KR20130101605A - Security media and system for certification including that security media - Google Patents

Security media and system for certification including that security media Download PDF

Info

Publication number
KR20130101605A
KR20130101605A KR1020120011442A KR20120011442A KR20130101605A KR 20130101605 A KR20130101605 A KR 20130101605A KR 1020120011442 A KR1020120011442 A KR 1020120011442A KR 20120011442 A KR20120011442 A KR 20120011442A KR 20130101605 A KR20130101605 A KR 20130101605A
Authority
KR
South Korea
Prior art keywords
touch
authentication
security code
security
conductor patch
Prior art date
Application number
KR1020120011442A
Other languages
Korean (ko)
Inventor
구홍식
Original Assignee
쓰리웨이테크놀러지(주)
구홍식
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 쓰리웨이테크놀러지(주), 구홍식 filed Critical 쓰리웨이테크놀러지(주)
Priority to KR1020120011442A priority Critical patent/KR20130101605A/en
Priority to PCT/KR2012/007200 priority patent/WO2013036056A2/en
Priority to US14/343,346 priority patent/US20140304806A1/en
Publication of KR20130101605A publication Critical patent/KR20130101605A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/041Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
    • G06F3/0412Digitisers structurally integrated in a display
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2203/00Indexing scheme relating to G06F3/00 - G06F3/048
    • G06F2203/048Indexing scheme relating to G06F3/048
    • G06F2203/04808Several contacts: gestures triggering a specific function, e.g. scrolling, zooming, right-click, when the user establishes several contacts with the surface simultaneously; e.g. using several fingers or a combination of fingers and pen

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

Authentication system according to an aspect of the present invention that can increase the convenience of the user without having to directly enter the security code on the touch screen is a security medium including a conductor patch formed of a material having a predetermined capacitance or resistance; And an authentication device that recognizes the conductor patch when the security medium contacts the touch screen, and generates an authentication code corresponding to the touch area where the conductor patch is recognized on the touch screen to perform authentication. do.

Description

SECURITY MEDIA AND SYSTEM FOR CERTIFICATION INCLUDING THAT SECURITY MEDIA}

The present invention relates to a security medium and an authentication system including the same, and more particularly, to a security medium for performing authentication by receiving a touch through a touch screen and an authentication system including the same.

The touch screen is one of input devices that reads data necessary for communication with a device or a device in addition to voice, and is attracting attention due to its simplicity and ease of use. The touch screen is divided into a resistive type (or a pressure sensitive type) and a capacitive type (or a capacitive type) according to an operating principle. In particular, a surface acoustic wave (SAW) method for detecting a touch using ultrasonic technology has also been recently developed.

The resistive film is a method of sensing pressure by sensing pressure, and is implemented in a plurality of layers. On the outside is a soft, scratch-resistant layer, followed by two layers that protect the liquid crystal and two layers of electricity. When the outer flexible membrane is pressed, the resistive touch screen detects the input point by detecting a change in current and resistance generated when the two layers of electricity touch each other.

The capacitive method is a method of sensing motion by using static electricity of the human body, and is implemented by coating a highly conductive compound on the liquid crystal glass unlike the resistive film method. A capacitive touch screen senses a point of contact as electrons flowing on the liquid crystal move to the finger when the finger touches.

The capacitance type can reduce the thickness of the touch panel by 1mm as compared with the resistance film type, improve the durability of the touch pad, reduce the possibility of malfunction due to external pressure, and enlarge or reduce the image with two fingers As multi-touch capability is available, recently, touch screens tend to favor capacitive touch screens.

In addition, the surface acoustic wave method is a method in which ultrasonic waves are flowed on the surface glass to recognize the coordinate where the touch is made, which is advantageous in that sensitivity is good when any point is pressed because there is no dead zone.

On the other hand, when a user logs in to a specific site or performs an electronic transaction in a computer, a smart phone, a personal information terminal, or a financial automation machine equipped with a touch screen, a password is input by touching a number, It is common to get certified.

However, the authentication method in which the user directly touches the touch screen is inconvenient to memorize the password in advance. Accordingly, the existing authentication method has a problem that it is difficult to use a complicated and long password, and generally vulnerable to security because the same password is used for a plurality of authentication procedures.

In addition, the existing authentication method has a problem that the afterimage of the fingerprint due to the contact of the finger remains on the touch screen, there is a risk that the password is exposed to others.

The present invention is to solve the above problems, to provide a security medium that can perform authentication by using an authentication pattern without the need to directly enter the security code on the touch screen and its technical problem to include the same do.

Another object of the present invention is to provide a security medium capable of easily and accurately inputting an authentication pattern on a touch screen of an authentication device and an authentication system including the same.

An authentication system according to an aspect of the present invention for achieving the above object is a security medium comprising a conductor patch formed of a material having a predetermined capacitance or resistance; And an authentication device that recognizes the conductor patch when the security medium contacts the touch screen, and generates an authentication code corresponding to the touch area where the conductor patch is recognized on the touch screen to perform authentication. do.

An authentication system according to another aspect of the present invention for achieving the above object is a recognition unit for recognizing the touch area the conductor is in contact on the touch screen, when the conductor is in contact with the touch screen; A security code generator for generating a security code corresponding to the touch area; And characterized in that it comprises an authentication device including an authentication unit for performing authentication using the generated security code.

According to the present invention, the authentication is performed only by contacting the security medium to the touch screen of the authentication device, so that the user does not have to remember the security code and can easily process the authentication process, thereby increasing the convenience of the user. There is.

In addition, according to the present invention, since the security code does not need to be directly input to the touch screen of the authentication device by hand, there is another effect that the touch screen can be fundamentally solved the problem that the touch screen is contaminated by fingerprints or vulnerable to security with the remaining fingerprints. .

In addition, according to the present invention, since the authentication process is performed using a plurality of authentication patterns, there is another risk that the password is not exposed to the outside and the security can be enhanced.

1 is a view schematically showing an authentication system according to an embodiment of the present invention.
2 is a view schematically showing a security medium according to a first embodiment of the present invention.
3 is a view schematically showing a security medium according to a second embodiment of the present invention.
4 is a block diagram schematically illustrating an authentication apparatus according to an embodiment of the present invention.
5 is a view schematically showing a reference pattern according to an embodiment of the present invention.
6 is a view schematically showing an authentication system according to another embodiment of the present invention.

Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings. In order to clearly explain the present invention, parts not related to the description in the drawings are omitted, and the same reference numerals are used for the same parts throughout the specification.

Meanwhile, the meaning of the terms described in the present invention should be understood as follows.

The terms "first "," second ", and the like are intended to distinguish one element from another, and the scope of the right should not be limited by these terms. For example, the first component may be referred to as a second component, and similarly, the second component may also be referred to as a first component.

It should be understood that the singular " include "or" have "are to be construed as including a stated feature, number, step, operation, component, It is to be understood that the combination is intended to specify that it does not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, or combinations thereof.

1 is a view schematically showing an authentication system according to an embodiment of the present invention.

Referring to FIG. 1, the authentication system 100 includes a security medium 110 and an authentication device 120.

First, the security medium 110 inputs an authentication pattern composed of a conductor patch to the authentication device 120. The conductor patch may have a capacitance above a threshold value or may be supplied with capacitance from the outside, and when contacted with the touch screen of the authentication device 120, may be electrically connected to the touch screen and recognized by the authentication device 120. have.

Hereinafter, the security medium 110 according to the first and second embodiments of the present invention will be described in more detail with reference to FIGS. 2 and 3.

2 is a view schematically showing a security medium according to a first embodiment of the present invention.

The security medium 110 according to the first embodiment of the present invention shown in FIG. 2 includes a plate 210 and a conductor patch 220.

First, the plate 210 is formed of a non-conductive material to form the body of the security medium 100. For example, the non-conductor material may include plastic, wood, rubber, paper, and the like.

In one embodiment, plate 210 may be implemented as a card. At this time, the plate 210 may be thinner so that the user can be stored in the wallet, and may be implemented in various ways such as square, triangle, circle, oval, and the like.

In another embodiment, the plate 210 may be implemented with a sheet of a flexible material. At this time, the plate 210 may be formed on the adhesive surface to be attached to one side of the painting, name plate, character goods, cards.

Next, the conductor patch 220 is formed of a conductor material on the plate 210. That is, the conductor patch 220 may charge or discharge electric charges, and may be implemented as a pure conductor, semiconductor, or device having a semiconductor characteristic or a combination of devices having a specific capacitance or resistance.

The conductor patch 220 may be formed in at least one of polygonal, circular, and linear shapes. For example, the security medium 110 may arrange a conductor patch 221 (hereinafter, referred to as a “circular patch”) formed in a circular shape on the plate 210 as shown in FIG. 2A. As another example, the security medium 110 may place a conductor patch 222 (hereinafter referred to as a “linear patch”) formed linearly on the plate 210 as shown in FIG. 2 (b). As another example, the security medium 110 may be disposed by mixing the circular patch 221 and the linear patch 222, as shown in Figure 2 (c). In this case, the linear patch 222 may connect a plurality of circular patches 221.

In addition, the conductor patch 220 does not need to limit the thickness, and may be printed thinly on the plate 210.

On the other hand, the conductor patch 220 constitutes an authentication pattern. The authentication pattern is used to obtain a security code for user authentication. Here, the security code may correspond to various types of data such as a social security number, a driver's license number, a health insurance number, a card number, an ID, a password, and a message.

In one embodiment, the authentication pattern may be different for each user. For example, a financial institution may assign a unique authentication pattern to each user for financial transactions. Accordingly, each user may have a different authentication pattern.

In another embodiment, the authentication pattern may be different for each service. For example, a web service provider may assign a unique authentication pattern to a person allowing web service access. In this case, the same web service user may be assigned the same authentication pattern. As another example, the web service provider may assign an authentication pattern according to a user's access authority. In this case, a user having the same access authority may be assigned the same authentication pattern.

In one embodiment, the conductor patch 220 may be detachable. For example, when the user receives the security medium 110 to which the first front conductor patch 220 is pre-attached, the user may remove the at least one conductor patch 220 to form a unique authentication pattern. On the contrary, when the user receives the security medium 110 without the conductor patch 120 attached to the first surface, the user may attach the at least one conductor patch 220 to form a unique authentication pattern.

The security medium 110 in the embodiment shown in FIG. 2 includes one authentication pattern, but in another embodiment, may include a plurality of authentication patterns.

Hereinafter, the security medium 110 in which a plurality of authentication patterns are formed will be described in detail with reference to FIG. 3.

The security medium 110 shown in FIG. 3 includes two authentication patterns. However, this is for convenience of explanation only and does not exclude that three or more authentication patterns are formed. In addition, in FIG. 3, for convenience of description, the circular patch 221 is described as a reference, and the conductor patch 220 and the circular patch 221 are used in combination.

The conductor patch 221 included in the security medium 110 shown in FIG. 3 includes a first conductor patch 221a and a second conductor patch 221b. In one embodiment, the security medium 110 may further include a capacitance 230.

First, the first and second conductor patches 221a and 221b are formed of a conductor material on the plate 210. In one embodiment, the first and second conductor patches 221a and 221b may be formed on different surfaces. For example, the first conductor patch 221a may be formed in the first area of the first face, and the second conductor patch 221b may be formed in the second area of the second face opposite to the first face. have. At this time, the first and second regions do not overlap.

In another embodiment, the first and second conductor patches 221a and 221b may be formed on the same side. For example, the first conductor patch 221a may be formed of a conductor in a first area of the first surface, and the second conductor patch 221b may be formed in a second area of the first surface. At this time, the first and second regions do not overlap.

On the other hand, the first conductor patch 221a is used to form a first authentication pattern to obtain a first security code for user authentication. The second conductor patch 221b is used to form a second authentication pattern to obtain a second security code for user authentication.

The first and second authentication patterns may be used in the authentication process of the same service. For example, the first authentication pattern and the second authentication pattern may be used to obtain a first security code and a second security code for a financial transaction. The user may use the financial transaction only when the second authentication is successful by inputting the second authentication pattern again after the first authentication is successful by inputting the first authentication pattern.

In addition, the first and second authentication patterns may be used in the authentication procedure of the associated service. For example, the first authentication pattern may be used to obtain a first security code for unlocking the smartphone, and the second authentication pattern may be used to obtain a second security code for using a call service or data service of the smartphone. Can be used to obtain.

In another example, the first authentication pattern may be used to obtain a first security code for accessing a specific website, and the second authentication pattern may be used to obtain a second web service provided by the specific website. Can be used to obtain a security code. Here, the specific web site represents a web site providing a web service by allowing access only to a specific group, and the specific web service represents a web service provided only to a user to whom the access right is granted.

Next, the capacitance 230 is formed of a conductive material and is electrically connected to at least one of the first conductor patch 221a and the second conductor patch 221b. The capacitance 230 may be implemented by a copper plate, a semiconductor, a combination of a conductor and a non-conductor, a device having a specific resistance value, or a combination of devices having conductor characteristics.

On the other hand, the capacitance 230 causes the capacitance above the threshold value to be generated in at least one of the first conductor patch 221a and the second conductor patch 221b. Here, the threshold represents the minimum capacitance that the touch screen can sense the touch area.

In one embodiment, the capacitive body 230 may itself have a capacitance above a threshold. In this case, the capacitance 230 may supply a charge to the first conductor patch 221a or the second conductor patch 221b having a capacitance less than the threshold value to have a capacitance above the threshold value.

In another embodiment, the capacitance 230 may serve as a ground. That is, the capacitive body 230 may provide a charge transfer path between the outside and the touch screen when the security medium 110 contacts the touch screen.

The capacitive body 230 may be formed at one side of the plate 210, as shown in FIG. 3A. In one embodiment, the capacitor 230 may be electrically connected to at least one of the first conductor patch 221a and the second conductor patch 221b through a connection pattern printed on the plate 210.

In another embodiment, the capacitive body 230 may be electrically connected to at least one of the first conductor patch 221a and the second conductor patch 221b through a conductive material mounted on the edge of the plate 210. .

On the other hand, the capacitive body 230 may be formed on the side of the touch pen 240 in combination with the touch pen 240, as shown in FIG.

The touch pen 240 may include a conductive material electrically connected to the capacitive body 230, and may expose a portion of the touch pen 240 so that the conductive material may contact the security medium 110. The touch pen 240 may be electrically connected to the security medium 110 by inserting the exposed conductor material into the touch hole formed in the plate 210.

Although not shown in FIGS. 3A and 3B, in one embodiment, the capacitance 230 is a first capacitance, and a second conductor, electrically connected to the first conductor patch 221a. It may include a second capacitance electrically connected to the patch 221b.

In one embodiment, the first conductor patch 221a can cause capacitance above the threshold to be generated in the second conductor patch 221b as the capacitance 230, and the second conductor patch 221b is the capacitance. As the sieve 230, capacitance greater than or equal to a threshold value may be generated in the first conductor patch 221a.

The security medium 110 according to the first and second embodiments described above may be combined with a financial card to improve commercial value. The term 'financial card' refers to a card that performs financial transactions or verification functions using IC chips, and is a credit card, check card, debit card, cash card, electronic bank account, transportation card, electronic employee card, electronic student ID card, It is embodied in an electronic resident card or the like.

In one embodiment, an IC chip storing financial information and / or personal identification information is attached to one side of the security medium 110 coupled with the financial card, and according to the type of the financial card, the card number, expiration date, user name, At least one of the issuer, card brand, and user picture is embossed or printed.

Referring back to FIG. 1, the authentication device 120 receives an authentication pattern from the security medium 110, obtains a security code from the authentication pattern, and performs authentication.

The authentication device 120 collectively refers to an electronic device having a touch screen, and specifically, a desktop computer, a notebook computer, a personal digital assistant (PDA), a mobile phone or a smart phone, a financial automation device ( Automatic Teller Machine (ATM), Digital Safe, Digital Door Lock, Kiosk or the like.

Here, the touch screen includes a tempered glass integrated touch screen for integrally forming a touch on the bottom of a cover window such as tempered glass, an attached touch screen for attaching a separate touch screen to the upper part of the display, and a color filter, a liquid crystal, and a thin film transistor. An in-cell touch screen that implements a touch recognition function is included in the configured display cell.

4 is a block diagram schematically illustrating an authentication apparatus according to an embodiment of the present invention, and FIG. 5 is a diagram schematically showing a reference pattern provided by the authentication apparatus of FIG. 4.

As shown in FIG. 4, the authentication device 120 includes a display unit 410, a recognition unit 420, a security code generation unit 430, and an authentication unit 440. In one embodiment, the authentication device 120 may further include at least one of the application driver 450, the warning sound output unit 460 and the sound output unit 470.

First, the display unit 410 displays a reference pattern on the touch screen. The reference pattern serves as a guideline when the user inputs the touch pattern.

As shown in FIG. 5, the reference pattern includes a plurality of first reference lines 510 and a plurality of second reference lines 520 intersecting with the plurality of first reference lines 510. Here, the plurality of first reference lines 510 may represent an X value, and the plurality of second reference lines 520 may represent a Y value. The intersection of the first reference line 510 and the second reference line 520 may be represented by a coordinate value including an X value and a Y value.

In the exemplary embodiment illustrated in FIG. 5, the X value and the Y value include numbers. In another embodiment, the X value and the Y value may include at least one of numbers, letters, and symbols. In another embodiment, the plurality of first reference lines 510 may represent a musical scale, and the plurality of second reference lines 520 may represent an octave. The intersection of the first reference line 510 and the second reference line 520 may represent a sound in an octave.

In addition, the display unit 410 may further display the security code display window 540 on the touch screen. The security code display window 540 is for displaying the security code generated by the security code generation unit 430, and may be displayed as an empty space at the time of initial authentication.

When the reference pattern is displayed on the touch screen, the display unit 410 provides the display unit 420 with display information about the reference pattern. In this case, the display information includes location information of each of the first reference line 510, the second reference line 520, and the intersection area.

Next, the recognition unit 420 receives the authentication pattern from the security medium 110. When the conductor patch 220 of the security medium 110 contacts the touch screen, the recognition unit 420 recognizes the touch area where the conductor patch 220 contacts the touch screen. One or more touch areas recognized by the recognition unit 420 constitute an authentication pattern.

In one embodiment, the recognition unit 420 may recognize a touch group consisting of one or more touch areas at predetermined time intervals. In this case, the touch regions recognized within the first time interval may be recognized as the same touch group, and the touch regions recognized after the first time interval may be recognized as different touch groups.

For example, assuming that the authentication device 120 performs authentication by recognizing six touch areas, the recognition unit 420 recognizes a first touch group composed of six touch areas recognized within a first time interval. can do.

For another example, the recognizer 420 recognizes a first touch group composed of three touch regions recognized within a first time interval, and recognizes a second touch group composed of three touch regions recognized within a second time interval. I can recognize it.

As another example, the recognizer 420 recognizes a first touch group composed of two touch regions recognized within a first time interval, and a second touch group composed of one touch region recognized within a second time interval. And a third touch group composed of three touch regions recognized within a third time interval.

On the other hand, the recognition unit 420 recognizes the touch area in contact with the cross region of the reference pattern. On the contrary, the recognition unit 420 may not recognize the touch area in contact with the remaining areas except the cross area.

When the touch area is recognized, the recognition unit 420 obtains the coordinate value of the touch area by using the coordinate value of the corresponding intersection area, and provides the obtained coordinate area value to the security code generator 420. For example, the coordinate values of the six touch regions 530 illustrated in FIG. 5 correspond to (2,4), (2,7), (3,8), (4,2) corresponding to the coordinate values of the cross region. ), (4,5), and (6,1).

Next, the security code generation unit 430 generates a security code corresponding to the coordinate value of the touch area. In one embodiment, the security code generation unit 430 may generate a security code using the coordinate value of the touch area.

For example, when the coordinate value of the touch area is (2, 4), the security code generator 430 may generate 24 as a security code.

In another embodiment, the security code generator 430 may generate a security code using at least one of numbers, letters, and symbols that match the coordinate values of the touch area. To this end, the authentication device 120 may further include a separate storage unit (not shown) for storing at least one of numbers, letters, and symbols that match the coordinate value.

For example, when the coordinate value of the touch area is (2,4), the security code generator 430 searches for (2,4) in the storage unit (not shown), and if found, (2,4) B4 matching with can be generated as a security code.

On the other hand, the security code generation unit 430 may generate a sub code constituting the security code for each touch group when a plurality of touch groups composed of one or more touch areas. In addition, the security code generation unit 430 may generate a security code including a plurality of sub codes generated in consideration of the time order.

For example, it is assumed that the three touch regions recognized within the first time interval constitute the first touch group, and the coordinate values are (2,4), (3,8), and (6,1). . In addition, it is assumed that the three touch areas recognized within the second time interval constitute the second touch group, and the coordinate values are (2,7), (4,2), and (4,5). In this case, the first time interval precedes the second time interval and does not overlap the second time interval.

First, the security code generator 430 may generate a first sub code using at least one of numbers, letters, and symbols that match the coordinate values of the touch area included in the first touch group. When (2,4), (3,8), and (6,1) are matched with B4, C8, and F1, respectively, the security code generator 430 may generate B4C8F1 as the first subcode. .

Next, the security code generation unit 430 may generate the second sub code using at least one of numbers, letters, and symbols that match the coordinate values of the touch area included in the second touch group. When (2,7), (4,2), and (4,5) are matched with B7, D2, and D5, respectively, the security code generator 430 may generate B7D2D5 as a second subcode. .

Finally, the security code generator 430 may generate a security code using the first and second subcodes. The security code may include first and second subcodes, and may further include a separator capable of distinguishing the first and second subcodes.

When the security code includes the separator "-", the security code generation unit 430 may generate B4C8F1-B7D2D5 as a security code.

Next, the authentication unit 440 performs authentication using the security code provided from the security code generation unit 430. Specifically, the authentication unit 440 performs authentication by comparing the security code provided from the security code generation unit 430 with the security code of the user recorded in the memory (not shown).

In one embodiment, the authentication unit 440 displays the security code provided from the security code generation unit 430 on the security code display window 540 through the display unit 410, so that the user of the security medium 110 can authenticate the authentication device ( The security code recognized by 120 may be checked.

In an embodiment, the authenticator 440 may provide the authentication result to the application driver 450 so that the application driver 450 may drive a specific application requiring an authentication procedure. The application driver 450 displays the driving result of the application through the display unit 410.

Next, the notification unit 460 outputs a warning sound when the conductor patch 220 is in contact with an area excluding an intersection area of the reference pattern. The notification unit 460 prevents the security medium 110 from being recognized at the wrong position, and allows the user of the security medium 110 to change the contact position of the security medium 110.

Next, when the conductor patch 220 contacts the cross region of the reference pattern, the sound output unit 470 outputs a sound corresponding to the cross region. In this case, the first reference line 510 of the reference pattern may represent a musical scale, and the plurality of second reference lines 520 may represent an octave. The intersection of the first reference line 510 and the second reference line 520 may represent a musical scale in octaves.

Meanwhile, in the above-described embodiment, the authentication apparatus 120 has been described as receiving an authentication pattern from the security medium 110. However, if the security medium 110 is not lost or possessed, there is a problem that the authentication device 120 cannot perform the authentication procedure.

Accordingly, in the case of the present invention, as shown in FIG. 6, the authentication device 120 may receive the authentication pattern through the conductor 610 and perform this authentication procedure.

In one embodiment, the conductor may be implemented with a user's finger, and in another embodiment, the conductor may be implemented with a touch pen including a conductor material.

The functions performed by the authentication medium or the authentication apparatus may be implemented in the form of program instructions that can be executed through various computer means and recorded in a computer-readable recording medium. In this case, the computer-readable recording medium may include program instructions, data files, data structures, and the like, alone or in combination. On the other hand, the program instructions recorded on the recording medium may be those specially designed and configured for the present invention or may be available to those skilled in the art of computer software.

Those skilled in the art to which the present invention pertains will understand that the above-described present invention can be implemented in other specific forms without changing the technical spirit or essential features.

It is therefore to be understood that the above-described embodiments are illustrative in all aspects and not restrictive. The scope of the present invention is defined by the appended claims rather than the detailed description and all changes or modifications derived from the meaning and scope of the claims and their equivalents are to be construed as being included within the scope of the present invention do.

100: authentication system 110: security medium
120: authentication device 210: plate
220: conductor patch 230: capacitive
410: display unit 420: recognition unit
430: security code generation unit 440: authentication unit

Claims (16)

A security medium comprising a conductor patch formed of a material having a predetermined capacitance or resistance; And
And an authentication device that recognizes the conductor patch when the security medium contacts the touch screen, and generates a security code corresponding to the touch area where the conductor patch is recognized on the touch screen to perform authentication. Authentication system.
The method of claim 1 wherein the conductor patch
A first conductor patch formed on the first face; And
A second conductor patch formed on a second surface opposite the first surface,
When the security medium is in contact with the touch screen of the authentication device, the first conductor patch is used as a first security code for authentication, the second conductor patch is used as a second security code for authentication Authentication system.
The method of claim 1 wherein the conductor patch
Authentication system, characterized in that formed in the shape of at least one of circular, polygonal, and linear.
The method of claim 1, wherein the security medium is
It is formed of a conductive material, and further comprises a capacitance for generating a capacitance above the threshold in the conductor patch,
And the capacitive body is electrically connected to the conductor patch.
The method of claim 1, wherein the security medium is
Authentication system, characterized in that formed by a plate of non-conductive material.
A recognizing unit that recognizes a touch area where the conductor is in contact with the conductor when the conductor is in contact with the touch screen;
A security code generator for generating a security code corresponding to the touch area; And
And an authentication device including an authentication unit for performing authentication using the generated security code.
The method of claim 1 or 6, wherein the authentication device
Acquiring a coordinate value of each touch area, and generating the security code using the obtained coordinate value.
The method of claim 1 or 6, wherein the authentication device
Acquiring a coordinate value of each touch area, and using the at least one of the numbers, letters and symbols that match the obtained coordinate value to generate the security code.
The method of claim 1 or 6, wherein the authentication device
Recognizing a touch group consisting of one or more touch areas at predetermined time intervals, and generating a sub code constituting the security code for each of the recognized touch groups.
10. The method of claim 9,
The touch regions recognized within the first time interval are recognized as the same touch group, and the touch regions recognized after the first time interval are recognized as different touch groups from the touch regions recognized within the first time interval. Authentication system.
The method of claim 1 or 6, wherein the authentication device
Authentication system, characterized in that for displaying the generated security code on the touch screen.
The method of claim 1 or 6, wherein the authentication device
And a reference pattern including a plurality of first reference lines and at least one of a plurality of second reference lines crossing the plurality of first reference lines on a touch screen.
The method of claim 12, wherein the recognition unit
And a touch area in contact with an intersection area between the first reference lines and the second reference lines.
The method of claim 12,
And a warning sound output unit configured to output a warning sound when the touch area is recognized in an area excluding an intersection area between the first reference lines and the second reference lines.
The method of claim 12,
And the plurality of first reference lines represent a musical scale, and the plurality of second reference lines represent an octave.
16. The method of claim 15,
And a sound output unit configured to output a sound corresponding to a musical scale at an octave of the corresponding crossing area when the touch area is recognized at an intersection area of the first reference line and the second reference line.
KR1020120011442A 2011-09-06 2012-02-03 Security media and system for certification including that security media KR20130101605A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
KR1020120011442A KR20130101605A (en) 2012-02-03 2012-02-03 Security media and system for certification including that security media
PCT/KR2012/007200 WO2013036056A2 (en) 2011-09-06 2012-09-06 Security medium and authentication system using same
US14/343,346 US20140304806A1 (en) 2011-09-06 2012-09-06 Security media and authentication system including the same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020120011442A KR20130101605A (en) 2012-02-03 2012-02-03 Security media and system for certification including that security media

Publications (1)

Publication Number Publication Date
KR20130101605A true KR20130101605A (en) 2013-09-16

Family

ID=49451649

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020120011442A KR20130101605A (en) 2011-09-06 2012-02-03 Security media and system for certification including that security media

Country Status (1)

Country Link
KR (1) KR20130101605A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101501491B1 (en) * 2013-11-01 2015-03-11 한국생산기술연구원 Capacitive touch tag reconizable by capacitive touch panel, information recognition method thereof and information service method using the same

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101501491B1 (en) * 2013-11-01 2015-03-11 한국생산기술연구원 Capacitive touch tag reconizable by capacitive touch panel, information recognition method thereof and information service method using the same
US10001890B2 (en) 2013-11-01 2018-06-19 Korea Institute Of Industrial Technology Touch tag recognizable through capacitive touch panel, information recognition method thereof and information providing method using same

Similar Documents

Publication Publication Date Title
US9898695B2 (en) Security token and authentication system
US20140304806A1 (en) Security media and authentication system including the same
US20160140379A1 (en) Improvements in or relating to user authentication
KR101534903B1 (en) Systems and methods for pressure-based authentication of a signature on a touch screen
USRE42038E1 (en) Man-machine interface for controlling access to electronic devices
US20240061540A1 (en) Fingerprint imaging device incorporating electrodes and drive-sense circuitry
CN109416739B (en) Multi-sensor-based method and system for acquiring fingerprint under screen and electronic equipment
WO2020093251A1 (en) Double sensing area-based fingerprint identification method, fingerprint identification system, and electronic device
KR102507281B1 (en) Electornic device comprising fingerprint sensor and method for operating thereof
US20240112494A1 (en) Elongated Fingerprint Sensor
CN104067542A (en) Body-coupled communication based on user device with touch display
CN107831945A (en) Electronic equipment, display system and its integrated control device, safe verification method
US20100108771A1 (en) Financial transaction card
KR20150087811A (en) Touch detecting apparatus including fingerprint sensor
JP4734088B2 (en) User authentication apparatus and control method thereof
US11727105B2 (en) Method and device for multi-factor authentication on a capacitive area sensor
US20190064949A1 (en) Device for entry on a touch-sensitive surface and corresponding method
WO2014070597A1 (en) A wire-array pressure and movement sensor
US20200387265A1 (en) Code generation device
KR20130101605A (en) Security media and system for certification including that security media
US10037453B2 (en) Capacitive fingerprint sensing module
US10990973B2 (en) Device for entry on a touch-sensitive surface and corresponding method
KR101993137B1 (en) Document having an electronic display device
CN109328349B (en) Fingerprint identification method and device
CN107239719B (en) Characteristic data generating device, card reader, data processing system and method

Legal Events

Date Code Title Description
WITN Withdrawal due to no request for examination