the subscription. ≪ Desc / Clms Page number 21 >
The login confirmation module confirms whether the login has been performed by inputting information necessary for login within a predetermined time set in advance by the user who is in the membership waiting state through the login module and if the login is performed within a predetermined time, , ≪ / RTI &
Checking whether the first code displayed on the user terminal is recognized by the reader and coinciding with the first code stored in the reader,
Generating a first code at the relay server, transmitting identification information including the first code to the user terminal and the reader,
And the user terminal generates the ID card having the first code as the ID information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150007580A KR20160088510A (en) | 2015-01-15 | 2015-01-15 | System for mobile confirmation of identity and method for mobile confirmation of identity using the same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150007580A KR20160088510A (en) | 2015-01-15 | 2015-01-15 | System for mobile confirmation of identity and method for mobile confirmation of identity using the same |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20160088510A true KR20160088510A (en) | 2016-07-26 |
Family
ID=56680772
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150007580A KR20160088510A (en) | 2015-01-15 | 2015-01-15 | System for mobile confirmation of identity and method for mobile confirmation of identity using the same |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20160088510A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018124856A1 (en) * | 2016-12-30 | 2018-07-05 | 주식회사 코인플러그 | Method and terminal for authenticating user by utilizing mobile id by means of blockchain database, and server utilizing method and terminal |
CN111090848A (en) * | 2019-11-05 | 2020-05-01 | 深圳市文鼎创数据科技有限公司 | Authentication method and authentication device |
KR20230049942A (en) | 2021-10-07 | 2023-04-14 | 한국전자통신연구원 | Apparatus and method for verification using mobile id based on user face |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20050099604A (en) | 2005-09-23 | 2005-10-14 | 주식회사 엠투스네트웍스 | 2d-barcode generating and mobile identification system in ubiquitous environment |
-
2015
- 2015-01-15 KR KR1020150007580A patent/KR20160088510A/en not_active Application Discontinuation
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20050099604A (en) | 2005-09-23 | 2005-10-14 | 주식회사 엠투스네트웍스 | 2d-barcode generating and mobile identification system in ubiquitous environment |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018124856A1 (en) * | 2016-12-30 | 2018-07-05 | 주식회사 코인플러그 | Method and terminal for authenticating user by utilizing mobile id by means of blockchain database, and server utilizing method and terminal |
CN111090848A (en) * | 2019-11-05 | 2020-05-01 | 深圳市文鼎创数据科技有限公司 | Authentication method and authentication device |
KR20230049942A (en) | 2021-10-07 | 2023-04-14 | 한국전자통신연구원 | Apparatus and method for verification using mobile id based on user face |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11108558B2 (en) | Authentication and fraud prevention architecture | |
EP3499795A1 (en) | Authentication system and method, and user equipment, authentication server, and service server for performing same method | |
CN101335619B (en) | Authorized using method of disposal dynamic cipher telephone or short message | |
EP3043306A1 (en) | System for convenient person authentication using mobile communication terminal and actual financial card and method therefor | |
CN104077689A (en) | Information verification method, relevant device and system | |
GB2549371A (en) | Access authentication method and system | |
KR101675728B1 (en) | Method and apparatus for processing user authentification using information processing device | |
US11734544B2 (en) | Mobile passport, mobile passport generation system for generating same, and mobile passport certification method | |
US20120159598A1 (en) | User authentication system and method using personal identification number | |
US20190164167A1 (en) | System and Method for Identity Verification of a User | |
WO2014180345A1 (en) | User identity verification and authorization system | |
JP2017102842A (en) | Personal identification system, personal identification information output system, authentication server, personal identification method, personal identification information output method, and program | |
KR20160088510A (en) | System for mobile confirmation of identity and method for mobile confirmation of identity using the same | |
WO2018176020A1 (en) | System and method for confirming a person's identity | |
KR101603963B1 (en) | Authentication method using fingerprint information and certification number, user terminal and financial institution server | |
CN110582771B (en) | Method and apparatus for performing authentication based on biometric information | |
US10129266B2 (en) | Identity information systems and methods | |
CN104735067A (en) | O2O real name registration admittance system and method | |
US20160342996A1 (en) | Two-factor authentication method | |
CN105095704A (en) | Identity recognition method based on multiple dynamic authentication | |
US20150371227A1 (en) | Registering a Mobile User | |
KR20230049942A (en) | Apparatus and method for verification using mobile id based on user face | |
KR101044518B1 (en) | System for certifying autographed document or product using SMS of mobile phone and method thereof | |
KR102048468B1 (en) | System and method for identification of a corporate name user | |
KR101691163B1 (en) | User authentication method and server performing the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |