WO2019132214A1 - Method and system for hybrid password authentication - Google Patents
Method and system for hybrid password authentication Download PDFInfo
- Publication number
- WO2019132214A1 WO2019132214A1 PCT/KR2018/012842 KR2018012842W WO2019132214A1 WO 2019132214 A1 WO2019132214 A1 WO 2019132214A1 KR 2018012842 W KR2018012842 W KR 2018012842W WO 2019132214 A1 WO2019132214 A1 WO 2019132214A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- password
- terminal
- information
- code value
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0846—Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0872—Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
Definitions
- the disclosed technique relates to a method and system for generating a hybrid password based on a specific location and time and thereby performing authentication.
- the authentication method using a universal password uses a method of adding additional authentication such as a mobile phone authentication, but there is still a possibility to suffer from the same method as snooping.
- the disclosed technique is to provide a method and system for generating a hybrid password based on a specific location and time and thereby performing authentication for a user for a predetermined time.
- a communication system including a plurality of authentication terminals, each of which is disposed in each of a plurality of base stations and transmits authentication information to terminals located within a communication radius of a base station in which the base stations are located, A smart terminal for generating a password on the basis of a code value included in the authentication information and the terminal information of the terminal, and transmitting the password before the expiration time included in the authentication information passes, And an authentication server that receives location information on the deployed base station and receives the password from the smart terminal to verify validity of the password.
- Embodiments of the disclosed technique may have effects that include the following advantages. It should be understood, however, that the scope of the disclosed technology is not to be construed as limited thereby, since the embodiments of the disclosed technology are not meant to include all such embodiments.
- the hybrid password authentication method and system have the effect of securely authenticating a user by generating a hybrid password temporarily valid only in a specific space.
- 1 is a flowchart of a hybrid password authentication method according to an embodiment of the disclosed technique.
- FIG. 2 is a block diagram of a hybrid password authentication system according to an embodiment of the disclosed technique.
- FIG 3 is a diagram of a smart terminal receiving authentication information from an authentication terminal located at a base station in accordance with an embodiment of the disclosed technique.
- FIG. 4 is a diagram illustrating an authentication server for preventing duplication of code values using a data list according to an embodiment of the disclosed technology.
- first, second, A, B, etc. may be used to describe various components, but the components are not limited by the terms, but may be used to distinguish one component from another .
- the first component may be referred to as a second component, and similarly, the second component may also be referred to as a first component.
- / or < / RTI > includes any combination of a plurality of related listed items or any of a plurality of related listed items.
- each of the constituent units described below may additionally perform some or all of the functions of other constituent units in addition to the main functions of the constituent units themselves, and that some of the main functions, And may be carried out in a dedicated manner. Accordingly, the presence or absence of each component described in this specification should be interpreted as a function.
- the hybrid password authentication method includes the following steps.
- the smart terminal 220 receives the authentication information 211 from the authentication terminal 210 disposed in the first base station including the current position among the plurality of base stations in the communication radius.
- each base station is provided with authentication terminals for communicating with the smart terminal.
- the smart terminal which is out of the communication radius can not receive the authentication information 211 transmitted from the authentication terminal 210 and can not receive the authentication including the code value ABE from the authentication terminal 210 of the base station covering its position Information can be received. That is, the authentication terminals installed in each base station may broadcast their authentication information with a communication radius equal to the communication radius of the base station as in conventional cell broadcasting.
- the smart terminal 220 includes a mobile terminal capable of freely moving the communication radius of various base stations, as well as a terminal that can be used in a fixed state within a communication radius of a specific base station such as a PC or a notebook.
- the authentication information 211 broadcasted by the authentication terminal 210 includes a code value 211a and a validity time 211b.
- the code value 211a is information on which the authentication terminals generate the same rule or the same type of value, and transmit the generated value to the smart terminal. It is a principle that each authentication terminal generates a unique code value that does not overlap with each other.
- the validity time 211b indicates a time when the generated code value is in a valid state. For example, if the validity time is set to 1 hour, since the generated code value becomes meaningless data after one hour or more, a new code value is generated with reference to each offset 212 thereof. Therefore, each authentication terminal changes its code value based on the valid time.
- the smart terminal 220 generates a password 222 based on the code value 211a included in the authentication information and the terminal information 221 of the smart terminal 220 using the application communicating with the authentication terminal 210.
- the code value 211a included in the authentication information 211 is used in generating the password 222.
- the code value 211a is used not only in the code value 211a but also in the smart terminal 220 receiving the code value 211a, And generates a password 222 by combining the terminal information 221 with the terminal information 221.
- the terminal information 221 indicates information unique to the smart terminal 220. For example, it may be wake-up information, a serial number, or personal information or bio information of a terminal user.
- a password may be encrypted by encrypting the terminal information with a code value, or by mixing two values according to a certain rule, and then applying a hash function. Can be generated.
- the smart terminal 220 has installed an application communicating with the authentication terminal 210 in advance. It is possible to generate the password 222 using the terminal information 221 and the code value 211a by using the password generation algorithm of the application.
- the smart terminal 220 transmits the password 222 to the authentication terminal 210 before the valid time 211b included in the authentication information 211 is displayed.
- the authentication information 211 includes not only the code value 211a but also the valid time 211b, and the system 200 determines that the password is valid only for the password processed before the valid time 211b passes
- the application installed in the smart terminal 220 automatically transmits the password 222 to the authentication terminal 210 that has provided the authentication information before the validity time 211b passes.
- step 140 the authentication terminal 210 transmits the password 222 received from the smart terminal 220 and the location information 213 of the base station of which the authentication terminal 210 is located, to the authentication server 230.
- the base station in which the authentication terminal 210 is located is referred to as a first base station.
- the smart terminals 220 located within the communication radius of the base station can receive the authentication information 211. At this time, it is necessary to confirm whether the smart terminal 220 actually exists in the area. For example, the hacker may falsely manipulate the GPS information of the terminal or arbitrarily change other location-based information to be located within the communication radius of the first base station, so that the authentication terminal 210 determines whether the smart terminal 220 is actually located in the field
- the server 222 itself receives the password 222 from the smart terminal 220, not the server.
- the password 222 received from the smart terminal 220 and the location information 213 of the first base station are transmitted to the authentication server 230 to support the reliability of the password.
- the authentication server 230 receives the password 222 and the location information 213 from the authentication terminal 210 disposed in the first base station. And verifies the validity of the received password (222). In one embodiment, if the code value 211a included in the received password 222 matches the code value 211a generated by the authentication terminal 210 that transmitted the position information 213, the password 222 is valid .
- the authentication server 230 may communicate with the authentication terminal 210 in a wired or wireless manner and may receive the authentication information 211 generated by the authentication terminal 210 in advance.
- the authentication server 230 can verify whether the user of the smart terminal 220 is a legitimate user through the authentication terminal 210. [ If the authentication fails, a message can be sent to it to restart the procedure or to block access for authentication.
- the authentication server 230 can communicate with a plurality of authentication terminals disposed in each base station by wire or wireless, and can monitor the authentication information generated by each authentication terminal, and if necessary, It is possible to change the information directly.
- the authentication server 230 wirelessly communicates with the authentication terminals located in the plurality of base stations, and can set the code values included in the authentication information for each of the authentication terminals to unique values that do not overlap with each other have. That is, the initial code value of the authentication information generated by the authentication terminal can be generated and transmitted so that the authentication servers do not overlap each other. The subsequent code value is changed according to the valid time and offset of each authentication terminal.
- the authentication server periodically grasps such information through the data list, thereby preventing code values from being duplicated.
- the authentication server 230 may communicate with wired or wireless authentication terminals disposed in a plurality of base stations, and may set the valid time included in the authentication information for each of the authentication terminals to the same cycle . That is, since each of the authentication terminals generates the authentication information including the unique code value, if the validity time is set to the same, it is possible for each authentication terminal to generate its own code value which is not duplicated at a time.
- the authentication server 230 may communicate wired or wirelessly with the authentication terminals disposed in the plurality of base stations to record the authentication information received from the authentication terminals, store the data list 231, It is possible to search duplicate code values by comparing the authentication information recorded in the data list 231 according to the preset cycle.
- the code value 401 of the authentication terminal A01 is ABC and that after the validity time 1 hour, the code value of the authentication terminal B02 is changed to DEF according to the offset, There may be a situation in which they have the same code value for two hours and for one hour.
- the authentication server 230 sends a control signal to the corresponding authentication terminal so as to change the code value and the validity time of the at least one authentication terminal that generated the duplicated code value to an arbitrary value Lt; / RTI > That is, the authentication server 230 can change the code value and effective time of A01 to an arbitrary value or change the code value and effective time of B02 to an arbitrary value.
- the authentication server 230 confirms that the code value is duplicated in the received authentication information according to the order of receiving the authentication information, the authentication server 230 transmits a control signal to the authentication terminal that has transmitted the authentication information, Can be changed.
- the hybrid password authentication system 200 includes an authentication terminal 210, a smart terminal 220, and an authentication server 230.
- the authentication terminal 210 broadcasts a code value 211a in an area which is disposed in each of a plurality of base stations and which is the same as the communication radius of the base station in which the base station is located.
- a code value 211a may be transmitted to a smart terminal 220 located within a communication radius, such as transmitting a message in a cell broadcasting manner.
- the smart terminal 220 generates a password 222 based on the code value 211a and the terminal information 221 thereof using an application communicating with the authentication terminal 210 and broadcasts the password 222 together with the code value 211a And transmits the password 222 before the validity time 211b is displayed.
- the terminal information such as the wicket information may be encrypted with a code value or the code value may be encrypted with terminal information to generate a password.
- the password generation technique can be variously generated by applying various conventional password generation techniques.
- the authentication server 230 receives the location information 213 from the authentication terminal 210 and receives the password 222 from the smart terminal 220. 1, the authentication terminal 210 receives and transmits the password 222 of the smart terminal 220. Since the smart terminal 222 is also a terminal having a built-in communication function, The password 222 can be transmitted. Of course, it would be appropriate to transmit the password 222 after the authentication server 230 is connected in advance or the authentication server 230 is requested to transmit the password 222.
- the smart terminal 220 receives the location information 213 together with the authentication information 211 from the authentication terminal 210. That is, the authentication server 230 directly performs communication with the authentication server 230, and transmits the password generated by the authentication server 230 and the location information 213 received from the authentication terminal 210 together.
- the location information 213 is information indicating the location of the base station where the authentication terminal 210 is located. For example, it may be a coordinate point of the base station or an ID value of the base station.
- the location information 213 is information for verifying whether the password 222 received from the smart terminal 220 is valid or not.
- the code value 211a used for generating the password 222 for example, If it matches the one generated by the terminal 210, it can be verified that the password 222 is valid.
- the authentication server 230 communicates with a plurality of authentication terminals by wire or wireless before receiving the password 222 from the smart terminal 220 and receives the respective authentication information, It is possible to verify whether the password 222 is generated by receiving the authentication information 211 from the authentication terminal 210 of the base station covering the point where the smart terminal 220 actually exists. Therefore, it is possible to verify whether the password 222 is generated by the normal access, and furthermore, it is possible to cope with the place and time when the password 222 can be utilized, even if it is leaked to the outside.
Abstract
Description
Claims (11)
- 스마트 단말기가 복수개의 기지국들 중 현재 위치를 통신반경에 포함하는 제 1 기지국에 배치된 인증단말기로부터 인증정보를 수신하는 단계;The smart terminal receiving authentication information from an authentication terminal located at a first base station including a current location among a plurality of base stations in a communication radius;상기 스마트 단말기가 상기 인증단말기와 통신하는 어플리케이션을 이용하여 상기 인증정보에 포함된 코드값 및 자신의 단말기 정보를 토대로 패스워드를 생성하는 단계;Generating a password based on a code value included in the authentication information and the terminal information of the smart terminal using an application communicating with the authentication terminal;상기 스마트 단말기가 상기 인증정보에 포함된 유효시간이 도과하기 이전에 상기 패스워드를 상기 인증단말기에 전송하는 단계;The smart terminal transmitting the password to the authentication terminal before the effective time included in the authentication information ends;상기 인증단말기가 상기 패스워드 및 상기 제 1 기지국에 대한 위치정보를 인증서버에 전송하는 단계; 및The authentication terminal transmitting the password and the location information about the first base station to an authentication server; And상기 인증서버가 상기 패스워드 및 상기 위치정보를 수신하여 상기 패스워드에 대한 유효 여부를 검증하는 단계;를 포함하는 하이브리드 패스워드 인증 방법.And the authentication server receiving the password and the location information and verifying validity of the password.
- 제 1 항에 있어서,The method according to claim 1,상기 인증단말기는 상기 인증정보에 대한 상기 유효시간이 도과하면 미리 저장된 오프셋을 기준으로 상기 코드값을 변경하는 하이브리드 패스워드 인증 방법.Wherein the authentication terminal changes the code value based on an offset stored in advance when the validity time of the authentication information exceeds the validity time.
- 제 1 항에 있어서,The method according to claim 1,상기 인증서버는 상기 복수개의 기지국들에 배치된 인증단말기들과 유선 또는 무선으로 통신하고, 상기 인증단말기들 각각에 대한 인증정보에 포함된 코드값을 서로 중복되지 않는 고유값으로 설정하는 하이브리드 패스워드 인증 방법.The authentication server communicates with the authentication terminals located in the plurality of base stations in a wired or wireless manner and performs a hybrid password authentication in which code values included in the authentication information for each of the authentication terminals are set to unique values that do not overlap with each other Way.
- 제 1 항에 있어서,The method according to claim 1,상기 인증서버는 상기 복수개의 기지국들에 배치된 인증단말기들과 유선 또는 무선으로 통신하고, 상기 인증단말기들 각각에 대한 인증정보에 포함된 유효시간을 서로 동일한 사이클로 설정하는 하이브리드 패스워드 인증 방법.Wherein the authentication server communicates wired or wirelessly with the authentication terminals disposed in the plurality of base stations and sets the valid time included in the authentication information for each of the authentication terminals to the same cycle.
- 제 1 항에 있어서,The method according to claim 1,상기 인증서버는 상기 복수개의 기지국들에 배치된 인증단말기들과 유선 또는 무선으로 통신하여 상기 인증단말기들 각각에 대한 인증정보들을 기록한 데이터리스트를 저장하고, 기 설정된 사이클에 따라 상기 데이터리스트에 기록된 인증정보들 각각을 비교하여 중복되는 코드값이 검색되면 상기 중복되는 코드값을 생성한 적어도 하나의 인증단말기의 코드값 및 유효시간을 임의의 값으로 변경하도록 제어신호를 전송하는 하이브리드 패스워드 인증 방법.Wherein the authentication server stores a data list in which authentication information for each of the authentication terminals is communicated by wired or wireless communication with the authentication terminals disposed in the plurality of base stations, Comparing the authentication information with each other, and if a duplicate code value is found, transmitting a control signal to change the code value and the validity time of the at least one authentication terminal that generated the duplicate code value to an arbitrary value.
- 제 1 항에 있어서, 상기 유효 여부를 검증하는 단계는,2. The method of claim 1, wherein verifying the validity comprises:상기 인증서버가 수신한 상기 패스워드에 포함된 코드값이 상기 위치정보를 전송한 인증단말기에서 생성한 코드값과 일치하면 상기 패스워드가 유효한 것으로 검증하고, 상기 패스워드를 이용하여 인증을 수행하는 하이브리드 패스워드 인증 방법.Wherein the authentication server verifies that the password is valid if the code value included in the password received by the authentication server matches a code value generated by the authentication terminal that transmitted the location information, and performs a hybrid password authentication Way.
- 복수개의 기지국들 각각에 배치되어 자신이 배치된 기지국의 통신반경 내 위치하는 단말기에 인증정보를 전송하는 복수개의 인증단말기;A plurality of authentication terminals arranged in each of a plurality of base stations and transmitting authentication information to terminals located within a communication radius of a base station in which the base stations are located;상기 인증단말기와 통신하는 어플리케이션을 이용하여 상기 인증정보에 포함된 코드값 및 자신의 단말기 정보를 토대로 패스워드를 생성하고 상기 인증정보에 포함된 유효시간이 도과하기 이전에 상기 패스워드를 전송하는 스마트 단말기; 및A smart terminal for generating a password based on a code value included in the authentication information and an own terminal information by using an application communicating with the authentication terminal and transmitting the password before a valid time included in the authentication information is reached; And상기 인증단말기로부터 자신이 배치된 기지국에 대한 위치정보를 수신하고 상기 스마트 단말기로부터 상기 패스워드를 수신하여 상기 패스워드에 대한 유효 여부를 검증하는 인증서버;를 포함하는 하이브리드 패스워드 인증 시스템.And an authentication server for receiving location information on the base station from which the authentication terminal is located and receiving the password from the smart terminal to verify validity of the password.
- 제 7 항에 있어서,8. The method of claim 7,상기 인증단말기는 상기 인증정보에 대한 상기 유효시간이 도과하면 미리 저장된 오프셋을 기준으로 상기 코드값을 변경하는 하이브리드 패스워드 인증 시스템.Wherein the authentication terminal changes the code value based on an offset stored in advance when the validity time of the authentication information exceeds the validity time.
- 제 7 항에 있어서,8. The method of claim 7,상기 인증서버는 상기 복수개의 인증단말기들과 유선 또는 무선으로 통신하고, 상기 복수개의 인증단말기들 각각의 인증정보에 포함된 코드값을 서로 중복되지 않는 고유값으로 설정하는 하이브리드 패스워드 인증 시스템.Wherein the authentication server communicates with the plurality of authentication terminals in a wired or wireless manner and sets a code value included in the authentication information of each of the plurality of authentication terminals as a unique value that does not overlap with each other.
- 제 7 항에 있어서,8. The method of claim 7,상기 인증서버는 상기 복수개의 인증단말기들과 유선 또는 무선으로 통신하여 상기 복수개의 인증단말기들 각각에 대한 인증정보들을 기록한 데이터리스트를 사전에 저장하고, 기 설정된 사이클에 따라 상기 데이터리스트에 기록된 인증정보들 각각을 비교하여 중복되는 코드값이 검색되면 상기 중복되는 코드값을 생성한 적어도 하나의 인증단말기의 코드값 및 유효시간을 임의의 값으로 변경하도록 제어신호를 전송하는 하이브리드 패스워드 인증 시스템.The authentication server may previously store a data list in which authentication information for each of the plurality of authentication terminals is recorded by communicating with the plurality of authentication terminals in a wired or wireless manner, And transmits a control signal to change a code value and an effective time of at least one authentication terminal that has generated the duplicated code value to an arbitrary value.
- 제 7 항에 있어서, 8. The method of claim 7,상기 인증서버는 수신된 상기 패스워드에 포함된 코드값이 상기 위치정보를 전송한 인증단말기에서 생성한 것과 일치하면 상기 패스워드가 유효한 것으로 검증하고, 상기 패스워드를 이용하여 인증을 수행하는 하이브리드 패스워드 인증 시스템.Wherein the authentication server verifies that the password is valid if the code value contained in the received password matches that generated by the authentication terminal that transmitted the location information, and performs authentication using the password.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020170182089A KR102088523B1 (en) | 2017-12-28 | 2017-12-28 | Hybrid password authentication method and system |
KR10-2017-0182089 | 2017-12-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019132214A1 true WO2019132214A1 (en) | 2019-07-04 |
Family
ID=67063963
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2018/012842 WO2019132214A1 (en) | 2017-12-28 | 2018-10-26 | Method and system for hybrid password authentication |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR102088523B1 (en) |
WO (1) | WO2019132214A1 (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20050053967A (en) * | 2003-12-03 | 2005-06-10 | 소프트포럼 주식회사 | Authorization system and method for utilizing one time password based on time synchronization |
KR20060129925A (en) * | 2005-06-13 | 2006-12-18 | 가부시키가이샤 히타치세이사쿠쇼 | Authentication systems, wireless communication terminals, and wireless base stations |
KR20140106360A (en) * | 2013-02-26 | 2014-09-03 | (주)이스톰 | System and Method for OTP authentication |
US8949949B1 (en) * | 2014-02-11 | 2015-02-03 | Level 3 Communications, Llc | Network element authentication in communication networks |
KR20160055872A (en) * | 2013-11-13 | 2016-05-18 | 알리바바 그룹 홀딩 리미티드 | Method and system for location based data communication over network |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101355405B1 (en) * | 2007-09-10 | 2014-01-24 | 에스케이텔레콤 주식회사 | Authentication Method for Mobile Terminal |
KR100963924B1 (en) * | 2007-10-08 | 2010-06-17 | 주식회사 신한은행 | Method for Confirming Wireless One-time Authentication Location and Mobile Phone, Recording Medium |
KR101615686B1 (en) * | 2009-07-10 | 2016-04-26 | 주식회사 비즈모델라인 | Method for Providing Mobile OTP based on Location |
-
2017
- 2017-12-28 KR KR1020170182089A patent/KR102088523B1/en active IP Right Grant
-
2018
- 2018-10-26 WO PCT/KR2018/012842 patent/WO2019132214A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20050053967A (en) * | 2003-12-03 | 2005-06-10 | 소프트포럼 주식회사 | Authorization system and method for utilizing one time password based on time synchronization |
KR20060129925A (en) * | 2005-06-13 | 2006-12-18 | 가부시키가이샤 히타치세이사쿠쇼 | Authentication systems, wireless communication terminals, and wireless base stations |
KR20140106360A (en) * | 2013-02-26 | 2014-09-03 | (주)이스톰 | System and Method for OTP authentication |
KR20160055872A (en) * | 2013-11-13 | 2016-05-18 | 알리바바 그룹 홀딩 리미티드 | Method and system for location based data communication over network |
US8949949B1 (en) * | 2014-02-11 | 2015-02-03 | Level 3 Communications, Llc | Network element authentication in communication networks |
Also Published As
Publication number | Publication date |
---|---|
KR20190079964A (en) | 2019-07-08 |
KR102088523B1 (en) | 2020-03-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110678770B (en) | Positioning information verification | |
US8150372B2 (en) | Method and system for distributing data within a group of mobile units | |
CN102378170B (en) | Method, device and system of authentication and service calling | |
CN105516103B (en) | Method, device and system for binding intelligent household electrical appliance | |
CN108471610B (en) | Bluetooth connection control system | |
KR100847145B1 (en) | Method for detecting illegal Access Point | |
CN109618344B (en) | Safe connection method and device of wireless monitoring equipment | |
JP5380583B1 (en) | Device authentication method and system | |
CN102318386A (en) | Service-based authentication to a network | |
WO2012126634A1 (en) | Authentication in a communications system | |
CN110300400B (en) | Sign-in method, device, electronic equipment and storage medium | |
CN111092820B (en) | Equipment node authentication method, device and system | |
KR20160131572A (en) | Method and apparatus for certificating information related payment in a mobile communication system | |
KR20160143333A (en) | Method for Double Certification by using Double Channel | |
CN103686651A (en) | Emergency call based authentication method, device and system | |
CN110730447B (en) | User identity protection method, user terminal and core network | |
CN110073681B (en) | Method, apparatus and computer readable medium for internet of things device | |
CN105430649A (en) | Wifi access method and apparatus | |
JP6101088B2 (en) | Status change notification method, subscriber authentication device, status change detection device, and mobile communication system | |
WO2019132214A1 (en) | Method and system for hybrid password authentication | |
CN108702705B (en) | Information transmission method and equipment | |
KR102279293B1 (en) | Method and apparatus for detecting null-ciphering channels | |
KR101425275B1 (en) | Terminal device communicating with wireless access point and Method for controlling the same | |
CN205864753U (en) | A kind of encryption guard system of terminal unit | |
KR101940722B1 (en) | Method for providing communication security for user mobile in open wifi zone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18894282 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18894282 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 05.02.2021) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18894282 Country of ref document: EP Kind code of ref document: A1 |