KR101500906B1 - Mobile terminal containded usim chip, crypto verification server, system and method for authenticating user using usim chip - Google Patents

Mobile terminal containded usim chip, crypto verification server, system and method for authenticating user using usim chip Download PDF

Info

Publication number
KR101500906B1
KR101500906B1 KR1020140102249A KR20140102249A KR101500906B1 KR 101500906 B1 KR101500906 B1 KR 101500906B1 KR 1020140102249 A KR1020140102249 A KR 1020140102249A KR 20140102249 A KR20140102249 A KR 20140102249A KR 101500906 B1 KR101500906 B1 KR 101500906B1
Authority
KR
South Korea
Prior art keywords
crypto
authentication
portable
key
relay server
Prior art date
Application number
KR1020140102249A
Other languages
Korean (ko)
Other versions
KR20140106488A (en
Inventor
하남수
한석민
김제일
Original Assignee
주식회사 엘지유플러스
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 엘지유플러스 filed Critical 주식회사 엘지유플러스
Priority to KR1020140102249A priority Critical patent/KR101500906B1/en
Publication of KR20140106488A publication Critical patent/KR20140106488A/en
Application granted granted Critical
Publication of KR101500906B1 publication Critical patent/KR101500906B1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/06Authentication

Abstract

The present invention generates a first crypto using at least one of an authentication number included in an authentication message received from a payment relay server, a reception time of the authentication message, a wisdom key recorded in the worm chip, and an international portable device identification number The authentication number, the reception time, and the first crypto from the portable terminal and the payment relay server, and receives at least one of the number of the portable device, the authentication number, and the reception time And a crypto verification server for verifying the validity of the first crypto using the first crypto chip and transmitting the verified verification result to the payment relay server.

Description

BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a user authentication system and a method for authenticating a user using a wireless chip including a wireless chip,

One embodiment of the present invention relates to a method of authenticating a user using a wasting chip.

With the development of Internet use, business using the Internet is increasing. In particular, the industry that prevents personal information from being leaked through the Internet and handles personal information securely becomes an important topic. For example, the online settlement system must perform settlement using payment information entered from a user's computer or a portable device, and securely process the settlement information so that the settlement information is not leaked to the outside.

In this way, a one-time password is used to increase the security of the Internet. The One Time Password is generated whenever user authentication is requested, and is generally used when joining a Web server. For example, when an authentication message including a one-time password is transmitted from the web server to the user's mobile device, when the user correctly inputs the one-time password transmitted to the mobile device to the web page of the web server, have.

However, in the above-described SMS authentication method, a user can use an authentication message as an authentication means to steal illegal copy mobile devices, phishing, and the like. Therefore, it is necessary to enhance the security of the method of authenticating the user using the SMS authentication method using the one-time password.

In an embodiment of the present invention, a new authentication number is generated using an authentication number, a message reception time, a wisdom key recorded on a spoof chip, and an international portable device identification number received from a payment relay server, And a wireless chip capable of encrypting the wireless chip.

One embodiment of the present invention is a method for extracting a wired key associated with a portable device using message information received from a payment relay server and transmitting a crypto key for verifying the validity of the first crypto already generated in the portable device using the extracted wired key And provides a verification server.

According to an embodiment of the present invention, when a first crypto is generated by encrypting an authentication number using a wired key recorded on a worm chip in a portable device, the validity of the generated first crypto is verified by the crypto verification server, The present invention provides a system and method for authenticating a user using a chip chip.

In order to achieve the above object, a portable device including a wireless chip includes a receiving module for receiving an authentication message including an authentication number from a payment relay server, and a wireless module for transmitting the authentication message including the wireless key, the reception time of the received authentication message, And at least one of the international portable device identification numbers to generate a first crypto chip.

The portable device including the worm chip may further include a display module for displaying the generated first crypto on the screen such that the generated first crypto is input to the payment relay server.

In order to achieve the above object, a crypto verification server includes an information receiver for receiving message information on an authentication message transmitted from a payment relay server to a mobile device and a first crypto, And a result transmitting unit for transmitting the verified verification result to the payment relay server. The validation verification unit may include a validation unit for extracting the key, extracting the key, verifying the validity of the first crypto using the extracted wilt key, and a result transmitting unit for transmitting the verified verification result to the payment relay server.

The message information may include at least one of the number of the portable device, the authentication number, and the transmission time of the authentication message. The validity verification unit may identify a wasted chip identifier corresponding to the number of the portable device from the membership database, and extract the wasted key using the identified wasted chip identifier and the master key.

Wherein the validity verification unit identifies an international portable device identification number from the portable device number and uses at least one of the identified international portable device identification number, the extracted wake key, the authentication number, and the transmission time of the authentication message To produce a second crypto.

Wherein the validity verification unit compares the generated second crypto with the first crypto and verifies that the first crypto is valid when the second crypto is equal to the first crypto as a result of the comparison, If the 2 crypto is not the same as the first crypto, it can be verified that the first crypto is not effective.

In order to achieve the above object, a user authentication system using a rogue chip includes an authentication number included in an authentication message received from a payment relay server, a reception time of the authentication message, a rogue key recorded on a rogue chip, And a payment relay server for receiving the first crypto generated by the portable device and verifying the validity of the first crypto, And transmits the verification result to the payment relay server.

To achieve the above object, a method for authenticating a user using a chip chip includes receiving an authentication message including an authentication number from a settlement relay server, receiving a chip key recorded on a chip chip, a reception time of the received authentication message, An authentication number, and an international portable device identification number to generate a first crypto.

To achieve the above object, a user authentication method using a rogue chip includes receiving message information and a first crypto in response to an authentication message transmitted from a payment relay server to a portable device, Extracting a vigor key associated with the first crypto key, verifying the validity of the first crypto using the extracted vigor key, and transmitting the verified verification result to the payment relay server.

According to an embodiment of the present invention, a new authentication number is generated by using the authentication number, the message reception time, the wince key recorded on the wasting chip, and the international portable device identification number received from the payment relay server, The authentication number can be encrypted.

According to an exemplary embodiment of the present invention, a wired key associated with a portable device is extracted using message information received from a payment relay server, and the validity of the first crypto already generated in the mobile device is verified using the extracted wired key can do.

According to an embodiment of the present invention, when the first crypto is generated by encrypting the authentication number using the worm key recorded on the worm chip in the mobile device, the validity of the generated first crypto is verified by the crypto verification server, Lt; / RTI >

FIG. 1 is a diagram illustrating a network connection relationship of a user authentication system using a buffer chip according to an embodiment of the present invention. Referring to FIG.
2 is a block diagram showing the configuration of a portable device according to an embodiment of the present invention.
3 is a block diagram illustrating the configuration of a crypto verification server according to an embodiment of the present invention.
FIG. 4 is a flowchart illustrating a procedure of a user authentication method using a roughened chip according to an embodiment of the present invention.

Hereinafter, various embodiments of the present invention will be described in detail with reference to the accompanying drawings and accompanying drawings, but the present invention is not limited to or limited by the embodiments.

FIG. 1 is a diagram illustrating a network connection relationship of a user authentication system using a buffer chip according to an embodiment of the present invention. Referring to FIG.

1, a user authentication system 100 using a rogue chip includes a computer 110, a portable device 120, a payment relay server 130, a crypto verification server 140, and a web server 150 can do.

The user can subscribe to the web server 150 using his or her computer 110 or purchase goods. At this time, the web server 150 may request the payment relay server 130 to confirm the user's identity.

The payment relay server 130 may perform the identity verification of the user on behalf of the web server 150 or may perform settlement on behalf of the web server 150. [ For example, the payment relay server 130 may request the user to input the number of his or her portable device 120 to confirm the identity of the user. The user can input the number of the portable device 120 using the computer 110. [ When the number of the portable device 120 is input, the payment relay server 130 generates an authentication number and transmits an authentication message including the generated authentication number to the portable device 120. [ At this time, the authentication number may be a one time password.

The portable device 120 receives the authentication message, and performs a first crypto operation using at least one of a worm key recorded on the worm chip, a reception time of the authentication message, the authentication number, and an international portable device identification number, . The Universal Subscriber Identity Module Key (USIM Key) may be a code that is uniquely assigned to the idle chip provided in the portable device 120. The International Mobile Equipment Identity (IMEI) is different from the number of the portable device 120 and may be a phone number of the portable device 120 according to a standard used internationally. The portable device 120 can generate the first crypto by encrypting the authentication number using the vigor key. The portable device 120 can provide the generated first crypto through the screen. The user can input the first crypto provided on the screen to the input page of the payment relay server 130. [

The payment relay server 130 may transmit the first crypto with the message information regarding the authentication message to the crypto verification server 140 when the first crypto is input. Here, the message information may include at least one of the number of the portable device 120, the authentication number, and the transmission time of the authentication message. The transmission time of the authentication message is the time when the payment relay server 130 transmits the authentication message to the portable device 120 and the reception time of the authentication message is the time when the portable device 120 receives the authentication message , It can be interpreted that the transmission time and the reception time are the same.

The crypto verification server 140 may extract the voicemail key associated with the portable device using the received message information and verify the validity of the first crypto using the extracted voicemail key. For example, the crypto verification server 140 may identify a wasted chip identifier corresponding to the number of the portable device 120 from the membership database, and extract the wasted key using the identified wasted chip identifier and the master key. A member database (not shown) stores information of members registered in a mobile communication company, and may include numbers of mobile devices owned by members, wasting chip identifiers, and the like.

The crypto verification server 140 also identifies the international portable device identification number from the portable device number 120 and identifies the identified international portable device identification number, the extracted wake key, the authentication number, The second cryptosystem can be generated using at least one of the transmission time and the transmission time. That is, the crypto verification server 140 can generate the second crypto using the same information as the portable device 120 in the same manner. Thus, the crypto verification server 140 can verify the validity of the first crypto by comparing the generated second crypto with the first crypto. For example, the crypto verification server 140 may verify that the first crypto is valid if the second crypto is identical to the first crypto, and if the second crypto is not the same as the first crypto, It can be verified that the first crypto is not effective.

The crypto verification server 140 transmits the verification result of verifying the validity of the first crypto to the payment relay server 130.

When the verification result is received that the second crypto is the same as the first crypto and the first crypto is valid, the payment relay server 130 completes the identity authentication related to the user of the mobile device 120 . The payment relay server 130 may transmit the result of the authentication to the web server 150. [ The web server 150 may accept the membership to the user or complete the settlement according to the result of the authentication of the user.

2 is a block diagram showing the configuration of a portable device according to an embodiment of the present invention.

Referring to FIG. 2, the portable device 200 may include a receiving module 210, a buffer chip 220, and a display module 230.

The receiving module 210 receives an authentication message including an authentication number from the payment relay server 130. [ The user can subscribe to the web server 150 using his or her computer 110 or purchase goods. At this time, the web server 150 may request the payment relay server 130 to confirm the user's identity. The payment relay server 130 may perform the identity verification of the user on behalf of the web server 150 or may perform settlement on behalf of the web server 150. [ For example, the payment relay server 130 requests the user to input the number of his / her portable device 120 to confirm the identity of the user, and when the user uses the computer 110, When the number is input, an authentication number is generated, and an authentication message including the generated authentication number is transmitted to the portable device 200. At this time, the authentication number may be a one-time password.

The vortex chip 220 generates the first crypto using at least one of the vital key, the reception time of the received authentication message, the authentication number, and the international portable device identification number. Crypto means, in a dictionary meaning, a secret consent, a secret, but here it may refer to a new second authentication number which is encrypted with the worm key. That is, the worm chip 220 encrypts the authentication number using at least one of the worm key (AD 1348) uniquely assigned to itself, the reception time of the received authentication message, the authentication number, and the international portable device identification number A first crypto that is a new second authentication number can be generated.

The display module 230 displays the generated first crypto on the screen. The user can input the first crypto displayed on the screen to the payment relay server 130. [

The payment relay server 130 may transmit the first crypto with the message information regarding the authentication message to the crypto verification server 140 when the first crypto is input.

3 is a block diagram illustrating the configuration of a crypto verification server according to an embodiment of the present invention.

Referring to FIG. 3, the crypto verification server 300 may include an information receiving unit 310, a validity verifying unit 320, and a result transmitting unit 330.

The information receiving unit 310 receives message information on the authentication message transmitted from the settlement relay server 130 to the portable device 200 and the first crypto. Here, the message information may include at least one of the number of the portable device 200, the authentication number, and the transmission time of the authentication message. The transmission time of the authentication message is a time when the payment relay server 130 transmits the authentication message to the mobile device 200 and the reception time of the authentication message is the time when the mobile device 200 receives the authentication message , It can be interpreted that the transmission time and the reception time are the same.

The validation unit 320 extracts a wired key associated with the portable device using the received message information. For example, the validation unit 320 may identify the wasted chip identifier corresponding to the number of the portable device 200 from the member database, and extract the wasted key using the identified wasted chip identifier and the master key .

The member database is a means for managing information about a user in a mobile communication company, and can store information about users subscribed to the mobile communication company. For example, the member database may store at least one of a user's name, a resident number, an address, a number of a portable device, and a wasting chip identifier. The worm core chip identifier is a code displayed on the wastepaper chip provided in the portable device 200. The mobile communication company can generate the wormhole key using the wastepaper chip identifier and the master key. That is, the worm key may be a code uniquely assigned to the worm chip. The mobile communication company may associate the generated worm key with the user and store the generated worm key in the member database. Accordingly, the validation verifier 320 can extract the worm key related to the portable device 200 using the worm chip identifier and the master key in the same manner as the mobile communication company.

The validation unit 320 may identify the international portable device identification number from the portable device 200 number. The international portable device identification number is different from the portable device 200 number and may be a phone number of the portable device 200 according to a standard standard used internationally. The validation unit 320 may generate the second crypto using at least one of the identified international portable device identification number, the extracted wilt key, the authentication number, and the transmission time of the authentication message. That is, the validity verifier 320 can generate the second crypto using the same information as the portable device 200 in the same manner.

The validation unit 320 may verify the validity of the first crypto by comparing the generated second crypto with the first crypto. For example, if the second crypto is equal to the first crypto, the validation unit 320 may verify that the first crypto is valid. Alternatively, the validation unit 320 may verify that the first crypto is not valid if the second crypto is not the same as the first crypto.

The result transmitting unit 330 transmits the verified verification result to the payment relay server 130. For example, the result transmitting unit 330 may transmit the verification result that the first crypto is valid or the validity of the first crypto is not valid.

When the verification result is received that the second crypto is the same as the first crypto and the first crypto is valid, the payment relay server 130 completes the identity authentication related to the user of the mobile device 200 .

FIG. 4 is a flowchart illustrating a procedure of a user authentication method using a roughened chip according to an embodiment of the present invention.

Referring to FIG. 4, in step 401, the web server 150 may request user authentication to the payment relay server 130. When the web server 150 receives a request for membership registration from the user, the web server 150 requests the user to authenticate the payment to the payment relay server 130 or request payment transaction to the payment relay server 130 .

In step 402, the portable device 200 is requested to input the number of the portable device 200 to the user from the payment relay server 130, and inputs the number of the portable device 200 to the payment relay server 130 . In this case, although the portable device 200 is illustrated in the drawing, the user may input the number of the portable device 200 using his or her computer 110.

In step 403, the payment relay server 130 may generate an authentication number and generate an authentication message including the authentication number. In step 404, the payment relay server 130 may transmit the generated authentication message to the portable device 200. [

In step 405, the portable device 200 may transmit the authentication message to the worm chip 220 provided.

In step 406, the worm chip 220 can generate the first crypto using at least one of the worm key, the received time of the received authentication message, the authentication number, and the international portable device identification number (IMEI). In step 407, the centrifugal chip 220 may transmit the generated first crypto to the portable device 200. [

In step 408, the portable device 200 can display the delivered first crypto on the screen so that the user can input the first crypto to the payment relay server 130

In step 409, the payment relay server 130 may request the crypto verification server 300 to verify the input first crypto. At this time, the payment relay server 130 may transmit the message information on the authentication message transmitted to the portable device 200 and the first crypto to the crypto verification server 300.

In step 410, the crypto verification server 300 may extract the key code associated with the portable device 200 according to the verification request for the first crypto. The message information may include at least one of the number of the portable device 200, the authentication number, and the transmission time of the authentication message. For example, the crypto verification server 300 may identify the inhabitant chip identifier corresponding to the number of the portable device 200 from the member database, and extract the inhabitant key using the identified inhabitant chip identifier and the master key .

In step 411, the crypto verification server 300 generates a second crypto using at least one of the extracted wush key, the received time of the received authentication message, the authentication number, and the international portable device identification number (IMEI) can do. The crypto verification server 300 can identify the international portable device identification number (IMEI) from the number of the portable device 200.

In step 412, the crypto verification server 300 may verify the validity of the first crypto by comparing the generated second crypto with the received first crypto. If the second crypto is equal to the first crypto as a result of the comparison, the crypto verification server 300 verifies that the first crypto is valid in step 413, and transmits the verification result (success) To the server (130).

In step 414, when the payment relay server 130 receives 'success' as the verification result, it can notify the web server 150 of 'authentication success'.

Otherwise, if the second crypto is not the same as the first crypto, the crypto verification server 300 verifies in step 415 that the first crypto is not valid, To the payment relay server 130. In this case, in step 416, the payment relay server 130 may notify the web server 150 of 'authentication failure' when receiving 'failure' as a result of the verification.

The web server 150 may approve or deny the membership of the user according to the received information (authentication success or authentication failure) according to the verification result. Alternatively, the web server 150 may approve or not allow the user to purchase the goods according to the information (authentication success or authentication failure) received according to the verification result.

The methods according to embodiments of the present invention may be implemented in the form of program instructions that can be executed through various computer means and recorded in a computer-readable medium. The computer-readable medium may include program instructions, data files, data structures, and the like, alone or in combination. The program instructions recorded on the medium may be those specially designed and constructed for the present invention or may be available to those skilled in the art of computer software.

While the invention has been shown and described with reference to certain preferred embodiments thereof, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. This is possible.

Therefore, the scope of the present invention should not be limited to the described embodiments, but should be determined by the equivalents of the claims, as well as the claims.

100: User authentication system using ID chip
110: Computer
120: Mobile devices
130: Payment relay server
140: Crypto verification server
150: Web server

Claims (8)

  1. An information receiver for receiving message information on an authentication message transmitted from the payment relay server to the mobile device and a first crypto;
    A validity verifying unit for generating a second crypto using the transmission time of the authentication message included in the message information, and for verifying the validity of the first crypto through comparison with the generated second crypto; And
    And a result transmitting unit for transmitting the verification result of the validity to the payment relay server,
    Lt; / RTI >
    Wherein the message information includes a number of the portable device,
    The validity-
    Identifying a wasted chip identifier corresponding to the number of the portable device from the membership database, extracting the wasted key using the identified wasted chip identifier and the master key, and using the extracted wilt key to validate the first crypto Second verification
    Crypto Verification Server.
  2. The method according to claim 1,
    Wherein the message information further includes an authentication number,
    The validity-
    Identifying the international portable device identification number from the portable device number, and generating the second crypto by further using at least one of the identified international portable device identification number, the extracted wilt key, and the authentication number
    Crypto Verification Server.
  3. The method according to claim 1,
    The validity-
    Comparing the generated second crypto with the first crypto and verifying that the first crypto is valid if the second crypto is identical to the first crypto, If it is not the same, the first verification is made that the first crypto is not valid
    Crypto Verification Server.
  4. A portable device that generates a first crypto using at least one of an authentication number included in the authentication message received from the payment relay server, a wired key recorded on the wasting chip, and an international portable device identification number; And
    Receiving the first crypto generated by the portable terminal via the payment relay server and transmitting a second crypto using the transmission time of the authentication message in which the authentication message is transmitted from the payment relay server to the portable device And verifying the validity of the first crypto through the comparison with the generated second crypto, and transmitting a verification result of the validity of the first crypto to the payment relay server,
    Lt; / RTI >
    The crypto verification server comprises:
    Extracting the wisdom key and the international portable device identification number using the number of the portable device and further using at least one of the extracted wisdom key, the extracted international portable device identification number, and the authentication number, To generate
    A user authentication system using asymmetric chip.
  5. 5. The method of claim 4,
    The payment relay server comprises:
    When the verification result is received that the second crypto is the same as the first crypto and that the first crypto is valid, the authentication of the user associated with the user of the portable device is completed
    A user authentication system using asymmetric chip.
  6. Receiving message information on an authentication message transmitted from the payment relay server to the mobile device and a first crypto;
    Generating a second crypto using the transmission time of the authentication message included in the message information;
    First validating the effectiveness of the first crypto through comparison with the generated second crypto;
    Identifying a wasting chip identifier corresponding to the number of the portable device included in the message information from the member database, extracting the waking key by using the identified wasting chip identifier and the master key, and using the extracted waking key Second validating the effectiveness of the first crypto; And
    And transmitting the verification result of the validity to the payment relay server
    The method comprising the steps of:
  7. The method according to claim 6,
    Wherein the message information further includes an authentication number,
    The step of generating the second crypto-
    Identifying an international portable device identification number from the number of the portable device; And
    Generating the second crypto by further using at least one of the identified international portable device identification number, the extracted wilt key, and the authentication number
    The method comprising the steps of:
  8. The method according to claim 6,
    The first verification of the effectiveness of the first crypto-
    Comparing the generated second crypto with the first crypto; And
    Verifying that the first crypto is valid if the second crypto is identical to the first crypto; or
    Verifying that the first crypto is not valid if the second crypto is not identical to the first crypto
    Wherein the user authentication method further comprises:
KR1020140102249A 2014-08-08 2014-08-08 Mobile terminal containded usim chip, crypto verification server, system and method for authenticating user using usim chip KR101500906B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020140102249A KR101500906B1 (en) 2014-08-08 2014-08-08 Mobile terminal containded usim chip, crypto verification server, system and method for authenticating user using usim chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020140102249A KR101500906B1 (en) 2014-08-08 2014-08-08 Mobile terminal containded usim chip, crypto verification server, system and method for authenticating user using usim chip

Publications (2)

Publication Number Publication Date
KR20140106488A KR20140106488A (en) 2014-09-03
KR101500906B1 true KR101500906B1 (en) 2015-03-10

Family

ID=51754895

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020140102249A KR101500906B1 (en) 2014-08-08 2014-08-08 Mobile terminal containded usim chip, crypto verification server, system and method for authenticating user using usim chip

Country Status (1)

Country Link
KR (1) KR101500906B1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080050946A (en) * 2006-12-04 2008-06-10 한국전자통신연구원 Method for detecting illegal access point
KR20090115089A (en) * 2009-06-24 2009-11-04 주식회사 신한은행 System for Transferring Cash Payment by Using USIM
KR20090114585A (en) * 2008-04-30 2009-11-04 주식회사 신한은행 Method and System for Processing Cash Payment by Using USIM and Recording Medium
KR20100136379A (en) * 2009-06-18 2010-12-28 주식회사 비즈모델라인 System and method for settling mobile phone by multiple code creation mode network otp authentication and recording medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080050946A (en) * 2006-12-04 2008-06-10 한국전자통신연구원 Method for detecting illegal access point
KR20090114585A (en) * 2008-04-30 2009-11-04 주식회사 신한은행 Method and System for Processing Cash Payment by Using USIM and Recording Medium
KR20100136379A (en) * 2009-06-18 2010-12-28 주식회사 비즈모델라인 System and method for settling mobile phone by multiple code creation mode network otp authentication and recording medium
KR20090115089A (en) * 2009-06-24 2009-11-04 주식회사 신한은행 System for Transferring Cash Payment by Using USIM

Also Published As

Publication number Publication date
KR20140106488A (en) 2014-09-03

Similar Documents

Publication Publication Date Title
US10592872B2 (en) Secure registration and authentication of a user using a mobile device
US10348715B2 (en) Computer-implemented systems and methods of device based, internet-centric, authentication
DE102017000768A1 (en) Method for performing two-factor authentication
AU2016220072B2 (en) Secure authentication of user and mobile device
US10116448B2 (en) Transaction authorization method and system
Chang et al. Untraceable dynamic‐identity‐based remote user authentication scheme with verifiable password update
US9338163B2 (en) Method using a single authentication device to authenticate a user to a service provider among a plurality of service providers and device for performing such a method
US8966096B2 (en) Device-pairing by reading an address provided in device-readable form
US9824353B2 (en) Key protection method and system
US10360561B2 (en) System and method for secured communications between a mobile device and a server
CA2748481C (en) System and method for initiating transactions on a mobile device
ES2553222T3 (en) Enhanced 2CHK authentication security with query transactions
US9642005B2 (en) Secure authentication of a user using a mobile device
US20180160255A1 (en) Nfc tag-based web service system and method using anti-simulation function
US9521548B2 (en) Secure registration of a mobile device for use with a session
US10594696B2 (en) Network-based authentication and security services
US10389531B2 (en) Authentication system and authentication method
US8752125B2 (en) Authentication method
TWI635409B (en) Query system, method and non-transitory machine-readable medium to determine authentication capabilities
JP5407104B2 (en) Method and apparatus for physical POS transaction
US9529985B2 (en) Global authentication service using a global user identifier
US9537661B2 (en) Password-less authentication service
US9378352B2 (en) Barcode authentication for resource requests
KR101384608B1 (en) Method for providing card payment system using phnone number and system thereof
US10554420B2 (en) Wireless connections to a wireless access point

Legal Events

Date Code Title Description
A107 Divisional application of patent
A201 Request for examination
E902 Notification of reason for refusal
E701 Decision to grant or registration of patent right
GRNT Written decision to grant
FPAY Annual fee payment

Payment date: 20180213

Year of fee payment: 6