KR20130101605A - Security media and system for certification including that security media - Google Patents
Security media and system for certification including that security media Download PDFInfo
- Publication number
- KR20130101605A KR20130101605A KR1020120011442A KR20120011442A KR20130101605A KR 20130101605 A KR20130101605 A KR 20130101605A KR 1020120011442 A KR1020120011442 A KR 1020120011442A KR 20120011442 A KR20120011442 A KR 20120011442A KR 20130101605 A KR20130101605 A KR 20130101605A
- Authority
- KR
- South Korea
- Prior art keywords
- touch
- authentication
- security code
- security
- conductor patch
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/03—Arrangements for converting the position or the displacement of a member into a coded form
- G06F3/041—Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
- G06F3/0412—Digitisers structurally integrated in a display
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2203/00—Indexing scheme relating to G06F3/00 - G06F3/048
- G06F2203/048—Indexing scheme relating to G06F3/048
- G06F2203/04808—Several contacts: gestures triggering a specific function, e.g. scrolling, zooming, right-click, when the user establishes several contacts with the surface simultaneously; e.g. using several fingers or a combination of fingers and pen
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Authentication system according to an aspect of the present invention that can increase the convenience of the user without having to directly enter the security code on the touch screen is a security medium including a conductor patch formed of a material having a predetermined capacitance or resistance; And an authentication device that recognizes the conductor patch when the security medium contacts the touch screen, and generates an authentication code corresponding to the touch area where the conductor patch is recognized on the touch screen to perform authentication. do.
Description
The present invention relates to a security medium and an authentication system including the same, and more particularly, to a security medium for performing authentication by receiving a touch through a touch screen and an authentication system including the same.
The touch screen is one of input devices that reads data necessary for communication with a device or a device in addition to voice, and is attracting attention due to its simplicity and ease of use. The touch screen is divided into a resistive type (or a pressure sensitive type) and a capacitive type (or a capacitive type) according to an operating principle. In particular, a surface acoustic wave (SAW) method for detecting a touch using ultrasonic technology has also been recently developed.
The resistive film is a method of sensing pressure by sensing pressure, and is implemented in a plurality of layers. On the outside is a soft, scratch-resistant layer, followed by two layers that protect the liquid crystal and two layers of electricity. When the outer flexible membrane is pressed, the resistive touch screen detects the input point by detecting a change in current and resistance generated when the two layers of electricity touch each other.
The capacitive method is a method of sensing motion by using static electricity of the human body, and is implemented by coating a highly conductive compound on the liquid crystal glass unlike the resistive film method. A capacitive touch screen senses a point of contact as electrons flowing on the liquid crystal move to the finger when the finger touches.
The capacitance type can reduce the thickness of the touch panel by 1mm as compared with the resistance film type, improve the durability of the touch pad, reduce the possibility of malfunction due to external pressure, and enlarge or reduce the image with two fingers As multi-touch capability is available, recently, touch screens tend to favor capacitive touch screens.
In addition, the surface acoustic wave method is a method in which ultrasonic waves are flowed on the surface glass to recognize the coordinate where the touch is made, which is advantageous in that sensitivity is good when any point is pressed because there is no dead zone.
On the other hand, when a user logs in to a specific site or performs an electronic transaction in a computer, a smart phone, a personal information terminal, or a financial automation machine equipped with a touch screen, a password is input by touching a number, It is common to get certified.
However, the authentication method in which the user directly touches the touch screen is inconvenient to memorize the password in advance. Accordingly, the existing authentication method has a problem that it is difficult to use a complicated and long password, and generally vulnerable to security because the same password is used for a plurality of authentication procedures.
In addition, the existing authentication method has a problem that the afterimage of the fingerprint due to the contact of the finger remains on the touch screen, there is a risk that the password is exposed to others.
The present invention is to solve the above problems, to provide a security medium that can perform authentication by using an authentication pattern without the need to directly enter the security code on the touch screen and its technical problem to include the same do.
Another object of the present invention is to provide a security medium capable of easily and accurately inputting an authentication pattern on a touch screen of an authentication device and an authentication system including the same.
An authentication system according to an aspect of the present invention for achieving the above object is a security medium comprising a conductor patch formed of a material having a predetermined capacitance or resistance; And an authentication device that recognizes the conductor patch when the security medium contacts the touch screen, and generates an authentication code corresponding to the touch area where the conductor patch is recognized on the touch screen to perform authentication. do.
An authentication system according to another aspect of the present invention for achieving the above object is a recognition unit for recognizing the touch area the conductor is in contact on the touch screen, when the conductor is in contact with the touch screen; A security code generator for generating a security code corresponding to the touch area; And characterized in that it comprises an authentication device including an authentication unit for performing authentication using the generated security code.
According to the present invention, the authentication is performed only by contacting the security medium to the touch screen of the authentication device, so that the user does not have to remember the security code and can easily process the authentication process, thereby increasing the convenience of the user. There is.
In addition, according to the present invention, since the security code does not need to be directly input to the touch screen of the authentication device by hand, there is another effect that the touch screen can be fundamentally solved the problem that the touch screen is contaminated by fingerprints or vulnerable to security with the remaining fingerprints. .
In addition, according to the present invention, since the authentication process is performed using a plurality of authentication patterns, there is another risk that the password is not exposed to the outside and the security can be enhanced.
1 is a view schematically showing an authentication system according to an embodiment of the present invention.
2 is a view schematically showing a security medium according to a first embodiment of the present invention.
3 is a view schematically showing a security medium according to a second embodiment of the present invention.
4 is a block diagram schematically illustrating an authentication apparatus according to an embodiment of the present invention.
5 is a view schematically showing a reference pattern according to an embodiment of the present invention.
6 is a view schematically showing an authentication system according to another embodiment of the present invention.
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings. In order to clearly explain the present invention, parts not related to the description in the drawings are omitted, and the same reference numerals are used for the same parts throughout the specification.
Meanwhile, the meaning of the terms described in the present invention should be understood as follows.
The terms "first "," second ", and the like are intended to distinguish one element from another, and the scope of the right should not be limited by these terms. For example, the first component may be referred to as a second component, and similarly, the second component may also be referred to as a first component.
It should be understood that the singular " include "or" have "are to be construed as including a stated feature, number, step, operation, component, It is to be understood that the combination is intended to specify that it does not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, or combinations thereof.
1 is a view schematically showing an authentication system according to an embodiment of the present invention.
Referring to FIG. 1, the
First, the
Hereinafter, the
2 is a view schematically showing a security medium according to a first embodiment of the present invention.
The
First, the
In one embodiment,
In another embodiment, the
Next, the
The
In addition, the
On the other hand, the
In one embodiment, the authentication pattern may be different for each user. For example, a financial institution may assign a unique authentication pattern to each user for financial transactions. Accordingly, each user may have a different authentication pattern.
In another embodiment, the authentication pattern may be different for each service. For example, a web service provider may assign a unique authentication pattern to a person allowing web service access. In this case, the same web service user may be assigned the same authentication pattern. As another example, the web service provider may assign an authentication pattern according to a user's access authority. In this case, a user having the same access authority may be assigned the same authentication pattern.
In one embodiment, the
The
Hereinafter, the
The
The
First, the first and
In another embodiment, the first and
On the other hand, the
The first and second authentication patterns may be used in the authentication process of the same service. For example, the first authentication pattern and the second authentication pattern may be used to obtain a first security code and a second security code for a financial transaction. The user may use the financial transaction only when the second authentication is successful by inputting the second authentication pattern again after the first authentication is successful by inputting the first authentication pattern.
In addition, the first and second authentication patterns may be used in the authentication procedure of the associated service. For example, the first authentication pattern may be used to obtain a first security code for unlocking the smartphone, and the second authentication pattern may be used to obtain a second security code for using a call service or data service of the smartphone. Can be used to obtain.
In another example, the first authentication pattern may be used to obtain a first security code for accessing a specific website, and the second authentication pattern may be used to obtain a second web service provided by the specific website. Can be used to obtain a security code. Here, the specific web site represents a web site providing a web service by allowing access only to a specific group, and the specific web service represents a web service provided only to a user to whom the access right is granted.
Next, the
On the other hand, the
In one embodiment, the
In another embodiment, the
The
In another embodiment, the
On the other hand, the
The
Although not shown in FIGS. 3A and 3B, in one embodiment, the
In one embodiment, the
The
In one embodiment, an IC chip storing financial information and / or personal identification information is attached to one side of the
Referring back to FIG. 1, the
The
Here, the touch screen includes a tempered glass integrated touch screen for integrally forming a touch on the bottom of a cover window such as tempered glass, an attached touch screen for attaching a separate touch screen to the upper part of the display, and a color filter, a liquid crystal, and a thin film transistor. An in-cell touch screen that implements a touch recognition function is included in the configured display cell.
4 is a block diagram schematically illustrating an authentication apparatus according to an embodiment of the present invention, and FIG. 5 is a diagram schematically showing a reference pattern provided by the authentication apparatus of FIG. 4.
As shown in FIG. 4, the
First, the
As shown in FIG. 5, the reference pattern includes a plurality of
In the exemplary embodiment illustrated in FIG. 5, the X value and the Y value include numbers. In another embodiment, the X value and the Y value may include at least one of numbers, letters, and symbols. In another embodiment, the plurality of
In addition, the
When the reference pattern is displayed on the touch screen, the
Next, the
In one embodiment, the
For example, assuming that the
For another example, the
As another example, the
On the other hand, the
When the touch area is recognized, the
Next, the security
For example, when the coordinate value of the touch area is (2, 4), the
In another embodiment, the
For example, when the coordinate value of the touch area is (2,4), the
On the other hand, the security
For example, it is assumed that the three touch regions recognized within the first time interval constitute the first touch group, and the coordinate values are (2,4), (3,8), and (6,1). . In addition, it is assumed that the three touch areas recognized within the second time interval constitute the second touch group, and the coordinate values are (2,7), (4,2), and (4,5). In this case, the first time interval precedes the second time interval and does not overlap the second time interval.
First, the
Next, the security
Finally, the
When the security code includes the separator "-", the security
Next, the
In one embodiment, the
In an embodiment, the
Next, the
Next, when the
Meanwhile, in the above-described embodiment, the
Accordingly, in the case of the present invention, as shown in FIG. 6, the
In one embodiment, the conductor may be implemented with a user's finger, and in another embodiment, the conductor may be implemented with a touch pen including a conductor material.
The functions performed by the authentication medium or the authentication apparatus may be implemented in the form of program instructions that can be executed through various computer means and recorded in a computer-readable recording medium. In this case, the computer-readable recording medium may include program instructions, data files, data structures, and the like, alone or in combination. On the other hand, the program instructions recorded on the recording medium may be those specially designed and configured for the present invention or may be available to those skilled in the art of computer software.
Those skilled in the art to which the present invention pertains will understand that the above-described present invention can be implemented in other specific forms without changing the technical spirit or essential features.
It is therefore to be understood that the above-described embodiments are illustrative in all aspects and not restrictive. The scope of the present invention is defined by the appended claims rather than the detailed description and all changes or modifications derived from the meaning and scope of the claims and their equivalents are to be construed as being included within the scope of the present invention do.
100: authentication system 110: security medium
120: authentication device 210: plate
220: conductor patch 230: capacitive
410: display unit 420: recognition unit
430: security code generation unit 440: authentication unit
Claims (16)
And an authentication device that recognizes the conductor patch when the security medium contacts the touch screen, and generates a security code corresponding to the touch area where the conductor patch is recognized on the touch screen to perform authentication. Authentication system.
A first conductor patch formed on the first face; And
A second conductor patch formed on a second surface opposite the first surface,
When the security medium is in contact with the touch screen of the authentication device, the first conductor patch is used as a first security code for authentication, the second conductor patch is used as a second security code for authentication Authentication system.
Authentication system, characterized in that formed in the shape of at least one of circular, polygonal, and linear.
It is formed of a conductive material, and further comprises a capacitance for generating a capacitance above the threshold in the conductor patch,
And the capacitive body is electrically connected to the conductor patch.
Authentication system, characterized in that formed by a plate of non-conductive material.
A security code generator for generating a security code corresponding to the touch area; And
And an authentication device including an authentication unit for performing authentication using the generated security code.
Acquiring a coordinate value of each touch area, and generating the security code using the obtained coordinate value.
Acquiring a coordinate value of each touch area, and using the at least one of the numbers, letters and symbols that match the obtained coordinate value to generate the security code.
Recognizing a touch group consisting of one or more touch areas at predetermined time intervals, and generating a sub code constituting the security code for each of the recognized touch groups.
The touch regions recognized within the first time interval are recognized as the same touch group, and the touch regions recognized after the first time interval are recognized as different touch groups from the touch regions recognized within the first time interval. Authentication system.
Authentication system, characterized in that for displaying the generated security code on the touch screen.
And a reference pattern including a plurality of first reference lines and at least one of a plurality of second reference lines crossing the plurality of first reference lines on a touch screen.
And a touch area in contact with an intersection area between the first reference lines and the second reference lines.
And a warning sound output unit configured to output a warning sound when the touch area is recognized in an area excluding an intersection area between the first reference lines and the second reference lines.
And the plurality of first reference lines represent a musical scale, and the plurality of second reference lines represent an octave.
And a sound output unit configured to output a sound corresponding to a musical scale at an octave of the corresponding crossing area when the touch area is recognized at an intersection area of the first reference line and the second reference line.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020120011442A KR20130101605A (en) | 2012-02-03 | 2012-02-03 | Security media and system for certification including that security media |
PCT/KR2012/007200 WO2013036056A2 (en) | 2011-09-06 | 2012-09-06 | Security medium and authentication system using same |
US14/343,346 US20140304806A1 (en) | 2011-09-06 | 2012-09-06 | Security media and authentication system including the same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020120011442A KR20130101605A (en) | 2012-02-03 | 2012-02-03 | Security media and system for certification including that security media |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20130101605A true KR20130101605A (en) | 2013-09-16 |
Family
ID=49451649
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020120011442A KR20130101605A (en) | 2011-09-06 | 2012-02-03 | Security media and system for certification including that security media |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20130101605A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101501491B1 (en) * | 2013-11-01 | 2015-03-11 | 한국생산기술연구원 | Capacitive touch tag reconizable by capacitive touch panel, information recognition method thereof and information service method using the same |
-
2012
- 2012-02-03 KR KR1020120011442A patent/KR20130101605A/en not_active Application Discontinuation
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101501491B1 (en) * | 2013-11-01 | 2015-03-11 | 한국생산기술연구원 | Capacitive touch tag reconizable by capacitive touch panel, information recognition method thereof and information service method using the same |
US10001890B2 (en) | 2013-11-01 | 2018-06-19 | Korea Institute Of Industrial Technology | Touch tag recognizable through capacitive touch panel, information recognition method thereof and information providing method using same |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9898695B2 (en) | Security token and authentication system | |
US20140304806A1 (en) | Security media and authentication system including the same | |
US20160140379A1 (en) | Improvements in or relating to user authentication | |
KR101534903B1 (en) | Systems and methods for pressure-based authentication of a signature on a touch screen | |
USRE42038E1 (en) | Man-machine interface for controlling access to electronic devices | |
US20240061540A1 (en) | Fingerprint imaging device incorporating electrodes and drive-sense circuitry | |
CN109416739B (en) | Multi-sensor-based method and system for acquiring fingerprint under screen and electronic equipment | |
WO2020093251A1 (en) | Double sensing area-based fingerprint identification method, fingerprint identification system, and electronic device | |
KR102507281B1 (en) | Electornic device comprising fingerprint sensor and method for operating thereof | |
US20240112494A1 (en) | Elongated Fingerprint Sensor | |
CN104067542A (en) | Body-coupled communication based on user device with touch display | |
CN107831945A (en) | Electronic equipment, display system and its integrated control device, safe verification method | |
US20100108771A1 (en) | Financial transaction card | |
KR20150087811A (en) | Touch detecting apparatus including fingerprint sensor | |
JP4734088B2 (en) | User authentication apparatus and control method thereof | |
US11727105B2 (en) | Method and device for multi-factor authentication on a capacitive area sensor | |
US20190064949A1 (en) | Device for entry on a touch-sensitive surface and corresponding method | |
WO2014070597A1 (en) | A wire-array pressure and movement sensor | |
US20200387265A1 (en) | Code generation device | |
KR20130101605A (en) | Security media and system for certification including that security media | |
US10037453B2 (en) | Capacitive fingerprint sensing module | |
US10990973B2 (en) | Device for entry on a touch-sensitive surface and corresponding method | |
KR101993137B1 (en) | Document having an electronic display device | |
CN109328349B (en) | Fingerprint identification method and device | |
CN107239719B (en) | Characteristic data generating device, card reader, data processing system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WITN | Withdrawal due to no request for examination |