KR101107666B1 - System and Method for security processing using mobile phone, and Recording medium thereof - Google Patents

System and Method for security processing using mobile phone, and Recording medium thereof Download PDF

Info

Publication number
KR101107666B1
KR101107666B1 KR20100007419A KR20100007419A KR101107666B1 KR 101107666 B1 KR101107666 B1 KR 101107666B1 KR 20100007419 A KR20100007419 A KR 20100007419A KR 20100007419 A KR20100007419 A KR 20100007419A KR 101107666 B1 KR101107666 B1 KR 101107666B1
Authority
KR
South Korea
Prior art keywords
security
mobile phone
security module
management server
user information
Prior art date
Application number
KR20100007419A
Other languages
Korean (ko)
Other versions
KR20110087810A (en
Inventor
김병배
이건호
최정애
Original Assignee
(주)이컴앤드시스템
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by (주)이컴앤드시스템 filed Critical (주)이컴앤드시스템
Priority to KR20100007419A priority Critical patent/KR101107666B1/en
Publication of KR20110087810A publication Critical patent/KR20110087810A/en
Application granted granted Critical
Publication of KR101107666B1 publication Critical patent/KR101107666B1/en

Links

Images

Abstract

Disclosed are a mobile phone security processing system and method, and a recording medium thereof. Mobile phone security processing system according to an embodiment of the present invention comprises a client PC for receiving user information and storing in a database server via a web server; A mobile phone security management server for inquiring the user information from the database server and issuing a security module to the web server; A web server which relays between the client PC and the mobile phone security management server and transmits the security module issued by the mobile phone security management server to a mobile phone; The security module is executed to generate a two-dimensional barcode including the user information, the two-dimensional barcode is displayed on a screen to perform an entrance procedure and an entrance procedure of a security facility, and when the security release request is input, the security module is executed. A mobile phone for transmitting the security violation history to an access management terminal when the security module finds a security violation history, and deletes the two-dimensional barcode if a security violation history is not found; And an access management terminal for transmitting the security violation history transmitted from the mobile phone to the mobile phone security management server. According to embodiments of the present invention, it is possible to reduce the cost of issuing a security card at the time of access management of a security facility, to increase the security by eliminating the risk of theft or loss, and to implement robust security management regardless of the type or performance of a mobile phone. .

Description

System and method for mobile phone security processing and recording medium {System and Method for security processing using mobile phone, and Recording medium}

BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a technology capable of enhancing security in order to prevent leakage of in-house confidential or corporate technology, and more particularly, to a mobile phone security processing system and method, and a recording medium thereof.

There are roughly two technologies in the field of security in the facility. The first method is to operate with a card key such as a magnetic or IC card, which is common in large office entrances and hotels.

The first method, the card key method, is a noticeable system that is rapidly replacing the conventional method of keys and locks due to its simplicity. However, the most commonly used magnetic card costs about 2,500 won per piece and the high security IC card costs almost 10,000 won per card, so it is installed for customers with multiple members. It can be seen that the cost is considerable.

The second method is a biometric system that began with the recent development of the Internet and security technologies. As such biometric methods, methods such as fingerprint recognition, iris recognition, and vein recognition are typically used. The biometric method may be more secure than any other method, but it is relatively expensive to use, so it is difficult to use it universally. There are many difficulties in implementation. In order for this method to be commercialized, a socio-economic network infrastructure capable of transmitting and receiving large amounts of information data in real time without delay must be premised.

Therefore, the conventional methods have a relatively high installation fixed cost, there is a limit to use in a general purpose, there is a problem that the card issuance cost is excessively consumed, there is a problem that the risk of theft or loss of the key or card key.

In addition, when carrying a mobile phone in a security facility, most facilities maintain security by attaching a sticker to the camera of the mobile phone. However, under such a method, it is not known exactly whether the camera of the mobile phone is actually used, and information leakage using means other than the camera, for example, information leakage using infrared communication, cannot be prevented, and therefore, it is vulnerable to security.

The first technical problem to be achieved by the present invention is to reduce the cost of issuing a security card when the access control of the security facility, to eliminate the risk of theft or loss to increase the security, mobile phones that can be applied regardless of the type or performance of the mobile phone It is to provide a security processing system.

The second technical problem to be achieved by the present invention is to provide a mobile phone security processing method applied to the mobile phone security processing system.

A third technical object of the present invention is to provide a recording medium that can be read by a computer system as a medium in which a program for executing the mobile phone security processing method is executed in a computer system.

Mobile phone security processing system according to an embodiment of the present invention comprises a client PC for receiving user information and storing in a database server via a web server; A mobile phone security management server for inquiring the user information from the database server and issuing a security module to the web server; A web server which relays between the client PC and the mobile phone security management server and transmits the security module issued by the mobile phone security management server to a mobile phone; The security module is executed to generate a two-dimensional barcode including the user information, the two-dimensional barcode is displayed on a screen to perform an entrance procedure and an entrance procedure of a security facility, and when the security release request is input, the security module is executed. A mobile phone for transmitting the security violation history to an access management terminal when the security module finds a security violation history, and deletes the two-dimensional barcode if a security violation history is not found; And an access management terminal for transmitting the security violation history transmitted from the mobile phone to the mobile phone security management server.

In addition, the mobile phone security processing system according to another embodiment of the present invention, the mobile phone security management server for receiving the user information input to the access management terminal, stored in the database server, and issuing a security module to the access management terminal; By executing the security module to generate a two-dimensional bar code containing user information, to display the two-dimensional bar code on the screen to perform the entry and exit procedures of the security facility, if the security release request is inputted by executing the security module A mobile phone which transmits the security violation history to an access management terminal when the security module finds a security violation history, and deletes the two-dimensional barcode when a security violation history is not found; And receiving the user information and transmitting the mobile phone management server, transmitting the security module issued from the mobile phone security management server to the mobile phone, and transmitting the security violation history transmitted from the mobile phone to the mobile phone security management server. It includes an access management terminal.

On the other hand, mobile phone security processing method according to an embodiment of the present invention comprises the steps of receiving the user information from the client PC via a web server to store in the database server; When the web server transmits an issuance request for a security module to a mobile phone security management server, the mobile phone security management server inquiring the user information from the database server and then issuing a security module to the web server; The web server transmitting the security module issued by the mobile phone security management server to a mobile phone; Executing the security module on the mobile phone to generate a two-dimensional barcode including the user information, and displaying the two-dimensional barcode on a screen to perform an entrance procedure and an entrance procedure of a security facility; And when the security release request is input to the mobile phone, executing the security module, and when the security module finds a security violation history in the mobile phone, transmits the security violation history to the mobile phone security management server through an access control terminal. And deleting the two-dimensional barcode from the mobile phone if a security violation history has not been found.

In addition, the mobile phone security processing method according to another embodiment of the present invention comprises the steps of receiving user information from the access management terminal; Storing, by a mobile phone security management server, user information input to the access management terminal in a database server, and issuing a security module to the access management terminal; Transmitting, by the access management terminal, the security module issued by the mobile phone security management server to a mobile phone; Generating a two-dimensional barcode including user information by executing a security module in the mobile phone, and displaying the two-dimensional barcode on a screen to perform an entrance procedure and an entrance procedure of a security facility; And when the security release request is input to the mobile phone, executing the security module to transmit the security violation history to the mobile phone security management server via the access control terminal when the security module finds a security violation history on the mobile phone. And deleting the two-dimensional barcode from the mobile phone if a security violation history has not been found.

According to embodiments of the present invention, it is possible to reduce the cost of issuing a security card at the time of access management of a security facility, to increase the security by eliminating the risk of theft or loss, and to implement robust security management regardless of the type or performance of a mobile phone. .

1 illustrates a mobile phone security processing system according to an embodiment of the present invention.
2 is a flowchart illustrating a security registration process among mobile phone security processing methods according to an embodiment of the present invention.
3 is a block diagram of a system for performing user authentication using a two-dimensional barcode issued to a mobile phone in one embodiment of the present invention.
4 is a flowchart illustrating a security releasing process of the mobile phone security processing method according to an embodiment of the present invention.

Hereinafter, exemplary embodiments of the present invention will be described with reference to the accompanying drawings. However, embodiments of the present invention illustrated below may be modified in various other forms, and the scope of the present invention is not limited to the embodiments described below.

1 illustrates a mobile phone security processing system according to an embodiment of the present invention.

The mobile phone 100 is used as a device for performing an entrance procedure of a security facility by displaying a two-dimensional bar code on the screen. The mobile phone 100 is installed with a security module to generate a two-dimensional barcode. Since the mobile phone 100 only needs to be able to execute the security module, embodiments of the present invention may be applied regardless of the type, performance, communication company, etc. of the mobile phone 100. If a security release request is input to the mobile phone 100 when the user proceeds to the door procedure, the mobile phone 100 executes the security module. The input of the security release request may be made by a button input of the mobile phone 100 or an input through a wire / wireless control signal to the mobile phone 100 from the access management terminal 110. The security module transmits the security violation history to the access management terminal when the security violation history is found. Here, the security violation history is a still image shooting through the mobile phone 100, voice recording through the mobile phone 100, video recording through the mobile phone 100, data communication through the mobile phone 100 (wired communication through the data cable And the like). On the other hand, the security module deletes the two-dimensional barcode in the mobile phone 100 if the security violation history is not found.

The access management terminal 110 is installed in the front door, the back door of the security facility, and manages a user entering the security facility or a user moving out of the security facility.

If the user wants to be issued a security module in the field, the access management terminal 110 receives the user information and transmits it to the mobile phone security management server 120. Thereafter, the access management terminal 110 transmits the security module issued from the cellular phone security management server 120 to the cellular phone 100.

The mobile phone security management server 120 manages information (name, social security number, mobile phone number, phone type, setting type, security level, etc.) of a user who requires mobile phone security settings. The mobile phone security management server 120 stores user information transmitted from the client PC 190 to the web server 140 or user information received from the access management terminal 110. The mobile phone security management server 120 issues a security module to the client PC 190 or the access management terminal 110. If there is a security violation history of the mobile phone 100, the mobile phone security management server 120 may refuse to issue the security module. Mobile phone security management server 120 stores the security violation history in its own storage or database server 130. The mobile phone security management server 120 may also manage password information required for security setting / cancellation.

The database server 130 registers / stores information on the visitor, member or employee information (or human resource / level information) belonging to the security facility. The mobile phone security management server 120 or the web server 140 determines whether the user requesting the security setting is an authorized user based on the information stored in the database server 130.

Web server 140 is applied to the case of visitors to the open network Internet, and serves to relay between the client PC 190 and the mobile phone security management server 120. The web server 140 transmits the security module issued by the mobile phone security management server 120 to the mobile phone 100. The web server 140 may be via a mobile communication provider network for the transmission of the security module.

The client PC 190 is used for open network Internet visitors. To register visitor information, visit the security facility directly, register visitor information in the field, download the security module to the mobile phone 100 in real time, and visit the user information by accessing the web before the user visits the security facility. By installing the security module to the client PC 190 or the mobile phone 100, by downloading a two-dimensional bar code to the mobile phone 100 connected to the client PC 190 by a cable or the like or by executing a security module installed in the mobile phone 100 There may be a method for generating a two-dimensional barcode. For visitors to the open network, this means the latter.

The client PC 190 accesses the web server 140 and transmits the user information to the web server 140 when the user information of the mobile phone 100 is input.

The client PC 190 may receive a security module from the mobile phone security management server 120 via the web server 140. The client PC 190 transmits the security module to the mobile phone 100 so that the mobile phone 100 includes user information. Generate two-dimensional barcodes. The mobile phone security management server 120 may reject the issuance of the security module by checking user information or the existing security violation history.

The mobile phone 100 stores the two-dimensional barcode in the internal memory. In the case of visitors to the open network, the security release procedure is the same. That is, when the security release request is input to the mobile phone 100 when the user proceeds to the door procedure, the mobile phone 100 executes the security module. The input of the security release request may be made by a button input of the mobile phone 100 or an input through a wire / wireless control signal to the mobile phone 100 from the access management terminal 110. The security module transmits the security violation history to the access management terminal when the security violation history is found. On the other hand, the security module deletes the two-dimensional barcode in the mobile phone 100 if the security violation history is not found.

2 is a flowchart illustrating a security registration process among mobile phone security processing methods according to an embodiment of the present invention.

First, the case of visitors to the open network is described. When the user information of the mobile phone is input from the client PC accessing the web server, the user information is transmitted to the database server via the web server (S230). In this case, the mobile phone may be in a state of being wired or wirelessly connected to the client PC.

Next, the mobile phone security management server inquires the user information in the database server, and if it is determined that the user has no problem with the security module issuance, it issues a security module (S240).

When the security module is issued, the web server transmits the security module to the mobile phone, and the mobile phone installs the security module to prepare for execution (S241).

When the security module installed in the mobile phone is executed (S242), a two-dimensional barcode including user information is generated.

When the two-dimensional bar code is generated (S250), the mobile phone displays the two-dimensional bar code on the screen (S260) is a bar code scanning state at the time of passing through the entrance or entry or exit procedure in the security facility. The security module installed in the mobile phone can check the button of the mobile phone, touch the screen, etc. and record it in a log file whenever a security violation history occurs. The security module may be, for example, software that records a log of various key button inputs of the cellular phone.

Next, the case where the security module is issued at the security facility site will be described. When the user information of the mobile phone is input to the access management terminal, the user information is transmitted to the database server via the mobile phone security management server (S230). In this case, the mobile phone may be in a wired or wireless state connected to the access management terminal.

Next, the mobile phone security management server inquires the user information in the database server, and if it is determined that the user has no problem with the security module issuance, it issues a security module (S240).

When the security module is issued, the access management terminal transmits the security module to the mobile phone, and the mobile phone installs the security module to prepare for execution (S241). The following procedure (S242-S260) is as described above.

3 is a block diagram of a system for performing user authentication using a two-dimensional barcode issued to a mobile phone in one embodiment of the present invention.

After displaying the two-dimensional bar code 301 on the screen of the mobile phone 300, scanning the two-dimensional bar code 301 with a barcode scanner 320 installed in doors, etc. in a security facility, scanning data is generated, the data is a mobile phone security management server Is sent to 120.

The mobile phone security management server 120 determines whether the corresponding scanning data is a two-dimensional bar code generated by the security module issued by the mobile phone security management server 120 and transmits the result to the barcode scanner 320. 320 may display the scanning result on the display 321. The database server 130 may provide employee information / member information to the mobile phone security management server 120 in order to determine whether the corresponding door is in a zone where the visitor is allowed to enter the security facility.

4 is a flowchart illustrating a security releasing process of the mobile phone security processing method according to an embodiment of the present invention.

After displaying the two-dimensional bar code on the screen of the mobile phone to perform an outgoing procedure of the security facility (S410), it is determined whether the security can be released by determining whether the scanned two-dimensional bar code is abnormal (S420). If it is determined that the security release is not possible in the access control terminal or the like, the release disable message is displayed on the screen of the mobile phone or the access management terminal (S460). The parties can then be allowed to take subsequent security measures.

If it is determined that security can be released from the access control terminal, the security module installed in the mobile phone is executed. At this time, the security module checks the usage history of the mobile phone (S430). If the security module is to create the log file described above, the usage history may be obtained by examining the log file.

If the security module finds the security violation history (S440), the security violation history is transmitted to the mobile phone security management server via the access management terminal (S451). Here, the security violation history refers to still image shooting through a mobile phone, voice recording through a mobile phone, video shooting through a mobile phone, data communication through a mobile phone (including wired communication through a data cable), and the like.

If there is no security violation history in the mobile phone, the security module deletes the two-dimensional barcode stored in the mobile phone, and releases the security (S452). In this process (S452) may be to collect the security module. That is, since the security module needs to operate in the security facility, if the user exits the security facility and completes the entrance procedure, it may be advantageous to remove the security module from the mobile phone for security or mobile phone resource management. Therefore, if the security violation history does not exist in the mobile phone, the security module may go through the self-installation process or the access management terminal transmits a control signal to the mobile phone by wire / wireless so that the security module can be collected.

The invention can be implemented via software. Preferably, the mobile phone security processing method according to the embodiments of the present invention can be provided by recording a program for executing in a computer on a computer-readable recording medium. When implemented in software, the constituent means of the present invention are code segments that perform the necessary work. The program or code segments may be stored on a processor readable medium or transmitted by a computer data signal coupled with a carrier on a transmission medium or network.

Computer-readable recording media include all kinds of recording devices that store data that can be read by a computer system. Examples of the computer readable recording medium include ROM, RAM, CD-ROM, DVD 占 ROM, DVD-RAM, magnetic tape, floppy disk, hard disk, optical data storage, and the like. The computer readable recording medium can also be distributed over network coupled computer devices so that the computer readable code is stored and executed in a distributed fashion.

Although the present invention has been described with reference to one embodiment shown in the drawings, this is merely exemplary, and it will be understood by those skilled in the art that various modifications and variations may be made therefrom. And, such modifications should be considered to be within the technical protection scope of the present invention. Therefore, the true technical protection scope of the present invention will be defined by the technical spirit of the appended claims.

BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a technology capable of enhancing security in order to prevent leakage of in-house confidential or corporate technology, and more particularly, to a mobile phone security processing system and method, and a recording medium thereof.

Claims (10)

  1. A client PC configured to receive user information and store the information in a database server via a web server;
    A mobile phone security management server for inquiring the user information from the database server and issuing a security module to the web server;
    A web server which relays between the client PC and the mobile phone security management server and transmits the security module issued by the mobile phone security management server to a mobile phone;
    The security module is executed to generate a two-dimensional barcode including the user information, the two-dimensional barcode is displayed on a screen to perform an entrance procedure and an entrance procedure of a security facility, and when the security release request is input, the security module is executed. A mobile phone for transmitting the security violation history to an access management terminal when the security module finds a security violation history, and deletes the two-dimensional barcode if a security violation history is not found; And
    And an access management terminal for transmitting the security violation history transmitted from the mobile phone to the mobile phone security management server.
    The mobile phone security management server, after receiving a request for issuance of the security module from the web server, if the security violation history of the mobile phone is queried, characterized in that the mobile phone security processing system, characterized in that denying the issuance of the security module.
  2. The method of claim 1,
    The security breach history is
    And at least one of still picture shooting through the mobile phone, voice recording through the mobile phone, video shooting through the mobile phone, or data communication through the mobile phone.
  3. delete
  4. A mobile phone security management server configured to receive user information input to an access management terminal, store the information in a database server, and issue a security module to the access management terminal;
    By executing the security module to generate a two-dimensional bar code containing user information, to display the two-dimensional bar code on the screen to perform the entry and exit procedures of the security facility, if the security release request is inputted by executing the security module A mobile phone which transmits the security violation history to an access management terminal when the security module finds a security violation history, and deletes the two-dimensional barcode when a security violation history is not found; And
    The user information is received and transmitted to the mobile phone management server, the security module issued from the mobile phone security management server is transmitted to the mobile phone, and the security violation history transmitted from the mobile phone is transmitted to the mobile phone security management server. Includes an access management terminal to
    The mobile phone security management server, after receiving the request for issuance of the security module from the access management terminal, the mobile phone security processing system, characterized in that for rejecting the issuance of the security module when querying the security violation history of the mobile phone.
  5. The method of claim 4, wherein
    The security breach history is
    And at least one of still picture shooting through the mobile phone, voice recording through the mobile phone, video shooting through the mobile phone, or data communication through the mobile phone.
  6. Receiving user information from a client PC and storing the user information in a database server via a web server;
    When the web server transmits an issuance request for a security module to a mobile phone security management server, the mobile phone security management server inquiring the user information from the database server and then issuing a security module to the web server;
    The web server transmitting the security module issued by the mobile phone security management server to a mobile phone;
    Executing the security module on the mobile phone to generate a two-dimensional barcode including the user information, and displaying the two-dimensional barcode on a screen to perform an entrance procedure and an entrance procedure of a security facility; And
    When a security release request is input to the mobile phone, the security module is executed. When the security module finds a security violation history in the mobile phone, the security violation history is transmitted to the mobile phone security management server through an access management terminal. Deleting the two-dimensional barcode in the mobile phone if the security violation history is not found,
    The issuing of the security module may include: rejecting issuance of the security module by the mobile phone security management server when the security violation history of the mobile phone is inquired after receiving the issuance request for the security module. That, how to handle mobile phone security.
  7. The method according to claim 6,
    The security breach history is
    And at least one of still image shooting through the mobile phone, voice recording through the mobile phone, video shooting through the mobile phone, or data communication through the mobile phone.
  8. delete
  9. Receiving user information at an access management terminal;
    Storing, by a mobile phone security management server, user information input to the access management terminal in a database server, and issuing a security module to the access management terminal;
    Transmitting, by the access management terminal, the security module issued by the mobile phone security management server to a mobile phone;
    Generating a two-dimensional barcode including user information by executing a security module in the mobile phone, and displaying the two-dimensional barcode on a screen to perform an entrance procedure and an entrance procedure of a security facility; And
    When a security release request is input to the mobile phone, the security module is executed to transmit the security violation history to the mobile phone security management server via the access control terminal when the security module detects a security violation history on the mobile phone. Deleting the two-dimensional barcode in the mobile phone if the security violation history is not found,
    The issuing of the security module may include: rejecting issuance of the security module by the mobile phone security management server when the security violation history of the mobile phone is inquired after receiving the issuance request for the security module. That, how to handle mobile phone security.
  10. A computer-readable recording medium having recorded thereon a program for executing the method of any one of claims 6 to 7, 9.
KR20100007419A 2010-01-27 2010-01-27 System and Method for security processing using mobile phone, and Recording medium thereof KR101107666B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR20100007419A KR101107666B1 (en) 2010-01-27 2010-01-27 System and Method for security processing using mobile phone, and Recording medium thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR20100007419A KR101107666B1 (en) 2010-01-27 2010-01-27 System and Method for security processing using mobile phone, and Recording medium thereof

Publications (2)

Publication Number Publication Date
KR20110087810A KR20110087810A (en) 2011-08-03
KR101107666B1 true KR101107666B1 (en) 2012-02-22

Family

ID=44926516

Family Applications (1)

Application Number Title Priority Date Filing Date
KR20100007419A KR101107666B1 (en) 2010-01-27 2010-01-27 System and Method for security processing using mobile phone, and Recording medium thereof

Country Status (1)

Country Link
KR (1) KR101107666B1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050045662A (en) * 2003-11-12 2005-05-17 엘지전자 주식회사 Usage restriction system and method for digital camera adapted to mobile communication terminal
KR20050050420A (en) * 2003-11-25 2005-05-31 엘지전자 주식회사 Function limit apparatus and method for mobile station
KR20070001477A (en) * 2005-06-29 2007-01-04 삼성전자주식회사 System for preservation exit and entry control using mobile terminal
KR20070045466A (en) * 2005-10-27 2007-05-02 삼성전자주식회사 Method and system for limitting a function of device in specific perimeters

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050045662A (en) * 2003-11-12 2005-05-17 엘지전자 주식회사 Usage restriction system and method for digital camera adapted to mobile communication terminal
KR20050050420A (en) * 2003-11-25 2005-05-31 엘지전자 주식회사 Function limit apparatus and method for mobile station
KR20070001477A (en) * 2005-06-29 2007-01-04 삼성전자주식회사 System for preservation exit and entry control using mobile terminal
KR20070045466A (en) * 2005-10-27 2007-05-02 삼성전자주식회사 Method and system for limitting a function of device in specific perimeters

Also Published As

Publication number Publication date
KR20110087810A (en) 2011-08-03

Similar Documents

Publication Publication Date Title
US8549584B2 (en) Physical security triggered dynamic network authentication and authorization
RU2524868C2 (en) Controlling user authentication
KR100896391B1 (en) External device
US8504841B1 (en) Systems and methods for software application security management
US8494486B2 (en) System and method for securely managing data stored on mobile devices, such as enterprise mobility data
US9053335B2 (en) Methods and systems for active data security enforcement during protected mode use of a system
JP2011502311A (en) Account transaction management using dynamic account numbers
US7571473B1 (en) Identity management system and method
Di Cerbo et al. Detection of malicious applications on android os
US7647625B2 (en) System and/or method for class-based authorization
JP2014515142A (en) Method and system for authenticating an entity by a terminal
US9438635B2 (en) Controlling physical access to secure areas via client devices in a network environment
JP5567114B2 (en) Mitigation of potentially endangered electronic devices
US8166404B2 (en) System and/or method for authentication and/or authorization
US20050021703A1 (en) Systems and methods for automatically configuring a client for remote use of a network-based service
US9531710B2 (en) Behavioral authentication system using a biometric fingerprint sensor and user behavior for authentication
CN105229596A (en) High level of authentication technology and application
CN1838595A (en) The authentication system and the authentication method which use a portable communication terminal
KR20120037330A (en) Log-in method and system using image objects
CN103441986B (en) Data resource security control method in thin client mode
US9501657B2 (en) Sensitive data protection during user interface automation testing systems and methods
US20130160100A1 (en) Methods and systems for increasing the security of network-based transactions
US8806567B1 (en) Using encoded identifiers to provide rapid configuration for network access
EP2736021A2 (en) Access control system
US8990889B2 (en) System and method for physical access control

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E701 Decision to grant or registration
GRNT Written decision to grant
LAPS Lapse due to unpaid annual fee