KR20170018127A - Method for certification using digital image, application system, and authentication system thereof - Google Patents
Method for certification using digital image, application system, and authentication system thereof Download PDFInfo
- Publication number
- KR20170018127A KR20170018127A KR1020150110550A KR20150110550A KR20170018127A KR 20170018127 A KR20170018127 A KR 20170018127A KR 1020150110550 A KR1020150110550 A KR 1020150110550A KR 20150110550 A KR20150110550 A KR 20150110550A KR 20170018127 A KR20170018127 A KR 20170018127A
- Authority
- KR
- South Korea
- Prior art keywords
- digital image
- information
- authentication
- portable terminal
- authentication system
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
An authentication method using a digital image and an application system therefor are disclosed. According to an aspect of the present invention, an application system installed in a mobile terminal includes an image acquisition module for acquiring a digital image targeted at a predetermined object through image shooting means included in a portable terminal, Wherein when the digital image in which the insertion information is inserted is transmitted to a predetermined authentication system, the validity of the insertion information is determined by the authentication system, and if the validity of the insertion information is determined, The validity of the digital image or the user of the portable terminal is authenticated.
Description
The present invention relates to a system and method for authenticating a user using a digital image, and more particularly, to a system and method for authenticating a user using verification information that can be obtained by a digital image.
Recently, various online services such as online commerce, internet banking, online certificate issuance and the like have been provided. Because of the nature of these services, it is very important that they authenticate themselves to ensure that the user has the right to use the service.
The most obvious authentication method is to visit a bank or a certificate issuing organization directly. However, since the visit is very cumbersome, the facial photograph, own identification card or other authentication means are scanned or photographed and transmitted to the certification body online. Non-face authentication technology is emerging that performs identity verification through transmitted pictures.
However, when the current non-face authentication technology is used, there is a problem that a problem that the photo is stolen, forged or exploited by a hacker or the like can not be prevented.
In addition, there are cases where a car insurance company provides a service for checking mileage or black box installation and discounting insurance premiums. At this time, there are cases where forged pictures are transmitted, Even if you do not have the possession of the other person as if you are holding a photo of the person is pretending to be increasing.
As the number of cases of counterfeiting or theft of digital images such as online photographs is increasing, a method for confirming the validity of digital images is widely required.
SUMMARY OF THE INVENTION Accordingly, the present invention has been made keeping in mind the above problems occurring in the prior art, and it is an object of the present invention to provide a digital image authentication method, a digital image authentication method, a digital image authentication method, And to provide a system and method that can be used.
According to an aspect of the present invention, an application system installed in a portable terminal includes an image acquisition module for acquiring a digital image targeted at a predetermined object through image shooting means of a portable terminal, Wherein when the digital image in which the insertion information is inserted is transmitted to a predetermined authentication system, the validity of the insertion information is determined by the authentication system, and if the validity of the insertion information is determined, Or the user of the portable terminal is authenticated.
And the insertion module inserts the insertion information into the metadata of the digital image or the image information of the digital image.
Wherein the insertion module inserts encryption information or hash information of the insertion information at a predetermined position when inserting the insertion information into the metadata and inserts the insertion information into the image information when inserting the insertion information into the image information, A watermark, or a digital stamp, which can be recognized by the authentication system.
Wherein the inserting module inserts the inserting information in which the auto information inserted in the meta data is changed in a predetermined manner in place of the auto information by the image photographing means, And inserting it into the data.
Wherein the application system further comprises a communication module for performing communication with the authentication system, wherein the communication module transmits the digital image, into which the insertion information has been inserted, to the authentication system within a predetermined time from the time the digital image is acquired And transmits the data.
Wherein the application system further comprises a communication module for transmitting the digital image to the authentication system, wherein when the validity of the digital image or the user of the portable terminal is authenticated by the authentication system, Wherein the photographing time of the digital image and the time when the authentication system receives the digital image satisfy a predetermined condition or the photographing position of the digital image included in the digital image and the position of the portable terminal, Or the identification information of the portable terminal included in the digital image and the identification information of the portable terminal confirmed by the authentication system correspond to each other.
Wherein the application system further comprises a communication module for performing communication with the authentication system, wherein the insertion module inserts the one-time information received from the authentication system through the communication module into the insertion information and inserts the insertion information into the digital image And the validity of the digital image or the user of the portable terminal is authenticated if the one-time information inserted in the digital image is authenticated by the authentication system.
The insertion module inserts insertion information based on identification information of a portable terminal in which the application system is installed or insertion information based on identification information of the portable terminal and identification information of an object capable of identifying the object in the digital image And the validity of the digital image or the user of the portable terminal is authenticated when insertion information inserted in the digital image corresponds to information previously stored in the authentication system by the authentication system.
Wherein the application system further comprises a communication module for performing communication with the authentication system and receives the image transmission request from the authentication system through the communication module that confirms the success of the authentication of the principal through the predetermined target system , The insertion module inserts the insertion information into the digital image, or the image acquisition module acquires the digital image.
The personal authentication through the target system may be authentication based on whether the identification information including the identity of the cellular phone, the card authentication, or the user's personal information corresponds to the registration information registered in the target system.
Wherein at least a part of the information displayed on the object is recognized by the application system, the authentication system, or a predetermined target system, and the validity of the digital image, the authentication of the user of the portable terminal, And is used for authentication of the person provided by the target system.
Wherein the digital image transmitted to the authentication system is a digital image comprising a first object and a second object, or a first digital image comprising a first object and a second digital image comprising a second object And the user is authenticated by the authentication system so that the information displayed on the first object and the information displayed on the second object correspond to each other.
The insertion information is divided and inserted in a first digital image including a first object and a second digital image including a second object, and when the first digital image and the second digital image are transmitted to the authentication system, The insertion information obtained from each of the first digital image and the second digital image is obtained by the authentication system so that the insertion information is specified.
According to an aspect of the present invention, there is provided an application system installed in a mobile terminal, including: an image acquisition module for acquiring a digital image of a predetermined object through an image capturing means of a portable terminal; Wherein at least one of information displayed on the object or identification information of the portable terminal corresponds to registration information registered in a target system connected to the authentication system, Is authenticated.
The authentication system may authenticate the user of the portable terminal only if the validity of the verification information included in the digital image is further determined.
Wherein the application system further comprises an insertion module for inserting predetermined insertion information into the digital image, wherein if the validity of the insertion information included in the digital image is further determined by the authentication system, the user of the portable terminal is authenticated . ≪ / RTI >
According to an aspect of the present invention, there is provided an authentication system including an image receiving module for receiving a digital image having a predetermined object and a predetermined insertion information inserted by a portable terminal, And a verification module for determining validity of the extracted insertion information and authenticating the validity of the digital image or the user of the portable terminal when the validity of the insertion information is determined.
According to another aspect of the present invention, there is provided an authentication system including an image receiving module for receiving a digital image of a predetermined object from a portable terminal, And an authentication module for authenticating a user of the portable terminal according to the identification result of the identification information authentication module.
According to another aspect of the present invention, there is provided an authentication method using an application system installed in a portable terminal, the method comprising: the application system acquiring a digital image for a predetermined object through an image capturing means of the portable terminal; Wherein the inserting information is inserted into the digital image, and if the digital image in which the inserting information is inserted is transmitted to a predetermined authentication system, the validity of the inserting information is judged by the authentication system, The validity of the digital image or the user of the portable terminal is authenticated.
Wherein the step of inserting embedding information into the digital image obtained by the application system comprises inserting the embedding information into the metadata of the digital image or the image information of the digital image, Wherein the inserting step inserts the encryption information or the hash information of the insertion information into a predetermined position when inserting the embedded information into the image information, , A watermark, or a digital stamp is inserted.
The authentication method using the digital image may further include the step of the application system transmitting the digital image in which the insertion information is inserted to the authentication system within a predetermined time from the time when the digital image is acquired.
When the validity of the digital image or the user of the portable terminal is authenticated by the authentication system, the photographing time of the digital image included in the digital image and the time when the authentication system receives the digital image satisfy a predetermined condition Or the photographing position of the digital image included in the digital image and the position of the portable terminal confirmed by the authentication system satisfy a predetermined condition or the identification information of the portable terminal included in the digital image and the authentication system And the identification information of the portable terminal corresponds to each other.
Wherein inserting the insertion information into the digital image obtained by the application system includes inserting the insertion information into the digital image by the application system including the one-time information received from the authentication system, The validity of the digital image or the user of the portable terminal may be authenticated if the one-time information inserted in the digital image is authenticated.
Wherein the authentication method using the digital image further comprises receiving an image transmission request from the authentication system, the application system confirming the success of the authentication of the user through a predetermined target system, And inserts the insertion information into the digital image or acquires the digital image.
Wherein the digital image transmitted to the authentication system is a digital image comprising a first object and a second object or a plurality of digital images including a first digital image comprising a first object and a second digital image comprising a second object, And the user is authenticated by the authentication system so that the information displayed on the first object and the information displayed on the second object correspond to each other.
The insertion information is divided and inserted in a first digital image including a first object and a second digital image including a second object, and when the first digital image and the second digital image are transmitted to the authentication system, The insertion information obtained from each of the first digital image and the second digital image is obtained by the authentication system so that the insertion information is specified.
According to an aspect of the present invention, there is provided an authentication method using an application system installed in a portable terminal, the method comprising: the application system acquiring a digital image for a predetermined object through an image capturing means of the portable terminal; Wherein at least one of the information displayed on the object or the identification information of the portable terminal corresponds to registration information registered in a target system connected to the authentication system, And the user of the terminal is authenticated.
According to another aspect of the present invention, there is provided an authentication method including the steps of: receiving a digital image in which an authentication system has a predetermined object and a predetermined insertion information inserted by a portable terminal; Extracting the insertion information from the authentication information, and validating the insertion information extracted by the authentication system and authenticating the validity of the digital image or the user of the portable terminal when the validity of the insertion information is determined .
According to another aspect of the present invention, there is provided an authentication method for an authentication system, the authentication method comprising the steps of: receiving a digital image of a predetermined object from a portable terminal; Determining whether the registration information registered in the target system corresponds to the registration information registered in the target system, and authenticating the user of the portable terminal according to a result of the verification by the authentication system.
According to another aspect of the present invention, there is provided a computer program installed in a data processing apparatus and stored in a recording medium for performing the above-described method.
According to an embodiment of the present invention, it is possible to use a digital image to perform powerful and simple non-face authentication or validity of the digital image (that is, a digital image is photographed by a legitimate user or an object Quot ;, which means that the user is occupied) can be determined.
In addition, since a primary authentication is performed through a target system (e.g., a mobile communication company system, a credit card company system, or a payment mediation system), and a secondary authentication is performed using the verification information acquired by the digital image Strong authentication can be performed.
According to an embodiment of the present invention, when the verification information used for validity verification of a digital image is inserted into metadata, the metadata is encrypted and inserted into a digital image and decrypted to extract metadata. Can be prevented.
According to an embodiment of the present invention, the verification information may include auto information (e.g., photographing time, photographing position, etc.) of a digital image to be automatically inserted by the photographing means. There is an effect that it is possible to prevent the verification information from being manipulated by the user by inserting insertion information in place of the auto information.
Further, among the pieces of verification information, the insertion information inserted by the application system is inserted into the meta data or the image itself (e.g., steganography technique, watermark, stamp, etc.) .
Also, according to an embodiment of the present invention, two or more of the facial, ID, and unique authenticated objects of the user of the portable terminal may be authenticated using a plurality of digital images photographed together or individually Therefore, it is possible to obtain an effect of further enhancing the authenticity of the object to be occupied when the image of the object to be authenticated is acquired .
Further, the application system according to the embodiment of the present invention permits the digital image to be transmitted within a predetermined time after the digital image is acquired, and the authentication system also permits authentication only when the digital image is received within a predetermined time, It is difficult to perform artificial manipulation or change of the insertion information on the side of the user.
According to the embodiment of the present invention, the photographing time of the digital image and the time when the authentication system receives the digital image satisfy a predetermined condition, or the photographing position of the digital image and the photographing position of the portable terminal Face authentication or the validity of the digital image when the position satisfies a predetermined condition or when the identification information of the portable terminal and the identification information of the portable terminal confirmed by the authentication system correspond to each other, There is an effect that it is difficult to manipulate or change the image.
Also, when authentication is performed using a plurality of digital images, the insertion information is divided into a plurality of digital images and inserted, thereby enhancing security.
In addition, when the insertion information inserted in the digital image for authentication includes the one-time information received from the authentication system, the inserted information itself can have a one-time effect, thereby providing excellent security.
BRIEF DESCRIPTION OF THE DRAWINGS A brief description of each drawing is provided to more fully understand the drawings recited in the description of the invention.
1 is a conceptual illustration of an authentication system using a digital image according to an embodiment of the present invention.
2 is a flowchart illustrating an authentication method using a digital image according to an exemplary embodiment of the present invention.
3 is a block diagram showing a schematic configuration of an authentication system using a digital image according to an embodiment of the present invention.
4 is a flowchart illustrating an example of an authentication method using a digital image according to an embodiment of the present invention.
5 is a flowchart illustrating an example of an authentication method using a digital image according to another embodiment of the present invention.
6 is a flowchart illustrating an example of an authentication method using a digital image according to another embodiment of the present invention.
7 shows an example of an application system according to an embodiment of the present invention.
8 is a flowchart illustrating an operation process of an application system according to an embodiment of the present invention.
9 is a flowchart illustrating an operation procedure of an application system according to another embodiment of the present invention.
BRIEF DESCRIPTION OF THE DRAWINGS The present invention is capable of various modifications and various embodiments, and specific embodiments are illustrated in the drawings and described in detail in the detailed description. It is to be understood, however, that the invention is not to be limited to the specific embodiments, but includes all modifications, equivalents, and alternatives falling within the spirit and scope of the invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, the present invention will be described in detail with reference to the accompanying drawings.
The terms first, second, etc. may be used to describe various elements, but the elements should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.
The terminology used in this application is used only to describe a specific embodiment and is not intended to limit the invention. The singular expressions include plural expressions unless the context clearly dictates otherwise.
In this specification, terms such as "comprise," "comprising," and the like are intended to specify that there are stated features, numbers, steps, operations, elements, parts or combinations thereof, But do not preclude the presence or addition of one or more other features, steps, operations, elements, components, or combinations thereof.
Also, in this specification, when any one element 'transmits' data to another element, the element may transmit the data directly to the other element, or may be transmitted through at least one other element And may transmit the data to the other component. Conversely, when one element 'directly transmits' data to another element, it means that the data is transmitted to the other element without passing through another element in the element.
Hereinafter, the present invention will be described in detail with reference to the embodiments of the present invention with reference to the accompanying drawings. Like reference symbols in the drawings denote like elements.
1 is a conceptual illustration of an authentication system using a digital image according to an embodiment of the present invention. 1, an authentication system (hereinafter referred to as an 'authentication system') 100 using a digital image is used to implement an authentication method using a digital image according to an embodiment of the present invention .
The
The
According to an embodiment, the
The
In this specification, the mobile communication company system refers to a system of a mobile communication network provider providing mobile communication services to the
When the
The
According to the technical idea of the present invention, an authentication method with enhanced security is provided by using a predetermined authentication method that can be performed by the
In the present invention, a digital image does not only mean a single image but also includes an image (for example, an image frame included in a moving image) that can be provided by a moving image or other method.
The
Meanwhile, the
The first verification information may be embedded in the digital image in various ways to write information such as watermark, steganography, stamp, etc. to the image.
According to an embodiment, the first verification information may include information (e.g., name, date of birth, resident number, card information, etc.) displayed on an object (e.g., ID card, card, etc.) of the digital image.
In one embodiment, the first verification information may be included in the digital image in the form of metadata. The first verification information may be a part of the metadata included in the digital image. Metadata is structured data about data and is data that describes other data. In particular, the metadata of a digital image includes photograph information such as exposure, flash usage, resolution, and photo size, information (device manufacturer, device identification, model name, etc.) of the device that captured the digital image, Time information, geographical position information of the photographed place, and the like as metadata.
The first verification information may include information inserted into the digital image by the
According to the embodiment of the present invention, since the auto information is written in plain text which can be easily changed or manipulated by the user, the
A representative format for storing metadata of a digital image is, but not limited to, an EXchangeable Image File format (Exif).
The digital image may also be an identification card, a user's card, or other object expected to be occupied by the user. The object of the digital image may be designated by the
In one embodiment, the
Meanwhile, the
The second verification information is information corresponding to the first verification information, and may be information corresponding to the portable terminal.
The fact that the second verification information corresponds to the first verification information may mean that the second verification information is the same kind of information as the first verification information. Or that the second verification information includes the same kind of information as the information included in the first verification information. For example, if the first verification information is location information, the second verification information may be at least location information, and if the first verification information includes location information, device identification information, and time information, The verification information may include at least location information, device identification information, and time information.
Meanwhile, the
The method for the mobile
The fact that the
The mobile communication company to which the
The
Of course, according to an embodiment, the
2 is a flowchart briefly illustrating an authentication method using a digital image according to an embodiment of the present invention.
2, the
The
In addition, the first verification information may include insertion information artificially inserted by the
An example of the insertion information may be a photographing position of a digital image, a photographing time, identification information of the
Meanwhile, the
The
The
FIG. 3 is a block diagram illustrating a schematic configuration of an
The
In this specification, a module may mean a functional and structural combination of hardware for carrying out the technical idea of the present invention and software for driving the hardware. For example, the module may refer to a logical unit of a predetermined code and a hardware resource for executing the predetermined code, and it does not necessarily mean a physically connected code or a kind of hardware But can be easily deduced to the average expert in the field of the present invention.
The
The
In one embodiment, the first verification information may be embedded in the digital image in the form of metadata. The first verification information may be a part of the metadata included in the digital image. The metadata may be included in the digital image and may be data regarding the digital image itself. As described above, the metadata of the digital image may be in Exif format, but is not limited thereto.
The
According to an embodiment, the first verification information may include at least one of position information of a place where the digital image is photographed, identification information of the
The location information may be Global Positioning System (GPS) information.
The identification information of the
The
Meanwhile, in one embodiment, the metadata included in the digital image may be data encrypted with a predetermined encryption method for preventing forgery and falsification. In this case, the
The encryption / decryption method used in the
Meanwhile, the
The information corresponding to the portable terminal means information about the portable terminal which is collected by the portable terminal, received from the portable terminal, or collected or grasped by a predetermined system (for example, a portable communication system) interlocked with the portable terminal It can mean. Meanwhile, since the information included in the second verification information includes information corresponding to the first verification information, when the first verification information includes the location information of the place where the digital image is photographed, The second verification information may include identification information of the portable terminal when the first verification information includes identification information of a device that has photographed the digital image, If the first verification information includes time information on the digital image, the second verification information may include time information indicating that the digital image was received from the portable terminal.
According to an embodiment, the
When the first verification information includes the location information of the place where the digital image is photographed, the acquiring
When the digital image is transmitted through the network, the
If the first verification information includes identification information of the
The
More specifically, when the first verification information includes the location information of the place where the digital image is photographed, the
The fact that two positions satisfy a predetermined position condition may mean that the two positions correspond to a predefined positional relationship. For example, if the distance between the position of the place where the digital image is photographed and the position of the portable terminal is within a predetermined limit distance, the
If the first verification information includes the identification information of the device that captured the digital image, the
If the first verification information includes the time information on the digital image taken, the
The satisfaction of a predetermined time condition between two times may mean that the two times correspond to a predefined time relationship. For example, when the difference between the time at which the digital image is photographed and the time at which the digital image is received from the portable terminal is within a predefined limit time, the
When the position of the digital image and the position of the portable terminal satisfy a predetermined positional condition, the
Meanwhile, the digital image may be any one of a facial image of the user of the portable terminal, an ID image, a unique authentication object, or an image of an object to be occupied by the portable terminal, Images can be used for non-confidential self-certification.
Here, the inherent identity authentication object refers to, for example, a variety of authentication objects such as a financial transaction account, a financial transaction confirmation, a financial transaction account screen, a financial card (credit card, debit card, etc.) Object.
According to an embodiment, the
The identification
Therefore, the legitimacy of the identification information may refer to a case where the identification information corresponds to information registered in advance (for example, information registered in the target system 300). Or when card information (for example, card number or the like) is included in the identification information as described later, it means that the card corresponding to the card information is a card capable of authenticating the user himself or a card capable of actual payment It is possible.
The identification information does not necessarily have to be completely input by the user. The user can input only a part of the identification information by using the
According to an embodiment, identification information may not be input by the user. For example, the identification information may be a combination of the information displayed on the object and the verification information included in the digital image. Alternatively, the identification information may be information displayed on the object and the identification information (e.g., telephone number, device identification information, O / S ID, etc.) of the portable terminal identified by the
For example, the identification information may be changed according to the
For example, the identification information may include information necessary for a personal authentication (for example, authentication of the cellular phone itself) conventionally provided by the mobile communication company system. That is, the phone number of the
The identification information may include information necessary for authentication (e.g., credit card authentication) conventionally provided by a credit card company system. Card information and user's personal information may be included in the identification information, and the object of the digital image may be an object (e.g., a card) corresponding to the card information.
When the identification information includes the identification information of the
On the other hand, when the identification information includes card information and personal information, the
The digital image may further include verification information (e.g., a photographing position, a photographing time, identification information of the portable terminal 200) for verifying the validity of the digital image, as described above. In this case, The authentication of the user can be succeeded.
When the digital image is an ID image, the
When the digital image is an image of a unique authentication object, the digital image may include predetermined information (e.g., a unique serial number of the credit card, a card number, an expiration date, a financial account number, etc., (E.g., a unique serial number of the device, a unique serial number of the secure card, etc.) may be included in the digital image, and the
In the case where the information displayed on the object of the digital image is used as the verification information, the information input by the user may be input as the identification information. For example, when the user inputs his or her own mobile phone and personal information as the identification information, the identification
When the user inputs the card information and the personal information as the identification information, the identification
Verification information (e.g., personal information or card information) acquired by the
In some implementations, all of the identification information (e.g., card information and personal information) may be obtained by the
In one embodiment, the digital image may be an image of two or more of the user's face, identification, or unique identity-authenticated object together. For example, a financial account or a credit card may be photographed in a single image together with the face of the user of the mobile terminal or an identification card. Alternatively, the
When the digital image received by the
The
Alternatively, the
In some implementations, the
In any case, the
In another embodiment, the digital image may be a face of the user, an identification card, or an image taken together with a unique identity verification object and an occupancy verification object.
Here, the object to be occupied confirmation may refer to various articles or devices that need to be confirmed that the user of the portable terminal has occupied or possessed. For example, when the user of the portable terminal desires to sell a used article, it is necessary to confirm that the user of the portable terminal occupies a used article. Therefore, in this case, the used goods may be an object to be occupied. For example, the digital image may be a financial transaction book or financial account confirmation and a single image of the object to be verified at a time. Since the digital image may be an image obtained by photographing the means for authenticating the user and the object to be occupied together, there is an effect that the reliability of the possession of the owner of the portable terminal is strengthened.
4 is a flowchart specifically illustrating an authentication method using a digital image according to an exemplary embodiment of the present invention.
Referring to FIG. 4, the
Then, the
The first verification information may include location information of a place where the digital image is photographed, identification information of a device that photographed the digital image, and / or time information when the digital image was photographed. This information can be used to validate the digital image. Also, as described above, the first verification information may include information displayed on an object of the digital image, and such information may be used for authentication of a user as described above.
Therefore, the
Meanwhile, the
More specifically, the
The
If it is determined that the ID photo is valid, the
5 is a flowchart illustrating an example of an authentication method using a digital image according to another embodiment of the present invention. It will be readily apparent to one of ordinary skill in the art that the order of execution of the processes shown in FIG. 5 may be easily changed as needed.
Referring to FIG. 5, the user may transmit identification information for identity authentication to the
Also, the
Also, the
Then, the
6 is a flowchart illustrating an example of an authentication method using a digital image according to another embodiment of the present invention. It will be readily appreciated by those of ordinary skill in the art that the order of execution of the processes illustrated in FIG. 6 may also be readily modified as needed.
6, the user may transmit only the first partial identification information to the
Then, the
Then, the
If the validity of the identification information is confirmed, the
7 shows an example of an application system according to an embodiment of the present invention.
Referring to FIG. 7, the
The
The
The
According to the technical idea of the present invention, when the insertion information is inserted into the digital image and the digital image in which the insertion information is inserted is transmitted to the
As described above, the
When the insertion information is embedded in the metadata, the metadata may be data that can be easily accessed and manipulated by general users as compared with the case where the insertion information is inserted into the image information. Therefore, the
Meanwhile, the metadata may include information on the auto information (for example, the photographing position and the photographing time of the digital image), and the auto information may be the verification information to be verified. In this case, there is a risk that the auto information can be easily manipulated by the user as described above.
Therefore, the inserting
According to an embodiment, the auto information may be inserted into the metadata separately (encrypted or encoded) corresponding to the auto information while being stored in the metadata. In this case, the validity of the digital image or the user can be authenticated using the insertion information instead of the auto information, so that even if the user operates the auto information, the authentication mechanism can operate effectively.
According to one embodiment, the inserting
For example, the
The
According to an exemplary embodiment of the present invention, the
For example, when the
According to the embodiment, the
In this case, since authentication of the
On the other hand, identification information may be required for the authentication of the subject provided by the
When the user's personal information is displayed on the object, at least some of the user's personal information to be included in the identification information can be automatically recognized and used without the user having to input the information displayed on the object. For example, the user can perform the act of photographing the object without inputting the user's personal information using the
The identification information (e.g., hardware identification information, OS identification information, and / or telephone number) of the
According to an embodiment, an application system for implementing the technical idea of the present invention, which can be implemented as an independent application or an application included in another application (e.g., an application such as a financial institution) The identification information of the
When the identification information of the
Similarly, the
Meanwhile, the
The
The
According to an example, the
When the user selects the image transmission request, the image photographing means can be activated. Then, the user can shoot a predetermined object, and the digital image from which the object is captured can be acquired by the
According to an embodiment, the
Meanwhile, the
The one-time information is received from the
When the one-time information is included in the insertion information, even if the same information is continuously inserted into the digital image as the insertion information, the insertion information can not be reused by the one-time information, and the security is increased.
The
In addition, when the user is authenticated using the digital image as described above, a digital image on which a plurality of objects are captured may be used. In this case, the information displayed on the plurality of objects corresponds to each other, Can be authenticated.
On the other hand, when a plurality of objects are included in each of the plurality of digital images, that is, one of the first digital images is included in the first object and the second object is included in the second digital image.
At this time, if the insertion information to be inserted is specified, the
The first digital image and the second digital image may then be transmitted to the
In this case, even if the insertion information inserted in one of the digital images is forged, authentication can not be successfully performed by the
8 is a flowchart illustrating an operation process of an application system according to an embodiment of the present invention.
Referring to FIG. 8, the
When the image transmission request is received, the user can activate the application system 400 (S510). The
9 is a flowchart illustrating an operation procedure of an application system according to another embodiment of the present invention.
Referring to FIG. 9, the
The
The
According to another embodiment of the present invention, the
The
In some embodiments, the
The
On the other hand, according to an embodiment, the
Meanwhile, the authentication method according to the embodiment of the present invention may be implemented in the form of a program-readable program command and stored in a computer-readable recording medium. Also, the control program and the target program according to the embodiment of the present invention may be stored in a computer- And the like. A computer-readable recording medium includes all kinds of recording apparatuses in which data that can be read by a computer system is stored.
Program instructions to be recorded on a recording medium may be those specially designed and constructed for the present invention or may be available to those skilled in the art of software.
Examples of the computer-readable recording medium include magnetic media such as a hard disk, a floppy disk and a magnetic tape, optical media such as CD-ROM and DVD, a floptical disk, And hardware devices that are specially configured to store and execute program instructions such as magneto-optical media and ROM, RAM, flash memory, and the like. The above-mentioned medium may also be a transmission medium such as a light or metal wire, wave guide, etc., including a carrier wave for transmitting a signal designating a program command, a data structure and the like. The computer readable recording medium may also be distributed over a networked computer system so that computer readable code can be stored and executed in a distributed manner.
Examples of program instructions include machine language code such as those produced by a compiler, as well as devices for processing information electronically using an interpreter or the like, for example, a high-level language code that can be executed by a computer.
The hardware devices described above may be configured to operate as one or more software modules to perform the operations of the present invention, and vice versa.
It will be understood by those skilled in the art that the foregoing description of the present invention is for illustrative purposes only and that those of ordinary skill in the art can readily understand that various changes and modifications may be made without departing from the spirit or essential characteristics of the present invention. will be. It is therefore to be understood that the above-described embodiments are illustrative in all aspects and not restrictive. For example, each component described as a single entity may be distributed and implemented, and components described as being distributed may also be implemented in a combined form.
It is intended that the present invention covers the modifications and variations of this invention provided they come within the scope of the appended claims and their equivalents. .
Claims (30)
An image acquiring module for acquiring a digital image for a predetermined object through an image photographing means of the portable terminal;
And an insertion module for inserting insertion information into the acquired digital image,
If the inserted digital image is transmitted to a predetermined authentication system, the validity of the inserted information is determined by the authentication system. If the validity of the embedded information is determined, the validity of the digital image or the user of the portable terminal And is authenticated.
And inserts the insertion information into the metadata of the digital image or the image information of the digital image.
Inserting encryption information or hash information of the insertion information at a predetermined position when inserting the insertion information into the meta data,
Inserting a steganography, a watermark, or a digital stamp that can be recognized by the authentication system into the digital image when inserting the insertion information into the image information.
Inserting the insertion information into the metadata in place of the auto information or inserting the insertion information into the metadata separately from the auto information, Lt; / RTI >
Further comprising a communication module for performing communication with the authentication system,
The communication module includes:
And transmits the digital image in which the insertion information is inserted to the authentication system within a predetermined time from the time at which the digital image was acquired.
Further comprising a communication module for transmitting the digital image to the authentication system,
When the validity of the digital image or the user of the portable terminal is authenticated by the authentication system,
Wherein when the photographing time of the digital image included in the digital image and the time when the authentication system receives the digital image satisfy a predetermined condition,
The photographing position of the digital image included in the digital image and the position of the portable terminal confirmed by the authentication system satisfy a predetermined condition, or
Wherein the identification information of the portable terminal included in the digital image corresponds to the identification information of the portable terminal identified by the authentication system.
Further comprising a communication module for performing communication with the authentication system,
The insertion module
And inserts the one-time information received from the authentication system through the communication module in the insertion information into the digital image,
Wherein validity of the digital image or a user of the portable terminal is authenticated when the one-time information inserted in the digital image is authenticated by the authentication system.
And inserting insertion information based on identification information of a portable terminal equipped with the application system or insertion information based on identification information of the portable terminal and identification information of an object capable of identifying the object,
When the identification information of the portable terminal corresponds to the information previously stored in the authentication system based on the insertion information inserted in the digital image by the authentication system, the validity of the digital image or the authentication of the user of the portable terminal Lt; / RTI >
Further comprising a communication module for performing communication with the authentication system,
Through the communication module, to receive the image transmission request from the authentication system which confirms the success of the authentication of the user through the predetermined target system,
Wherein the insertion module inserts the insertion information into the digital image,
And wherein the image acquisition module obtains the digital image.
Wherein the authentication is based on whether authentication of the mobile phone, card authentication, or identification information including personal information of the user corresponds to registration information registered in the target system.
At least a portion of the information displayed on the object,
The authentication system, or the predetermined target system,
Wherein the application system is used for validity of the digital image, authentication of a user of the portable terminal, or authentication of a person provided by the target system based on the recognized information.
Wherein the digital image transmitted to the authentication system comprises:
A digital image including a first object and a second object,
A plurality of digital images comprising a first digital image comprising a first object and a second digital image comprising a second object,
Wherein the authentication system authenticates the user if the information displayed on the first object and the second object correspond to each other.
The insertion information is divided and inserted in a first digital image including a first object and a second digital image including a second object,
When the first digital image and the second digital image are transmitted to the authentication system, the insertion information obtained from each of the first digital image and the second digital image is obtained by the authentication system so that the insertion information is specified Lt; / RTI >
An image acquiring module for acquiring a digital image for a predetermined object through an image photographing means of the portable terminal;
And a communication module for transmitting the obtained digital image to an authentication system,
Characterized in that at least one of the information displayed on the object or the identification information of the portable terminal corresponds to registration information registered in a target system connected to the authentication system so that the user of the portable terminal is authenticated by the authentication system system.
Wherein the user of the portable terminal is authenticated only when the validity of the verification information included in the digital image is further judged.
Further comprising an insertion module for inserting predetermined insertion information into the digital image,
By the authentication system,
Wherein the user of the portable terminal is authenticated only when the validity of the insertion information included in the digital image is further judged.
An image receiving module for receiving a digital image of a predetermined object and having predetermined insertion information inserted by a portable terminal;
An extraction module for extracting the insertion information inserted in the received digital image; And
And a verification module for determining the validity of the extracted insertion information and authenticating the validity of the digital image or the user of the portable terminal if the validity of the insertion information is determined.
An image receiving module for receiving a digital image of a predetermined object from a portable terminal;
An identification information authentication module for verifying whether the information displayed on the object or the identification information of the portable terminal corresponds to registration information registered in a target system connected to the authentication system; And
And a verification module for authenticating a user of the portable terminal according to the identification result of the identification information authentication module.
The application system acquiring a digital image for a predetermined object through image shooting means of the portable terminal;
Inserting insertion information into the digital image obtained by the application system,
If the inserted digital image is transmitted to a predetermined authentication system, the validity of the inserted information is determined by the authentication system. If the validity of the embedded information is determined, the validity of the digital image or the user of the portable terminal The authentication method using the digital image.
Wherein the application system includes inserting the insertion information into metadata of the digital image or image information of the digital image,
Inserting encryption information or hash information of the insertion information at a predetermined position when inserting the insertion information into the meta data,
And inserting steganography, a watermark, or a digital stamp recognizable by the authentication system into the digital image when inserting the insertion information into the image information.
Further comprising the step of the application system transmitting, to the authentication system, the digital image in which the insertion information is inserted within a predetermined time from the time at which the digital image was acquired.
Wherein when the photographing time of the digital image included in the digital image and the time when the authentication system receives the digital image satisfy a predetermined condition,
The photographing position of the digital image included in the digital image and the position of the portable terminal confirmed by the authentication system satisfy a predetermined condition, or
Wherein the identification information of the portable terminal included in the digital image corresponds to the identification information of the portable terminal identified by the authentication system.
Inserting the one-time information received from the authentication system in the insertion information into the digital image,
Wherein validity of the digital image or a user of the portable terminal is authenticated when the one-time information inserted in the digital image is authenticated by the authentication system.
Wherein the application system further comprises receiving an image transmission request from the authentication system confirming successful authentication of the user through a predetermined target system,
The application system
Upon receipt of the image transfer request
The insertion information is inserted into the digital image
And acquiring the digital image.
A digital image including a first object and a second object,
A plurality of digital images comprising a first digital image comprising a first object and a second digital image comprising a second object,
And the user is authenticated by the authentication system if the information displayed on the first object and the second object correspond to each other.
When the first digital image and the second digital image are transmitted to the authentication system, the insertion information obtained from each of the first digital image and the second digital image is obtained by the authentication system so that the insertion information is specified The authentication method using the digital image.
The application system acquiring a digital image for a predetermined object through image shooting means of the portable terminal;
And transmitting the obtained digital image to an authentication system,
Characterized in that at least one of the information displayed on the object or the identification information of the portable terminal corresponds to registration information registered in a target system connected to the authentication system so that the user of the portable terminal is authenticated by the authentication system Authentication method using image.
Receiving a digital image in which an authentication system targets a predetermined object and in which predetermined insertion information is inserted by a portable terminal;
Extracting the insertion information inserted in the digital image received by the authentication system; And
Determining validity of the insertion information extracted by the authentication system, and authenticating the validity of the digital image or the user of the portable terminal if the validity of the insertion information is determined.
The authentication system receiving a digital image of a predetermined object from a portable terminal;
Confirming whether the information displayed on the object or the identification information of the portable terminal corresponds to registration information registered in a target system connected to the authentication system; And
And the authentication system authenticates the user of the portable terminal according to the confirmation result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150110550A KR20170018127A (en) | 2015-08-05 | 2015-08-05 | Method for certification using digital image, application system, and authentication system thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150110550A KR20170018127A (en) | 2015-08-05 | 2015-08-05 | Method for certification using digital image, application system, and authentication system thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20170018127A true KR20170018127A (en) | 2017-02-16 |
Family
ID=58264972
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150110550A KR20170018127A (en) | 2015-08-05 | 2015-08-05 | Method for certification using digital image, application system, and authentication system thereof |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20170018127A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20190013153A (en) * | 2017-07-31 | 2019-02-11 | 주식회사 케이티 | Authentication system and method of photographic informaton |
US10974537B2 (en) | 2019-08-27 | 2021-04-13 | Advanced New Technologies Co., Ltd. | Method and apparatus for certificate identification |
KR20230158740A (en) * | 2022-05-12 | 2023-11-21 | 이관희 | Method for preventing digital image forgery and computer readable medium storing program for executing the method |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20050009415A (en) | 2003-07-16 | 2005-01-25 | 양기철 | Method for portrait mutual certification and computer readable record medium on which program therefor is recorded |
-
2015
- 2015-08-05 KR KR1020150110550A patent/KR20170018127A/en unknown
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20050009415A (en) | 2003-07-16 | 2005-01-25 | 양기철 | Method for portrait mutual certification and computer readable record medium on which program therefor is recorded |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20190013153A (en) * | 2017-07-31 | 2019-02-11 | 주식회사 케이티 | Authentication system and method of photographic informaton |
US10974537B2 (en) | 2019-08-27 | 2021-04-13 | Advanced New Technologies Co., Ltd. | Method and apparatus for certificate identification |
KR20230158740A (en) * | 2022-05-12 | 2023-11-21 | 이관희 | Method for preventing digital image forgery and computer readable medium storing program for executing the method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101703713B1 (en) | Method for certification using digital image, application system, and authentication system thereof | |
EP3647977B1 (en) | Secure data communication | |
US11562363B2 (en) | Hardware and token based user authentication | |
EP3622689B1 (en) | Data verification | |
US9858567B2 (en) | Dynamic card verification values and credit transactions | |
JP2023062065A (en) | Using contactless card to securely share personal data stored in blockchain | |
US11228587B2 (en) | Method, system, device and software programme product for the remote authorization of a user of digital services | |
US20030012374A1 (en) | Electronic signing of documents | |
US10990776B2 (en) | Methods and devices for biometric verification | |
KR101748136B1 (en) | Method for certification using digital image, application system, and authentication system thereof | |
KR20170001864A (en) | System and method for verifying validity of digital image | |
KR20170018127A (en) | Method for certification using digital image, application system, and authentication system thereof | |
EP1280098A1 (en) | Electronic signing of documents | |
WO2003009217A1 (en) | Electronic signing of documents | |
JP2009086890A (en) | Application reception system and application reception method | |
JP6690686B2 (en) | Account opening system, account opening method, and program | |
KR20170121737A (en) | Method for Providing Non-Facing Certification by using Camera | |
AU2021107510A4 (en) | A method for electronic identity verification and management | |
KR20120107043A (en) | Method and system for providing non-facing certification by using camera, handheld device | |
WO2023038734A1 (en) | Image authentication | |
JP2023179334A (en) | Authentication method, authentication system, portable information device, and authentication device | |
TWM592132U (en) | Online registration system | |
JP2003060879A (en) | Electronic signature for document | |
JP2019159555A (en) | Information processing apparatus and recognition method | |
Reagan et al. | Identity Management for Large e-Government Populations. |