KR20170040913A - These security the enhanced functionality portable wireless authentication methods and apparatus - Google Patents
These security the enhanced functionality portable wireless authentication methods and apparatus Download PDFInfo
- Publication number
- KR20170040913A KR20170040913A KR1020150140167A KR20150140167A KR20170040913A KR 20170040913 A KR20170040913 A KR 20170040913A KR 1020150140167 A KR1020150140167 A KR 1020150140167A KR 20150140167 A KR20150140167 A KR 20150140167A KR 20170040913 A KR20170040913 A KR 20170040913A
- Authority
- KR
- South Korea
- Prior art keywords
- information
- rfid
- authentication
- fingerprint information
- fingerprint
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0723—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10237—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the reader and the record carrier being capable of selectively switching between reader and record carrier appearance, e.g. in near field communication [NFC] devices where the NFC device may function as an RFID reader or as an RFID tag
-
- G06K9/00006—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
Abstract
The present invention relates to a portable wireless authentication method and apparatus, and more particularly, to a wireless authentication apparatus using an RFID module, A portable wireless authentication method in which a security function built in a ring form for preventing loss or illegal use of another person is prevented and an RFID reader having an identification code for authentication is provided as an RFID reader In which the biometric information data stored in advance is compared with the biometric information data input in real time for authentication, and the RFID data transmission and the personal authentication are limitedly performed only when they match, .
Description
The present invention relates to a portable wireless authentication method and apparatus, and more particularly, to a wireless authentication apparatus using an RFID module, the operation of the RFID module is restricted when the fingerprint information coincides with the biometric information through the fingerprint identification data The present invention relates to a portable wireless authentication method and apparatus for enhancing a security function that is built in a ring form for ease of portability and prevents illegal use of others.
As is well known, personal authentication has been developed as a variety of technologies and media in order to prevent unauthorized use in various information communication apparatuses and network facilities.
Such personal authentication is used to restrict access to the facility and to permit the use of the device. In real life, it is applied to a large number of devices such as a smart key of an automobile, a door lock of a home door, a safe, .
In general, a method of scanning a contact type card and a barcode, such as a magnetic card, has been used as a method of recognizing information. However, in recent years, a contactless method of transmitting information by a wireless communication method A technique based on the equation is used.
An authentication device using a preferred non-contact type RFID module, which is diffused and preferred, is mainly composed of a tag or a card having an embedded RFID chip and distributed to a user so that a tag or a card carried by the user is brought close to the RFID reader, It is known that a reader activates an RFID chip embedded in a tag or a card to read recorded data to authenticate the user, thereby opening the facility or using the device.
Such personal identification authentication apparatus is also applied to payment of a traffic fee or financial transaction.
However, such an RFID tag or card is portable and there is a great risk of loss.
In order to reduce the risk, there have been many attempts to incorporate an RFID module in a personal body.
Typically, they are intended to be worn on the human body, such as rings and watches, so as to improve the risk of loss and portability.
However, according to the related art, the convenience of carrying and the risk of loss are improved merely in the form of a ring, but if lost, a problem that an arbitrary user passes the authentication can not be avoided. Therefore, in a separate system for managing the RFID module There is a great problem that if there is a delay in the follow-up action, there is a possibility that damage may be caused by fraudulent use without any limitations.
Disclosure of Invention Technical Problem [6] The present invention is directed to a portable wireless authentication method and apparatus which overcomes the problems of the related art and enhances a security function, and solves the following problems.
The present invention provides a portable wireless authentication method with an enhanced security function that greatly enhances the function of preventing illegal use upon loss by selectively activating the RFID module by scanning biometrics information on a ring containing an RFID module for personal identification And a device therefor.
The present invention provides a portable wireless authentication method and apparatus in which an RFID module for personal identification is embedded in a ring, thereby enhancing a security function of reducing the ease of portability and loss concerns.
The present invention is to provide a portable wireless authentication method and apparatus in which a security function that is worn as a personal item and has no aesthetic hindrance to scan and input biometric information is enhanced.
To transmit the RFID data having the identification code for authentication to the RFID reader, the biometrics information data stored in advance is compared with the biometrics information data inputted in real time for authentication. , Which is a portable wireless authentication method with enhanced security functions for realizing RFID data transmission and personal authentication.
According to another aspect of the present invention, there is provided a control method for an RFID tag, comprising: an RFID module having an identification code for authentication; a scanner for scanning biometrics information of an individual; a storage unit for storing biometrics information of the scan- And a one-chip microcomputer for controlling the storage unit is built in the ring.
The ring may be applied to personal items such as rings, bracelets and necklaces.
The electric power of the components incorporated in the ring is dependent on the built-in battery, and the battery can be charged from the outside in a wired or wireless manner.
The biometric information may be any information such as fingerprint, iris, facial recognition, and vein scan information.
However, in consideration of the portability of the apparatus of the present invention, the description of the present invention will be limited to fingerprint information and is not necessarily limited to specific biometric information.
According to the present invention, biometrics information is scanned and stored in a ring containing an RFID module for personal identification, biometrics information is rescanned when authentication is required, and compared with stored scan data, thereby selectively activating the RFID module RFID module for personal identification is embedded in the ring to reduce the ease of portability and loss of concern, so that it can be conveniently used for portable use. It is a very useful invention that can be commercialized in various ring form and various biometric information so that there is no aesthetic obstacle to scan input.
1 is a conceptual diagram illustrating a portable wireless authentication method with enhanced security functions according to an embodiment of the present invention.
FIG. 2 is a conceptual diagram illustrating another embodiment of a portable wireless authentication method with enhanced security functions according to the present invention.
3 is a conceptual diagram illustrating another embodiment of a portable wireless authentication method having enhanced security functions according to the present invention.
4 is a block diagram showing a structure of a portable wireless authentication device with enhanced security function of the present invention.
FIG. 5 is a block diagram of a portable wireless authentication device having a security function enhanced according to the present invention. FIG.
FIG. 6 is a block diagram showing a structure of a portable wireless authentication apparatus having a security function enhanced according to the present invention. FIG.
FIG. 7 is a block diagram of a control device circuit as an example showing an internal configuration of a portable wireless authentication device with enhanced security function of the present invention. FIG.
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
1 to 3, a portable wireless authentication method in which the security function of the present invention is enhanced will be described.
The present invention relates to a method of performing personal authentication by transmitting an RFID information value embedded in a portable authentication device to an RFID reader, the fingerprint information being stored in the portable authentication device itself in the initial state of the portable authentication device, A fingerprint information input step of inputting user fingerprint information when a personal authentication is required after the fingerprint information is preregistered, a step of inputting fingerprint information to be stored in the fingerprint information stored in the pre-registration step A comparison information value transmission step of transmitting a matching or non-matching information value to the RFID comparison result, and a comparison information value transmission step of transmitting an authentication information value transmitted to the RFID reader by adding the input comparison information value to the RFID unique information value And the authenticity of the authentication information value of the RFID reader transmitted from the RFID is judged, And determines whether or not the processor is proceeding.
In order to enhance security, the invention of the above embodiment compares the fingerprint information previously registered with the fingerprint information for the second scan inputted to confirm whether the user is the same user, adds the fingerprint information comparison value to the existing portable RFID information value, The RFID reader side first confirms the identity of the authenticated RFID information value and the added fingerprint information comparison value and confirms the identity authentication secondarily.
In this authentication method, the program of the RFID reader side system in addition to the portable authentication device can be easily prepared by improving the RFID information value according to the increase of the digit of the RFID information value.
Also, in consideration of the non-contact wireless transmission of the RFID information value, it is advantageous that the result obtained by comparing the fingerprint information is added and processed with a flag value of a unit of unit.
Next, the invention of another embodiment shown in FIG. 2 will be described.
The present invention relates to a method for transmitting personal identification information by transmitting an RFID information value stored in a portable authentication device to an RFID reader, the fingerprint information being stored in the portable authentication device itself in the initial state of the portable authentication device, A fingerprint information input step of inputting user fingerprint information when a personal authentication is required after preliminarily registering the fingerprint information; a fingerprint information input step of comparing the fingerprint information scanned with the fingerprint information stored and registered in the pre-registration step An RFID transmission step of wirelessly transmitting the RFID information value when the information comparison result matches the information comparison result; and an RFID transmission deactivation step of blocking wireless transmission of the RFID information value when the information comparison result is inconsistent By controlling the RFID tag in one step, Is composed of the authentication information value authenticity of the side according to the determination to determine the progress of the authentication whether or not a subsequent processor.
According to another embodiment of the present invention, the first and second authentication methods are performed in the same manner as in the above embodiment. However, since the fingerprint information comparison value is added to the existing portable RFID information value and transmitted to the RFID reader side, The RFID information value is determined to be wirelessly transmitted, and the difference is that authentication is realized without changing the RFID reader side system.
Therefore, the change of the authentication system can be minimized.
Next, the invention of another embodiment shown in FIG. 3 will be described.
The present invention relates to a method of transmitting personal identification information by transmitting an RFID information value stored in a portable authentication device to an RFID reader, A fingerprint information input step of inputting user fingerprint information when personal authentication is required after pre-registering the fingerprint information, and an authentication information value transmission step of wirelessly transmitting the fingerprint information to the RFID reader together with the RFID information And determining whether the subsequent processor is to proceed according to the authentication based on the authenticity of the authentication information value of the RFID reader transmitted from the RFID.
According to another embodiment of the present invention, the first and second authentication methods are performed in the same manner as in the above embodiment, but the fingerprint information value is added to the existing portable RFID information value and transmitted to the RFID reader side. The difference is that it is mainly implemented in the RFID reader side.
In this authentication method, as in the above embodiment, the program of the RFID reader side system other than the portable authentication device can be prepared easily by changing the RFID information value.
A configuration of an authentication apparatus of the present invention implementing the above-described authentication method will be described in detail with reference to FIGS. 4 to 7 attached hereto.
FIG. 7 is a block diagram illustrating a structure of a portable wireless authentication apparatus with enhanced security functions according to the present invention.
The fingerprint scanner (2) and the fingerprint scanner (2) are stored in the portable authentication device, and the fingerprint scanner (2) and the fingerprint scanner (2) And a built-in
The one-
The authentication device may be a non-power-source type in which the RFID information value is transmitted by the electromagnetic wave of the RFID reader, or a built-in battery or a rechargeable battery. The rechargeable battery may be applied as a wired / wireless rechargeable battery. It may be carried out by selectively applying known techniques.
As shown in FIGS. 4 to 6, the authentication device may be a ring or a ring of a bracelet, and the
The authentication device may be in the form of a ring or bracelet ring and the
The authentication device may be any one of a flat card and a coin type in which the
The present invention is used for various factors such as permission to use an access permission facility and an apparatus using an ordinary RFID module. In case that the RFID module is lost, malicious use by a fraudulent acquirer is prevented.
That is, the fingerprint information of one user is input in advance to the portable authentication device, and the fingerprint information is additionally scanned and inputted in real time every time of use. The RFID reader is limited or controlled by comparing the existing stored fingerprint information with the real time fingerprint information, By judging the authenticity of the received information, the security function can be greatly enhanced by the authentication process using the RFID and the second user fingerprint information.
The parts of the
1: RFID module 2: scanner
3: One chip microprocessor 10: Authentication device
12: touch groove 14: touch surface
Claims (7)
A fingerprint information pre-registration step of storing the fingerprint information of the user himself / herself in the portable authentication device itself in an initial state of the portable authentication device,
A fingerprint information input step of scanning and inputting user fingerprint information when personal authentication is required after preregistration of fingerprint information;
An information comparison step of comparing the fingerprint information scanned and input with the fingerprint information stored and registered in the pre-registration step;
A comparison information value transmission step of transmitting a matching or non-matching information value to the RFID comparison result to the RFID,
An authentication information value transmission step of adding the inputted comparison information value to the RFID unique information value and wirelessly transmitting the added RFID information value to the RFID reader,
And determining whether to proceed with a subsequent processor based on the authenticity of the authentication information value of the RFID reader transmitted from the RFID.
A fingerprint information pre-registration step of storing the fingerprint information of the user himself / herself in the portable authentication device itself in an initial state of the portable authentication device,
A fingerprint information input step of inputting user fingerprint information when personal authentication is required after the fingerprint information is preregistered; an information comparing step of comparing fingerprint information stored in the fingerprint information stored in the pre-registration step with the input fingerprint information,
An RFID transmission activation step of wirelessly transmitting an RFID information value when the information comparison result matches the information comparison result,
An RFID transmission deactivation step of blocking wireless transmission of the RFID information value when the information comparison result is inconsistent,
Wherein the controller is configured to control the RFID reader according to the authentication information value of the RFID reader transmitted from the RFID by controlling the activation or deactivation of the RFID reader. Enhanced portable wireless authentication method.
A fingerprint information pre-registration step of storing the fingerprint information of the user himself / herself in the portable authentication device itself in an initial state of the portable authentication device,
A fingerprint information input step of scanning and inputting user fingerprint information when personal authentication is required after preregistration of fingerprint information;
An authentication information value transmission step of wirelessly transmitting scan input fingerprint information to an RFID reader together with RFID information;
And determining whether to proceed with a subsequent processor based on the authenticity of the authentication information value of the RFID reader transmitted from the RFID.
A memory for storing fingerprint information values for storing, comparing and processing scan information of the RFID module 1, the fingerprint scanner 2 and the fingerprint scanner 2, and a memory for controlling the RFID module 1 And a one-chip microprocessor (3) including a program and an interface are built in the portable wireless authentication apparatus.
Wherein the authentication device comprises a ring or a ring of a bracelet, and the scanner (2) is formed with a recessed touch groove (12).
Characterized in that the authentication device comprises a ring or a bracelet ring and the scanner part (2) comprises a touch surface (14) of different color or different material from the ring. .
The authentication device is formed of a flat card or a coin type in which the scanner 2 is disposed and the scanner 2 is formed by forming a touch surface 14 having a different color or different material from that of the other surface A portable wireless authentication device with enhanced security.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150140167A KR20170040913A (en) | 2015-10-06 | 2015-10-06 | These security the enhanced functionality portable wireless authentication methods and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150140167A KR20170040913A (en) | 2015-10-06 | 2015-10-06 | These security the enhanced functionality portable wireless authentication methods and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20170040913A true KR20170040913A (en) | 2017-04-14 |
Family
ID=58579542
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150140167A KR20170040913A (en) | 2015-10-06 | 2015-10-06 | These security the enhanced functionality portable wireless authentication methods and apparatus |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20170040913A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102227917B1 (en) * | 2020-12-16 | 2021-03-15 | 주식회사 씨큐앤비 | Apparatus and method for non-contact unlocking of digital doorlock |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100675697B1 (en) | 2005-03-23 | 2007-01-29 | 여호룡 | User authentification method and apparatus by RFID chip and Smart card |
KR20100072198A (en) | 2007-08-19 | 2010-06-30 | 링보우 리미티드 | Finger-worn device and related methods of use |
KR101255928B1 (en) | 2011-10-20 | 2013-04-23 | 김태성 | Ring comprsing the elctronic chip |
KR20140050842A (en) | 2012-10-22 | 2014-04-30 | 나기권 | Jewelry and accessory applied nfc tag |
KR20150042069A (en) | 2013-10-10 | 2015-04-20 | 에스케이플래닛 주식회사 | Device function control method using RFID and Device therefor |
-
2015
- 2015-10-06 KR KR1020150140167A patent/KR20170040913A/en not_active Application Discontinuation
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100675697B1 (en) | 2005-03-23 | 2007-01-29 | 여호룡 | User authentification method and apparatus by RFID chip and Smart card |
KR20100072198A (en) | 2007-08-19 | 2010-06-30 | 링보우 리미티드 | Finger-worn device and related methods of use |
KR101255928B1 (en) | 2011-10-20 | 2013-04-23 | 김태성 | Ring comprsing the elctronic chip |
KR20140050842A (en) | 2012-10-22 | 2014-04-30 | 나기권 | Jewelry and accessory applied nfc tag |
KR20150042069A (en) | 2013-10-10 | 2015-04-20 | 에스케이플래닛 주식회사 | Device function control method using RFID and Device therefor |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102227917B1 (en) * | 2020-12-16 | 2021-03-15 | 주식회사 씨큐앤비 | Apparatus and method for non-contact unlocking of digital doorlock |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230195865A1 (en) | Biometric identification device and methods of use | |
CN104508674B (en) | System and device for certification user | |
RU2391705C2 (en) | Portable data carrier, external device, system and methods for wireless data transfer | |
US6980673B2 (en) | Fingerprint identification system, fingerprint identification apparatus, fingerprint identification method, and biometric identification apparatus | |
KR101667388B1 (en) | System for relaying financial transaction with multiple safety function using finger vein and fingerprint to authenticate at the same time and method for processing thereof | |
KR20150113152A (en) | Smart card and smart card system with enhanced security features | |
US20050188213A1 (en) | System for personal identity verification | |
CN103699995A (en) | Payment authentication method based on fingerprints and finger veins | |
EP1421543A1 (en) | User-wearable wireless transaction device with biometrical user validation | |
CA3194491A1 (en) | Biometric-based identity authentication | |
KR101617855B1 (en) | System for relaying financial transaction with multiple safety function using finger vein authentication and method for processing thereof | |
CN110048998A (en) | Auth method and its system, intelligent door lock based on Token | |
EP3451216B1 (en) | Multi-functional identification recognition system capable of recognizing the identity of users | |
KR101717754B1 (en) | System for relaying financial transaction with multiple safety function using finger vein authentication | |
KR20170040913A (en) | These security the enhanced functionality portable wireless authentication methods and apparatus | |
CN108780476A (en) | Method for verifying personnel identity | |
JP2004070894A (en) | Card system with individual identification | |
KR101853266B1 (en) | Portable secure authentication apparatus using fingerprint | |
KR20060125033A (en) | System for activating/deactivating ic cards, using electronic fingerprint recognition | |
KR20040028210A (en) | Apparatus for Identifying a Person through Recognizing a Face and Method thereof | |
Imam et al. | Multi-banking automatic teller machine transaction system by utilizing GSM and biometric identification with one single touch | |
US20140032923A1 (en) | System and device for authenticating a user | |
KR20040037449A (en) | A Mobile Fingerprint Key And A Verification System using thereof | |
CA2970007A1 (en) | The bioid nfc smart card | |
Vikram et al. | ATM Security and Privacy Preserving System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |