KR20160100078A - Client Terminal for Supporting Banking Service, Authentication Server, Method and Application for User Terminal - Google Patents
Client Terminal for Supporting Banking Service, Authentication Server, Method and Application for User Terminal Download PDFInfo
- Publication number
- KR20160100078A KR20160100078A KR1020150022589A KR20150022589A KR20160100078A KR 20160100078 A KR20160100078 A KR 20160100078A KR 1020150022589 A KR1020150022589 A KR 1020150022589A KR 20150022589 A KR20150022589 A KR 20150022589A KR 20160100078 A KR20160100078 A KR 20160100078A
- Authority
- KR
- South Korea
- Prior art keywords
- authentication
- information
- key
- client terminal
- authentication server
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
Abstract
Description
The present invention relates to a user authentication technology, and more particularly, to a client terminal supporting a financial transaction service, a server for authenticating the client terminal, an authentication method, and an application stored in a medium for executing the authentication method.
In order to use a personalized service through a communication network, an ID and a password for identifying individual users are required.
In particular, when using financial transaction services through a network, a stronger authentication method is required to confirm the identity of users, prevent the forgery and alteration of documents, and prevent non-repudiation of transaction facts. In addition, in order to enhance security against day-to-day electronic financial fraud, a user's password is set to a longer digit and it is required to include special characters as well as numbers and letters.
In recent years, wearable terminals that can be worn on human bodies or clothes have been commercialized. Generally, a wearable terminal can be classified into an interlocking type and a stand-alone type. The single wearable terminal can be used independently without synchronization with other devices, and the interlocking wearable terminal can be used in synchronization with a master device such as a smart phone. Wearable terminals are manufactured to be compact and easy to carry and wear, and the penetration rate is expected to increase gradually.
As a financial transaction service through a user terminal such as a smart phone is actively used and the penetration rate of a wearable terminal increases, a demand for using a financial transaction service not only in a smart phone but also in a wearable terminal has been raised.
However, due to the characteristics of the wearable terminal, the size of the display unit can not be reduced. On the other hand, the password used in the financial transaction service may include numbers, characters, and special characters, so that there are many restrictions to input the password through the wearable terminal.
The embodiment of the present invention is directed to a client terminal that encrypts a complex password with a simple identification number and supports a financial transaction service that can be used by decrypting an encrypted password in user authentication and a server for authenticating the same, The application stored in the medium can be provided.
The embodiments of the present invention provide a client terminal supporting a financial transaction service in which information necessary for encrypting and decrypting a password is distributed to clients and servers and security can be improved through mutual authentication and a server for authenticating the client terminal, An authentication method and an application stored in a medium to execute the authentication method.
A client terminal according to an exemplary embodiment of the present invention is a client terminal connected to an authentication server through a communication network, comprising: a random data generator for generating random data and transmitting a part of the random data to the authentication server; A user authentication information generating unit for generating user authentication information based on the identification number, the rest of the random data, and authentication parameters provided from the authentication server, and transmitting a part of the user authentication information to the authentication server; A device authentication information generation unit that generates device authentication information based on device information of the client terminal and transmits a part of the device authentication information to the authentication server; And a password processor for encrypting and storing the password with the primary encryption key and encrypting the primary encryption key with the secondary encryption key generated based on the random data and the device information and transmitting the encrypted data to the authentication server .
According to an embodiment of the present invention, there is provided an authentication server connected to a client terminal through a communication network, the authentication server comprising: an authentication parameter manager for managing authentication parameters assigned to the client terminals; A distributed information management unit for receiving and storing a part of random data, a part of user authentication information, a part of device authentication information, and an encrypted primary encryption key from the client terminal; A second public verification key generated based on the authentication parameter and a part of the user authentication information to the client terminal, and a second mutual authentication key generated and transmitted by the client terminal based on the second public verification key A user authentication unit for performing user authentication according to the user authentication; A part of the random data and a part of the device authentication information are transmitted to the client, and a part of the device authentication information derived from the device verification value as the device verification value is received from the client terminal, A device authentication unit comparing a part of the authentication information to perform device authentication; And a decryption information provider for transmitting the encrypted primary encryption key to the client terminal according to the authentication result of the user authentication unit and the device authentication unit.
An authentication method according to an exemplary embodiment of the present invention is an authentication method of a client terminal connected to an authentication server through a communication network. The client terminal accesses the authentication server and requests password encryption, Receiving an authentication parameter from the authentication module; A random data distribution step in which the client terminal generates random data and transmits a part of the random data to the authentication server; Wherein the client terminal generates user authentication information based on the identification number, the authentication parameter, and the random data as the identification number is input to the client terminal, and transmits the user authentication information to the authentication server, Authentication information distribution process; A device authentication information distribution step in which the client terminal generates device authentication information based on device information of the client terminal and transmits a part of the device authentication information to the authentication server; And the client terminal encrypts and stores the password using the primary encryption key and encrypts the primary encryption key with the secondary encryption key generated based on the random data and the device information to transmit the encryption information And a dispersion process.
An application according to an embodiment of the present invention is an application stored in a client terminal connected to an authentication server through a communication network, the application having a function of receiving an authentication parameter from the authentication server by accessing the authentication server and requesting password encryption; A random data distribution function for generating random data and transmitting a part of the random data to the authentication server; A user authentication information distribution function for generating user authentication information based on the identification number, the authentication parameter and the random data, and transmitting a part of the user authentication information to the authentication server, ; A device authentication information distribution function for generating device authentication information based on device information of the client terminal and transmitting a part of the device authentication information to the authentication server; And an encryption information distribution function for encrypting and storing the password with the primary encryption key and encrypting the primary encryption key with the secondary encryption key generated based on the random data and the device information and transmitting the encrypted primary encryption key to the authentication server May be stored in the medium for execution.
According to this technology, a password can be encrypted only by inputting a simple identification number, and information used for encryption can be distributed and stored by a client and a server. In addition, authentication can be performed using distributed information, and a password can be decrypted only when authentication is successful, thereby improving security.
Furthermore, since authentication is performed not only for the user but also for the device to use the service, access to the unauthorized device as well as the unauthorized user can be blocked.
BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a diagram for explaining a connection relationship between devices to which the present invention can be applied;
2 is a block diagram of a client terminal according to an embodiment.
3 is a configuration diagram of a password management unit according to an embodiment,
4 is a configuration diagram of an authentication server according to an embodiment,
5 is a configuration diagram of an authentication unit according to an embodiment,
6 is a flowchart illustrating an authentication method according to an embodiment,
7 is a detailed flowchart of a password encryption process according to an embodiment,
8 is a flowchart for explaining an authentication method according to another embodiment;
9 is a detailed flowchart of a password decryption process according to another embodiment.
Hereinafter, embodiments of the present technology will be described in more detail with reference to the accompanying drawings.
BRIEF DESCRIPTION OF DRAWINGS FIG. 1 is a diagram for explaining a connection relationship between devices to which the present invention can be applied. FIG.
The client terminal 10 may be connected to the
The
In one embodiment, the client terminal 10 may generate random data to encrypt the password. In addition, user authentication information is generated based on the authentication parameters provided from the
Also, the client terminal 10 can generate a mutual authentication key based on the authentication parameters provided from the
In one embodiment, the client terminal 10 performing the above-described password encryption and decryption may be a
The password may be directly input to the
Meanwhile, the
As described above, the user terminal 10 and the
However, it is possible to prevent a dictionary attack on a password by distributing information necessary for password encryption as in this technique. In addition, since the identification number is not transmitted as it is during the user authentication for password decryption and the information registration process for the password encryption, the leakage of the identification number can be prevented.
Mutual authentication of the user is performed using the information distributed and stored in the client terminal 10 and the
2 is a configuration diagram of a client terminal according to an embodiment.
2 includes a
The
The
The
The
The
The
3 is an example of a password management unit.
3 may include a random
The
The user authentication
On the other hand, the user authentication
The device authentication
On the other hand, in order to decrypt the password, the device authentication
The
In order to encrypt the password, the
On the other hand, in order to decrypt the password, the
The functions of the
4 is a configuration diagram of an authentication server according to an embodiment.
4, the authentication server 20-1 may include a
The
The
The
The
The
5 shows an example of the authentication unit 250-1 and includes an authentication
The authentication
The distributed
The
The
The
The decryption
FIG. 6 is a flowchart for explaining an authentication method according to an embodiment, and shows an example of a password encryption process. FIG. 7 is a detailed flowchart of a password encryption process according to an exemplary embodiment. Referring to FIGS. 6 and 7, a password encryption process will be described below.
Authentication parameters N and G are shared between the
Referring to FIG. 7, the
Upon reception of the authentication parameters N and G, the client terminal 10 transmits random data, preferably first random data R1 and second random data R2 for distributed storage with the
7, after the
Next, as the identification number (PIN) is input to the client terminal 10, the client terminal 10 generates user authentication information and distributes it to the authentication server 20 (S300).
An embodiment in which user authentication information is generated and distributedly stored will be described with reference to FIG. The user authentication
Then, a device authentication information generation and distributed storage process (S400) may be performed.
Specifically, as shown in FIG. 7, the device authentication
A part (R2) of the random data R1 and R2 generated by the client terminal 10, a part Y of the user authentication information X and Y and a part of the device authentication information D1, D2, DI and DA DI, and DA) are distributed and stored in the
7, the
After the password is encrypted, the encryption key encryption and distributed storage process (S600) may be performed.
7, the
Accordingly, the encryption-related information generated by the client terminal 10, that is, the random data, the user authentication information, and the apparatus authentication information can be distributedly stored in the client terminal 10 and the
As described above, when information necessary for authentication and password encryption is distributed and stored, a dictionary attack against a password can be prevented. In addition, since the identification number is not transmitted as it is in the information registration process for password encryption, the leakage of the identification number can be prevented.
FIG. 8 is a flowchart for explaining an authentication method according to another embodiment, and shows an example of a password decryption process, and FIG. 9 is a detailed flowchart of a password decryption process according to another embodiment.
First, an authentication parameter sharing process (S700) may be performed between the client terminal 10 and the
9, the authentication
Next, the client terminal 10 and the
8, the user authentication
On the other hand, the
The second public verification key B and the second random number u are transmitted from the
After the first mutual authentication key Z C is generated, the user
As the mutual authentication key authentication information M is received from the client terminal 10, the
That is, mutual authentication is performed between the client terminal 10 and the
If the user authentication is successful, the apparatus and the server authentication process using the random data and the device authentication information (S900) may be performed.
9, the
The device authentication
The
As described above, it can be seen that the device authentication process is also performed by mutual authentication between the client terminal 10 and the
When user authentication and device authentication are completed, a password decryption process (S1000) can be performed.
9, the decryption
The
When the secondary encryption key wk is generated, it decrypts the encrypted primary encryption key EK received from the
In this way, only when the authentication of the user and the device is successful between the client terminal 10 and the
In addition, when the user authentication fails in the user authentication process, for example, if the incorrect identification number is input a predetermined number of times, the distributed information stored in the
In this way, the dictionary attack can be prevented by distributing and storing information necessary for user and device authentication between the client terminal 10 and the
It will be understood by those skilled in the art that the present invention can be embodied in other specific forms without departing from the spirit or essential characteristics thereof. It is therefore to be understood that the embodiments described above are to be considered in all respects only as illustrative and not restrictive. The scope of the present invention is defined by the appended claims rather than the detailed description and all changes or modifications derived from the meaning and scope of the claims and their equivalents are to be construed as being included within the scope of the present invention do.
10: Client terminal
20: Authentication server
30: Network
101: Master terminal
102: Wearable terminal
Claims (36)
A random data generation unit generating random data and transmitting a part of the random data to the authentication server;
A user authentication information generating unit for generating user authentication information based on the identification number, the rest of the random data, and authentication parameters provided from the authentication server, and transmitting a part of the user authentication information to the authentication server;
A device authentication information generation unit that generates device authentication information based on device information of the client terminal and transmits a part of the device authentication information to the authentication server; And
A password processing unit for encrypting and storing the password with the primary encryption key, encrypting the primary encryption key with the secondary encryption key generated based on the random data and the device information, and transmitting the encrypted primary encryption key to the authentication server;
Lt; / RTI >
Wherein the random data generator generates the first random data and the second random data and transmits the second random data to the authentication server.
Wherein the user authentication information generation unit generates the authentication private key generated based on the identification number and the remainder of the random data and the authentication verification key generated based on the authentication parameter and the authentication private key, And transmits the authentication verification key to the authentication server.
Wherein the user authentication information generating unit generates an authentication private key based on the identification number and the remainder of the random data and transmits the first public verification key generated based on the authentication parameter to the authentication server,
Generating a first mutual authentication key based on the second public verification key, the authentication parameter, and the authentication private key as the second public verification key is received from the authentication server, And transmits the mutual authentication key authentication information including the first public verification key and the second public verification key to the authentication server.
And the second public verification key is information generated based on a part of the user authentication information.
The device authentication information generation unit extracts a device information list and device information based on the device information list, generates a device authentication value based on the device information, and transmits the device information list and the device authentication value to the authentication server The transmitting client terminal.
The device authentication information generation unit generates device authentication information based on device information extracted based on the device information list as part of the random data and device verification information including a device information list are transmitted from the authentication server To the authentication server.
Wherein the primary encryption key is an arbitrary random number, and the secondary encryption key is generated based on the identification number, the random data, and the device information.
Wherein the password processing unit generates the secondary encryption key and decrypts the primary encryption key as the encrypted primary encryption key is transmitted from the authentication server, and the password processing unit decrypts the primary encryption key using the decrypted primary encryption key, To the client terminal.
Wherein the client terminal is a wearable terminal for short-range wireless communication with a master terminal connected to the authentication server through the communication network.
Wherein the identification number is composed of a number of specified digits,
Wherein the password is composed of a combination of numbers, letters, and special characters of a specified number of digits.
An authentication parameter management unit for managing authentication parameters assigned to the client terminals;
A distributed information management unit for receiving and storing a part of random data, a part of user authentication information, a part of device authentication information, and an encrypted primary encryption key from the client terminal;
A second public verification key generated based on the authentication parameter and a part of the user authentication information to the client terminal, and a second mutual authentication key generated and transmitted by the client terminal based on the second public verification key A user authentication unit for performing user authentication according to the user authentication;
A part of the random data and a part of the device authentication information are transmitted to the client, and a part of the device authentication information derived from the device verification value as the device verification value is received from the client terminal, A device authentication unit comparing a part of the authentication information to perform device authentication; And
A decryption information providing unit for transmitting the encrypted primary encryption key to the client terminal according to an authentication result of the user authentication unit and the device authentication unit;
.
Wherein the user authentication unit receives a first public verification key from the client terminal and generates a second mutual authentication key based on the first public verification key and a part of the user authentication information, And an authentication server for comparing the second mutual authentication key to perform user authentication.
Wherein the distributed information management unit stores a device information list and a device authentication value as a part of the device authentication information,
The device authentication unit extracts the device information list and transmits the device information list to the client terminal. The device authentication unit compares the device authentication value derived from the device verification value received from the client terminal with the device authentication value stored in the distributed information management unit, The authentication server that performs the authentication.
Wherein the distributed information management unit is configured to delete a part of the user authentication information when the user authentication in the user authentication unit fails more than a specified number of times.
Wherein the distributed information management unit is configured to delete a part of the random data and a part of the device authentication information when the device authentication in the device authentication unit fails more than a specified number of times.
The client terminal accessing the authentication server and requesting password encryption, the client terminal receiving an authentication parameter from the authentication server;
A random data distribution step in which the client terminal generates random data and transmits a part of the random data to the authentication server;
Wherein the client terminal generates user authentication information based on the identification number, the authentication parameter, and the random data as the identification number is input to the client terminal, and transmits the user authentication information to the authentication server, Authentication information distribution process;
A device authentication information distribution step in which the client terminal generates device authentication information based on device information of the client terminal and transmits a part of the device authentication information to the authentication server; And
The client terminal encrypts and stores the password using the primary encryption key and encrypts the primary encryption key with the secondary encryption key generated based on the random data and the device information to transmit the encrypted information distributed to the authentication server process;
.
Wherein the random data distribution process is a process in which the client terminal generates first random data and second random data and transmits the second random data to the authentication server.
Wherein the user authentication information distribution step includes the steps of the client terminal generating a private key for authentication based on the identification number and the remainder of the random data;
The client terminal generating a verification key for authentication based on the authentication parameter and the authentication private key; And
Transmitting, by the client terminal, the verification key for authentication to the authentication server;
.
The device authentication information distribution process includes: the client terminal extracting a device information list and device information based on the device information list;
The client terminal generating a device authentication value based on the device information; And
The client terminal sending the device information list and the device authentication value to the authentication server;
.
The encryption information distribution process may include: generating the primary encryption key by the client terminal;
The client terminal encrypting the password with the primary encryption key and storing the encrypted password;
The client terminal generating a secondary encryption key based on the identification number, the random data, and the device information;
Encrypting the primary encryption key with the secondary encryption key; And
The client terminal transmitting the encrypted primary encryption key to the authentication server;
.
A step in which the client terminal receives an authentication parameter from the authentication server after the client terminal accesses the authentication server and requests password decryption after the encryption information distribution process;
Generating a mutual authentication key authentication information based on the identification number, the rest of the random data, and authentication data received from the authentication server, and transmitting the mutual authentication key authentication information to the authentication server;
A part of the random data and a part of the device authentication information are transmitted from the authentication server, the client terminal generates a device verification value based on the device authentication data derived according to a part of the device authentication information, A device authentication process for transmitting the device authentication request; And
A decryption process in which the client terminal decrypts the password when the encrypted primary encryption key is transmitted from the authentication server;
.
Wherein the user authentication step comprises: the client terminal generating a private key for authentication based on the identification number and the remainder of the random data;
Generating a first public verification key based on the authentication parameter and transmitting the first public verification key to the authentication server;
Generating a first mutual authentication key based on the second public verification key, the authentication private key and the authentication parameter as the second public verification key is transmitted from the authentication server as the authentication data; ; And
Generating the mutual authentication key authentication information based on the first mutual authentication key, the first public verification key, and the second public verification key, and transmitting the mutual authentication key authentication information to the authentication server;
.
Wherein the device authentication process is a process in which the client terminal transmits device information as the device authentication data based on the device information list as a part of the random data and a device information list as part of the device authentication information are transmitted from the authentication server Extracting; And
Generating the device verification value from the device information and transmitting the device verification value to the authentication server;
.
Wherein the decryption includes: generating the secondary encryption key by the client terminal when the encrypted primary encryption key is transmitted from the authentication server;
Decrypting the encrypted primary encryption key received from the authentication server by the client terminal with the secondary encryption key; And
The client terminal decrypting the password with the decrypted primary encryption key;
.
Wherein the authentication server deletes a part of the user authentication information when the user authentication process fails for a predetermined number of times or more.
Wherein the authentication server deletes a part of the random data and a part of the device authentication information when the device authentication process fails more than the designated number of times.
A function of receiving an authentication parameter from the authentication server by accessing the authentication server and requesting password encryption;
A random data distribution function for generating random data and transmitting a part of the random data to the authentication server;
A user authentication information distribution function for generating user authentication information based on the identification number, the authentication parameter and the random data, and transmitting a part of the user authentication information to the authentication server, ;
A device authentication information distribution function for generating device authentication information based on device information of the client terminal and transmitting a part of the device authentication information to the authentication server; And
An encryption information distribution function for encrypting and storing a password with a primary encryption key, encrypting the primary encryption key with a secondary encryption key generated based on the random data and the device information, and transmitting the encrypted primary encryption key to the authentication server;
An application that is stored on the medium to run.
Wherein the random data distribution function is stored in a medium which is a function of generating first random data and second random data and transmitting the second random data to the authentication server.
Wherein the user authentication information distribution function includes: a function of generating an authentication private key based on the identification number and the remainder of the random data;
A function of generating a verification key for authentication based on the authentication parameter and the authentication private key; And
A function of transmitting the authentication key for authentication to the authentication server;
An application that is stored on a medium for further execution.
The device authentication information distribution function includes: a function of extracting a device information list and device information based on the device information list;
A function of generating a device authentication value based on the device information; And
Transmitting the device information list and the device authentication value to the authentication server;
An application that is stored on a medium for further execution.
The encryption information distribution function includes: a function of generating the primary encryption key;
A function of encrypting the password with the primary encryption key and storing the encrypted password;
A function of generating a secondary encryption key based on the identification number, the random data, and the device information;
A function of encrypting the primary encryption key with the secondary encryption key; And
A function of transmitting the encrypted primary encryption key to the authentication server;
An application that is stored on a medium for further execution.
A function of receiving an authentication parameter from the authentication server by accessing the authentication server and requesting password decryption after the encryption information distribution function;
A user authentication function for generating mutual authentication key authentication information based on the identification number, the rest of the random data, and authentication data received from the authentication server, and transmitting the mutual authentication key authentication information to the authentication server;
A part of the random data and a part of the device authentication information are transmitted from the authentication server to generate a device verification value based on the device authentication data derived in accordance with a part of the device authentication information, Authentication function; And
A decryption function for decrypting the password when the encrypted primary encryption key is transmitted from the authentication server;
An application that is stored on a medium for further execution.
The user authentication function includes a function of generating a private key for authentication based on the identification number and the remainder of the random data;
Generating a first public key for verification based on the authentication parameter and transmitting the first public key to the authentication server;
A function of generating a first mutual authentication key based on the second public verification key, the authentication private key and the authentication parameter as the second public verification key is transmitted as the authentication data from the authentication server; And
A function of generating the mutual authentication key authentication information based on the first mutual authentication key, the first public verification key, and the second public verification key and transmitting the mutual authentication key authentication information to the authentication server;
An application that is stored on a medium for further execution.
The function of extracting device information as the device authentication data based on the device information list as a part of the random data and a device information list are transmitted as part of the device authentication information from the authentication server; And
Generating the device verification value from the device information and transmitting the device verification value to the authentication server;
An application that is stored on a medium for further execution.
Wherein the decryption function has a function of generating the secondary encryption key as the encrypted primary encryption key is transmitted from the authentication server;
A function of decrypting the encrypted primary encryption key received from the authentication server with the secondary encryption key; And
Decrypting the password with the decrypted primary encryption key;
An application that is stored on a medium for further execution.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150022589A KR20160100078A (en) | 2015-02-13 | 2015-02-13 | Client Terminal for Supporting Banking Service, Authentication Server, Method and Application for User Terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150022589A KR20160100078A (en) | 2015-02-13 | 2015-02-13 | Client Terminal for Supporting Banking Service, Authentication Server, Method and Application for User Terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20160100078A true KR20160100078A (en) | 2016-08-23 |
Family
ID=56875454
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150022589A KR20160100078A (en) | 2015-02-13 | 2015-02-13 | Client Terminal for Supporting Banking Service, Authentication Server, Method and Application for User Terminal |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20160100078A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20190024221A (en) * | 2017-08-31 | 2019-03-08 | (주)비바리퍼블리카 | Method for scrapping user information of account-running-institue and application system thereof |
KR20190054280A (en) * | 2017-11-13 | 2019-05-22 | 주식회사 하나은행 | Method and mobile terminal unit for providing asset management service |
CN114095202A (en) * | 2021-10-09 | 2022-02-25 | 浪潮软件股份有限公司 | Method for fast authentication of client-server architecture |
WO2022124431A1 (en) * | 2020-12-08 | 2022-06-16 | 주식회사 앰진시큐러스 | Method for automating trusted execution environment-based non-contact identity generation and mutual authentication |
-
2015
- 2015-02-13 KR KR1020150022589A patent/KR20160100078A/en not_active Application Discontinuation
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20190024221A (en) * | 2017-08-31 | 2019-03-08 | (주)비바리퍼블리카 | Method for scrapping user information of account-running-institue and application system thereof |
KR20190054280A (en) * | 2017-11-13 | 2019-05-22 | 주식회사 하나은행 | Method and mobile terminal unit for providing asset management service |
WO2022124431A1 (en) * | 2020-12-08 | 2022-06-16 | 주식회사 앰진시큐러스 | Method for automating trusted execution environment-based non-contact identity generation and mutual authentication |
CN114095202A (en) * | 2021-10-09 | 2022-02-25 | 浪潮软件股份有限公司 | Method for fast authentication of client-server architecture |
CN114095202B (en) * | 2021-10-09 | 2024-04-12 | 浪潮软件股份有限公司 | Method for rapidly authenticating client-server architecture |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109495274B (en) | Decentralized intelligent lock electronic key distribution method and system | |
CN1689297B (en) | Method of preventing unauthorized distribution and use of electronic keys using a key seed | |
CN101834853B (en) | Method and system for sharing anonymous resource | |
CN105684346A (en) | Method for securing over-the-air communication between a mobile application and a gateway | |
CN109150519A (en) | Anti- quantum calculation cloud storage method of controlling security and system based on public keys pond | |
CN1939028A (en) | Accessing protected data on network storage from multiple devices | |
CN1985466A (en) | Method of delivering direct proof private keys in signed groups to devices using a distribution CD | |
JP5380583B1 (en) | Device authentication method and system | |
CN110690956B (en) | Bidirectional authentication method and system, server and terminal | |
CN108199847B (en) | Digital security processing method, computer device, and storage medium | |
KR20180101870A (en) | Method and system for data sharing using attribute-based encryption in cloud computing | |
EP1501238B1 (en) | Method and system for key distribution comprising a step of authentication and a step of key distribution using a KEK (key encryption key) | |
CN104539420A (en) | General intelligent hardware safe secret key management method | |
CN103329589A (en) | System and method for issuing an authentication key for authenticating a user in a cpns environment | |
CN110505055A (en) | Based on unsymmetrical key pond to and key card outer net access identity authentication method and system | |
CN101944216A (en) | Two-factor online transaction safety authentication method and system | |
KR20160100078A (en) | Client Terminal for Supporting Banking Service, Authentication Server, Method and Application for User Terminal | |
CN109379345B (en) | Sensitive information transmission method and system | |
CN111586023A (en) | Authentication method, authentication equipment and storage medium | |
EP3292654B1 (en) | A security approach for storing credentials for offline use and copy-protected vault content in devices | |
CN112822021B (en) | Key management method and related device | |
KR102053993B1 (en) | Method for Authenticating by using Certificate | |
WO2018043466A1 (en) | Data extraction system, data extraction method, registration device, and program | |
KR20200000978A (en) | Data security method and system | |
KR20190007336A (en) | Method and apparatus for generating end-to-end security channel, and method and apparatus for transmitting/receiving secure information using security channel |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
N231 | Notification of change of applicant | ||
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |