KR101680975B1 - mobile terminal performing user authentication by using steganography - Google Patents
mobile terminal performing user authentication by using steganography Download PDFInfo
- Publication number
- KR101680975B1 KR101680975B1 KR1020150105206A KR20150105206A KR101680975B1 KR 101680975 B1 KR101680975 B1 KR 101680975B1 KR 1020150105206 A KR1020150105206 A KR 1020150105206A KR 20150105206 A KR20150105206 A KR 20150105206A KR 101680975 B1 KR101680975 B1 KR 101680975B1
- Authority
- KR
- South Korea
- Prior art keywords
- mobile terminal
- identification information
- user
- user identification
- information
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61B—DIAGNOSIS; SURGERY; IDENTIFICATION
- A61B5/00—Measuring for diagnostic purposes; Identification of persons
- A61B5/117—Identification of persons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G06K9/00006—
-
- G06K9/00221—
-
- G06K9/00597—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Biophysics (AREA)
- Pathology (AREA)
- Biomedical Technology (AREA)
- Heart & Thoracic Surgery (AREA)
- Medical Informatics (AREA)
- Molecular Biology (AREA)
- Surgery (AREA)
- Animal Behavior & Ethology (AREA)
- General Health & Medical Sciences (AREA)
- Public Health (AREA)
- Veterinary Medicine (AREA)
- Telephone Function (AREA)
Abstract
Description
The present invention relates to a mobile terminal authentication technique, and more particularly, to a mobile terminal authentication technique capable of performing user authentication using steganography technology in which user identification information for authentication (EX: user biometric information) is hidden in a multimedia file .
Currently, a function of setting a lock function to various mobile terminals such as a smart phone, a tablet PC, and a wearable device to release a lock before use and switch to a use mode is generally applied. That is, in the process of releasing the lock function, when the identification information such as gesture, pattern, and password for valid user authentication is properly input, the lock function is released and the mobile terminal is switched to a usable state.
Furthermore, in recent years, with the development of various sensor technologies and image analysis technologies, user identification information including biometric information of a user (for example, fingerprint of a user, iris of a user, voice of a user, face of a user, Research and commercialization for use in certification are actively being carried out.
However, this method has a problem that when the user identification information for authentication inputted as an initial security method is exposed to the outside or the mobile terminal is initialized, it becomes useless. In addition, when the mobile terminal is lost or stolen without setting the locking function in the mobile terminal, the mobile terminal is exposed to unauthorized use of the unauthorized person.
SUMMARY OF THE INVENTION It is an object of the present invention to provide a mobile terminal capable of maximizing security by performing user authentication while hiding user identification information for authentication in a multimedia file using steganography technology.
It is another object of the present invention to provide a method and system for managing user identification information, which can select an algorithm suitable for hiding or extracting user identification information according to the type of user identification information (in particular, user biometric information) And to provide a mobile terminal capable of increasing the efficiency of processing.
Another object of the present invention is to acquire user identification information to be compared with user identification information hidden in a Stego object and to perform user authentication when a predetermined condition is satisfied even when the unlock screen is not executed And to provide a mobile terminal that can be used.
Another object of the present invention is to provide a method and system for a mobile communication terminal, which can prevent a user from performing authentication by using a mobile terminal, And to provide a mobile terminal that can be used.
Another aspect of the present invention is to provide a mobile terminal capable of performing a specific function when a plurality of mobile terminals are shared with authentication secret data.
The technical objects to be achieved by the present invention are not limited to the technical matters mentioned above, and other technical subjects which are not mentioned can be clearly understood by those skilled in the art from the following description. There will be.
According to an aspect of the present invention, there is provided a mobile terminal including: a plurality of information obtaining means; A memory for storing a stego-object, which is a multimedia file generated by hidden user identification information, which is secret data, in a multimedia file which is a cover object; And acquiring user identification information by using information obtaining means corresponding to the type of the hidden user identification information among the plurality of information obtaining means when the user authentication mode is entered, extracting the hidden user identification information from the Stegoobject, And a controller for performing user authentication by comparing the obtained user identification information with the extracted user identification information.
Wherein the control unit selects the hiding algorithm corresponding to the type of the user identification information to be hidden among the plurality of hiding algorithms to generate the stego object and extracts the hidden user identification It is possible to extract the hidden user identification information by selecting an extraction algorithm corresponding to the type of information.
Wherein the control unit automatically acquires user identification information using the information acquisition unit corresponding to the type of the hidden identification information even when the predetermined condition for performing the user authentication is satisfied even when the unlock screen of the mobile terminal is not executed The following user authentication can be performed. The predetermined user authentication performing condition may include at least one of an arrival of an authentication execution time according to a predetermined user authentication execution period, execution of a predetermined specific application, and execution of a predetermined specific function.
The control unit may be configured to, when the user authentication fails, to restrict the use of the mobile terminal, transmit the location information of the mobile terminal to the predetermined network device, transmit the acquired user identification information for identifying the current user Can do at least one
When the secret data for authentication corresponding to a specific function is distributed and hidden among a plurality of mobile terminals including the mobile terminal and at least one other mobile terminal, When it is confirmed that the mobile terminal is located at a short distance, the predetermined number of mobile terminals share the stored authentication secret data, and the specific function can be executed based on the shared authentication secret data. The control unit may block the functions of the mobile terminal except for at least one predetermined function based on the shared secret data.
The mobile terminal according to the present invention has an advantage that security can be maximized by performing user authentication in a state where the authentication user identification information is hidden in a multimedia file using steganography technology.
The mobile terminal according to the present invention can select an algorithm suitable for hiding or extracting user identification information according to the type of user identification information when steganographic technology is applied, There is an advantage that it can be increased.
The mobile terminal according to the present invention obtains the user identification information for comparison with the user identification information hidden in the stereos object and performs the user authentication when a predetermined condition is satisfied even when the unlock screen is not executed, It is possible to provide an effect of blocking use by a non-user.
The mobile terminal according to the present invention can prevent the user from performing the following actions when the user authentication fails, for example, restriction on use of the mobile terminal, transmission of location information of the mobile terminal, transmission of identification information of the current user acquired for authentication, Can be provided.
The mobile terminal according to the present invention can provide an effect of performing a specific function when authentication data for authentication is shared with another mobile terminal.
1A is a block diagram illustrating a mobile terminal according to the present invention.
1B and 1C are conceptual diagrams illustrating an example of a mobile terminal according to the present invention in different directions.
2 is a conceptual diagram for explaining another example of a mobile terminal according to the present invention.
3 is a flowchart illustrating an example of a method of driving a mobile terminal according to the present invention.
FIG. 4 shows an example in which a stego object with hidden user biometric information for authentication is generated in a mobile terminal according to the present invention.
5 is a flowchart showing another example of a method for driving a mobile terminal according to the present invention.
6 is a flowchart showing another example of the method for driving a mobile terminal according to the present invention.
FIG. 7 shows an example in which the mobile terminal according to the present invention enters the user authentication mode according to the mobile terminal driving method of FIG.
8 is a flowchart illustrating another example of a method for driving a mobile terminal according to the present invention.
9 shows examples of follow-up actions performed by the mobile terminal according to the present invention upon user authentication failure.
10 is a flowchart illustrating another example of a method of driving a mobile terminal according to the present invention.
FIG. 11 shows an example in which authentication secret data is shared according to the mobile terminal driving method of FIG. 10 to perform a specific function.
For a better understanding of the present invention, its operational advantages and features, and the objects attained by the practice of the present invention, reference should be made to the accompanying drawings, which form a preferred embodiment of the invention, and the accompanying drawings.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings. Like reference numerals in the drawings denote like elements.
The mobile terminal described in this specification includes a mobile phone, a smart phone, a laptop computer, a digital broadcasting terminal, a personal digital assistant (PDA), a portable multimedia player (PMP), a navigation device, a slate PC A tablet PC, an ultrabook, a wearable device such as a smartwatch, a smart glass, and a head mounted display (HMD). have. However, the scope of the present invention is not limited thereto.
The mobile terminal according to the present invention may have the following features.
1. A mobile terminal according to the present invention performs user authentication in a state where user identification information including authentication biometric information is hidden in a multimedia file using a steganography technique to maximize security have.
2. The mobile terminal according to the present invention can select an algorithm suitable for hiding or extracting user identification information according to the type of user identification information when applying steganography technology, Increase efficiency, and so on.
3. The mobile terminal according to the present invention performs user authentication by obtaining user identification information for comparison with user identification information hidden in a stereos object when a predetermined condition is satisfied even when the unlock screen is not executed, The use by an unauthorized user can be blocked.
4. When the user authentication fails, the mobile terminal according to the present invention can perform subsequent measures such as restriction of use of the mobile terminal, transmission of location information of the mobile terminal, transmission of identification information of the current user acquired for authentication have.
5. The mobile terminal according to the present invention can perform a specific function when authentication data for authentication is shared with another mobile terminal.
Hereinafter, the features of the mobile terminal of the present invention will be described in more detail.
1A to 1C are block diagrams for explaining a mobile terminal according to the present invention, and FIGS. 1B and 1C are conceptual diagrams showing an example of a mobile terminal according to the present invention in different directions.
The
The
The
The
The
The
The
In addition, the
In addition to the operations related to the application program, the
In addition, the
The
At least some of the components may operate in cooperation with one another to implement a method of operation, control, or control of a mobile terminal according to various embodiments described below. In addition, the operation, control, or control method of the mobile terminal may be implemented on the mobile terminal by driving at least one application program stored in the
Hereinafter, the various components of the
First, referring to the
The broadcast management server may refer to a server for generating and transmitting broadcast signals and / or broadcast related information, or a server for receiving broadcast signals and / or broadcast related information generated by the broadcast management server and transmitting the generated broadcast signals and / or broadcast related information. The broadcast signal may include a TV broadcast signal, a radio broadcast signal, a data broadcast signal, and a broadcast signal in which a data broadcast signal is combined with a TV broadcast signal or a radio broadcast signal.
The broadcasting signal may be encoded according to at least one of technical standards for transmitting and receiving a digital broadcasting signal (or a broadcasting system, for example, ISO, IEC, DVB, ATSC, etc.) It is possible to receive the digital broadcasting signal using a method conforming to the technical standard defined by the technical standards.
The broadcast-related information may be information related to a broadcast channel, a broadcast program, or a broadcast service provider. The broadcast-related information may also be provided through a mobile communication network. In this case, it may be received by the
The broadcast-related information may exist in various forms, for example, an Electronic Program Guide (EPG) of Digital Multimedia Broadcasting (DMB) or an Electronic Service Guide (ESG) of Digital Video Broadcast-Handheld (DVB-H). The broadcast signal and / or broadcast related information received through the
The
The wireless signal may include various types of data depending on a voice call signal, a video call signal or a text / multimedia message transmission / reception.
The
Wireless Internet technologies include, for example, wireless LAN (WLAN), wireless fidelity (Wi-Fi), wireless fidelity (Wi-Fi) Direct, DLNA (Digital Living Network Alliance), WiBro Interoperability for Microwave Access, High Speed Downlink Packet Access (HSDPA), High Speed Uplink Packet Access (HSUPA), Long Term Evolution (LTE) and Long Term Evolution-Advanced (LTE-A) 113 transmit and receive data according to at least one wireless Internet technology, including Internet technologies not listed above.
The
The short-
Here, the other
The
Next, the
The
The
Meanwhile, the
First, the
Examples of the
On the other hand, for convenience of explanation, the act of recognizing that the object is located on the touch screen in proximity with no object touching the touch screen is referred to as "proximity touch & The act of actually touching an object on the screen is called a "contact touch. &Quot; The position at which the object is closely touched on the touch screen means a position where the object corresponds to the touch screen vertically when the object is touched. The
The touch sensor uses a touch (or touch input) applied to the touch screen (or the display unit 151) by using at least one of various touch methods such as a resistance film type, a capacitive type, an infrared type, an ultrasonic type, Detection.
For example, the touch sensor may be configured to convert a change in a pressure applied to a specific portion of the touch screen or a capacitance generated in a specific portion to an electrical input signal. The touch sensor may be configured to detect a position, an area, a pressure at the time of touch, a capacitance at the time of touch, and the like where a touch object touching the touch screen is touched on the touch sensor. Here, the touch object may be a finger, a touch pen, a stylus pen, a pointer, or the like as an object to which a touch is applied to the touch sensor.
Thus, when there is a touch input to the touch sensor, the corresponding signal (s) is sent to the touch controller. The touch controller processes the signal (s) and transmits the corresponding data to the
On the other hand, the
On the other hand, the touch sensors and the proximity sensors discussed above can be used independently or in combination to provide a short touch (touch), a long touch, a multi touch, a drag touch ), Flick touch, pinch-in touch, pinch-out touch, swipe touch, hovering touch, and the like. Touch can be sensed.
The ultrasonic sensor can recognize the position information of the object to be sensed by using ultrasonic waves. Meanwhile, the
The
The
The
In addition, the
In the stereoscopic display unit, a three-dimensional display system such as a stereoscopic system (glasses system), an autostereoscopic system (no-glasses system), and a projection system (holographic system) can be applied.
Generally, 3D stereoscopic images consist of left image (left eye image) and right image (right eye image). A top-down method of arranging a left image and a right image in one frame according to a method in which a left image and a right image are combined into a three-dimensional stereoscopic image, A checker board system in which pieces of a left image and a right image are arranged in a tile form, a left-to-right (right-side) Or an interlaced method in which rows are alternately arranged, and a time sequential (frame-by-frame) method in which right and left images are alternately displayed in time.
In addition, the 3D thumbnail image may generate a left image thumbnail and a right image thumbnail from the left image and right image of the original image frame, respectively, and may be generated as one image as they are combined. In general, a thumbnail means a reduced image or a reduced still image. The left image thumbnail and the right image thumbnail generated in this way are displayed on the screen with a difference of the left and right distance by the depth corresponding to the parallax between the left image and the right image, thereby exhibiting a stereoscopic spatial feeling.
The left and right images necessary for realizing the three-dimensional stereoscopic image can be displayed on the stereoscopic display unit by the stereoscopic processing unit. The stereoscopic processing unit receives a 3D image (an image at a reference time point and an image at an expansion point), sets a left image and a right image therefrom, or receives a 2D image and converts it into a left image and a right image.
The
The
In addition to vibration, the
The
The
The signal output from the
The
The identification module is a chip for storing various information for authenticating the use right of the
The
The
The
Meanwhile, as described above, the
In addition, the
The
In addition, the
As another example, the
In the following, various embodiments may be embodied in a recording medium readable by a computer or similar device using, for example, software, hardware, or a combination thereof.
Referring to FIGS. 1B and 1C, the disclosed
Here, the terminal body can be understood as a concept of referring to the
The
A
In some cases, electronic components may also be mounted on the
As shown, when the
These
The
Meanwhile, the
The
1B and 1C, a
However, these configurations are not limited to this arrangement. These configurations may be excluded or replaced as needed, or placed on different planes. For example, the
The
The
In addition, the
The
The touch sensor may be a film having a touch pattern and disposed between the
In this way, the
The first
The
The
The
The first and
In this figure, the
The contents input by the first and
On the other hand, a rear input unit (not shown) may be provided on the rear surface of the terminal body as another example of the
The rear input unit may be disposed so as to overlap with the
When a rear input unit is provided on the rear surface of the terminal body, a new type of user interface using the rear input unit can be realized. When the
Meanwhile, the
The
The
And a
The
The
And a second
The terminal body may be provided with at least one antenna for wireless communication. The antenna may be embedded in the terminal body or formed in the case. For example, an antenna constituting a part of the broadcast receiving module 111 (see FIG. 1A) may be configured to be able to be drawn out from the terminal body. Alternatively, the antenna may be formed in a film type and attached to the inner surface of the
The terminal body is provided with a power supply unit 190 (see FIG. 1A) for supplying power to the
The
The
The
Meanwhile, in the present invention, information processed in the mobile terminal can be displayed using a flexible display. Hereinafter, the present invention will be described in detail with reference to the accompanying drawings.
2 is a conceptual diagram for explaining another example of the
As shown, the
A typical flexible display refers to a sturdy display that is lightweight and does not break easily, such as paper, formed on a thin, flexible substrate that can flex, bend, fold, twist, or curl like a conventional flat panel display.
In addition, the electronic paper is a display technology to which general ink characteristics are applied, and the point that the reflected light is used is different from the conventional flat panel display. The electronic paper can be changed by using a twist ball or electrophoresis (electrophoresis) using a capsule.
In a state in which the
The
Meanwhile, the
Meanwhile, the
The deformation detecting unit may be provided in the
The
Meanwhile, the
In addition, the battery (not shown) included in the
The state change of the
Meanwhile, the mobile terminal can be extended to a wearable device that can be worn on the body beyond the dimension that the user mainly grasps and uses. These wearable devices include smart watch, smart glass, and head mounted display (HMD). Hereinafter, examples of a mobile terminal extended to a wearable device will be described.
The wearable device can be made to be able to exchange (or interlock) data with another
3 is a flowchart illustrating an example of a method of driving a mobile terminal according to the present invention. Hereinafter, the driving method will be described with reference to necessary drawings.
First, the
After the multimedia file to be used as the cover object is obtained, the user identification information which is the secret data used for user authentication is obtained (S110). The user identification information may be user's body information such as the face of the user, the voice of the user, the fingerprint of the user, The user identification information may be a password, a pattern, a PIN, or the like. On the other hand, the acquisition order of the cover object and the acquisition order of the secret data may be opposite to each other.
When the cover object and the secret data are obtained, the
When the user enters the user authentication mode in the state where the stego object is stored, the
When the user identification information is obtained, the
FIG. 4 shows an example in which a user generates biometric information for authentication in a mobile terminal according to an embodiment of the present invention.
Referring to FIG. 4A, one of a plurality of image files stored in the
The face image of the user hidden in the selected image file may be the entire image or a part of the image, or may be data representing the characteristics of the user's face extracted therefrom. That is, the
Referring again to FIG. 4 (c), the final generated stego object still maintains the image file format, but substantially the pixel data of the stego object corresponds to the face image information of the user (Hatched in Fig. 4 (c)). However, visually separating the original image file from the Stego object is not easy. Moreover, if a person other than the user sees it, it is impossible to know that the authentication information is concealed in the stego object. Therefore, the
4, the user biometric information for user authentication hidden in the image may be the iris information of the user, the fingerprint of the user, or the user's voice. Unlike the example of FIG. 4, the multimedia file in which the user's biometric information is hidden may be a voice file, a text file, a moving picture file, or the like.
5 is a flowchart showing another example of a method for driving a mobile terminal according to the present invention. Hereinafter, the driving method will be described with reference to necessary drawings.
First, a multimedia file, which is a cover object necessary for generating a stego object, and user biometric information, which is secret data, are acquired (S200). At this time, the
The
For example, if the obtained multimedia file is an image, the
After the hidden algorithm is selected, the
Then, the
As described above, the
6 is a flowchart showing another example of the method for driving a mobile terminal according to the present invention. Hereinafter, the driving method will be described with reference to necessary drawings.
The
The predetermined user authentication performing condition may be that the user presses the power switch. In this case, the
Meanwhile, the
The
The
The
The
The
As described above, the
Referring again to FIG. 6, the user enters the user authentication mode, and the
When the user biometric information is obtained, the
FIG. 7 shows examples in which the
Referring to FIG. 7A, when the call application is executed, the
7B, when attempting self-photographing, the
Referring to FIG. 7C, when the SNS application is executed, the
8 is a flowchart illustrating another example of a method for driving a mobile terminal according to the present invention. Hereinafter, the driving method will be described with reference to necessary drawings.
The
However, if it is determined that the user authentication has failed (S410, NO), the
FIG. 9 shows examples of follow-up actions that the
9A shows that the
9B shows that the
9C shows that the
Meanwhile, although not shown in the figure, when the user authentication fails, the
10 is a flowchart illustrating another example of a method of driving a mobile terminal according to the present invention. Hereinafter, the driving method will be described with reference to necessary drawings.
In a state where the authentication secret data corresponding to the specific function is distributed and stored in a plurality of mobile terminals, another mobile terminal located near and stored with the authentication secret data is recognized (S500). Then, the
In a case where the authentication data for authentication is distributedly stored in a plurality of mobile terminals and it is confirmed that a predetermined number or more of the mobile terminals are gathered at a short distance, The mobile terminals may share the stored secret data for authentication and perform a specific function based on the shared secret data for authentication.
FIG. 11 shows an example in which authentication secret data is shared according to the mobile terminal driving method of FIG. 10 to perform a specific function.
FIG. 11A shows sharing of authentication secret data when a plurality of
Restrictions on the use of a particular application can be performed for the rest of the application, except for basic and critical applications such as call applications or message applications. In this case, when a plurality of people are gathered, the phenomenon of playing with only a mobile terminal without a conversation can be fundamentally blocked. In this case, the
Meanwhile, when the secret data for authentication is shared, the
Referring again to FIG. 11 (b), when the secret data is shared among a plurality of mobile terminals, the
In contrast to the example of FIG. 11 (b), when the secret data is shared among a plurality of mobile terminals, the
While the invention has been shown and described with reference to certain preferred embodiments thereof, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. This is possible.
Therefore, the scope of the present invention should not be limited to the described embodiments, but should be determined by the equivalents of the claims, as well as the claims.
100: mobile terminal 110: wireless communication unit
120: input unit 140: sensing unit
150: output unit 160: interface unit
170: memory 180:
190: Power supply
Claims (7)
A memory for storing a stego-object, which is a multimedia file generated by hidden user identification information, which is secret data, in a multimedia file which is a cover object; And
Acquiring user identification information by using an information acquiring means corresponding to the type of the hidden user identification information among the plurality of information acquiring means when the user authentication mode is entered, extracting the hidden user identification information from the Stegoobject, And a controller for performing user authentication by comparing the obtained user identification information with the extracted user identification information,
Wherein,
Selecting a hidden algorithm corresponding to a type of user identification information to be hidden among a plurality of hiding algorithms to generate the Stego object,
Wherein the extracting algorithm extracts the hidden user identification information by selecting an extraction algorithm corresponding to the type of the hidden user identification information among a plurality of extraction algorithms.
A memory for storing a stego-object, which is a multimedia file generated by hidden user identification information, which is secret data, in a multimedia file which is a cover object; And
Acquiring user identification information by using an information acquiring means corresponding to the type of the hidden user identification information among the plurality of information acquiring means when the user authentication mode is entered, extracting the hidden user identification information from the Stegoobject, And a controller for performing user authentication by comparing the obtained user identification information with the extracted user identification information,
Wherein,
If the predetermined user authentication performing condition is satisfied,
Wherein the mobile terminal is configured to automatically acquire user identification information by using an information acquisition unit corresponding to the type of the hidden user identification information, and then perform user authentication even when the unlock screen of the mobile terminal is not executed.
An execution of a specific application determined in advance, an execution of a predetermined function predetermined in advance, an arrival of an authentication execution time according to a predetermined user authentication execution cycle, and a predetermined execution of a specified function.
A memory for storing a stego-object, which is a multimedia file generated by hidden user identification information, which is secret data, in a multimedia file which is a cover object; And
Acquiring user identification information by using an information acquiring means corresponding to the type of the hidden user identification information among the plurality of information acquiring means when the user authentication mode is entered, extracting the hidden user identification information from the Stegoobject, And a controller for performing user authentication by comparing the obtained user identification information with the extracted user identification information,
Wherein,
If user authentication fails,
Wherein the mobile terminal performs at least one of the use restriction of the mobile terminal, the transmission of the location information of the mobile terminal to the predetermined network device, and the transmission of the obtained user identification information for confirming the identity of the current user. .
A memory for storing a stego-object, which is a multimedia file generated by hidden user identification information, which is secret data, in a multimedia file which is a cover object; And
Acquiring user identification information by using an information acquiring means corresponding to the type of the hidden user identification information among the plurality of information acquiring means when the user authentication mode is entered, extracting the hidden user identification information from the Stegoobject, And a controller for performing user authentication by comparing the obtained user identification information with the extracted user identification information,
Wherein,
When secret data for authentication corresponding to a specific function is distributed and hidden among a plurality of mobile terminals including a mobile terminal and at least one other mobile terminal,
Wherein when a predetermined number or more of the plurality of mobile terminals are collected at a short distance, the predetermined number or more of the mobile terminals share the stored authentication secret data, and based on the shared authentication secret data, The mobile terminal comprising:
And blocks the function of the mobile terminal except for at least one predetermined function based on the shared secret data for authentication.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150105206A KR101680975B1 (en) | 2015-07-24 | 2015-07-24 | mobile terminal performing user authentication by using steganography |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150105206A KR101680975B1 (en) | 2015-07-24 | 2015-07-24 | mobile terminal performing user authentication by using steganography |
Publications (1)
Publication Number | Publication Date |
---|---|
KR101680975B1 true KR101680975B1 (en) | 2016-12-12 |
Family
ID=57574248
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150105206A KR101680975B1 (en) | 2015-07-24 | 2015-07-24 | mobile terminal performing user authentication by using steganography |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101680975B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022163897A1 (en) * | 2021-01-26 | 2022-08-04 | 삼성전자주식회사 | Electronic device and control method therefor |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100381813B1 (en) | 1998-08-06 | 2003-04-26 | 수미토모 스페셜 메탈스 코., 리미티드 | Magnetic field generator for mri, method for assembling the same, and method for assembling a magnet unit for the same |
JP2004501555A (en) * | 2000-05-26 | 2004-01-15 | キヤノン株式会社 | Content creation method, content reproduction device and method |
KR20070110161A (en) * | 2006-05-12 | 2007-11-16 | (주)넷크루즈 | Method and system for providing multimedia file |
-
2015
- 2015-07-24 KR KR1020150105206A patent/KR101680975B1/en active IP Right Grant
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100381813B1 (en) | 1998-08-06 | 2003-04-26 | 수미토모 스페셜 메탈스 코., 리미티드 | Magnetic field generator for mri, method for assembling the same, and method for assembling a magnet unit for the same |
JP2004501555A (en) * | 2000-05-26 | 2004-01-15 | キヤノン株式会社 | Content creation method, content reproduction device and method |
KR20070110161A (en) * | 2006-05-12 | 2007-11-16 | (주)넷크루즈 | Method and system for providing multimedia file |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022163897A1 (en) * | 2021-01-26 | 2022-08-04 | 삼성전자주식회사 | Electronic device and control method therefor |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102508147B1 (en) | Display apparatus and controlling method thereof | |
KR102254886B1 (en) | Mobile terminal and method for controlling external device using the same | |
EP3310034B1 (en) | Mobile terminal | |
KR20170038308A (en) | A mobile terminal and method for controlling the same | |
KR20160071887A (en) | Mobile terminal and method for controlling the same | |
KR20160092363A (en) | Mobile terminal and method for controlling the same | |
KR20160005447A (en) | Mobile terminal having touch screen and the method for controlling the mobile terminal | |
KR20170027189A (en) | Mobile terminal and control method for the mobile terminal | |
KR102130802B1 (en) | Mobile terminal and method for controlling the same | |
KR20180072971A (en) | Mobile terminal and method for controlling the same | |
KR20180037721A (en) | Display apparatus | |
KR20180023197A (en) | Terminal and method for controlling the same | |
KR20180018049A (en) | Mobile terminal | |
KR20180012064A (en) | Display apparatus | |
KR20170064901A (en) | Mobile device and, the method thereof | |
KR20180048170A (en) | Display apparatus | |
KR20160012009A (en) | Mobile terminal and method for controlling the same | |
KR20170046969A (en) | Mobile device and, the method thereof | |
KR20190054727A (en) | Smart mirror device and and method the same | |
KR101721132B1 (en) | Mobile terminal and method for controlling the same | |
KR20170021514A (en) | Display apparatus and controlling method thereof | |
KR101680975B1 (en) | mobile terminal performing user authentication by using steganography | |
KR102241334B1 (en) | Mobile terminal and method for controlling the same | |
KR101622730B1 (en) | Mobile terminal and method for controlling the same | |
KR20180037370A (en) | Mobile terminal and method for controlling the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant | ||
FPAY | Annual fee payment |
Payment date: 20191125 Year of fee payment: 4 |