KR20090003457A - Method of operating image password - Google Patents
Method of operating image password Download PDFInfo
- Publication number
- KR20090003457A KR20090003457A KR1020070057123A KR20070057123A KR20090003457A KR 20090003457 A KR20090003457 A KR 20090003457A KR 1020070057123 A KR1020070057123 A KR 1020070057123A KR 20070057123 A KR20070057123 A KR 20070057123A KR 20090003457 A KR20090003457 A KR 20090003457A
- Authority
- KR
- South Korea
- Prior art keywords
- image
- user
- image map
- map
- generator
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/005—Network, LAN, Remote Access, Distributed System
- G06F2211/006—E-Mail
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a method for operating an image password. More specifically, when a user generates an image map using an image map generator, an image authentication server generates an image map identical to the user's image map generator in a time-synchronous manner. Generating a map; The image map generated in the image map generation step is not downloaded and displayed on the user terminal, the image map is displayed only on the image map generator, and an image key, which is a direction key indicating an image path, is input to the user terminal by the user. A generator user authentication step of authenticating, by the image authentication server, the input image key; An image map download step of generating an image map randomly by the image authentication server and downloading the image map to the user terminal when there is a request for downloading the image map from a user who does not own the image map generator; And a download user authentication step in which an image key is input to the user terminal by the user in the image map downloaded in the image map download step, and the image authentication server authenticates the input image key. According to the present invention, both the user who owns and the user who does not own the image map generator can be authenticated, and an image password operation method capable of authenticating and maintaining the maximum security level can be provided.
Description
1 is a block diagram of an image password operating method of the present invention.
The present invention relates to a method for operating an image password, and more particularly, an image password operation capable of authenticating both a user who owns an image map generator and a user who does not own the image password, and maintains the maximum security level. It is about a method.
At present, personal computer (PC) security programs are already commercialized, and various functions such as monitoring of illegal infringement or installation of hacking programs for hacking are provided.
In addition, many Internet sites allow users to check the secure connection option when logging in. To prevent hackers from invading, the international standard 128bits SSL (Secure Sokets Layer) used for internet banking and card payment can be used. It provides a service for encrypting passwords.
However, a personal computer security program only works on the computer on which it is installed, so if you open it on another computer, you are exposed to hacking again.
In addition, the conventional secure access service was helpless for the keyboard input information hacking program installed directly in the computer.
An object of the present invention devised to solve the above problems is to provide a more secure image password operation method from user terminal hacking because there is no image map in the user terminal at the time of image password authentication of the user owning the image map generator There is.
In addition, another object of the present invention is that a user who does not own an image map generator is not able to authenticate, but can download and authenticate an image map from an image authentication server, so that authentication can be performed even without the image map generator To provide an image password management method.
In addition, another object of the present invention is that, considering the reality that a user who normally performs economic activities has a mobile communication terminal and can use an image map generator, most users who authenticate through image map download do not perform economic activities. It is to provide a method for operating an image password in consideration of not being harmed even if the user terminal is hacked as a person who does not.
In the image password operation method of the present invention for achieving the above object, when the user generates an image map using the image map generator, the image authentication server to generate an image image the same image map in a time-synchronous manner with the user's image map generator Generating a map; A generator user authentication step in which an image key is input to the user terminal by the user by means of image key selection means, and the image authentication server authenticates the input image key; An image map download step of generating an image map randomly by the image authentication server and downloading the image map to the user terminal when an image map download request is received from a user who does not own the image map generator; And a download user authentication step in which an image key is input to the user terminal by the user in the image map downloaded in the image map download step, and the image authentication server authenticates the input image key.
Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings.
1 is a block diagram of an image password operating method of the present invention.
Referring to FIG. 1, a user of an image password operating method of the present invention includes a generator user and a download user.
The authentication step of the generator user includes an image map generation step and a generator user authentication step.
In the image map generation step, when the user generates an image map using the image map generator, the image authentication server generates the same image map in a synchronous manner with the image map generator of the user.
The image map generator may be an electronic chip having an image map generation function attached to a mobile communication terminal.
That is, the electronic chip stores a One Time Shuffle function that randomly mixes an image set, which is a collection of images, and positions of images, and selects an image map generation menu through a menu operation in an image map generator, which is a mobile communication terminal. The One Time Shuffle function operates to generate an image map from an image set, and the image authentication server has the same function as the One Time Shuffle function, so that the image map generated by the generator in a time synchronous or event synchronous manner is generated. You will create the same image map.
Therefore, the image authentication server and the image map generator use the same image map for a certain period of time after the user selects the image map generation menu.
Next, in the generator user authentication step, the image map is displayed on the image map generator, an image key is input to the user terminal by the user by image key selection means, and the image authentication server authenticates the input image key. do.
That is, a user guide message such as "See the map of the generator and pass through the image" of FIG. 1 appears, and the user has already entered the guard in the user terminal while watching the image map generator.
The authentication step of the download user includes an image map download step and a download user authentication step.
In the image map download step, when there is an image map download request from a user who does not own the image map generator, the image authentication server arbitrarily generates an image map and downloads the image map to the user terminal.
That is, when the image map generator is not available, the user clicks a phrase such as "download image map" in FIG. 1 of the user terminal to request an image map download.
In the download user authentication step, in the image map downloaded in the image map download step, an image key is input to the user terminal by the user, and the image authentication server authenticates the input image key.
The present invention is not limited to the above-described preferred embodiments and can be easily modified by anyone of ordinary skill in the art without departing from the gist of the invention claimed in the claims, Such changes are intended to fall within the scope of the claims.
According to the present invention as described above, when the image password authentication of the user owning the image map generator, the user terminal does not download the image map from the image authentication server can provide a more secure image password operation method from server hacking .
Further, according to the image password operation method of the present invention, the user who does not own the image map generator is not able to authenticate, but can download and authenticate the image map from the image authentication server. It is possible to provide a method for operating an image password.
In addition, according to the image password operation method of the present invention, considering that the user who usually performs the economic activity has a mobile communication terminal and can use the image map generator, most users who authenticate through the image map download are economic activities. As a person who doesn't have a server, it can provide an image password operation method considering that the server is not harmed even if the server is hacked.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020070057123A KR20090003457A (en) | 2007-06-12 | 2007-06-12 | Method of operating image password |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020070057123A KR20090003457A (en) | 2007-06-12 | 2007-06-12 | Method of operating image password |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20090003457A true KR20090003457A (en) | 2009-01-12 |
Family
ID=40486076
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020070057123A KR20090003457A (en) | 2007-06-12 | 2007-06-12 | Method of operating image password |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20090003457A (en) |
-
2007
- 2007-06-12 KR KR1020070057123A patent/KR20090003457A/en not_active Application Discontinuation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8595810B1 (en) | Method for automatically updating application access security | |
CA2742705C (en) | Method and system protecting against identity theft or replication abuse | |
US8370899B2 (en) | Disposable browser for commercial banking | |
CN112425114B (en) | Password manager protected by public key-private key pair | |
US20040230807A1 (en) | Apparatus and method for authenticating access to a network resource | |
US20090158033A1 (en) | Method and apparatus for performing secure communication using one time password | |
Mannan et al. | Leveraging personal devices for stronger password authentication from untrusted computers | |
JP6835851B2 (en) | Multi-user strict authentication token | |
JP2012503229A (en) | Apparatus, system and computer program for authorizing server operation | |
US20100257359A1 (en) | Method of and apparatus for protecting private data entry within secure web sessions | |
KR20080101333A (en) | Secutiry method using virtual keyboard | |
JPWO2008114390A1 (en) | Service control system, service control method, and service control program | |
US20170201528A1 (en) | Method for providing trusted service based on secure area and apparatus using the same | |
Kim et al. | On the security of internet banking in south korea | |
KR101659847B1 (en) | Method for two channel authentication using smart phone | |
CN109740319B (en) | Digital identity verification method and server | |
JP2009175938A (en) | Information processor, use range setting program and use range setting method | |
KR20170051459A (en) | Authentication stick | |
CN112398787B (en) | Mailbox login verification method and device, computer equipment and storage medium | |
JP4409497B2 (en) | How to send confidential information | |
KR20190003146A (en) | Automatic login system and management method through authorization authentication of smartphone | |
KR101152610B1 (en) | The Method of Virtual Keyboard | |
KR20090003457A (en) | Method of operating image password | |
KR101349698B1 (en) | System and method for certification using portable storage medium, and terminal and authentication server and portable storage medium thereof | |
CN111740938A (en) | Information processing method and device, client and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WITN | Withdrawal due to no request for examination |