KR20090003457A - Method of operating image password - Google Patents

Method of operating image password Download PDF

Info

Publication number
KR20090003457A
KR20090003457A KR1020070057123A KR20070057123A KR20090003457A KR 20090003457 A KR20090003457 A KR 20090003457A KR 1020070057123 A KR1020070057123 A KR 1020070057123A KR 20070057123 A KR20070057123 A KR 20070057123A KR 20090003457 A KR20090003457 A KR 20090003457A
Authority
KR
South Korea
Prior art keywords
image
user
image map
map
generator
Prior art date
Application number
KR1020070057123A
Other languages
Korean (ko)
Inventor
양기호
황재엽
Original Assignee
(주)솔메이즈
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by (주)솔메이즈 filed Critical (주)솔메이즈
Priority to KR1020070057123A priority Critical patent/KR20090003457A/en
Publication of KR20090003457A publication Critical patent/KR20090003457A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/005Network, LAN, Remote Access, Distributed System
    • G06F2211/006E-Mail

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a method for operating an image password. More specifically, when a user generates an image map using an image map generator, an image authentication server generates an image map identical to the user's image map generator in a time-synchronous manner. Generating a map; The image map generated in the image map generation step is not downloaded and displayed on the user terminal, the image map is displayed only on the image map generator, and an image key, which is a direction key indicating an image path, is input to the user terminal by the user. A generator user authentication step of authenticating, by the image authentication server, the input image key; An image map download step of generating an image map randomly by the image authentication server and downloading the image map to the user terminal when there is a request for downloading the image map from a user who does not own the image map generator; And a download user authentication step in which an image key is input to the user terminal by the user in the image map downloaded in the image map download step, and the image authentication server authenticates the input image key. According to the present invention, both the user who owns and the user who does not own the image map generator can be authenticated, and an image password operation method capable of authenticating and maintaining the maximum security level can be provided.

Description

Method of operating image password

1 is a block diagram of an image password operating method of the present invention.

The present invention relates to a method for operating an image password, and more particularly, an image password operation capable of authenticating both a user who owns an image map generator and a user who does not own the image password, and maintains the maximum security level. It is about a method.

At present, personal computer (PC) security programs are already commercialized, and various functions such as monitoring of illegal infringement or installation of hacking programs for hacking are provided.

In addition, many Internet sites allow users to check the secure connection option when logging in. To prevent hackers from invading, the international standard 128bits SSL (Secure Sokets Layer) used for internet banking and card payment can be used. It provides a service for encrypting passwords.

However, a personal computer security program only works on the computer on which it is installed, so if you open it on another computer, you are exposed to hacking again.

In addition, the conventional secure access service was helpless for the keyboard input information hacking program installed directly in the computer.

An object of the present invention devised to solve the above problems is to provide a more secure image password operation method from user terminal hacking because there is no image map in the user terminal at the time of image password authentication of the user owning the image map generator There is.

In addition, another object of the present invention is that a user who does not own an image map generator is not able to authenticate, but can download and authenticate an image map from an image authentication server, so that authentication can be performed even without the image map generator To provide an image password management method.

In addition, another object of the present invention is that, considering the reality that a user who normally performs economic activities has a mobile communication terminal and can use an image map generator, most users who authenticate through image map download do not perform economic activities. It is to provide a method for operating an image password in consideration of not being harmed even if the user terminal is hacked as a person who does not.

In the image password operation method of the present invention for achieving the above object, when the user generates an image map using the image map generator, the image authentication server to generate an image image the same image map in a time-synchronous manner with the user's image map generator Generating a map; A generator user authentication step in which an image key is input to the user terminal by the user by means of image key selection means, and the image authentication server authenticates the input image key; An image map download step of generating an image map randomly by the image authentication server and downloading the image map to the user terminal when an image map download request is received from a user who does not own the image map generator; And a download user authentication step in which an image key is input to the user terminal by the user in the image map downloaded in the image map download step, and the image authentication server authenticates the input image key.

Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings.

1 is a block diagram of an image password operating method of the present invention.

Referring to FIG. 1, a user of an image password operating method of the present invention includes a generator user and a download user.

The authentication step of the generator user includes an image map generation step and a generator user authentication step.

In the image map generation step, when the user generates an image map using the image map generator, the image authentication server generates the same image map in a synchronous manner with the image map generator of the user.

The image map generator may be an electronic chip having an image map generation function attached to a mobile communication terminal.

That is, the electronic chip stores a One Time Shuffle function that randomly mixes an image set, which is a collection of images, and positions of images, and selects an image map generation menu through a menu operation in an image map generator, which is a mobile communication terminal. The One Time Shuffle function operates to generate an image map from an image set, and the image authentication server has the same function as the One Time Shuffle function, so that the image map generated by the generator in a time synchronous or event synchronous manner is generated. You will create the same image map.

Therefore, the image authentication server and the image map generator use the same image map for a certain period of time after the user selects the image map generation menu.

Next, in the generator user authentication step, the image map is displayed on the image map generator, an image key is input to the user terminal by the user by image key selection means, and the image authentication server authenticates the input image key. do.

That is, a user guide message such as "See the map of the generator and pass through the image" of FIG. 1 appears, and the user has already entered the guard in the user terminal while watching the image map generator.

The authentication step of the download user includes an image map download step and a download user authentication step.

In the image map download step, when there is an image map download request from a user who does not own the image map generator, the image authentication server arbitrarily generates an image map and downloads the image map to the user terminal.

That is, when the image map generator is not available, the user clicks a phrase such as "download image map" in FIG. 1 of the user terminal to request an image map download.

In the download user authentication step, in the image map downloaded in the image map download step, an image key is input to the user terminal by the user, and the image authentication server authenticates the input image key.

The present invention is not limited to the above-described preferred embodiments and can be easily modified by anyone of ordinary skill in the art without departing from the gist of the invention claimed in the claims, Such changes are intended to fall within the scope of the claims.

According to the present invention as described above, when the image password authentication of the user owning the image map generator, the user terminal does not download the image map from the image authentication server can provide a more secure image password operation method from server hacking .

Further, according to the image password operation method of the present invention, the user who does not own the image map generator is not able to authenticate, but can download and authenticate the image map from the image authentication server. It is possible to provide a method for operating an image password.

In addition, according to the image password operation method of the present invention, considering that the user who usually performs the economic activity has a mobile communication terminal and can use the image map generator, most users who authenticate through the image map download are economic activities. As a person who doesn't have a server, it can provide an image password operation method considering that the server is not harmed even if the server is hacked.

Claims (1)

An image map generating step of the image authentication server generating the same image map in a time synchronous manner with the image map generator of the user when the user generates the image map using the image map generator; The image map generated in the image map generation step is not downloaded and displayed on the user terminal, the image map is displayed only on the image map generator, and an image key, which is a direction key indicating an image path, is input to the user terminal by the user. A generator user authentication step of authenticating, by the image authentication server, the input image key; An image map download step of generating an image map randomly by the image authentication server and downloading the image map to the user terminal when there is a request for downloading the image map from a user who does not own the image map generator; And And a download user authentication step in which an image key is input to a user terminal by a user in the image map downloaded in the image map download step, and the image authentication server authenticates the input image key.
KR1020070057123A 2007-06-12 2007-06-12 Method of operating image password KR20090003457A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020070057123A KR20090003457A (en) 2007-06-12 2007-06-12 Method of operating image password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020070057123A KR20090003457A (en) 2007-06-12 2007-06-12 Method of operating image password

Publications (1)

Publication Number Publication Date
KR20090003457A true KR20090003457A (en) 2009-01-12

Family

ID=40486076

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020070057123A KR20090003457A (en) 2007-06-12 2007-06-12 Method of operating image password

Country Status (1)

Country Link
KR (1) KR20090003457A (en)

Similar Documents

Publication Publication Date Title
US8595810B1 (en) Method for automatically updating application access security
CA2742705C (en) Method and system protecting against identity theft or replication abuse
US8370899B2 (en) Disposable browser for commercial banking
CN112425114B (en) Password manager protected by public key-private key pair
US20040230807A1 (en) Apparatus and method for authenticating access to a network resource
US20090158033A1 (en) Method and apparatus for performing secure communication using one time password
Mannan et al. Leveraging personal devices for stronger password authentication from untrusted computers
JP6835851B2 (en) Multi-user strict authentication token
JP2012503229A (en) Apparatus, system and computer program for authorizing server operation
US20100257359A1 (en) Method of and apparatus for protecting private data entry within secure web sessions
KR20080101333A (en) Secutiry method using virtual keyboard
JPWO2008114390A1 (en) Service control system, service control method, and service control program
US20170201528A1 (en) Method for providing trusted service based on secure area and apparatus using the same
Kim et al. On the security of internet banking in south korea
KR101659847B1 (en) Method for two channel authentication using smart phone
CN109740319B (en) Digital identity verification method and server
JP2009175938A (en) Information processor, use range setting program and use range setting method
KR20170051459A (en) Authentication stick
CN112398787B (en) Mailbox login verification method and device, computer equipment and storage medium
JP4409497B2 (en) How to send confidential information
KR20190003146A (en) Automatic login system and management method through authorization authentication of smartphone
KR101152610B1 (en) The Method of Virtual Keyboard
KR20090003457A (en) Method of operating image password
KR101349698B1 (en) System and method for certification using portable storage medium, and terminal and authentication server and portable storage medium thereof
CN111740938A (en) Information processing method and device, client and server

Legal Events

Date Code Title Description
WITN Withdrawal due to no request for examination