WO2008105602A1 - User authentication method and system using graphic otp - Google Patents

User authentication method and system using graphic otp Download PDF

Info

Publication number
WO2008105602A1
WO2008105602A1 PCT/KR2008/001070 KR2008001070W WO2008105602A1 WO 2008105602 A1 WO2008105602 A1 WO 2008105602A1 KR 2008001070 W KR2008001070 W KR 2008001070W WO 2008105602 A1 WO2008105602 A1 WO 2008105602A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
image
input
authentication
server
Prior art date
Application number
PCT/KR2008/001070
Other languages
French (fr)
Inventor
Min Su Kim
Original Assignee
Mininfo Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from KR1020070020553A external-priority patent/KR100844195B1/en
Priority claimed from KR1020070097878A external-priority patent/KR20080011362A/en
Priority claimed from KR1020070106375A external-priority patent/KR100960517B1/en
Application filed by Mininfo Co., Ltd. filed Critical Mininfo Co., Ltd.
Publication of WO2008105602A1 publication Critical patent/WO2008105602A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Definitions

  • the present invention relates to a user authentication method and system using a graphic OTP. More particularly, the method and system is characterized that, when it authenticates a user, it receives input of a coordinate, which indicates the shift of a key image selected by a user among a plurality of images provided by a server to the location of a designated hole image.
  • a GOTP(Graphic One Time Password) is a kind of OTP(One Time Password), which is embodied by a software, and is used as a safe and convenient method to generate and manage a password by applying a unique manner adopting a graphic interface without a separate hardware therefor.
  • a user enjoys easy memorization and remarkably improved validity period through a graphic interface, and comes to have security.
  • an inputted value and a password should be managed separately by being inputted by direction keys and a specified keyboard.
  • OTP As an OTP, it still has to be safe from shoulder surfing, phishing, and pharming, and easy to use and needs to lower cost in the introduction thereof.
  • ATM automated teller machine
  • a GOTP is developed to eliminate such uncomfortableness, that is, to be safe enough to input a password even when someone is peering in the back.
  • the present invention has been made in view of the above problems occurring in the prior art, and it is an object of the present invention to provide a user authentication method and system using graphic OTP whose image array is not exposed to hooking, phishing, or pharming by transmitting a synchronizing code to select an array function for arraying images apart from the images when the server transmits GOTP images to a user's terminal device; by selecting in the terminal device an array function corresponding to the transmitted synchronizing code; and by allowing the transmitted images to be arrayed according to the selected array function.
  • a user authentication method using a graphic OTP which comprises a first step of generating a synchronizing code for arraying an image group which is stored by a user after receiving a graphic OTP authentication request signal from said user's terminal device; a second step of transferring said synchronizing code and said image group to said user's terminal device; a third step of calculating a first shift path from the images to be arrayed on a screen using said synchronizing code and said image group; a fourth step of receiving a second shift path which is transmitted from said user's terminal device; and a fifth step of determining the user authenticity by comparing each starting point and each destination point of said first and second shift paths and transferring the authentication result to said user's terminal device.
  • a user authentication method using a graphic OTP which comprises a first step of transferring a graphic OTP authentication request signal to a server by receiving a user's input of an ID and password; a second step of receiving from said server an image group which is stored by said user and a synchronizing code for selecting an array function by which said image group is arrayed in order to authenticate said user; a third step of displaying a plurality of images of said image group on a screen of said terminal device according to said array function which is selected corresponding to said synchronizing code; a fourth step of receiving input of a shift path from at least one personal key image to at least one hole image which are displayed on said screen, wherein the input is made through selecting direction buttons shown on said screen; and a fifth step of receiving an authentication result from said server by transferring to said server said inputted shift path as a second shift path.
  • the present invention of a user authentication method using a graphic OTP has advantageous effects in that it can transfer to a terminal device an array function which is selected in order to array an image group including at least one personal key image, at least one hole image, and a plurality of background images separately with said image group, in order for the array of images selected and stored by the user not to be leaked by hooking, phishing, or pharming through an intrusion of the server or the terminal device, thereby preventing any illegal GOTP piracy.
  • Another advantageous effect of the present invention is that it can adopt various input manners besides shifting a personal key image to a hole image, thereby keeping intruders from finding images designated by the user.
  • the present invention is more advantageous in that it can apply not only graphical images but also conventional numerical password so that it does not have to make up a new system and data for existing one.
  • Fig. 1 is a flowchart illustrating steps of a user authentication according to the present invention
  • Fig. 2 is a flowchart describing steps of a GOTP authentication according to the present invention
  • Fig. 3 is a flowchart showing steps of setting an image group according to the present invention
  • Fig. 4 is a flowchart presenting steps of a GOTP authentication performed by a server according to the present invention
  • Fig. 5 is a flowchart depicting steps of a GOTP authentication performed by a user's terminal device according to the present invention
  • Fig. 6 is a screen layout for a GOTP authentication according to the present invention
  • Fig. 1 is a flowchart illustrating steps of a user authentication according to the present invention
  • Fig. 2 is a flowchart describing steps of a GOTP authentication according to the present invention
  • Fig. 3 is a flowchart showing steps of setting an image group according to the present invention
  • Fig. 4 is a flowchart
  • FIG. 7 is a concept diagram illustrating a column pointer matching method according to the present invention
  • FIG. 8 is a flowchart illustrating steps of a column pointer matching method according to the present invention
  • Fig. 9 is a concept diagram describing a screen blackout method according to the present invention
  • Fig. 10 is a flowchart describing steps of a screen blackout method according to the present invention
  • Fig. 11 is a concept diagram showing a multiple image selection method according to the present invention
  • Fig. 12 is a flowchart showing steps of a multiple image selection method according to the present invention
  • Fig. 13 is a screen layout for password input according to the present invention
  • Fig. 14 is a concept diagram presenting a password input method according to the present invention.
  • Fig. 15 is a flowchart presenting steps of a password input method according to the present invention.
  • Fig. 16 is a screen layout showing a shift key input counting display according to the present invention.
  • Fig. 17 is a concept diagram showing a shift key input counting display according to the present invention.
  • Fig. 18 is a block diagram illustrating a doorlock which adopts an independent
  • Fig. 1 is a flowchart illustrating steps of a user authentication according to the present invention.
  • a user authentication includes an ID authentication step (SlOO) as a first authentication through an ID and a password which has been inputted and stored by the user, and a GOTP authentication step (S200) as a second authentication through a shift coordinate value which is obtained by shift images which has been selected and stored by the user.
  • SlOO ID authentication step
  • S200 GOTP authentication step
  • the first authentication or ID authentication step is a step of authenticating a user when an ID and a password inputted by the user agree with those stored in the server. If the ID and the password inputted by the user do not agree with those stored in the server, the server does not authenticate the user.
  • the second authentication or GOTP authentication step (200) is a step of authenticating the user when a coordinate value, which is inputted by the user in order to shift a personal key image to a hole image among the image group displayed on the user's terminal device, agrees the corresponding coordinate value calculated in the server.
  • one of the methods to move the personal key image is to click direction keys with a mouse.
  • a direction key is clicked, any images displayed on the screen do not move, but only shift coordinate value is stored and transmitted to the server.
  • Fig. 2 is a flowchart describing steps of a GOTP authentication according to the present invention.
  • a server acknowledges the user who passes the first authentication by verifying the user's ID and password inputted through the user's terminal device (S210). At this time, if the verified ID and password shows that the user is not a member available to perform the following GOTP authentication (S220), the server performs a step of setting an image group for the GOTP authentication step (S230); if the user is verified to be available to perform the GOTP authentication (S220), the server performs the GOTP authentication step (S240).
  • the server selects a step to retry the second authentication, the GOTP authentication (S250); if the user passes in the GOTP authentication (S240), the user is able to access to service provided by the server.
  • FIG. 3 is a flowchart showing steps of setting an image group according to the present invention.
  • a user selects at least one image as his/her personal key image(s) and at least one hole image for matching the personal key image(s) thereto among a plurality of images which are transmitted from a server and displayed on the user's terminal device (S231).
  • background images which will be displayed in the user's terminal device, are selected by the user, set and stored as an image group with the already selected personal key image(s) and hole image(s) (S232).
  • a step of setting a text hint is performed in order for a user to find his/her personal key image(s) and hole image(s) in the event that the user forgets them (S233).
  • the user can input a word or a phrase that reminds the user of his/ her personal key image(s) and hole image(s) when the user cannot recollect them.
  • a step of setting an image hint may be performed as the user chooses to have the step (S234).
  • the image hint setting is for the purpose of inferring his/her personal key image(s) and hole image(s) among more than one images outputted with the personal key image(s) and the hole image(s) on the user's terminal device, when the user cannot recall the personal key image(s) and the hole image(s) even after trying the text hint.
  • the image hint setting step is a step to select more than one images which will be displayed with the user's personal key image(s) and hole image(s).
  • FIG. 4 is a flowchart presenting steps of a GOTP authentication performed by a server according to the present invention.
  • the server generates a synchronizing code for selecting a corresponding array function thereto which is to arrange an image group (S241).
  • the possibility that the identical synchronizing code is selected is variable according to the number of the synchronizing codes and the stored array functions.
  • the array functions are generated as many as the synchronizing codes and stored in a user's terminal device. After a synchronizing code, which is generated in a server upon a request of performing a GOTP authentication, is transmitted to the user's terminal device, an array function corresponding to the synchronizing code is selected in at least one array function which is stored in the user's terminal device.
  • the server transmits the generated synchronizing code and the image group belonging to the user to the user's terminal device (S242), and generates and saves a first shift path by calculating difference of shift coordinates from a user's personal key image to a hole image using the transmitted synchronizing code and image group (S243).
  • the server compares it with the first shift path generated therein.
  • the server ends the GOTP authentication.
  • the server performs a step of choosing to retry the GOTP authentication (S245).
  • the server renews the performance from the step of generating a synchronizing code (S241).
  • the data to be transmitted to the user's terminal device can be only a regenerated synchronizing code or both a regenerated synchronizing code and a corresponding image group.
  • Fig. 5 is a flowchart depicting steps of a GOTP authentication performed by a user's terminal device according to the present invention.
  • the user's terminal device after receiving the synchronizing code and the image group transmitted from the server and selecting an array function corresponding to the syn- chronizing code, displays the image group on the screen according to the array function (S510).
  • the number of array functions are the same with that of synchronizing codes which are generated upon the request of GOTP authentication, and the array functions are stored in the user's terminal device.
  • the user's terminal device receives input of a coordinate by the user which indicates the shift of the user's personal key image(s) to the designated hole image through direction keys displayed on the user's terminal device (S520) and calculates the difference of both coordinates to encode and transmit thereof as a second shift path to the server (S530).
  • a side of the user's terminal device or the screen thereof is provided with a counter, thereby displaying the number of input of direction keys.
  • the direction keys include buttons indicating up, down, right, left, or diagonal direction and are equipped in order to move displayed images to a desired place.
  • the direction keys can be inputted through a pointing device like a mouse besides a keyboard connected to the user's terminal device.
  • Fig. 6 is a screen layout for a GOTP authentication according to the present invention.
  • the user chooses his/her own hole image and personal key image.
  • the selected images and background images are arranged on the screen.
  • the images on the screen are arranged according to rule of the array function selected by a synchronizing code.
  • the background images can be selected in advance by the user or randomly arranged.
  • the user inputs coordinates ( ⁇ —
  • the use of direction keys can be varied, and the authentication is made relying on the accordance of the coordinate of the starting point and that of the ending point.
  • a side of the user's terminal device or the screen thereof is provided with a counter, thereby displaying the number of input of direction keys.
  • Fig. 7 is a concept diagram illustrating a column pointer matching method according to the present invention.
  • a general shift path input from a personal key image to a hole image is made by two-dimensional array, that is, upward, downward, rightward, or leftward movement, thereby making exact shift to the hole image.
  • the column pointer matching method is to just shift the column in which a personal key image is located to the column in which a hole image is placed even though the displayed images on the screen are two-dimensional array.
  • An embodiment of the column pointer matching method is as follows. Set the image '( ⁇ >' 710 as a hole image, '*' 720 and '0' 730 as personal key images. At first, in order to shift the column D in which the personal key image '*' 720 is located to the column D in which the hole image '( ⁇ >' 710 is placed, the user inputs a leftward key or button once. And then, in order to shift the column D in which the personal key image '0' 730 is positioned to the column D in which the hole image '( ⁇ >' 710 is placed, the user inputs a leftward key or button three times. In addition, to prevent unnecessary input and help the user with reference of input, a side of the user's terminal device or the screen thereof is provided with a counter, thereby displaying the number of input of direction keys.
  • Fig. 8 is a flowchart illustrating steps of a column pointer matching method according to the present invention.
  • the user's terminal device transmits an authentication request signal to the server (S810), and receives a synchronizing code for selection of an array function for arrangement of images with an image group (S 820).
  • the image group includes at least one hole image, at least one personal key image, and background images chosen by the user, and the GOTP images are arranged on the screen by the array function selected by a synchronizing code (S830).
  • the GOTP image arrangement method is through any one of transmitting of an array function from the server to the user's terminal device and generating a random function or an array function in the user's terminal device itself, thereby minimizing the possibility of appearing identical arrays.
  • a column pointer is given per column of the GOTP images arrayed on the screen
  • the server finds the column pointers for a hole image and a personal key image.
  • the server calculates the shift path from the column holding the personal key image to the column holing the hole image (S850) and receives the shift path input made through direction keys or buttons appearing on the screen of the user's terminal device (S850), thereby comparing the shift path input with its calculated shift path (S860).
  • a side of the user's terminal device or the screen thereof is provided with a counter, thereby displaying the number of input of direction keys.
  • FIG. 9 is a concept diagram describing a screen blackout method according to the present invention.
  • the user upon the completion of input of the shift coordinate from a personal key image to a hole image, the user should press the enter key on the keyboard or click the input button on the screen.
  • the screen blackout method is devised.
  • the screen blackout method is implemented as follows. At the moment a user finds a hole image and personal key image(s) in a GOTP image array 910 and inputs the shift coordinate(s) from the personal key image(s) to the hole image by pressing the left button of the mouse to click direction buttons on the screen or pressing direction keys on the keyboard, the images on the screen is changed into a black block 920; when the clicking or pressing is released, the previous images are resumed on the screen.
  • black block is shown instead of the images for GOTP authentication.
  • a side of the user's terminal device or the screen thereof is provided with a counter, thereby displaying the number of input of direction keys.
  • the second image array and the following image arrays after the screen blackout can have a different image array 930 from the previous image array.
  • the system can choose a step to retry GOTP authentication; when the user passes GOTP authentication, the user is allowed to access to the server.
  • Fig. 10 is a flowchart describing steps of a screen blackout method according to the present invention.
  • the user's terminal device transmits an authentication request signal to the server (SlOlO), and receives a synchronizing code for selection of an array function for arrangement of images with an image group (S 1020).
  • the image group includes at least one hole image, personal key image, and background images chosen by the user, and the GOTP images are arranged on the screen by the array function selected by the synchronizing code (S 1030).
  • the server identifies the location of a hole image and a personal key image among the arranged GOTP images and calculates the shift path from the personal key image to the hole image (S 1040).
  • the server receives the shift path input from the user (S 1040)
  • the image array on the screen is transformed into a black block at the moment the direction key on the keyboard of the user's terminal device or the direction button on the screen is pressed (S 1050).
  • the pressing is released, the previous images reappear on the screen.
  • the blackout is not for one time use, but for every time the direction keys or buttons are pressed during the authentication process.
  • a side of the user's terminal device or the screen thereof is provided with a counter, thereby displaying the number of input of direction keys.
  • the server compares the shift path input from the user's terminal device with its in advance calculated shift coordinate (S 1060). When the shift paths agree with each other as the result of the comparison, the user authentication completes; otherwise the system returns the step of requesting a synchronizing code to the server and makes the user retry the shift path input (S 1070).
  • the server can transmit the synchronizing code with an image group or only the synchronizing code. When the user, however, gives up the authentication process, or fails the authentication three times or more, the authentication process ends automatically.
  • Fig. 11 is a concept diagram showing a multiple image selection method according to the present invention.
  • a multiple image selection method is that a user selects his/her hole image and personal key image among representative images and the images to be displayed on the screen for GOTP authentication are the images with similar color or shape with the selected representative images.
  • a plurality of similar images based on the representative images are categorized and stored as one group (1110).
  • the images shown on the screen 1120 during GOTP authentication are of a category randomly selected among a plurality of categories to be displayed, which should be determined by the user as the identical or almost the same images with the representative images so as not to confuse the user.
  • Fig. 12 is a flowchart showing steps of a multiple image selection method according to the present invention.
  • a user sets in advance his/her hole image and personal key image among a plurality of representative images (S 1210).
  • the representative image includes a category of a plurality of similar images and each similar image has its own file name which shows no relation with the others.
  • the user's terminal device transfers an authentication request signal to the server, and receives a synchronizing code for selection of an array function for arrangement of images with an image group (S 1230).
  • the image group includes a hole image, a personal key image, and background images chosen by the user, which are not the representative images but brought from similar images, and the GOTP images are arranged on the screen (S 1240). From one image group, only one image is brought.
  • the server checks the position of the hole image and the personal key image among the GOTP images arranged on the screen, calculates the shift path from the user's personal key image to the hole image (S 1250), and compares it with the shift path inputted by the user (S 1260).
  • a side of the user's terminal device or the screen thereof is provided with a counter, thereby displaying the number of input of direction keys.
  • Fig. 13 is a screen layout for password input according to the present invention.
  • an array of a keypad for a GOTP input 1310 is the same with the conventional keypad for a direct input of password 1320.
  • the numbers marked on each key are not arrayed in numerical order, but randomly arranged every time of authentication by an array function.
  • key identifying marks for each number are different from one another so that the user can find each digit's position with their specific mark, color, shadow, and the like.
  • key identifying marks for a few of specific numbers other persons can easily catch those numbers. Therefore, by giving different identifying mark to each number key, only the user can catch specific color or mark.
  • the numbers on the keypad do not move, but the key identifying marks do, thereby making it difficult for others to guess the password even with sneaking a look into the input process.
  • Fig. 14 is a concept diagram presenting a password input method according to the present invention.
  • the password input method according to the present embodiment makes use of an existing password unlike conventional GOTP authentications, but the input is made by a shift key ( ⁇ ) functioning as a direction key, not by directly pressing numbers.
  • a shift key ( ⁇ ) functioning as a direction key
  • the shift key twice 1420.
  • the numbers assigned for each key still remain unchanged but the identifying marks move by a key unit in a pointer's direction of the shift key.
  • the identifying mark of the first password number T reaches the key of the second number '2' 1420, the user can complete the first input of shift path by pressing the 'OK' button 1430.
  • the numbers arrayed on the keypad are rearranged 1440.
  • the user presses the shift key ( ⁇ ) once in order to make the identifying mark of the third number '3' reach the key of the fourth number '4' 1450, and completes the second input of shift path by pressing an 'OK' button 1460.
  • the user perceives the process as a method as that of moving a cursor on his/her password and pressing them, but the GOTP authentication system itself perceives the shift path inputted by a user as a password.
  • the GOTP authentication system perceives the input twice ( ⁇ ) and input once ( ⁇ ) of the shift key as a password. Even when, therefore, others steals a look into the shift path input, they can not know the exact numbers.
  • an authentication system it is available to lower the possibility for others to guess the user's password by inputting the shift path continuously from the first number to the fourth number.
  • a rightward shift key like in this embodiment but also a leftward key, a couple of upward and downward keys or leftward and rightward keys, or a set of four keys of upward, downward, leftward and rightward.
  • Fig. 15 is a flowchart showing steps of a password input method according to the present invention.
  • a GOTP authentication system when receiving an ID input through an input unit, a GOTP authentication system generates and transfers an authentication request to a server (S 1510).
  • a user's terminal device transfers an authentication request signal to the server, and receives a synchronizing code for selection of an array function for arrangement of numbers and key identifying marks (S 1520).
  • the key identifying marks help the user identify a number's location by expressing each number differently with specific mark, color, shadow, etc.
  • the key identifying marks are arranged for each number on the screen by the array function which is selected according to a synchronizing code (S 1530).
  • the server checks the coordinates of password based on the numbers arrayed on the screen and calculates a first shift path from one number to the next number. And the user inputs shift coordinates according to the GOTP authentication method (S 1540) through his/her terminal device. The user's terminal device transfers to the server the inputted shift coordinates as a second shift path. Then, the server determines the agreement of the destination coordinates between the first shift path and the second shift path (S 1550) and transfers the result to the user's terminal device. When the shift paths agree with each other as the result of the comparison, the user authentication completes (S 1560); otherwise the system returns the step of requesting a synchronizing code to the server and makes the user retry the GOTP authentication (S 1570). The server can transmit the synchronizing code with key identifying marks or only the synchronizing code. When the shift paths do not agree certain times, the authentication process ends (S 1570).
  • Fig. 16 is a screen layout showing a shift key input counting display according to the present invention.
  • the shift key input counting display method is configured the same as above said password input method, but without key identifying marks. It is for displaying the number of the shift key input.
  • the keypad of this embodiment 1610 is arranged the same as the keypad of a conventional direct input method 1620.
  • the numbers marked on each key are not arranged in numerical order like in a conventional method, but randomly arranged by an array function every time of authentication. Even if a user inputs a shift key, as there is no remarkable sign on the screen, the user gets confused about his/her input times. To complement this, therefore, there is a counter 1640 in the lower part of the keypad in order to present input times whenever input key is pressed.
  • Fig. 17 is a concept diagram showing a shift key input counting display according to the present invention.
  • a user can use his/her existing password as it was, but input is made by pressing a shift key ( ⁇ ) up to the times for the first number to reach the second number, not by directly pressing the number keys.
  • the counter in the lower part of the keypad helps the user with his/her input by presenting the input times.
  • the counter in the lower part of the keypad shows "2" as the number of input 1720.
  • the numbers on the screen are rearranged 1740.
  • the user has the place of the third number '3' as the starting point 1750 and inputs shift key once to reach the place of the number '4' 1750.
  • the counter in the lower part of the keypad expresses " 1 " as the number of input, and the user completes the shift path input by pressing 'OK' button 1760.
  • Fig. 18 is a block diagram illustrating a doorlock which adopts a independent
  • a doorlock which adopts a independent GOTP system according to the present invention can be established without a network by including a function of a server to generate a synchronizing code in a terminal device and storing image groups and array functions in the storage unit thereof.
  • the independent GOTP system comprises an input unit 1810 to receive an ID input from a user, a display unit 1820 to provide the user with a guidance screen, a mechanical unit 1830 to open/close a lock of a door, a power supply unit 1840 to supply power to each unit of the system, a synchronizing code generating unit 1850 to generate a keypad array signal including algorithm to arrange the keypad, a storage unit 1860 to store data related to users' IDs and passwords, and a control unit 1800 to control overall system as connected with each unit.
  • the input unit 1810 is a device for a user to input his/her ID through a method such as an RFID, a smart card, an ID number, a Bluetooth, an electrical bracelet, a biorecognition (fingerprint, iris).
  • the user inputs his/her own ID through the input unit 1810, which transmits the received ID to the control unit.
  • the system allows the user to take the GOTP authentication process or permits access omitting the GOTP authentication depending on access permission level.
  • the display unit 1820 is a touchscreen on which GOTP images are arrayed for
  • GOTP authentication and provides users with guidance messages such as a user manual.
  • the display unit includes a shift key for users to input shift paths, an input button to complete an input of shift paths, an input method change button to alter the input method into a conventional direct input manner, a help button to request the user's manual for GOTP authentication, a correction button to correct shift path input, a cancel button to cancel the GOTP authentication process itself.
  • Users do not input the password directly, but uses the shift key to input the password with a shift path such as from the place of the first number key to that of the second number key.
  • the screen of the display unit 1820 provides not only GOTP authentication images but also some information to users with visual data including text, images, motion pictures, etc. In addition, it can present the number of input made by users in order to help the users with quick and exact input.
  • the mechanical unit 1830 is connected with and controlled by the control unit
  • the power supply unit 1840 is connected with the control unit 1800, through which it supplies power to the system.
  • doorlocks or safes which are difficult to be supplied with power from external sources, it is possible to operate them independently with a battery as the power source without connection to an external source.
  • independent ATMs however, though they become independent devices at night because the bank's server shuts down and the networking does not operate, they are difficult to operate only relying on a battery. They, therefore, should be power supplied by an external source.
  • the storage unit 1860 stores users' IDs and passwords, images for GOTP authentication, and information to be provided to users through the display unit 1820.
  • the control unit 1800 is connected with the input unit 1810, the display unit 1820, the mechanical unit 1830, the power supply unit 1840, the synchronizing code generating unit 1850, and the storage unit 1860, thereby controlling each unit.
  • the control unit perceives it as an occurrence of an authentication request.
  • the control unit searches the password for the pertinent ID in the storage unit, receives a synchronizing code from the synchronizing code generating unit 1850, and arrays numbers on the keypad of the screen of the display unit 1820.
  • control unit compares the shift path inputted by users with the shift path calculated in itself to thereby determine the result of the authentication.
  • the control unit controls the mechanical unit 1830 to open the lock of the door.
  • the network GOTP authentication system includes a plurality of terminal devices which receives input from users and provides service and a server which performs authentication responding the GOTP authentication request inputted through terminal devices.
  • the terminal devices bring the functions of the input unit, the display unit, the control unit, and the storage unit from the above described independent GOTP authentication system; and the server brings the functions of the synchronizing code generating unit, the storage unit, and the control unit.
  • each terminal device and the server can transmit and receive data to and from each other.
  • the GOTP authentication system becomes safer.
  • Each unit has the same function as those in the independent GOTP authentication system, and the server can be accessed through a plurality of terminal devices at the same time, thereby providing service concurrently to many users.
  • the terminal devices Through the terminal devices, input and output functions are provided, wherein the input is made by users and the output is an array of an image group displayed on the screen; through the server, the authentication is performed using the input. Therefore, this type is fit for a system such as a webserver, ATM, and the like which is accessed by at least one terminal device and requires a user authentication through a server.
  • the present invention provides an authentication method safe from pharming, phishing, and hacking, thereby being applicable to network systems, ATMs, doorlocks, and the like which requires authentication using an existing password.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present invention relates to a user authentication method and system which is capable of preventing illegal access when a user authentication is performed. More particularly, the present invention using a graphic OTP is characterized that, in authenticating a user who passed ID & password authentication, it receives input of a coordinate, which indicates shifting a user's key image to the place of a designated hole image. The present invention comprises a first step of generating a synchronizing code for arraying an image group, which is stored by a user, after receiving a graphic OTP authentication request signal from said user's terminal device; a second step of transferring said synchronizing code and said image group to said user's terminal device; a third step of calculating a first shift path from the images to be arrayed by said synchronizing code and said image group; a fourth step of receiving a second shift path from said user's terminal device; and a fifth step of determining the user authenticity by comparing each starting point and each ending point of said first and second shift paths, and transferring the authentication result to said user's terminal device.

Description

Description
USER AUTHENTICATION METHOD AND SYSTEM USING
GRAPHIC OTP
Technical Field
[1] The present invention relates to a user authentication method and system using a graphic OTP. More particularly, the method and system is characterized that, when it authenticates a user, it receives input of a coordinate, which indicates the shift of a key image selected by a user among a plurality of images provided by a server to the location of a designated hole image.
[2]
Background Art
[3] A GOTP(Graphic One Time Password) is a kind of OTP(One Time Password), which is embodied by a software, and is used as a safe and convenient method to generate and manage a password by applying a unique manner adopting a graphic interface without a separate hardware therefor.
[4] A user enjoys easy memorization and remarkably improved validity period through a graphic interface, and comes to have security. In real use, however, an inputted value and a password should be managed separately by being inputted by direction keys and a specified keyboard. As an OTP, it still has to be safe from shoulder surfing, phishing, and pharming, and easy to use and needs to lower cost in the introduction thereof.
[5] When one makes use of password input keys attached on an entrance or an
ATM(automated teller machine) and there is someone in the back, one may feel uncomfortable. That is because one is worried about unintentional disclosure of one's password. Someone in the back also feels uncomfortable. A GOTP is developed to eliminate such uncomfortableness, that is, to be safe enough to input a password even when someone is peering in the back.
[6] Conventional GOTPs have more than one graphic images transmitted to a user's terminal device, and the user checks the transmitted images and inputs a coordinate value through a keyboard in order to move the predetermined matching images.
[7] However, when the transmitted images or the keyboard input is hooked, phished, or pharmed by a hacker who tries a illegal hacking, that causes a problem that the images designated by the user are inferred from those images or the input.
[8]
Disclosure of Invention Technical Problem
[9] Accordingly, the present invention has been made in view of the above problems occurring in the prior art, and it is an object of the present invention to provide a user authentication method and system using graphic OTP whose image array is not exposed to hooking, phishing, or pharming by transmitting a synchronizing code to select an array function for arraying images apart from the images when the server transmits GOTP images to a user's terminal device; by selecting in the terminal device an array function corresponding to the transmitted synchronizing code; and by allowing the transmitted images to be arrayed according to the selected array function.
[10]
Technical Solution
[11] The above object of the present invention can be achieved by a user authentication method using a graphic OTP which comprises a first step of generating a synchronizing code for arraying an image group which is stored by a user after receiving a graphic OTP authentication request signal from said user's terminal device; a second step of transferring said synchronizing code and said image group to said user's terminal device; a third step of calculating a first shift path from the images to be arrayed on a screen using said synchronizing code and said image group; a fourth step of receiving a second shift path which is transmitted from said user's terminal device; and a fifth step of determining the user authenticity by comparing each starting point and each destination point of said first and second shift paths and transferring the authentication result to said user's terminal device.
[12] The above object of the present invention can also be achieved by a user authentication method using a graphic OTP which comprises a first step of transferring a graphic OTP authentication request signal to a server by receiving a user's input of an ID and password; a second step of receiving from said server an image group which is stored by said user and a synchronizing code for selecting an array function by which said image group is arrayed in order to authenticate said user; a third step of displaying a plurality of images of said image group on a screen of said terminal device according to said array function which is selected corresponding to said synchronizing code; a fourth step of receiving input of a shift path from at least one personal key image to at least one hole image which are displayed on said screen, wherein the input is made through selecting direction buttons shown on said screen; and a fifth step of receiving an authentication result from said server by transferring to said server said inputted shift path as a second shift path.
[13]
Advantageous Effects
[14] The present invention of a user authentication method using a graphic OTP has advantageous effects in that it can transfer to a terminal device an array function which is selected in order to array an image group including at least one personal key image, at least one hole image, and a plurality of background images separately with said image group, in order for the array of images selected and stored by the user not to be leaked by hooking, phishing, or pharming through an intrusion of the server or the terminal device, thereby preventing any illegal GOTP piracy. [15] Another advantageous effect of the present invention is that it can adopt various input manners besides shifting a personal key image to a hole image, thereby keeping intruders from finding images designated by the user. [16] In addition, the present invention is more advantageous in that it can apply not only graphical images but also conventional numerical password so that it does not have to make up a new system and data for existing one. [17]
Brief Description of the Drawings [18] Fig. 1 is a flowchart illustrating steps of a user authentication according to the present invention, [19] Fig. 2 is a flowchart describing steps of a GOTP authentication according to the present invention, [20] Fig. 3 is a flowchart showing steps of setting an image group according to the present invention, [21] Fig. 4 is a flowchart presenting steps of a GOTP authentication performed by a server according to the present invention, [22] Fig. 5 is a flowchart depicting steps of a GOTP authentication performed by a user's terminal device according to the present invention, [23] Fig. 6 is a screen layout for a GOTP authentication according to the present invention, [24] Fig. 7 is a concept diagram illustrating a column pointer matching method according to the present invention, [25] Fig. 8 is a flowchart illustrating steps of a column pointer matching method according to the present invention, [26] Fig. 9 is a concept diagram describing a screen blackout method according to the present invention, [27] Fig. 10 is a flowchart describing steps of a screen blackout method according to the present invention, [28] Fig. 11 is a concept diagram showing a multiple image selection method according to the present invention, [29] Fig. 12 is a flowchart showing steps of a multiple image selection method according to the present invention, [30] Fig. 13 is a screen layout for password input according to the present invention,
[31] Fig. 14 is a concept diagram presenting a password input method according to the present invention,
[32] Fig. 15 is a flowchart presenting steps of a password input method according to the present invention,
[33] Fig. 16 is a screen layout showing a shift key input counting display according to the present invention,
[34] Fig. 17 is a concept diagram showing a shift key input counting display according to the present invention,
[35] Fig. 18 is a block diagram illustrating a doorlock which adopts an independent
GOTP system according to the present invention.
[36]
[37] DESCRIPTION ON MAIN REFERENCE NUMERALS>
[38] 610, 710 : hole image 620, 630, 720, 730 : personal key image
[39]
Mode for the Invention
[40] The terms and the words used in the specification and the claims should not be limitedly construed with ordinary or lexical meaning. Rather, they should be construed with the meanings and the conceptions according to the idea of the present invention, abiding by the principle that an inventor can properly define the conception of terms so as to describe his or her own invention with the best manner.
[41] While the present invention has been described with reference to particular illustrative embodiments, it is not to be restricted by the embodiments but only by the appended claims. It is to be appreciated that those skilled in the art can change or modify the embodiments without departing from the scope and spirit of the present invention.
[42] Hereinafter, the preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.
[43] Fig. 1 is a flowchart illustrating steps of a user authentication according to the present invention. Referring to Fig. 1, a user authentication includes an ID authentication step (SlOO) as a first authentication through an ID and a password which has been inputted and stored by the user, and a GOTP authentication step (S200) as a second authentication through a shift coordinate value which is obtained by shift images which has been selected and stored by the user.
[44] The first authentication or ID authentication step (SlOO) is a step of authenticating a user when an ID and a password inputted by the user agree with those stored in the server. If the ID and the password inputted by the user do not agree with those stored in the server, the server does not authenticate the user.
[45] The second authentication or GOTP authentication step (200) is a step of authenticating the user when a coordinate value, which is inputted by the user in order to shift a personal key image to a hole image among the image group displayed on the user's terminal device, agrees the corresponding coordinate value calculated in the server.
[46] At this time, one of the methods to move the personal key image is to click direction keys with a mouse. When a direction key, however, is clicked, any images displayed on the screen do not move, but only shift coordinate value is stored and transmitted to the server.
[47] Fig. 2 is a flowchart describing steps of a GOTP authentication according to the present invention. Referring to Fig. 2, a server acknowledges the user who passes the first authentication by verifying the user's ID and password inputted through the user's terminal device (S210). At this time, if the verified ID and password shows that the user is not a member available to perform the following GOTP authentication (S220), the server performs a step of setting an image group for the GOTP authentication step (S230); if the user is verified to be available to perform the GOTP authentication (S220), the server performs the GOTP authentication step (S240).
[48] In this step, if the user fails in the GOTP authentication (S240), the server selects a step to retry the second authentication, the GOTP authentication (S250); if the user passes in the GOTP authentication (S240), the user is able to access to service provided by the server.
[49] Fig. 3 is a flowchart showing steps of setting an image group according to the present invention. Referring to Fig. 3, a user selects at least one image as his/her personal key image(s) and at least one hole image for matching the personal key image(s) thereto among a plurality of images which are transmitted from a server and displayed on the user's terminal device (S231).
[50] Then, background images, which will be displayed in the user's terminal device, are selected by the user, set and stored as an image group with the already selected personal key image(s) and hole image(s) (S232).
[51] And next, a step of setting a text hint is performed in order for a user to find his/her personal key image(s) and hole image(s) in the event that the user forgets them (S233).
[52] For the text hint, the user can input a word or a phrase that reminds the user of his/ her personal key image(s) and hole image(s) when the user cannot recollect them.
[53] In addition, a step of setting an image hint may be performed as the user chooses to have the step (S234). The image hint setting is for the purpose of inferring his/her personal key image(s) and hole image(s) among more than one images outputted with the personal key image(s) and the hole image(s) on the user's terminal device, when the user cannot recall the personal key image(s) and the hole image(s) even after trying the text hint.
[54] Therefore, the image hint setting step is a step to select more than one images which will be displayed with the user's personal key image(s) and hole image(s).
[55] Fig. 4 is a flowchart presenting steps of a GOTP authentication performed by a server according to the present invention. Referring to Fig. 4, the server generates a synchronizing code for selecting a corresponding array function thereto which is to arrange an image group (S241).
[56] As the synchronizing code is created at the time a request for a GOTP authentication is made, the possibility that the identical synchronizing code is selected is variable according to the number of the synchronizing codes and the stored array functions.
[57] Meanwhile, the array functions are generated as many as the synchronizing codes and stored in a user's terminal device. After a synchronizing code, which is generated in a server upon a request of performing a GOTP authentication, is transmitted to the user's terminal device, an array function corresponding to the synchronizing code is selected in at least one array function which is stored in the user's terminal device.
[58] The server transmits the generated synchronizing code and the image group belonging to the user to the user's terminal device (S242), and generates and saves a first shift path by calculating difference of shift coordinates from a user's personal key image to a hole image using the transmitted synchronizing code and image group (S243).
[59] Then later, after the server receives a second shift path transmitted from the user's terminal device, the server compares it with the first shift path generated therein. When the differences of the shift coordinates from the user's personal key image to the hole image agree (S244), the server ends the GOTP authentication.
[60] If the first shift path generated in the server does not agree with the second shift path transmitted from the user's terminal device (S244), the server performs a step of choosing to retry the GOTP authentication (S245).
[61] When the GOTP authentication is performed again, the server renews the performance from the step of generating a synchronizing code (S241). At this time, the data to be transmitted to the user's terminal device can be only a regenerated synchronizing code or both a regenerated synchronizing code and a corresponding image group.
[62] Fig. 5 is a flowchart depicting steps of a GOTP authentication performed by a user's terminal device according to the present invention. Referring to Fig. 5, the user's terminal device, after receiving the synchronizing code and the image group transmitted from the server and selecting an array function corresponding to the syn- chronizing code, displays the image group on the screen according to the array function (S510).
[63] The number of array functions are the same with that of synchronizing codes which are generated upon the request of GOTP authentication, and the array functions are stored in the user's terminal device.
[64] Later, the user's terminal device receives input of a coordinate by the user which indicates the shift of the user's personal key image(s) to the designated hole image through direction keys displayed on the user's terminal device (S520) and calculates the difference of both coordinates to encode and transmit thereof as a second shift path to the server (S530). For a case that a distant shift path makes the user confuse the input times of shift, a side of the user's terminal device or the screen thereof is provided with a counter, thereby displaying the number of input of direction keys.
[65] The direction keys include buttons indicating up, down, right, left, or diagonal direction and are equipped in order to move displayed images to a desired place. The direction keys can be inputted through a pointing device like a mouse besides a keyboard connected to the user's terminal device.
[66] When the user's terminal device receives the result of GOTP authentication from the server (S540) and the result is positive, then the user passes the ID and GOTP authentication, thereby being allowed to access to the desired service.
[67] Fig. 6 is a screen layout for a GOTP authentication according to the present invention. Referring to Fig. 6, the user chooses his/her own hole image and personal key image. For example, when the user selects a flag 610 as his/her hole image and a smile 620 and a sandglass 630 as his/her key images, the selected images and background images are arranged on the screen. The images on the screen are arranged according to rule of the array function selected by a synchronizing code. The background images can be selected in advance by the user or randomly arranged.
[68] For the GOTP authentication, the user inputs coordinates (<— | or |<— ) from the smile 620 to the flag 610 and ends the input; and again the user inputs coordinates (ii<— or <— H) from the sandglass 630 to the flag 610 and ends the input. The use of direction keys can be varied, and the authentication is made relying on the accordance of the coordinate of the starting point and that of the ending point. In addition, for a case that a distant shift path makes the user confuse the input times of shift, a side of the user's terminal device or the screen thereof is provided with a counter, thereby displaying the number of input of direction keys.
[69] Fig. 7 is a concept diagram illustrating a column pointer matching method according to the present invention. Referring to Fig. 7, a general shift path input from a personal key image to a hole image is made by two-dimensional array, that is, upward, downward, rightward, or leftward movement, thereby making exact shift to the hole image. The column pointer matching method, however, is to just shift the column in which a personal key image is located to the column in which a hole image is placed even though the displayed images on the screen are two-dimensional array.
[70] When the column pointer matching method is applied, a row pointer matching method is available. When arrangement of images is made by a random matrix of nxm, or nxn, it is more efficient to prevent the leak of personal key(s). From the application of the column pointer matching method, not only the row pointer matching method but also a method of combining the two are possible.
[71] An embodiment of the column pointer matching method is as follows. Set the image '(§>' 710 as a hole image, '*' 720 and '0' 730 as personal key images. At first, in order to shift the column D in which the personal key image '*' 720 is located to the column D in which the hole image '(§>' 710 is placed, the user inputs a leftward key or button once. And then, in order to shift the column D in which the personal key image '0' 730 is positioned to the column D in which the hole image '(§>' 710 is placed, the user inputs a leftward key or button three times. In addition, to prevent unnecessary input and help the user with reference of input, a side of the user's terminal device or the screen thereof is provided with a counter, thereby displaying the number of input of direction keys.
[72] As the user makes a shift toward the left or right direction, the possibility of authentication failure caused by mistake gets lower. Besides, several images in each column makes it difficult to guess the hole image and the personal key image(s).
[73] Fig. 8 is a flowchart illustrating steps of a column pointer matching method according to the present invention. Referring to Fig. 8, for a GOTP authentication, the user's terminal device transmits an authentication request signal to the server (S810), and receives a synchronizing code for selection of an array function for arrangement of images with an image group (S 820). The image group includes at least one hole image, at least one personal key image, and background images chosen by the user, and the GOTP images are arranged on the screen by the array function selected by a synchronizing code (S830). The GOTP image arrangement method is through any one of transmitting of an array function from the server to the user's terminal device and generating a random function or an array function in the user's terminal device itself, thereby minimizing the possibility of appearing identical arrays.
[74] A column pointer is given per column of the GOTP images arrayed on the screen
(S840), and the server finds the column pointers for a hole image and a personal key image. The server calculates the shift path from the column holding the personal key image to the column holing the hole image (S850) and receives the shift path input made through direction keys or buttons appearing on the screen of the user's terminal device (S850), thereby comparing the shift path input with its calculated shift path (S860).
[75] In addition, to prevent unnecessary input and help the user with reference of input, a side of the user's terminal device or the screen thereof is provided with a counter, thereby displaying the number of input of direction keys.
[76] When the shift paths agree with each other as the result of the comparison, the user authentication completes; otherwise the system returns the step of requesting a synchronizing code to the server and makes the user retry the shift path input (S870). The server can transmit the synchronizing code with an image group or only the synchronizing code. When the user, however, gives up the authentication process, or fails the authentication three times or more, the authentication process ends automatically.
[77] Fig. 9 is a concept diagram describing a screen blackout method according to the present invention. Referring to Fig. 9, in the process of a GOTP authentication, upon the completion of input of the shift coordinate from a personal key image to a hole image, the user should press the enter key on the keyboard or click the input button on the screen. There has appeared a hacking method using keylogging that captures not only keystrokes but also contents appearing on the screen at the moment the enter key is pressed. If the hacker repeatedly captures and records input signal from the keyboard and the image arrays a few times, the hacker is easily able to guess the user's hole image(s) and personal key image(s).
[78] In order to prevent being hacked by such keylogging, the screen blackout method is devised. The screen blackout method is implemented as follows. At the moment a user finds a hole image and personal key image(s) in a GOTP image array 910 and inputs the shift coordinate(s) from the personal key image(s) to the hole image by pressing the left button of the mouse to click direction buttons on the screen or pressing direction keys on the keyboard, the images on the screen is changed into a black block 920; when the clicking or pressing is released, the previous images are resumed on the screen. When a hacker sees the screen recorded by his/her hacking, only black block is shown instead of the images for GOTP authentication. As a result, the hacker cannot guess the user's hole image and personal key image(s). Besides, to help the user with quick input, a side of the user's terminal device or the screen thereof is provided with a counter, thereby displaying the number of input of direction keys.
[79] In addition, as for the input of two or more personal key images for GOTP authentication, the second image array and the following image arrays after the screen blackout can have a different image array 930 from the previous image array. When the user fails GOTP authentication, the system can choose a step to retry GOTP authentication; when the user passes GOTP authentication, the user is allowed to access to the server.
[80] Fig. 10 is a flowchart describing steps of a screen blackout method according to the present invention. Referring to Fig. 10, for a GOTP authentication, the user's terminal device transmits an authentication request signal to the server (SlOlO), and receives a synchronizing code for selection of an array function for arrangement of images with an image group (S 1020). The image group includes at least one hole image, personal key image, and background images chosen by the user, and the GOTP images are arranged on the screen by the array function selected by the synchronizing code (S 1030).
[81] The server identifies the location of a hole image and a personal key image among the arranged GOTP images and calculates the shift path from the personal key image to the hole image (S 1040). When the server receives the shift path input from the user (S 1040), the image array on the screen is transformed into a black block at the moment the direction key on the keyboard of the user's terminal device or the direction button on the screen is pressed (S 1050). When the pressing is released, the previous images reappear on the screen. The blackout is not for one time use, but for every time the direction keys or buttons are pressed during the authentication process.
[82] In addition, for a case that a distant shift path makes the user confuse the input times of shift, a side of the user's terminal device or the screen thereof is provided with a counter, thereby displaying the number of input of direction keys.
[83] The server compares the shift path input from the user's terminal device with its in advance calculated shift coordinate (S 1060). When the shift paths agree with each other as the result of the comparison, the user authentication completes; otherwise the system returns the step of requesting a synchronizing code to the server and makes the user retry the shift path input (S 1070). The server can transmit the synchronizing code with an image group or only the synchronizing code. When the user, however, gives up the authentication process, or fails the authentication three times or more, the authentication process ends automatically.
[84] Fig. 11 is a concept diagram showing a multiple image selection method according to the present invention. Referring to Fig. 11, a multiple image selection method is that a user selects his/her hole image and personal key image among representative images and the images to be displayed on the screen for GOTP authentication are the images with similar color or shape with the selected representative images. A plurality of similar images based on the representative images are categorized and stored as one group (1110). The images shown on the screen 1120 during GOTP authentication are of a category randomly selected among a plurality of categories to be displayed, which should be determined by the user as the identical or almost the same images with the representative images so as not to confuse the user.
[85] As each image shown on the screen for GOTP authentication is selected randomly in each category based on the representative image, the image has a different file name each time it appears. Even if a hacker, therefore, sneaks a look into the GOTP authentication process, he/she comes to find a different shift coordinate and file name in the data each time. As a result, the hacker cannot guess the user's hole image and personal key image(s) in spite of many stealing glances at the GOTP authentication process.
[86] Fig. 12 is a flowchart showing steps of a multiple image selection method according to the present invention. Referring to Fig. 12, for a GOTP authentication, a user sets in advance his/her hole image and personal key image among a plurality of representative images (S 1210). The representative image includes a category of a plurality of similar images and each similar image has its own file name which shows no relation with the others.
[87] When there is a GOTP authentication request (S 1220), the user's terminal device transfers an authentication request signal to the server, and receives a synchronizing code for selection of an array function for arrangement of images with an image group (S 1230). The image group includes a hole image, a personal key image, and background images chosen by the user, which are not the representative images but brought from similar images, and the GOTP images are arranged on the screen (S 1240). From one image group, only one image is brought. The server checks the position of the hole image and the personal key image among the GOTP images arranged on the screen, calculates the shift path from the user's personal key image to the hole image (S 1250), and compares it with the shift path inputted by the user (S 1260). For a case that a distant shift path makes the user confuse the input times of shift, to prevent unnecessary input and help the user with reference of input, a side of the user's terminal device or the screen thereof is provided with a counter, thereby displaying the number of input of direction keys.
[88] When the shift paths agree with each other as the result of the comparison, the user authentication completes; otherwise the system returns the step of requesting a synchronizing code to the server and makes the user retry the shift path input (S 1270). The server can transmit the synchronizing code with an image group or only the synchronizing code. When the user, however, gives up the authentication process, or fails the authentication three times or more, the authentication process ends automatically.
[89] Fig. 13 is a screen layout for password input according to the present invention.
Referring to Fig. 13, an array of a keypad for a GOTP input 1310 is the same with the conventional keypad for a direct input of password 1320. The numbers marked on each key, however, are not arrayed in numerical order, but randomly arranged every time of authentication by an array function. Besides, key identifying marks for each number are different from one another so that the user can find each digit's position with their specific mark, color, shadow, and the like. [90] When there are key identifying marks for a few of specific numbers, other persons can easily catch those numbers. Therefore, by giving different identifying mark to each number key, only the user can catch specific color or mark. Besides, whenever the user inputs a shift path through a direction key, the numbers on the keypad do not move, but the key identifying marks do, thereby making it difficult for others to guess the password even with sneaking a look into the input process.
[91] Users who are not used to the keypad for a GOTP input 1310 according to a GOTP authentication system may prefer the conventional keypad for a direct input of password 1320. Therefore, by pressing a button for change of input method 1330, the numbers on the keypad are rearranged in numerical order like the keypad of the conventional input method 1320, and the user directly inputs the password to get authenticated.
[92] Fig. 14 is a concept diagram presenting a password input method according to the present invention. Referring to Fig. 14, the password input method according to the present embodiment makes use of an existing password unlike conventional GOTP authentications, but the input is made by a shift key (→) functioning as a direction key, not by directly pressing numbers. For instance, when setting case that the password is '1234', in order to make the identifying mark of the first password number T 1410 reach the second number, a user presses the shift key twice 1420. Whenever the shift key is pressed, the numbers assigned for each key still remain unchanged but the identifying marks move by a key unit in a pointer's direction of the shift key. When the identifying mark of the first password number T reaches the key of the second number '2' 1420, the user can complete the first input of shift path by pressing the 'OK' button 1430.
[93] When the first input is completed, the numbers arrayed on the keypad are rearranged 1440. Like the first method, the user presses the shift key (→) once in order to make the identifying mark of the third number '3' reach the key of the fourth number '4' 1450, and completes the second input of shift path by pressing an 'OK' button 1460.
[94] The user perceives the process as a method as that of moving a cursor on his/her password and pressing them, but the GOTP authentication system itself perceives the shift path inputted by a user as a password. According to the previous embodiment of the array and the password, the GOTP authentication system perceives the input twice (→→) and input once (→) of the shift key as a password. Even when, therefore, others steals a look into the shift path input, they can not know the exact numbers.
[95] For a case that a distant shift path makes the user confuse the input times of shift, to prevent unnecessary input and help the user with reference of input, a side of the user's terminal device or the screen thereof is provided with a counter, thereby displaying the number of input of direction keys. [96] The previous example shows an embodiment of two step input of shift path.
According to an authentication system, it is available to lower the possibility for others to guess the user's password by inputting the shift path continuously from the first number to the fourth number. In addition, it is possible to use not only a rightward shift key like in this embodiment but also a leftward key, a couple of upward and downward keys or leftward and rightward keys, or a set of four keys of upward, downward, leftward and rightward.
[97] Fig. 15 is a flowchart showing steps of a password input method according to the present invention. Referring to Fig. 15, when receiving an ID input through an input unit, a GOTP authentication system generates and transfers an authentication request to a server (S 1510). A user's terminal device transfers an authentication request signal to the server, and receives a synchronizing code for selection of an array function for arrangement of numbers and key identifying marks (S 1520). The key identifying marks help the user identify a number's location by expressing each number differently with specific mark, color, shadow, etc. And the key identifying marks are arranged for each number on the screen by the array function which is selected according to a synchronizing code (S 1530).
[98] The server checks the coordinates of password based on the numbers arrayed on the screen and calculates a first shift path from one number to the next number. And the user inputs shift coordinates according to the GOTP authentication method (S 1540) through his/her terminal device. The user's terminal device transfers to the server the inputted shift coordinates as a second shift path. Then, the server determines the agreement of the destination coordinates between the first shift path and the second shift path (S 1550) and transfers the result to the user's terminal device. When the shift paths agree with each other as the result of the comparison, the user authentication completes (S 1560); otherwise the system returns the step of requesting a synchronizing code to the server and makes the user retry the GOTP authentication (S 1570). The server can transmit the synchronizing code with key identifying marks or only the synchronizing code. When the shift paths do not agree certain times, the authentication process ends (S 1570).
[99] Fig. 16 is a screen layout showing a shift key input counting display according to the present invention. Referring to Fig. 16, the shift key input counting display method is configured the same as above said password input method, but without key identifying marks. It is for displaying the number of the shift key input.
[100] The keypad of this embodiment 1610 is arranged the same as the keypad of a conventional direct input method 1620. The numbers marked on each key are not arranged in numerical order like in a conventional method, but randomly arranged by an array function every time of authentication. Even if a user inputs a shift key, as there is no remarkable sign on the screen, the user gets confused about his/her input times. To complement this, therefore, there is a counter 1640 in the lower part of the keypad in order to present input times whenever input key is pressed.
[101] Even when others see the input times, they can not know the password since they do not know the starting point. Since a user who is not used to this GOTP input method may prefer the keypad of a conventional input method 1620, the arrangement of the keypad is changed like the keypad of a conventional input method 1620 with the numbers arrayed in numerical order by pressing the button 1630 for change of input method. Then the user directly inputs his/her password to get authenticated.
[102] Fig. 17 is a concept diagram showing a shift key input counting display according to the present invention. Referring to Fig. 17, a user can use his/her existing password as it was, but input is made by pressing a shift key (→) up to the times for the first number to reach the second number, not by directly pressing the number keys. The counter in the lower part of the keypad helps the user with his/her input by presenting the input times.
[103] Put case that a user's password is '1234'. The user's starting point is the place of T
1710, and the user should input the shift key twice to reach the place of '2' 1720. Because the shift key input is made twice, the counter in the lower part of the keypad shows "2" as the number of input 1720. When the user completes the shift path input by pressing 'OK' button 1730, the numbers on the screen are rearranged 1740. As the first input was made, the user has the place of the third number '3' as the starting point 1750 and inputs shift key once to reach the place of the number '4' 1750. Then the counter in the lower part of the keypad expresses " 1 " as the number of input, and the user completes the shift path input by pressing 'OK' button 1760.
[104] Fig. 18 is a block diagram illustrating a doorlock which adopts a independent
GOTP system according to the present invention. Referring to Fig. 18, a doorlock which adopts a independent GOTP system according to the present invention can be established without a network by including a function of a server to generate a synchronizing code in a terminal device and storing image groups and array functions in the storage unit thereof.
[105] The independent GOTP system comprises an input unit 1810 to receive an ID input from a user, a display unit 1820 to provide the user with a guidance screen, a mechanical unit 1830 to open/close a lock of a door, a power supply unit 1840 to supply power to each unit of the system, a synchronizing code generating unit 1850 to generate a keypad array signal including algorithm to arrange the keypad, a storage unit 1860 to store data related to users' IDs and passwords, and a control unit 1800 to control overall system as connected with each unit.
[106] The input unit 1810 is a device for a user to input his/her ID through a method such as an RFID, a smart card, an ID number, a Bluetooth, an electrical bracelet, a biorecognition (fingerprint, iris). The user inputs his/her own ID through the input unit 1810, which transmits the received ID to the control unit. When the user's ID is determined to be valid, the system allows the user to take the GOTP authentication process or permits access omitting the GOTP authentication depending on access permission level.
[107] The display unit 1820 is a touchscreen on which GOTP images are arrayed for
GOTP authentication and provides users with guidance messages such as a user manual.
[108] The display unit includes a shift key for users to input shift paths, an input button to complete an input of shift paths, an input method change button to alter the input method into a conventional direct input manner, a help button to request the user's manual for GOTP authentication, a correction button to correct shift path input, a cancel button to cancel the GOTP authentication process itself. Users do not input the password directly, but uses the shift key to input the password with a shift path such as from the place of the first number key to that of the second number key.
[109] The screen of the display unit 1820 provides not only GOTP authentication images but also some information to users with visual data including text, images, motion pictures, etc. In addition, it can present the number of input made by users in order to help the users with quick and exact input.
[110] The mechanical unit 1830 is connected with and controlled by the control unit
1800, thereby performing the function to open/close the lock of a door.
[I l l] The power supply unit 1840 is connected with the control unit 1800, through which it supplies power to the system. As for doorlocks or safes which are difficult to be supplied with power from external sources, it is possible to operate them independently with a battery as the power source without connection to an external source. As for independent ATMs, however, though they become independent devices at night because the bank's server shuts down and the networking does not operate, they are difficult to operate only relying on a battery. They, therefore, should be power supplied by an external source.
[112] The synchronizing code generating unit 1850, upon the request of the control unit
1800, generates a synchronizing code to select an array function stored in the storage unit 1860 and transmits the synchronizing code to the control unit 1800. The storage unit 1860 stores users' IDs and passwords, images for GOTP authentication, and information to be provided to users through the display unit 1820.
[113] The control unit 1800 is connected with the input unit 1810, the display unit 1820, the mechanical unit 1830, the power supply unit 1840, the synchronizing code generating unit 1850, and the storage unit 1860, thereby controlling each unit. When there is an ID input through the input unit 1810, the control unit perceives it as an occurrence of an authentication request. When there occurs an authentication request, the control unit searches the password for the pertinent ID in the storage unit, receives a synchronizing code from the synchronizing code generating unit 1850, and arrays numbers on the keypad of the screen of the display unit 1820.
[114] In addition, the control unit compares the shift path inputted by users with the shift path calculated in itself to thereby determine the result of the authentication. When the authentication succeeds, the control unit controls the mechanical unit 1830 to open the lock of the door.
[115] Unlike an independent GOTP authentication system, it is possible to establish a network GOTP authentication system comprising a server and a plurality of terminal devices using the network. The network GOTP authentication system includes a plurality of terminal devices which receives input from users and provides service and a server which performs authentication responding the GOTP authentication request inputted through terminal devices.
[116] The terminal devices bring the functions of the input unit, the display unit, the control unit, and the storage unit from the above described independent GOTP authentication system; and the server brings the functions of the synchronizing code generating unit, the storage unit, and the control unit. By adding a communication unit, each terminal device and the server can transmit and receive data to and from each other. In addition, when the transmitted and received data is encoded and decoded, the GOTP authentication system becomes safer.
[117] Each unit has the same function as those in the independent GOTP authentication system, and the server can be accessed through a plurality of terminal devices at the same time, thereby providing service concurrently to many users. Through the terminal devices, input and output functions are provided, wherein the input is made by users and the output is an array of an image group displayed on the screen; through the server, the authentication is performed using the input. Therefore, this type is fit for a system such as a webserver, ATM, and the like which is accessed by at least one terminal device and requires a user authentication through a server.
[118] Although the present invention has been described with reference to several preferred embodiments, the description is illustrative of the invention and is not to be construed as limiting the invention. Various modifications and variations may occur to those skilled in the art, without departing from the scope of the invention as defined by the appended claims.
[119]
Industrial Applicability The present invention provides an authentication method safe from pharming, phishing, and hacking, thereby being applicable to network systems, ATMs, doorlocks, and the like which requires authentication using an existing password.

Claims

Claims
[1] A user authentication method using a graphic OTP (one time password) (OTP), in operating a server which performs user authentication using a graphic OTP, comprising: a first step of generating a synchronizing code for selecting an array function stored in a user's terminal device after receiving a graphic OTP authentication request from said user's terminal device; a second step of transferring to said user's terminal device said synchronizing code and an image group which is stored by said user; a third step of calculating a first shift path from the images to be arrayed on a screen by using said synchronizing code and said image group stored by said user; a fourth step of receiving a second shift path which is transmitted from said user's terminal device; and a fifth step of determining the user authentication by comparing each starting point and each destination point of said first shift path and second shift path, and transferring the authentication result to said user's terminal device.
[2] The method of claim 1, wherein said synchronizing code is for selecting an array function stored in said user's terminal device, and is generated anew for every occurrence of a generating request.
[3] The method of claim 1, wherein said image group includes: at least one personal key image of said user; at least one hole image which is designated by said user in order for said personal key image to be shifted to; and at least one background image which is selected by said user to be arrayed with said personal key image and said hole image by said array function corresponding to said synchronizing code.
[4] The method of claim 1, wherein said first shift path is a shift path by which said personal key image is moved to a place of said hole image; and said second shift path is inputted by said user and characterized by being encoded.
[5] The method of claim 1, wherein said fifth step, when a user authentication is retried because more than two personal key images are designated or a former authentication failed, returns to said first step of generating a synchronizing code anew upon the request thereof; and in said second step, the newly generated synchronizing code is transferred with an image group or by itself.
[6] The method of claim 1, wherein said server transfers information data expressed in text, images, or motion pictures to be provided to said user.
[7] A user authentication method using a graphic OTP, in operating a terminal device for user authentication using a graphic OTP, comprising: a first step of transferring to a server a graphic OTP authentication request signal by receiving a user's input of ID and password; a second step of receiving from said server an image group which is stored by said user and a synchronizing code for selecting an array function by which said image group is arrayed in order to authenticate said user; a third step of displaying a plurality of images of said image group on a screen of said terminal device according to said array function which is selected corresponding to said synchronizing code; a fourth step of receiving input of a shift path from at least one personal key image to at least one hole image which are displayed on said screen, wherein the input is made by selecting at least one direction key shown on said screen; and a fifth step of transferring to said server said inputted shift path as a second shift path, and receiving an authentication result from said server.
[8] The method of claim 7, wherein said input of ID is made by use of any one of an
RFID, a smart card, an ID number, a Bluetooth, an electrical bracelet, a biorecognition (fingerprint, iris).
[9] The method of claim 7, wherein said array function is stored in said terminal device in a plurality of number, and one is selected corresponding to one synchronizing code, thereby arraying images of said image group on said screen.
[10] The method of claim 7, wherein said image group includes: at least one personal key image of said user; at least one hole image which is designated by said user in order for said personal key image to be shifted to; and at least one background image which is selected by said user to be arrayed with said personal key image and said hole image by said array function corresponding to said synchronizing code.
[11] The method of claim 7, wherein said fourth step is able to present input number of said direction key through a counter in a side of said screen.
[12] The method of claim 7, wherein said second shift path is inputted by said user and characterized by being encoded.
[13] The method of claim 7, wherein said fifth step, when a user authentication is retried because more than two personal key images are designated or a former authentication failed, returns to said first step, which means requesting of a synchronizing code anew; and in said second step, the newly generated synchronizing code is transferred with an image group or by itself.
[14] The method of claim 7, wherein said terminal device receives from said server and stores information data expressed in text, images, or motion pictures, and provides said information data to said user through said screen for graphic OTP authentication.
[15] A user authentication method using a graphic OTP, in operating a terminal device for user authentication using a graphic OTP, comprising: a first step of transferring to a server a graphic OTP authentication request signal by receiving a user's input of ID and password; a second step of receiving from said server an image group which is stored by said user and a synchronizing code for selecting an array function by which said image group is arrayed in order to authenticate said user; a third step of displaying a plurality of images of said image group on a screen of said terminal device according to said array function which is selected corresponding to said synchronizing code; a fourth step of assigning pointers for each column of a plurality of images which are arrayed on said screen; a fifth step of identifying column pointers holding a personal key image and a hole image respectively, and receiving input of a shift path from a column pointer holding said personal key image to a column pointer holding said hole image, wherein the input is made through at least one direction key shown on said screen; and a sixth step of transferring to said server said inputted shift path as a second shift path, and receiving an authentication result from said server.
[16] The method of claim 15, wherein said input of ID is made by use of any one of an RFID, a smart card, an ID number, a Bluetooth, an electrical bracelet, a biorecognition (fingerprint, iris).
[17] The method of claim 15, wherein said array function is stored in said terminal device in a plurality of number, and one is selected corresponding to one synchronizing code, thereby arraying images of said image group on said screen.
[18] The method of claim 15, wherein said image group includes: at least one personal key image of said user; at least one hole image which is designated by said user in order for said personal key image to be shifted to; and at least one background image which is selected by said user to be arrayed with said personal key image and said hole image by said array function corresponding to said synchronizing code.
[19] The method of claim 15, wherein said column pointers holding said hole image and said personal key image respectively are possible to be replaced with row pointers holding said hole image and said personal key image respectively; or both column pointer and row pointer can be adopted at the same time or sequentially according to the number of shift.
[20] The method of claim 15, wherein said fifth step is able to present input number of said direction key through a counter in a side of said screen.
[21] The method of claim 15, wherein said sixth step, when a user authentication is retried because more than two personal key images are designated or a former authentication failed, returns to said first step, which means requesting of a synchronizing code anew; and in said second step, the newly generated synchronizing code is transferred with an image group or by itself.
[22] The method of claim 15, wherein said second shift path is inputted by said user and characterized by being encoded.
[23] The method of claim 15, wherein said terminal device receives from said server and stores information data expressed in text, images, or motion pictures, and provides said information data to said user through said screen for graphic OTP authentication.
[24] A user authentication method using a graphic OTP, in operating a terminal device for user authentication using a graphic OTP, comprising: a first step of transferring to a server a graphic OTP authentication request signal by receiving a user's input of ID and password; a second step of receiving from said server an image group which is stored by said user and a synchronizing code for selecting an array function by which said image group is arrayed in order to authenticate said user; a third step of displaying a plurality of images of said image group on a screen of said terminal device according to said array function which is selected corresponding to said synchronizing code; a fourth step of receiving input of a shift path from a personal key image to a hole image among a plurality of images which are displayed on said screen, wherein the input is made through at least one direction key; a fifth step of receiving confirmation of said shift path input through said user's selecting an input key shown on said screen; and a sixth step of transferring to said server said inputted shift path as a second shift path, and receiving an authentication result from said server; wherein said fourth and fifth steps are characterized by, whenever a direction key of a keyboard connected with said terminal device or a direction button shown on said screen is pressed in order to input said shift path, changing said images displayed on said screen into a black block; and restoring said images when a press of said direction key or said direction button is released as waiting for another input of shift path.
[25] The method of claim 24, wherein said input of ID is made by use of any one of an RFID, a smart card, an ID number, a Bluetooth, an electrical bracelet, a biorecognition (fingerprint, iris).
[26] The method of claim 24, wherein said array function is stored in said terminal device in a plurality of number, and one is selected corresponding to one synchronizing code, thereby arraying images of said image group on said screen.
[27] The method of claim 24, wherein said image group includes: at least one personal key image of said user; at least one hole image which is designated by said user in order for said personal key image to be shifted to; and at least one background image which is selected by said user to be arrayed with said personal key image and said hole image by said array function corresponding to said synchronizing code.
[28] The method of claim 24, wherein said fourth and fifth steps further include a step of rearraying images displayed on said screen as restoring images from said black block whenever completing one time input of said shift path.
[29] The method of claim 24, wherein said fourth and fifth steps are able to present input number of said direction key through a counter in a side of said screen.
[30] The method of claim 24, wherein said second shift path is inputted by said user and characterized by being encoded.
[31] The method of claim 24, wherein said sixth step, when a user authentication is retried because more than two personal key images are designated or a former authentication failed, returns to said first step, which means requesting of a synchronizing code anew; and in said second step, the newly generated synchronizing code is transferred with an image group or by itself.
[32] The method of claim 24, wherein said terminal device receives from said server and stores information data expressed in text, images, or motion pictures, and provides said information data to said user through said screen for graphic OTP authentication.
[33] A user authentication method using a graphic OTP, in operating a terminal device for user authentication using a graphic OTP, comprising: a first step of transferring to a server a graphic OTP authentication request signal by receiving a user's input of ID and password; a second step of receiving from said server a synchronizing code for selecting an array function by which a similar image group is arrayed, wherein said similar image group is composed of a plurality of similar images corresponding to each image in an image group which is stored by said user in order to authenticate said user; a third step of receiving input of a shift path from a personal key image to a hole image among images which are displayed on said screen, wherein the input is made through at least one direction key shown on said screen; and a fourth step of transferring to said server said inputted shift path as a second shift path, and receiving an authentication result from said server.
[34] The method of claim 33, wherein said input of ID is made by use of any one of an RFID, a smart card, an ID number, a Bluetooth, an electrical bracelet, a biorecognition (fingerprint, iris).
[35] The method of claim 33, wherein said array function is stored in said terminal device in a plurality of number, and one is selected corresponding to one synchronizing code, thereby arraying images of said image group on said screen.
[36] The method of claim 33, wherein said image group includes: at least one personal key image of said user; at least one hole image which is designated by said user in order for said personal key image to be shifted to; and at least one background image which is selected by said user to be arrayed with said personal key image and said hole image by said array function corresponding to said synchronizing code.
[37] The method of claim 33, wherein said third step is able to present input number of said direction key through a counter in a side of said screen.
[38] The method of claim 33, wherein said second shift path is inputted by said user and characterized by being encoded.
[39] The method of claim 33, wherein said fourth step, when a user authentication is retried because more than two personal key images are designated or a former authentication failed, returns to said first step, which means requesting of a synchronizing code anew; and in said second step, the newly generated synchronizing code is transferred with an image group or by itself.
[40] The method of claim 33, wherein said terminal device receives from said server and stores information data expressed in text, images, or motion pictures, and provides said information data to said user through said screen for graphic OTP authentication.
[41] A user authentication method using a graphic OTP, in operating a terminal device for user authentication using a graphic OTP, comprising: a first step of transferring to a server a graphic OTP authentication request signal by receiving a user's input of ID and password; a second step of receiving from said server a set of key identifying marks and a synchronizing code for selecting an array function by which said key identifying marks and each digit of password are dispersedly arrayed in order to authenticate said user; a third step of displaying each digit of numbers and key identifying marks, which are arrayed according to said array function, on a keypad appearing on a screen of said terminal device; a fourth step of receiving input of a shift coordinate from a first digit of password to a second digit thereof in said keypad, wherein the input is made through at least one direction key; a fifth step of calculating said shift coordinate which is recognized by selecting said direction key, wherein said key identifying marks are shifted in the same direction of said direction key whenever said direction key is selected; and a sixth step of transferring to said server said inputted shift coordinate as a second shift path, and receiving an authentication result from said server.
[42] The method of claim 41, wherein said input of ID is made by use of any one of an RFID, a smart card, an ID number, a Bluetooth, an electrical bracelet, a biorecognition (fingerprint, iris).
[43] The method of claim 41, wherein said array function is stored in said terminal device in a plurality of number, and one is selected corresponding to one synchronizing code, thereby arraying images of said image group on said screen.
[44] The method of claim 41, wherein said key identifying marks are for the purpose of identifying each key by using different color, mark or shadow for each key.
[45] The method of claim 41, wherein said keypad is arrayed by assigning any one digit of 0 to 9 to each of ten keys, which have a key identifying mark different from one another.
[46] The method of claim 41, wherein said keypad is arrayed by assigning any two digits of 0 to 9 to each of five keys, which have a key identifying mark different from one another.
[47] The method of claim 41, wherein said keypad is a touchscreen which is capable of presenting numbers, characters, figures, or images thereon.
[48] The method of claim 41, wherein said fourth step, depending on a composition of password, receives repeatedly performed shift coordinate input like from a first digit to a second digit, from the second digit to a third digit, or from the third digit to a fourth digit, and, when a former authentication failed, returns to said first step, which means requesting of a synchronizing code anew; and in said second step, the newly generated synchronizing code is transferred with an image group or by itself.
[49] The method of claim 41, wherein said fourth step is able to present input number of said direction key through a counter in a side of said screen.
[50] The method of claim 41, wherein said second shift path is inputted by said user and characterized by being encoded.
[51] The method of claim 41, wherein said terminal device receives from said server and stores information data expressed in text, images, or motion pictures, and provides said information data to said user through said screen for graphic OTP authentication.
[52] A user authentication method using a graphic OTP, in operating a terminal device for user authentication using a graphic OTP, comprising: a first step of transferring to a server a graphic OTP authentication request signal by receiving a user's input of ID and password; a second step of receiving from said server a synchronizing code for selecting an array function by which each digit of password is arrayed in order to authenticate said user; a third step of displaying each digit of numbers, which are arrayed according to said array function, on a keypad appearing on a screen of said terminal device; a fourth step of receiving input of a shift coordinate from a first digit of password to a second digit thereof in said keypad, wherein the input is made through at least one direction key; a fifth step of calculating said shift coordinate which is recognized by selecting said direction key, wherein a counter shows a input number of said direction key whenever said direction key is selected; and a sixth step of transferring to said server said inputted shift coordinate as a second shift path, and receiving an authentication result from said server.
[53] The method of claim 52, wherein said input of ID is made by use of any one of an RFID, a smart card, an ID number, a Bluetooth, an electrical bracelet, a biorecognition (fingerprint, iris).
[54] The method of claim 52, wherein said keypad is a touchscreen which is capable of presenting numbers, characters, figures, or images thereon.
[55] The method of claim 52, wherein said fourth step, depending on a composition of password, receives repeatedly performed shift coordinate input like from a first digit to a second digit, from the second digit to a third digit, or from the third digit to a fourth digit.
[56] The method of claim 52, wherein said second shift path is inputted by said user and characterized by being encoded.
[57] The method of claim 52, wherein said fifth step, when a user authentication is retried because more than two personal key images are designated or a former authentication failed, returns to said first step; and in said second step, the newly generated synchronizing code is transferred with an image group or by itself.
[58] The method of claim 52, wherein said terminal device receives from said server and stores information data expressed in text, images, or motion pictures, and provides said information data to said user through said screen for graphic OTP authentication.
[59] A user authentication system using a graphic OTP, which is a network type, wherein a terminal device comprises: an input unit to receive input of ID and password from a user and transfer said input to a control unit; a display unit to display images for graphic OTP authentication according to an array function which is selected by a synchronizing code received from a server, and to receive input of a shift path from said user and transfer said input to said control unit; a communication unit to transfer to and receive from said server data related to said graphic OTP authentication or information data to be provided to said user, as connected with said control unit; a storage unit to store array functions, which are for arraying an image group, a set of key identifying marks, or password received from said server corresponding to said synchronizing code, and information data to be provided to said user, to provide them to said control unit; and a control unit to transfer to said server a graphic OTP authentication request signal including said user's ID and password, and a second shift path which is encoded after being generated using shift path input made by said user; and to permit said user's access depending on said server's determination result.
[60] A system of claim 59, wherein said server comprises: a communication unit to transfer to and receive from a control unit data as wiredly or wirelessly connected with said communication unit of said terminal device; a synchronizing code generating unit to include algorithm for arraying images for graphic OTP authentication on said display unit of said terminal device; and to generate a synchronizing code which is a keypad array signal and transfer it to said control unit; a storage unit to store data related to each user's ID and password; to search an
ID and password which said control unit requests to confirm; and to transfer the search result to said control unit; and a control unit to transfer said synchronizing code, ID, and password to said terminal device through said communication unit; to calculate a first shift path by identifying each place of at least one hole image and at least one personal key image, or each digit's location of password to be arrayed on said display unit of said terminal device; and to permit said user's access by determining the agreement of said first shift path with said second shift path inputted by said user.
[61] A system of claim 60, wherein said first shift path is a shift path to shift said personal key image to said hole image or one digit of password to the next digit thereof; and said second shift path is characterized by encoding a shift path inputted by said user.
[62] A user authentication system using a graphic OTP, which is an independent type, comprising: an input unit to receive input of ID and password from a user and transfer said input to a control unit; a display unit to display a keypad for graphic OTP authentication by a signal of said control unit; and to receive input of a shift path from said user and transfer said input to said control unit; a synchronizing code generating unit to generate a synchronizing code for selecting an array function which is for arraying a keypad for graphic OTP authentication; a storage unit to store data related to each user's ID and password, array functions corresponding to each synchronizing code, and image groups including figures, characters, or numbers which are designated by said user; and a control unit to have said synchronizing code generated and transfer said synchronizing code to said storage unit; to have images for graphic OTP authentication arrayed according to said array function received from said storage unit; to calculate a first shift path by identifying a place of at least one hole image, at least one personal key image, or each digit of password on said keypad; and to permit said user's access by determining of the agreement of said first shift path with a second shift path inputted by said user.
[63] A system of claim 62, wherein said first shift path is a shift path to shift said personal key image to said hole image or one digit of password to the next digit thereof; and said second shift path is characterized by encoding a shift path inputted by said user.
PCT/KR2008/001070 2007-02-28 2008-02-25 User authentication method and system using graphic otp WO2008105602A1 (en)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
KR1020070020553A KR100844195B1 (en) 2007-02-28 2007-02-28 A user authentication method of having used graphic OTP
KR10-2007-0020553 2007-02-28
KR10-2007-0097878 2007-09-28
KR1020070097878A KR20080011362A (en) 2007-09-28 2007-09-28 Method for hacking protection of gotp
KR1020070106375A KR100960517B1 (en) 2007-10-23 2007-10-23 user authentication method of having used graphic OTP and user authentication system using the same
KR10-2007-0106375 2007-10-23

Publications (1)

Publication Number Publication Date
WO2008105602A1 true WO2008105602A1 (en) 2008-09-04

Family

ID=39721412

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2008/001070 WO2008105602A1 (en) 2007-02-28 2008-02-25 User authentication method and system using graphic otp

Country Status (1)

Country Link
WO (1) WO2008105602A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102011101711A1 (en) * 2011-05-17 2012-11-22 Deutsche Telekom Ag Method for authenticating person for accessing information-technology (IT)/non-technology (NT) system in bank, involves comparing authentication code with authentication input of user interface transmitted to data processing unit
WO2014011001A1 (en) * 2012-07-12 2014-01-16 주식회사 로웸 Password authentication system and password authentication method using consecutive password authentication
US20140201831A1 (en) * 2011-11-10 2014-07-17 Soongsil University Research Consortium Techno-Park Method and apparatus for authenticating password of user terminal
WO2016126052A3 (en) * 2015-02-06 2016-11-10 (주)이스톰 Authentication method and system
EP2988239A4 (en) * 2013-10-29 2017-01-18 Kyocera Document Solutions Inc. Password authentication device, password authentication method, and non-temporary computer-readable recording medium storing password authentication program
US9679123B2 (en) 2012-07-12 2017-06-13 Rowem Inc. Password authentication system and password authentication method using consecutive password authentication
CN112738561A (en) * 2020-12-03 2021-04-30 西安慧博文定信息技术有限公司 OTP (one time programmable) image encryption and verification based method and equipment
WO2022087432A1 (en) * 2020-10-23 2022-04-28 Capital One Services, Llc Multi-factor authentication using symbols

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996018139A1 (en) * 1994-12-08 1996-06-13 Philips Electronics N.V. Security code input
US6209104B1 (en) * 1996-12-10 2001-03-27 Reza Jalili Secure data entry and visual authentication system and method
US6981016B1 (en) * 1999-06-11 2005-12-27 Visage Development Limited Distributed client/server computer network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996018139A1 (en) * 1994-12-08 1996-06-13 Philips Electronics N.V. Security code input
US6209104B1 (en) * 1996-12-10 2001-03-27 Reza Jalili Secure data entry and visual authentication system and method
US6981016B1 (en) * 1999-06-11 2005-12-27 Visage Development Limited Distributed client/server computer network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
KIHO Y.: "The Concept of one-time passroute and its implementation", MAGAZINE OF COMPUTER WORLD, November 2005 (2005-11-01), pages 174 - 178 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102011101711A1 (en) * 2011-05-17 2012-11-22 Deutsche Telekom Ag Method for authenticating person for accessing information-technology (IT)/non-technology (NT) system in bank, involves comparing authentication code with authentication input of user interface transmitted to data processing unit
DE102011101711B4 (en) 2011-05-17 2022-11-10 Deutsche Telekom Ag Authentication Procedures
US20140201831A1 (en) * 2011-11-10 2014-07-17 Soongsil University Research Consortium Techno-Park Method and apparatus for authenticating password of user terminal
US9038166B2 (en) * 2011-11-10 2015-05-19 Soongsil University Research Consortium Techno-Park Method and apparatus for authenticating password of user terminal
US9679123B2 (en) 2012-07-12 2017-06-13 Rowem Inc. Password authentication system and password authentication method using consecutive password authentication
WO2014011001A1 (en) * 2012-07-12 2014-01-16 주식회사 로웸 Password authentication system and password authentication method using consecutive password authentication
EP2988239A4 (en) * 2013-10-29 2017-01-18 Kyocera Document Solutions Inc. Password authentication device, password authentication method, and non-temporary computer-readable recording medium storing password authentication program
WO2016126052A3 (en) * 2015-02-06 2016-11-10 (주)이스톰 Authentication method and system
US10298400B2 (en) 2015-02-06 2019-05-21 eStorm Co., LTD Authentication method and system
US10574463B2 (en) 2015-02-06 2020-02-25 eStorm Co., LTD Authentication method and system
US11876908B2 (en) 2015-02-06 2024-01-16 eStorm Co., LTD Authentication method and system
WO2022087432A1 (en) * 2020-10-23 2022-04-28 Capital One Services, Llc Multi-factor authentication using symbols
US11888841B2 (en) 2020-10-23 2024-01-30 Capital One Services, Llc Multi-factor authentication using symbols
CN112738561A (en) * 2020-12-03 2021-04-30 西安慧博文定信息技术有限公司 OTP (one time programmable) image encryption and verification based method and equipment

Similar Documents

Publication Publication Date Title
WO2008105602A1 (en) User authentication method and system using graphic otp
US8826406B2 (en) Password security input system using shift value of password key and password security input method thereof
US10798090B2 (en) User authentication method, system for implementing the same, and information communication terminal used in the same
KR100960517B1 (en) user authentication method of having used graphic OTP and user authentication system using the same
US6209104B1 (en) Secure data entry and visual authentication system and method
US5060263A (en) Computer access control system and method
CN100361115C (en) Method and system for processing password inputted by the matching of cells
EP2763070B1 (en) Graphical user interface (GUI) that receives directional input to change face for receiving passcode
US20170257359A1 (en) User authentication method and system for implementing same
US8869261B1 (en) Securing access to touch-screen devices
TWI617937B (en) Fingerprint encoding method, fingerprint authentication method and system
KR100664680B1 (en) Method for managing plural kind of passwords and portable apparatus implementing the method
JP2009169857A (en) Authentication system
KR20170092653A (en) Authentication server device, program, and authentication method
KR20150084678A (en) Method of inputting confidential data on a terminal
JP2019505051A (en) Dynamic graphical password-based network registration method and system
US20160093131A1 (en) Keypad for the entry of authentication data
KR20130027313A (en) Method and system for authenticating using input pattern
US11423183B2 (en) Thermal imaging protection
Salman et al. A graphical PIN entry system with shoulder surfing resistance
Alfard et al. IoTGazePass: A new password scheme for IoT applications
KR100844195B1 (en) A user authentication method of having used graphic OTP
KR20080011362A (en) Method for hacking protection of gotp
WO2017030210A1 (en) User authentication method using graphic otp
KR101051037B1 (en) User authentication method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08723108

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: LOSS OF RIGHTS COMMUNICATION (EPO F1205A OF 03.12.09)

122 Ep: pct application non-entry in european phase

Ref document number: 08723108

Country of ref document: EP

Kind code of ref document: A1