KR20130093855A - Security media - Google Patents
Security media Download PDFInfo
- Publication number
- KR20130093855A KR20130093855A KR1020120009223A KR20120009223A KR20130093855A KR 20130093855 A KR20130093855 A KR 20130093855A KR 1020120009223 A KR1020120009223 A KR 1020120009223A KR 20120009223 A KR20120009223 A KR 20120009223A KR 20130093855 A KR20130093855 A KR 20130093855A
- Authority
- KR
- South Korea
- Prior art keywords
- conductor
- patch
- authentication
- capacitance
- conductor patches
- Prior art date
Links
Images
Landscapes
- User Interface Of Digital Computer (AREA)
Abstract
Description
The present invention relates to a security medium, and more particularly to a security medium for user authentication.
The touch screen is one of the input devices that reads data necessary for communication with a device or a device in addition to voice, and is attracting attention due to its simplicity and convenience of use. Touch screens are divided into resistive (or pressure sensitive) and capacitive (or capacitive) methods according to the principle of operation. Recently, a surface acoustic wave (SAW) method for detecting a touch using ultrasonic technology has been developed.
The resistive film is a method of sensing pressure by sensing pressure, and is implemented in a plurality of layers. On the outside is a soft, scratch-resistant layer, followed by two layers that protect the liquid crystal and two layers of electricity. When the outer flexible membrane is pressed, the resistive touch screen detects the input point by detecting a change in current and resistance generated when the two layers of electricity touch each other.
The capacitive method is a method of sensing motion by using static electricity of the human body, and is implemented by coating a highly conductive compound on the liquid crystal glass unlike the resistive film method. A capacitive touch screen senses a point of contact as electrons flowing on the liquid crystal move to the finger when the finger touches.
The capacitance type can reduce the thickness of the touch panel by 1mm as compared with the resistance film type, improve the durability of the touch pad, reduce the possibility of malfunction due to external pressure, and enlarge or reduce the image with two fingers As multi-touch capability is available, recently, touch screens tend to favor capacitive touch screens.
In addition, the surface acoustic wave method is a method in which ultrasonic waves are flowed on the surface glass to recognize the coordinate where the touch is made, which is advantageous in that sensitivity is good when any point is pressed because there is no dead zone.
Recently, a user is authenticated by inputting a password by touching a number, figure, or letter displayed on the touch screen of the target device when authenticating a user by attaching a touch screen to a computer, a smartphone, a personal information terminal, or a financial automatic machine. to be. Recently, there has been introduced a method of starting a touch at the starting point and dragging it to the end point instead of touching the numbers and the like displayed on the touch screen one-time.
However, the conventional authentication method is inconvenient that the user must memorize the password in advance, and thus, it is difficult to use a complicated and long password, and thus weak in security because the same password is generally used in a plurality of authentication procedures. have. In addition, the existing authentication method has a problem that the afterimage of the fingerprint due to the contact of the finger remains on the touch screen, there is a risk that the password is exposed to others.
SUMMARY OF THE INVENTION The present invention has been made in view of the above-described problems, and it is an object of the present invention to provide a security medium that enables a user to perform user authentication without memorizing a password.
In addition, another object of the present invention is to provide a security medium capable of easily and accurately inputting a password to a touch screen of a target device.
In addition, the present invention is to solve the above-described problems, it is another technical problem to provide a security medium that can easily perform a complex and various authentication procedures.
Security medium according to an aspect of the present invention for achieving the above object, a plurality of first conductor patches formed of a material having a predetermined capacitance on the first surface; A first circuit line patch electrically connecting the plurality of first conductor patches, wherein user authentication is performed when at least one of the plurality of first conductor patches and the first circuit line patches is touched on the touch screen of the target device. Characterized in that it is used as a first password for.
According to another aspect of the present invention for achieving the above object, a security medium, the first authentication pattern consisting of a plurality of first conductor patches having a predetermined capacitance on the first surface; And a second authentication pattern including a plurality of second conductor patches having a predetermined capacitance on a second surface opposite to the first surface, wherein the first authentication pattern is to be touched by the touch screen of the target device. When used as a first password for user authentication, the second authentication pattern is used as a second password for user authentication when the touch screen of the target device.
Security medium according to another aspect of the present invention for achieving the above object, a plurality of first conductor patches formed of a material having a predetermined capacitance on the first surface; And a bent portion formed between a first region in which the plurality of first conductor patches are disposed and a second region that does not overlap the first region, wherein the plurality of first conductor patches are to be touched by a touch screen of a target device. When used as the first password for user authentication, characterized in that.
According to the present invention, since authentication is performed only by bringing the security medium into contact with the touch screen of the target device, there is an effect that the user can easily handle the authentication process without burden of having to remember the password.
In addition, according to the present invention, by forming a projection on the authentication pattern formed on the security medium has another effect that can improve the contact convenience to the touch screen of the target device.
In addition, according to the present invention, since the authentication process is performed using a plurality of authentication patterns, there is another effect that the password is not exposed to the outside and the security can be enhanced.
1 is a view schematically showing a security medium according to a first embodiment of the present invention.
FIG. 2 is a diagram schematically illustrating a first embodiment of a plurality of authentication patterns formed on the security medium of FIG. 1.
3 is a view schematically illustrating a second embodiment of a plurality of authentication patterns formed on the security medium of FIG. 1.
4 is a diagram schematically illustrating a third embodiment of a plurality of authentication patterns formed on the security medium of FIG. 1.
FIG. 5 is a view schematically showing a capacitance formed in the security medium of FIG. 1.
6 is a view schematically showing a security medium according to a second embodiment of the present invention.
FIG. 7 is a view schematically illustrating a modified embodiment of the security medium of FIG. 6.
8 is a view schematically showing a security medium according to a third embodiment of the present invention.
FIG. 9 is a view schematically illustrating a modified first embodiment of the security medium of FIG. 8.
FIG. 10 schematically illustrates a second modified embodiment of the security medium of FIG. 8.
FIG. 11 is a view schematically illustrating a modified third embodiment of the security medium of FIG. 8.
Description of the present application is only an embodiment for structural or functional description, the scope of the disclosed technology should not be construed as limited by the embodiments described in the text. That is, the embodiments are to be construed as being variously embodied and having various forms, so that the scope of the disclosed technology should be understood to include equivalents capable of realizing technical ideas.
Meanwhile, the meaning of the terms described in the present application should be understood as follows.
The terms "first "," second ", and the like are intended to distinguish one element from another, and the scope of the right should not be limited by these terms. For example, the first component may be referred to as a second component, and similarly, the second component may also be referred to as a first component.
It is to be understood that when an element is referred to as being "connected" to another element, it may be directly connected to the other element, but there may be other elements in between. On the other hand, it should be understood that no component is present. On the other hand, other expressions describing the relationship between the components, such as "between" and "immediately between" or "neighboring to" and "directly neighboring to", should be interpreted as well.
It should be understood that the singular " include "or" have "are to be construed as including a stated feature, number, step, operation, component, It is to be understood that the combination is intended to specify that it does not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, or combinations thereof.
All terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which the disclosed technology belongs, unless otherwise defined. Commonly used predefined terms should be interpreted to be consistent with the meanings in the context of the related art and can not be interpreted as having ideal or overly formal meaning unless explicitly defined in the present application.
1 is a view schematically showing a security medium according to a first embodiment of the present invention.
Referring to FIG. 1, the
First, the
In one embodiment,
In another embodiment, the
Next, the
The
On the other hand, the
In another embodiment, the authentication pattern may be different for each service. For example, a web service provider may assign a unique authentication pattern to a person allowing web service access. In this case, the same web service user may be assigned the same authentication pattern. As another example, the web service provider may assign an authentication pattern according to a user's access authority. In this case, a user having the same access authority may be assigned the same authentication pattern.
In one embodiment, the
Next, the
In addition, the
Here, the target device may include a PC having a touch screen, a notebook computer, a personal digital assistant (PDA), a smart phone, and an ATM. The touch screen includes a color filter, a liquid crystal, and a thin film transistor as well as a touch screen integrated with a tempered glass that forms a touch integrally on the bottom of a cover window such as tempered glass, and an attachable touch screen that attaches a separate touch screen to an upper portion of the display. An in-cell touch screen that implements a touch recognition function is included in the configured display cell.
On the other hand, the
Recently, it is common to put a protective case on a target device in order to protect the target device from an external impact. In this case, since a height difference occurs between the touch screen and the protective case, the user may have to apply a pressure to contact the security medium to the touch screen. It can also be mistaken. The
1 illustrates a security medium in which one authentication pattern is formed, but in another embodiment, a plurality of authentication patterns may be formed. Hereinafter, the
FIG. 2A is a perspective view schematically illustrating a first embodiment of a plurality of authentication patterns formed on the security medium of FIG. 1, and FIG. 2B is a first embodiment of a plurality of authentication patterns formed on the security medium of FIG. 1. It is sectional drawing which shows an example schematically.
3A is a perspective view schematically illustrating a second embodiment of a plurality of authentication patterns formed on the security medium of FIG. 1, and FIG. 3B is a second embodiment of a plurality of authentication patterns formed on the security medium of FIG. 1. It is sectional drawing which shows an example schematically.
4A is a perspective view schematically illustrating a third embodiment of a plurality of authentication patterns formed on the security medium of FIG. 1, and FIG. 4B is a third embodiment of a plurality of authentication patterns formed on the security medium of FIG. 1. It is sectional drawing which shows an example schematically.
2 to 4, the
The
First, the plurality of
Meanwhile, the plurality of
Each of the plurality of
Next, the plurality of
Each of the plurality of
In this case, the second authentication pattern may be used in the authentication procedure of the same service as the first authentication pattern. For example, the first authentication pattern and the second authentication pattern may be used as a first password and a second password for a financial transaction. The user may use the financial transaction only when the second authentication is successful by inputting the second password again after the first authentication is successful by inputting the first password.
In addition, the second authentication pattern may be used in an authentication procedure of a service associated with the first authentication pattern. For example, the first authentication pattern may be used as a first password for unlocking the smartphone, and the second authentication pattern may be used for user authentication for using a call service or data service of the smartphone.
As another example, the first authentication pattern may be used as a first password for accessing a specific website, and the second authentication pattern may be used as a second password for using a specific web service provided by the specific website. Can be. Here, the specific web site represents a web site providing a web service by allowing access only to a specific group, and the specific web service represents a web service provided only to a user to whom the access right is granted.
3 and 4, unlike the first embodiment described above, the plurality of
When formed on the second surface, the
On the other hand, as shown in FIG. 4, the
FIG. 5 is a diagram schematically illustrating a capacitance formed in the security medium of FIG. 2.
Referring to FIG. 5, the
5, unlike the security medium shown in FIG. 2, the
The
In one embodiment, the
In another embodiment, the
On the other hand, the capacitive 140 supplies the capacitance greater than or equal to the threshold value to the
In one embodiment, the
In another embodiment, the
Although not shown in FIG. 5, in one embodiment, the
In one embodiment, the
As a specific example, when the
6 (a) is a perspective view schematically showing a security medium according to a second embodiment of the present invention, Figure 6 (b) is a cross-sectional view schematically showing a security medium according to a second embodiment of the present invention.
Referring to FIG. 6, the
First, the
In one embodiment,
Next, the plurality of
The plurality of
In one embodiment, the
In addition, the plurality of
Next, the plurality of
The plurality of
In addition, the
Next, the
By the
In addition, the
Recently, it is common to put a protective case on a target device in order to protect the target device from an external impact, and a height difference occurs between the touch screen and the protective case. The
6 illustrates a security medium in which two authentication patterns are formed, in another embodiment, the security medium may be formed with one authentication pattern, and in another embodiment, three The above authentication pattern may be formed.
For example, when the
7 (a) is a perspective view schematically showing a modified embodiment of the embodiment of FIG. 6, and FIGS. 7 (b) and 7 (c) schematically show a modified embodiment of the embodiment of FIG. It is sectional drawing to show.
Referring to FIG. 7, the
The plurality of
However, the
The
The
Meanwhile, the
In this case, the
In one embodiment, the
In another embodiment, the
In one embodiment, the
In another embodiment, the
Although not shown in FIG. 7, in one embodiment, the
In one embodiment, the
In the above-described embodiment it will be described to perform the user authentication using the authentication pattern consisting of the
8 is a diagram schematically illustrating a security medium according to a third embodiment of the present invention, and FIGS. 9 to 11 are diagrams schematically showing modified embodiments of the security medium of FIG. 8.
Referring to FIG. 8, the
The
In addition, the
The
In one embodiment, the
Hereinafter, only the
In the above-described embodiment, the authentication pattern is configured using only the
The
In this case, the
In one embodiment,
Meanwhile, as shown in FIG. 10, the
In this case, as described with reference to FIG. 9, the
However, unlike the
In one embodiment shown in FIG. 10, the
Although described above with reference to the preferred embodiment of the present application, those skilled in the art will be modified and modified in various ways without departing from the spirit and scope of the present application described in the claims below It will be appreciated that it can be changed.
Claims (17)
A first circuitry patch electrically connecting the plurality of first conductor patches;
And at least one of the plurality of first conductor patches and the first circuit patch is used as a first password for user authentication when the touch screen of the target device is touched.
The plurality of first conductor patches are configured to form a different first authentication pattern for each user.
And a first protrusion formed on each of the first conductor patches.
And the first conductor patch and the first protrusion are integrally formed.
A plurality of second conductor patches formed of a material having a predetermined capacitance on a second surface opposite to the first surface; And
A second circuit line patch electrically connecting the plurality of second conductor patches,
And at least one of the plurality of second conductor patches and the second circuit line patch is used as a second password for user authentication when the touch screen of the target device is touched.
And a second protrusion formed on each of the second conductor patches.
And the plurality of first conductor patches and the plurality of second conductor patches are electrically connected.
A capacitance material formed of a conductor material and supplying capacitance greater than or equal to a threshold to at least one of the first conductor patch and the first circuit line patch,
And the capacitive body is electrically connected to at least one of the first conductor patch and the first circuit line patch.
And the first conductor patch has a capacitance below a threshold, and wherein the capacitance has a capacitance above the threshold.
Security medium, characterized in that formed of a non-conductive material plate.
A second authentication pattern comprising a plurality of second conductor patches having a predetermined capacitance on a second surface opposite to the first surface,
The first authentication pattern is used as a first password for user authentication when touching the touch screen of the target device, and the second authentication pattern is used as a second password for user authentication when touching the touch screen of the target device. Security medium, characterized in that used.
The security medium is a plate of non-conductive material,
The first authentication pattern is formed on a first area of the first surface of the security medium, and the second authentication pattern is formed on a second area not overlapping the first area of the second surface of the security medium. Security medium, characterized in that.
And a bent portion formed between the first region and the second region.
A capacitance for supplying a capacitance above the threshold to the plurality of first conductor patches or the plurality of second conductor patches; And
And a connection pattern for electrically connecting the capacitance with the plurality of first conductor patches or the plurality of second conductor patches.
A first reference pattern formed on the first surface; And
Further comprising a second reference pattern formed on the second surface,
And the first and second reference patterns are formed of a transparent or semi-transparent material in order to transmit the reference line in the authentication area displayed on the touch screen of the target device to show the user.
A bent portion formed between a first region in which the plurality of first conductor patches are disposed and a second region that does not overlap the first region,
The plurality of first conductor patches are used as a first password for user authentication when touched the touch screen of the target device.
And a plurality of second conductor patches formed of a material having a predetermined capacitance on a second surface opposite to the first surface,
The plurality of second conductor patches are disposed in the second area and are used as a second password for user authentication when touching the touch screen of the target device.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020120009223A KR20130093855A (en) | 2012-01-30 | 2012-01-30 | Security media |
US14/343,346 US20140304806A1 (en) | 2011-09-06 | 2012-09-06 | Security media and authentication system including the same |
PCT/KR2012/007200 WO2013036056A2 (en) | 2011-09-06 | 2012-09-06 | Security medium and authentication system using same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020120009223A KR20130093855A (en) | 2012-01-30 | 2012-01-30 | Security media |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20130093855A true KR20130093855A (en) | 2013-08-23 |
Family
ID=49217873
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020120009223A KR20130093855A (en) | 2011-09-06 | 2012-01-30 | Security media |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20130093855A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015186939A1 (en) * | 2014-06-02 | 2015-12-10 | 12Cm | Touch module for multi-touch |
KR101702434B1 (en) * | 2015-10-15 | 2017-02-03 | 경상대학교산학협력단 | Near field identification reader apparatus and method of identifying tag thereof |
-
2012
- 2012-01-30 KR KR1020120009223A patent/KR20130093855A/en not_active Application Discontinuation
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015186939A1 (en) * | 2014-06-02 | 2015-12-10 | 12Cm | Touch module for multi-touch |
US10678383B2 (en) | 2014-06-02 | 2020-06-09 | 12Cm Global Pte. Ltd. | Touch module for multiple touch |
KR101702434B1 (en) * | 2015-10-15 | 2017-02-03 | 경상대학교산학협력단 | Near field identification reader apparatus and method of identifying tag thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10740586B2 (en) | Electronic device with touch sensor and driving method therefor | |
US7355592B2 (en) | Digital resistive type touch panel and fabrication method thereof | |
US20160140379A1 (en) | Improvements in or relating to user authentication | |
KR102618537B1 (en) | On-screen type fingerprint sensor and electronic apparatus including the same | |
US20140304806A1 (en) | Security media and authentication system including the same | |
JP6529523B2 (en) | Capacitance-based digitizer sensor | |
US10884565B2 (en) | Device for the entry of data to be placed on a touch panel of a terminal, corresponding method and entry system | |
CN106548125B (en) | Multi-finger fingerprint identification device and multi-finger fingerprint identification electronic device | |
KR20170136359A (en) | Method for activiating a function using a fingerprint and electronic device including a touch display supporting the same | |
CN104932763A (en) | Capacitive touch screen having fingerprint recognition function and fingerprint detection method thereof | |
CN104794454A (en) | Fingerprint recognition device, display screen and display device | |
US20240112494A1 (en) | Elongated Fingerprint Sensor | |
US20150018045A1 (en) | Cover device and portable terminal having the same | |
TW201905664A (en) | Pressure sensing touch device | |
KR20120033480A (en) | Touch screen | |
TW201905668A (en) | Pressure sensing touch control device for accurately calculating the pressure exerted by an external object on a pressure sensing touch panel and also enhancing the application and effect of touch control through pressure sensing | |
CN109117704A (en) | Pressure identification device and electronic device including Pressure identification device | |
CN205507798U (en) | Biological identification device with curved substrate | |
KR101231085B1 (en) | Card type authentication media | |
EP3043474B1 (en) | Touch pad using piezo effect | |
KR20130093855A (en) | Security media | |
KR101191145B1 (en) | Touch film for capacitive type touchscreen, touchscreen comprising and mobile device comprising the same | |
CN205050107U (en) | Intelligence touch -sensitive screen protection film and mobile phone touch screen protective housing | |
US10588580B2 (en) | Touch-controlled assembly | |
KR20130101605A (en) | Security media and system for certification including that security media |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WITN | Withdrawal due to no request for examination |