WO2011118871A1 - 휴대단말기를 이용한 인증 방법 및 시스템 - Google Patents
휴대단말기를 이용한 인증 방법 및 시스템 Download PDFInfo
- Publication number
- WO2011118871A1 WO2011118871A1 PCT/KR2010/002590 KR2010002590W WO2011118871A1 WO 2011118871 A1 WO2011118871 A1 WO 2011118871A1 KR 2010002590 W KR2010002590 W KR 2010002590W WO 2011118871 A1 WO2011118871 A1 WO 2011118871A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- identifier
- information
- service server
- mobile terminal
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Definitions
- the present invention relates to an authentication method and system using a mobile terminal, and more particularly, to an authentication method and system using a mobile terminal that blocks authentication by others by performing authentication in connection with a mobile terminal, a service server, and an authentication system. It is about.
- portals or banks authenticate users by performing ID / password-based authentication, or perform user authentication using a public certificate.
- the ID / password based authentication method is performed in banks, portals, and various other service servers, but personal information and authentication information stored in the service server are leaked by hacking by an external intruder.
- OTP one-time password
- the service server handles authentication, when the service server is hacked, all user information of a user registered in the service server is exposed, thereby disabling user authentication.
- the user terminal which is more vulnerable than the service server, is very vulnerable to various malicious codes spread through the Internet.
- the malicious code infiltrated into the user's terminal obtains the authentication information by intercepting the key value of the keyboard when the user types the authentication information (for example, ID / password) on the keyboard or obtains a public certificate stored in the user terminal. The user's authentication information is being pulled out.
- the present applicant intends to propose an authentication method and system using a mobile terminal that forms an authentication route that cannot be hacked at the same time in place of an authentication method based on a single server, thereby improving the security of authentication information.
- an object of the present invention is to provide an authentication method using a portable terminal which is convenient to use while increasing security by not exposing authentication information by external intrusion or hacking unless the portable terminal, the service server, and the authentication system are hacked simultaneously. To provide a system.
- An object of the present invention is performed through a service server and an authentication system capable of network connection with a mobile terminal, obtaining information about an identifier exposed on the login screen of the user terminal through the mobile terminal, the service server through the Determining whether the identifier is a legitimate identifier, and if the identifier is legitimate, acquiring authentication information from the portable terminal to perform authentication on the portable terminal, and if authentication on the portable terminal is processed, the service server is substituted. By authenticating the user terminal given the identifier is implemented.
- An object of the present invention is performed through a service server and an authentication system capable of network connection with a mobile terminal, and acquires any one of an image and text including an identifier exposed on the login screen of the user terminal through the mobile terminal. Extracting an identifier from any one of the step, the image, and the text, determining the validity of the extracted identifier through the service server, and obtaining the authentication information with the portable terminal when the valid identifier is the valid identifier. Performing authentication for the mobile terminal, and authenticating the user terminal to which the identifier is assigned on behalf of the service server.
- An object of the present invention the service server interworking module sharing the same identifier information as the service server, the authentication of the service server displayed on the screen of the user terminal via the user's portable terminal when the user terminal connected to the network requests user authentication
- An identifier authentication module for acquiring identifier information on a screen, determining the validity of the identifier of the portable terminal by referring to the obtained identifier information and the identifier information shared with the service server, and when the identifier is valid, the portable terminal It is implemented through an authentication processing module for processing the authentication of the mobile terminal, and the service server for the user terminal with reference to the authentication information transmitted through.
- the service server interworking module sharing the same identifier information as the service server, the authentication of the service server displayed on the screen of the user terminal via the user's portable terminal when the user terminal connected to the network requests user authentication Acquiring an identifier image displayed on the screen, performing image processing on the identifier image to obtain an identifier, and comparing the identifier information sharing the identifier obtained by the image processing module with the service server to carry An identifier authentication module for determining a validity of a terminal side identifier, and when the identifier is valid, processing authentication of the mobile terminal and the service server with respect to the mobile terminal with reference to the authentication information transmitted through the mobile terminal. Implemented through the authentication processing module.
- the present invention does not expose the authentication information of the user through simple penetration or hacking into the service server or the user terminal.
- the subject processing authentication and the subject providing the information for authentication are independent from the user terminal, the authentication information of the user is not leaked by the penetration into the service server or the user terminal.
- FIG. 1 is a conceptual diagram illustrating an authentication system and an authentication method using the authentication system according to the present invention.
- FIG. 2 is a block diagram of a portable terminal according to an embodiment of the present invention.
- FIG. 3 is a block diagram of an authentication system according to an embodiment of the present invention.
- FIG. 1 is a conceptual diagram illustrating an authentication system and an authentication method using the authentication system according to the present invention.
- reference numeral 50 denotes a "user terminal” such as a personal computer and a notebook computer.
- Reference numeral 100 denotes a "mobile terminal” such as a mobile phone, a smartphone, and a PDA,
- Reference numeral 200 denotes an authentication system of the present invention.
- Reference numeral 300 denotes a service server that provides various services to a user, such as a portal site, a general website, a blog, a public institution website, and a website of a financial institution such as a bank.
- the service server may be a web site of various forms for providing information to the user, may be a personal homepage, and a variety of web sites that require a login, and also requires the subscriber's information when registering for a particular website It can be a web site.
- the mobile terminal 100 is capable of wireless communication, it is preferable that the model having a controller capable of capturing an image using a camera, and can perform image processing on the captured image, and a memory.
- the camera is essential when the mobile terminal 100 photographs the identifier of the web site, but the camera is not essential when the identifier is acquired using a separate character or a special character.
- the identifier has a form of a character or a special character
- a user may input a character or a special character through a portable terminal and transmit the same to the authentication system 200.
- the authentication system 200 of the present invention can be connected to the service server via a wired or wireless network, and is connected to the mobile terminal 100 by a wireless network, or wired with a mobile communication server (not shown) of the mobile terminal 100 side. Must be accessible by network.
- the service server 300 when the user terminal 50 accesses the service server 300 to perform authentication, for example, when logging in, the service server 300 may be a user.
- the terminal 50 provides an authentication interface including an identifier.
- the authentication interface shown in FIG. 1 includes an input window for inputting an ID / password and an identifier 60.
- the identifier 60 has one of 1D, 2D, and 3D barcodes, but the behavior of the identifier 60 is not limited to the barcode image.
- the identifier 60 may have the form of a 1D barcode, 2D barcode, 3D barcode, figure, image, glyph, character, special character, and picture. Since the identifier 60 itself does not have the form of a file, even if it is leaked by hacking by a malicious code or an external intruder, the distributor or hacker of the malicious code cannot use it as it is.
- the identifier 60 is not maintained in a constant form, but is changed every time the user terminal 50 connects to the service server 300, so even if it is leaked by hacking, the identifier 60 cannot be reused. .
- hacking on authentication information may have reliability when the same ID / password is used repeatedly, but the present invention does not give such reliability because the identifier 60 is continuously changed.
- the identifier 60 does not itself authenticate the user.
- the identifier 60 is only necessary for one process for user authentication, and itself does not authenticate the user, nor does it expose authentication information.
- the portable terminal 100 After the authentication interface including the identifier 60 is displayed on the monitor of the user terminal 50, the user photographs the identifier 60 by using the mobile terminal 100, and the imaged identifier 60 is authenticated by the authentication system 200. ) Or perform image processing on the imaged identifier 60 to extract numeric strings, character strings, color values, barcode values, and other identifier information contracted with the authentication system 200.
- the portable terminal 100 should be provided with an identifier recognition module for generating identifier information by performing image processing for the identifier 60
- the identifier recognition module installed in the portable terminal 100 is a hardware or software form It can have
- the identifier recognition module performs image processing on the identifier 60 captured by the camera to read barcode values to read identifier information.
- the identifier information may be generated by acquiring a gray level or a color value of the image, wherein the gray level or the color value of the image is the whole image, the center of the image, and the like. Or it may be calculated for one region of the image.
- the portable terminal 100 provides the identifier information to the authentication system 200.
- the authentication system 200 is connected to the mobile terminal 100 through a wireless network to obtain identifier information, or uses an wired network through a mobile communication company server (not shown) that provides a communication service to the mobile terminal 100. Information can be obtained.
- the authentication system 200 is in an interlocking state with the service server 300 that provided the authentication interface to the user terminal 50, and the service server 300 shares information on the identifier provided to the user terminal 50. have.
- the identifier changes over time or changes each time a user connects to the service server 300.
- the authentication system 200 generates identifier information from the identifier provided by the service server 300 to the user terminal 50, and compares the identifier information provided by the mobile terminal 100 to determine validity of the identifier information. Subsequently, if the identifier information is determined to be legitimate, the authentication system 200 requests the authentication information to the mobile terminal 100, and the mobile terminal 100 provides the authentication information to the authentication system 200 to perform a final authentication process. Done.
- the authentication information is
- Biometric information such as iris information, fingerprints, and voice
- the authentication system 200 may be any one of temporary approval numbers issued to the mobile terminal 100.
- the temporary approval number may be a one-time approval number issued to the mobile terminal 100 when the identifier information of the mobile terminal 100 is justified.
- the user terminal 50 to be connected to the service server 300 itself does not perform authentication.
- the user terminal 50 only displays the identifier on the monitor screen in the authentication process, and does not itself be the subject of authentication.
- the identifier displayed on the user terminal 50 is required in the authentication process using the authentication information of the authentication system 200, and additional authentication is performed based on this. Therefore, even if the user terminal 50 is attacked by a hacker or malicious code and the identifier is exposed, no authentication can be performed for the user by using the identifier.
- the authentication system 200 as well as the service server 300 should be hacked at the same time, but this is not possible in a probability, the authentication system 200, the user terminal 50, And the exposure of the identifier is merely to obtain a barcode image, unless the association of the service server 300 is known.
- the service server 300 or the authentication system 200 when the service server 300 or the authentication system 200 receives an external intrusion, the service server 300 only displays the identifier on the screen of the user terminal 50, and thus does not have a means for authenticating the user. For example, an attacker, such as a hacker, cannot attack a service server and obtain authentication information about a user.
- the authentication system 200 receives an external intrusion, the authentication of the user is not performed unless the identifier information transmitted by the user terminal 50 and the identifier obtained from the service server 300 are given. Instead, the intruder may not log in to the service server 300, nor may he or she perform cash or account transfers through the financial institution server.
- the authentication system 200 obtains authentication information from the mobile terminal 100, and the authentication information also matches. When doing so, the service server 300 notifies the authentication result (authentication success or authentication failure). The service server 300 determines that it is possible to log in by authenticating the user terminal 50 where the identifier is issued according to the authentication result.
- the authentication information may be one or more of a phone number, a MAC address, USIM or SIM card information, and a user-configured authentication number of the mobile terminal 100.
- the MAC address is a unique number assigned to the communication module of the mobile terminal performing wired / wireless communication. Since the same address does not exist, the MAC address is very accurate and effective for identifying the mobile terminal 100.
- FIG. 2 is a block diagram of a portable terminal according to an embodiment of the present invention.
- the illustrated mobile terminal includes a wireless communication unit 110, an A / V (Audio / Video) input unit 120, a user input unit 130, an output unit 150, a power supply unit 160, a controller 140, and a memory ( 160).
- a / V Audio / Video
- the illustrated mobile terminal includes a wireless communication unit 110, an A / V (Audio / Video) input unit 120, a user input unit 130, an output unit 150, a power supply unit 160, a controller 140, and a memory ( 160).
- the wireless communication unit 110 performs voice or data communication with the base station through the antenna 101, and may perform a broadcast reception function such as a DMB, a Bluetooth function, and a wireless Internet function.
- a broadcast reception function such as a DMB, a Bluetooth function, and a wireless Internet function.
- the A / V input unit 120 may acquire an audio signal or a video signal, a microphone 123 may be used to input an audio signal, and a camera 121 may be used to input a video signal.
- the camera 121 photographs an identifier displayed on the monitor of the user terminal 50 and provides the captured image to the controller 140.
- the camera 121 may have a separate exposure control function for capturing an identifier displayed on the monitor according to an appropriate exposure.
- the microphone 123 is composed of a microphone and is provided for calling or recording.
- the microphone 123 converts an external voice or sound signal into an electrical signal and provides the converted signal to the controller 140.
- the user input unit 130 includes a numeric key, a menu key, and a function key, and is used as an operation control of a portable terminal, a number selection key for voice communication, a direction key, and the like.
- the output unit 150 includes a speaker 153 that outputs an audio or video signal, and a display unit 151.
- the speaker 153 plays a ring tone, plays a voice, or generates a play sound for an audio file.
- the display unit 151 displays the identifier image photographed by the camera 121 so that the user can determine whether the identifier has been accurately captured.
- the display unit 151 may provide an interface necessary for a call mode when the mobile terminal 100 is in a call mode, and may display a captured image when the mobile terminal 100 is in an image capture mode.
- the memory 160 may store temporary data generated while driving a program for program processing and control of the controller 140.
- the memory 160 may be a flash memory type, a hard disk type, a multimedia card micro type, a card type memory (for example, SD or XD memory), RAM And at least one of a ROM.
- the controller 140 controls the wireless communication unit 110, the A / V input unit 120, the user input unit 130, the output unit 150, and the memory 160 in general, and performs voice calls, data communication, and cameras. Process the captured image. In addition, the controller 140 processes the image photographed by the camera 121 to obtain identifier information from the identifier.
- the controller 140 includes an identifier recognition module 141 in the form of a hardware or software module for extracting identifier information from an image for obtaining identifier information.
- the identifier recognition module 141 extracts the identifier from the image in a manner agreed with the authentication system 200.
- the identifier recognition module 141 may read the barcode to obtain a barcode value. If the identifier displayed on the user terminal 50 is a color image, and the authentication system 200 is promised to give information about the type or color of the color, the identifier recognition module 141 may be operated by the camera 121. The type of the color of the picked-up image and the value for the color of the color can be obtained as identifier information. In addition, the identifier recognition module 141 may generate identifier information using the grayscale value of the grayscale of the image captured by the camera 121.
- the controller 140 may transmit the image captured by the camera 121 to the authentication system 200 through the wireless communication unit 110 without performing separate image processing.
- the control unit 140 transmits the image captured by the camera 121 through the wireless communication unit 110 or transmits the identifier based on the text and the special character to the authentication system 200 through the user input unit 130. Can transmit
- the authentication system 200 processes the image to extract an identifier, and the extracted identifier is used by the user terminal in the service server 300. Authentication is performed by comparing the identifier sent to 50.
- the power supply unit 160 supplies power to the portable terminal and is preferably in the form of charging and discharging for portability.
- the power supply unit 160 includes a battery capable of charging and discharging, and a power control device for regulating a voltage applied to the battery and a voltage output from the battery.
- FIG. 3 is a block diagram of an authentication system according to an embodiment of the present invention.
- the authentication system 200 includes a service server interworking module 210, an identifier authentication module 220, a terminal information request module 230, a smartphone authentication module 240, and an authentication number processing module 250. , And database 260.
- the service server interworking module 210 obtains the same identifier as that provided to the user terminal 50 from the service server 300 when the service server 300 provides the authentication interface including the identifier to the user terminal 50. Create identifier information.
- the service server interworking module 210 has a service request from the user terminal 50 when the user terminal 50 requests a service to the service server 300, for example, when the login screen is displayed.
- the identifier can be obtained from In this case, when an identifier is provided from the service server 300 to the user terminal 50, the service server interworking module 210 may obtain the same identifier as that provided to the terminal 50 from the service server 300.
- the service server interworking module 210 may generate an identifier and provide the generated identifier to the service server 300 to perform authentication.
- the service server 300 when the service server 300 requests a service from the user terminal 50, the service server 300 requests an image including an identifier or a text-based identifier from the service server interworking module 210, and the service server interworking module 210. ) Provides the image or text including the identifier to the service server 300.
- the service server interworking module 210 should not generate the same identifier in the same time zone.
- the service server interworking module 210 may randomly generate the identifier or generate the identifier according to a predetermined rule, but in any case, the same identifier should not be generated at the same time zone.
- the identifier authentication module 220 sends the captured image after the mobile terminal 100 captures the identifier displayed on the monitor, or sends the identifier formed by the mobile terminal 100 based on a character and a special character, or an authentication system.
- the identifier authentication module 210 compares the identifier information on the identifier of the user terminal 50 obtained from the service server interworking module 210 with the identifier information obtained through the mobile terminal 100, and if both match, It is determined as correct identifier information, otherwise it is determined as incorrect identifier information.
- the identifier authentication module 220 requests the service server 300 to transmit a new identifier to the user terminal 50 through the service server interworking module 210 for authentication. 50 may be re-authenticated or the authentication process may be terminated.
- the terminal information request module 230 is connected to a mobile communication company server (not shown) that provides a communication service to the mobile terminal 100 to obtain information about the mobile terminal 100 through the mobile communication company server, or the mobile terminal ( Obtain terminal information directly from 100).
- the terminal information request module 230 obtains the MAC address information or the user information from the mobile communication company server or the mobile terminal 100 to verify the authentication information of the mobile terminal, and provides the terminal information request module 230 to the smartphone authentication module 240.
- the smartphone authentication module 240 obtains user information, MAC address information, SIM or USIM card information of the mobile terminal through the terminal information request module 230, and the obtained information matches that previously stored in the database 260. Determine if you do.
- the database 260 includes mobile terminal 100 information, user information, and authentication information provided when a user registers initial authentication information.
- the smart phone authentication module 240 compares the information related to the mobile terminal 100 stored in the database 260 with the information of the mobile terminal 100 provided from the mobile communication company server or the mobile terminal 100 to obtain correct identifier information. It can be determined whether to transmit.
- the authentication information processing module 250 after the identifier authentication by the mobile terminal 100 is processed, authentication information provided by the mobile terminal 100, for example, ID / password, the authentication number agreed with the user, and authentication The system 200 receives one of the temporary authorization numbers issued to the mobile terminal 100 and determines whether the received authentication information matches that stored in the database 260. If the determination result is identical, the authentication information processing module 250 completes user authentication through the mobile terminal 100 and notifies the service server 300 that the authentication is successful.
- the service server 300 determines that the user terminal 50 has succeeded in authenticating when the authentication success is notified from the authentication information processing module 250, and allows normal access to the service server 300, and provides various services that a login accessor can enjoy.
- the service server 300 is a financial institution server such as a bank
- the service server 300 may be used by the user terminal 50 to perform an account transfer, query an account, use a loan service, process a utility bill, Or you can use a variety of services provided by financial institutions, such as other banks.
- the user does not need a separate OTP or an official certificate, but may use the OTP or an official certificate in parallel.
- a user authenticated by the authentication system 200 has the same effect as a login access using an OTP or a public certificate.
- the same identifier displayed on the user terminal 50 is not displayed on the other user terminal in the same time zone.
- the service server 300 does not provide the same identifier to other user terminals in the same time zone.
- the authentication system 200 transmits an identifier when the mobile terminal 100 transmits an identifier. You can verify that you are the correct user.
- any user terminal may attempt authentication, but in the present invention, the identifier is determined by the mobile terminal 100. It is limited to the user terminal 50 which can image. However, the user terminal 50 is not limited to only one, and any user terminal may perform authentication as long as the identifier can be imaged by the camera 121 of the mobile terminal 100. Therefore, unless an external intruder acquires the user's mobile terminal 100, even if the user obtains an identifier, obtains user information, or obtains authentication information, he or she accesses a bank or performs a financial transaction on behalf of the user. Inability to do will be self explanatory. Of course, even if an external intruder has a user's mobile terminal, he cannot perform financial transactions on behalf of the user unless he knows the user's authentication information.
- the image processing module 270 extracts the identifier by performing image processing on the image.
- image processing may be performed in the mobile terminal 100 or the authentication system 200.
- the image processing module 270 extracts the identifier from the image transmitted by the mobile terminal 100, extracts the identifier through the form of a specific position of the image, or the image
- a barcode may be read, an identifier may be obtained using a color value of an image, or an identifier may be obtained using a grayscale value of an image.
- the identifier displayed on the user terminal 50 is a color image and is expressed in gray levels of 0 to 255
- the identifier may be represented by a value of 0 to 255.
- an identifier may be generated using dozens of color values and 255 gray level values. The identifier may be generated by substituting the gray value and the color value into a predetermined equation.
- the image processing module 270 may generate an identifier by replacing a form of a specific position of the image with a barcode or a number. It is noted that the method of obtaining the identifier through the image is various and is not limited to the one described herein.
- the present invention authenticates a user by linking a mobile terminal, an identifier displayed and provided by a service server to a user terminal, and authentication information. Therefore, unless the external intruder collects the information required for authentication at the same time from the mobile terminal, the service server, and the user terminal, authentication cannot be performed on behalf of the user.
- the present invention can be used to handle authentication in portal sites, financial institutions such as banks, personal blogs, homepages, and various other websites using the Internet.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (12)
- 서비스 서버, 및 휴대단말기와 네트워크 접속이 가능한 인증 시스템을 통해 수행되며,휴대단말기를 통해 사용자 단말기의 로그인 화면에 노출되는 식별자에 대한 정보를 획득하는 단계;상기 서비스 서버를 통해 상기 식별자가 정당한 식별자인가를 판단하며, 정당한 식별자일 경우, 상기 휴대단말기로부터 인증정보를 획득하여 상기 휴대단말기에 대한 인증을 수행하는 단계; 및상기 휴대단말기에 대한 인증이 처리되면, 상기 서비스 서버를 대신하여 상기 식별자가 부여된 사용자 단말기를 인증하는 단계;를 포함하는 것을 특징으로 하는 휴대단말기를 이용한 인증방법.
- 제1항에 있어서,상기 식별자는,바코드, 이미지, 그림, 도형, 문자, 특수문자, 및 상형문자 중 적어도 하나인 것을 특징으로 하는 휴대단말기를 이용한 인증 방법.
- 제1항에 있어서,상기 인증 정보는,인증 번호, 홍체 정보, 음성, 및 지문 중 어느 하나인 것을 특징으로 하는 휴대단말기를 이용한 인증 방법.
- 제1항에 있어서,상기 휴대 단말기를 인증하는 단계는,상기 휴대단말기가 전송한 인증정보를 상기 인증 시스템에 기 등록된 휴대 단말기 정보, 및 인증 정보와 비교하여 인증하는 단계인 것을 특징으로 하는 휴대단말기를 이용한 인증 방법.
- 제4항에 있어서,상기 인증 정보는,상기 휴대단말기의 폰 번호, MAC 어드레스, 및 사용자 설정된 인증번호 중 하나인 것을 특징으로 하는 휴대단말기를 이용한 인증 방법.
- 서비스 서버, 및 휴대단말기와 네트워크 접속이 가능한 인증 시스템을 통해 수행되며,휴대단말기를 통해 사용자 단말기의 로그인 화면에 노출되는 식별자를 포함하는 이미지, 및 텍스트 중 어느 하나를 획득하는 단계;상기 이미지, 및 텍스트 중 어느 하나에서 식별자를 추출하고, 상기 서비스 서버를 통해 상기 추출된 식별자에 대한 정당성을 판단하며, 정당한 식별자일 때, 상기 휴대단말기로부터 인증정보를 획득하여 상기 휴대단말기에 대한 인증을 수행하는 단계; 및상기 휴대단말기에 대한 인증이 성공하면, 상기 서비스 서버를 대신하여 상기 식별자가 부여된 사용자 단말기를 인증하는 단계;를 포함하는 것을 특징으로 하는 휴대단말기를 이용한 인증방법.
- 서비스 서버와 동일한 식별자 정보를 공유하는 서비스 서버 연동모듈;네트워크 접속되는 사용자 단말기가 사용자 인증을 요청 시, 사용자의 휴대단말기를 통해 사용자 단말기의 화면에 표시되는 상기 서비스 서버의 인증 화면에서 식별자 정보를 획득하고, 획득한 식별자 정보, 및 상기 서비스 서버와 공유하는 식별자 정보를 참조하여 상기 휴대단말기 측 식별자의 정당성을 판단하는 식별자 인증모듈; 및상기 식별자가 정당할 때, 상기 휴대단말기를 통해 전송되는 인증 정보를 참조하여 상기 휴대단말기, 및 상기 사용자 단말기에 대한 상기 서비스 서버의 인증을 처리하는 인증 처리모듈;을 포함하는 휴대단말기를 이용한 인증 시스템.
- 제7항에 있어서,상기 식별자는,바코드, 이미지, 그림, 도형, 문자, 특수문자, 및 상형문자 중 적어도 하나인 것을 특징으로 하는 휴대단말기를 이용한 인증 시스템.
- 제7항에 있어서,상기 인증 정보는,인증 번호, 홍체 정보, 음성, 및 지문 중 어느 하나인 것을 특징으로 하는 휴대단말기를 이용한 인증 시스템.
- 제7항에 있어서,상기 휴대단말기에 대한 정보를 이동통신사 서버 또는 휴대 단말기로부터 획득하여 상기 인증 처리모듈로 제공하는 단말기정보 요청모듈;을 더 포함하는 것을 특징으로 하는 휴대단말기를 이용한 인증 시스템.
- 제7항에 있어서,상기 휴대단말기는,휴대폰, 스마트폰, 및 PDA 중 어느 하나인 것을 특징으로 하는 휴대단말기를 이용한 인증 시스템.
- 서비스 서버와 동일한 식별자 정보를 공유하는 서비스 서버 연동모듈;네트워크 접속되는 사용자 단말기가 사용자 인증을 요청 시, 사용자의 휴대단말기를 통해 사용자 단말기의 화면에 표시되는 상기 서비스 서버의 인증 화면에표시되는 식별자 이미지를 획득하고, 상기 식별자 이미지에 대해 이미지 프로세싱을 수행하여 식별자를 획득하는 이미지 처리모듈;상기 이미지 처리모듈에서 획득한 식별자를 상기 서비스 서버와 공유하는 식별자 정보를 비교하여 상기 휴대단말기 측 식별자의 정당성을 판단하는 식별자 인증모듈; 및상기 식별자가 정당할 때, 상기 휴대단말기를 통해 전송되는 인증 정보를 참조하여 상기 휴대단말기, 및 상기 사용자 단말기에 대한 상기 서비스 서버의 인증을 처리하는 인증 처리모듈;을 포함하는 휴대단말기를 이용한 인증 시스템.
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010800668446A CN103039098A (zh) | 2010-03-26 | 2010-04-26 | 利用便携终端器的认证方法及系统 |
EP10848513A EP2552142A1 (en) | 2010-03-26 | 2010-04-26 | Authentication method and system using portable terminal |
JP2013501170A JP2013524314A (ja) | 2010-03-26 | 2010-04-26 | 携帯端末機を用いた認証方法及びシステム |
CA2794398A CA2794398A1 (en) | 2010-03-26 | 2010-04-26 | Authentication method and system using mobile terminal |
US13/627,267 US20130023241A1 (en) | 2010-03-26 | 2012-09-26 | Authentication method and system using portable terminal |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2010-0027315 | 2010-03-26 | ||
KR20100027315 | 2010-03-26 | ||
KR1020100036435A KR100992573B1 (ko) | 2010-03-26 | 2010-04-20 | 휴대단말기를 이용한 인증 방법 및 시스템 |
KR10-2010-0036435 | 2010-04-20 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/627,267 Continuation US20130023241A1 (en) | 2010-03-26 | 2012-09-26 | Authentication method and system using portable terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2011118871A1 true WO2011118871A1 (ko) | 2011-09-29 |
Family
ID=43409419
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2010/002590 WO2011118871A1 (ko) | 2010-03-26 | 2010-04-26 | 휴대단말기를 이용한 인증 방법 및 시스템 |
Country Status (7)
Country | Link |
---|---|
US (1) | US20130023241A1 (ko) |
EP (1) | EP2552142A1 (ko) |
JP (1) | JP2013524314A (ko) |
KR (1) | KR100992573B1 (ko) |
CN (1) | CN103039098A (ko) |
CA (1) | CA2794398A1 (ko) |
WO (1) | WO2011118871A1 (ko) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013151851A2 (en) | 2012-04-01 | 2013-10-10 | Authentify, Inc. | Secure authentication in a multi-party system |
WO2016153123A1 (ko) * | 2015-03-24 | 2016-09-29 | 손태식 | Mac 어드레스를 이용하여 인증을 수행하기 위한 시스템 및 그 방법 |
Families Citing this family (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2481663B (en) | 2010-11-25 | 2012-06-13 | Richard H Harris | Handling encoded information |
KR101257761B1 (ko) * | 2011-03-21 | 2013-04-24 | 주식회사 잉카인터넷 | 이미지 기반 인증시스템 및 방법 |
KR101365197B1 (ko) * | 2012-02-14 | 2014-02-19 | 한국모바일인증 주식회사 | 모바일 단말을 이용한 사용자 인증 처리 서비스 제공 방법 |
US20130311382A1 (en) | 2012-05-21 | 2013-11-21 | Klaus S. Fosmark | Obtaining information for a payment transaction |
US9642005B2 (en) * | 2012-05-21 | 2017-05-02 | Nexiden, Inc. | Secure authentication of a user using a mobile device |
US9521548B2 (en) * | 2012-05-21 | 2016-12-13 | Nexiden, Inc. | Secure registration of a mobile device for use with a session |
KR101206852B1 (ko) | 2012-08-27 | 2012-12-03 | 주식회사 잉카인터넷 | 이미지 기반 인증시스템 및 방법 |
KR101388935B1 (ko) * | 2012-10-22 | 2014-04-24 | 소프트포럼 주식회사 | 2채널 기반의 사용자 인증 장치 및 방법 |
KR101405832B1 (ko) * | 2012-10-22 | 2014-06-11 | 주식회사 잉카인터넷 | 이동통신기기를 이용한 로그인 인증 시스템 및 방법 |
CN102932793A (zh) * | 2012-11-15 | 2013-02-13 | 北京易和迅科技有限公司 | 基于二维码的无线网络认证方法和系统 |
US20140279542A1 (en) * | 2013-03-15 | 2014-09-18 | Independence Bancshares, Inc. | Mobile currency messaging systems |
CN104468108A (zh) * | 2013-09-18 | 2015-03-25 | 上海耕云供应链管理有限公司 | 基于条形码的用户身份认证系统及认证方法 |
KR101450013B1 (ko) * | 2013-12-20 | 2014-10-13 | 주식회사 시큐브 | 빠른 응답 코드를 이용한 인증 시스템 및 방법 |
US9847667B2 (en) * | 2014-02-26 | 2017-12-19 | Htc Corporation | Method of handling wireless charging authentication |
CN104869107A (zh) * | 2014-02-26 | 2015-08-26 | 腾讯科技(深圳)有限公司 | 一种身份验证方法、可穿戴设备、验证服务器及其系统 |
KR101468977B1 (ko) * | 2014-03-18 | 2014-12-04 | 성 탁 문 라파엘 | 모바일 디바이스를 이용한 인증방법 및 시스템 |
KR101535952B1 (ko) * | 2014-03-20 | 2015-07-24 | 주식회사 한국인터넷기술원 | 인식코드를 이용한 사용자 인증 장치 및 방법 |
CN108551675B (zh) | 2014-04-14 | 2022-04-15 | 创新先进技术有限公司 | 一种应用客户端、服务端及对应的Portal认证方法 |
US10008057B2 (en) | 2014-08-08 | 2018-06-26 | Live Nation Entertainment, Inc. | Short-range device communications for secured resource access |
US9489787B1 (en) | 2014-08-08 | 2016-11-08 | Live Nation Entertainment, Inc. | Short-range device communications for secured resource access |
CN105574400B (zh) * | 2014-11-10 | 2018-08-31 | 联想(北京)有限公司 | 一种信息处理方法及电子设备 |
KR101494854B1 (ko) * | 2014-12-10 | 2015-02-23 | 주식회사 인포바인 | 웹 혹은 어플리케이션 내 로그인 필드를 자동 감지하여 입력하는 간편 로그인 방법 및 이를 위한 장치 |
KR102338864B1 (ko) | 2015-02-12 | 2021-12-13 | 삼성전자주식회사 | 전자 장치 및 전자 장치에서의 지문 등록 방법 |
KR101977131B1 (ko) * | 2015-06-02 | 2019-08-28 | 남기원 | 서브인증을 통한 맞춤형 금융처리 시스템 및 그 방법 |
WO2017009915A1 (ja) * | 2015-07-10 | 2017-01-19 | 富士通株式会社 | 機器認証システム、管理装置及び機器認証方法 |
WO2017022121A1 (ja) * | 2015-08-06 | 2017-02-09 | 三菱電機株式会社 | 認証装置、認証システム、及び認証方法 |
CN106487767B (zh) * | 2015-08-31 | 2020-01-21 | 阿里巴巴集团控股有限公司 | 验证信息的更新方法及装置 |
CN105554014B (zh) * | 2015-12-30 | 2019-03-08 | 联想(北京)有限公司 | 一种无线网络的登录方法以及第一电子设备 |
KR101856530B1 (ko) * | 2016-03-17 | 2018-06-21 | 순천향대학교 산학협력단 | 사용자 인지 기반 암호화 프로토콜을 제공하는 암호화 시스템 및 이를 이용하는 온라인 결제 처리 방법, 보안 장치 및 거래 승인 서버 |
KR101921516B1 (ko) * | 2016-03-17 | 2019-02-14 | 순천향대학교 산학협력단 | 이용 단말 지정과 결합된 거래 연동 방법 및 시스템 |
KR101865879B1 (ko) * | 2016-04-27 | 2018-06-12 | 주식회사 하렉스인포텍 | 선승인에 의한 금융거래 제공 시스템 및 그 방법 |
KR102554551B1 (ko) * | 2016-08-10 | 2023-07-11 | 김철회 | 전자펜 및 전자펜의 사용자 인증 방법 |
CN106507301A (zh) * | 2016-10-26 | 2017-03-15 | 朱育盼 | 认证方法和装置 |
US11177963B2 (en) * | 2017-12-12 | 2021-11-16 | Thales Dis France Sa | Method for authenticating a user based on an image relation rule and corresponding first user device, server and system |
US11403646B2 (en) | 2019-03-01 | 2022-08-02 | Shopify Inc. | Secure pin entry via mobile device |
CN112004228B (zh) * | 2019-05-27 | 2023-06-02 | 中国电信股份有限公司 | 实人认证方法及系统 |
US12021861B2 (en) * | 2021-01-04 | 2024-06-25 | Bank Of America Corporation | Identity verification through multisystem cooperation |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060009403A (ko) * | 2006-01-11 | 2006-01-31 | 주식회사 비즈모델라인 | 휴대용 무선 통신 장치 |
KR20060072993A (ko) * | 2004-12-24 | 2006-06-28 | 엘지전자 주식회사 | 이동통신 단말기의 카메라를 이용한 인증 처리 방법 |
KR20070080066A (ko) * | 2006-02-06 | 2007-08-09 | 에스케이 텔레콤주식회사 | 영상인식을 이용한 개인인증 및 전자서명 시스템 및 그방법 |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7512254B2 (en) * | 2001-11-07 | 2009-03-31 | Symbol Technologies, Inc. | System and method for mobile biometric authentication |
JP3437148B2 (ja) * | 2000-06-13 | 2003-08-18 | 株式会社エイティング | 携帯端末による電子決済方法 |
WO2002073483A1 (fr) * | 2001-03-13 | 2002-09-19 | Fujitsu Limited | Systeme de reglement par argent electronique a l'aide d'un terminal de communication mobile |
US7379567B2 (en) * | 2003-07-17 | 2008-05-27 | Matsushita Electric Industrial Co., Ltd. | Iris code generation method, individual authentication method, iris code entry device, individual authentication device, and individual certification program |
US20070277224A1 (en) * | 2006-05-24 | 2007-11-29 | Osborn Steven L | Methods and Systems for Graphical Image Authentication |
JP2008077145A (ja) * | 2006-09-19 | 2008-04-03 | Anaheim Engineering Co Ltd | 認証システム、認証サーバ、システム管理サーバ、認証プログラム及びシステム管理プログラム |
JP5009012B2 (ja) * | 2007-03-16 | 2012-08-22 | Kddi株式会社 | 認証システム |
JP5258422B2 (ja) * | 2008-07-01 | 2013-08-07 | Kddi株式会社 | 相互認証システム、相互認証方法およびプログラム |
US8485438B2 (en) * | 2011-09-19 | 2013-07-16 | Google Inc. | Mobile computing device authentication using scannable images |
-
2010
- 2010-04-20 KR KR1020100036435A patent/KR100992573B1/ko active IP Right Review Request
- 2010-04-26 WO PCT/KR2010/002590 patent/WO2011118871A1/ko active Application Filing
- 2010-04-26 JP JP2013501170A patent/JP2013524314A/ja active Pending
- 2010-04-26 CA CA2794398A patent/CA2794398A1/en not_active Abandoned
- 2010-04-26 CN CN2010800668446A patent/CN103039098A/zh active Pending
- 2010-04-26 EP EP10848513A patent/EP2552142A1/en not_active Withdrawn
-
2012
- 2012-09-26 US US13/627,267 patent/US20130023241A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060072993A (ko) * | 2004-12-24 | 2006-06-28 | 엘지전자 주식회사 | 이동통신 단말기의 카메라를 이용한 인증 처리 방법 |
KR20060009403A (ko) * | 2006-01-11 | 2006-01-31 | 주식회사 비즈모델라인 | 휴대용 무선 통신 장치 |
KR20070080066A (ko) * | 2006-02-06 | 2007-08-09 | 에스케이 텔레콤주식회사 | 영상인식을 이용한 개인인증 및 전자서명 시스템 및 그방법 |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9641505B2 (en) | 2012-04-01 | 2017-05-02 | Early Warning Services, Llc | Secure authentication in a multi-party system |
WO2013151854A1 (en) | 2012-04-01 | 2013-10-10 | Authentify, Inc. | Secure authentication in a multi-party system |
EP2834959A4 (en) * | 2012-04-01 | 2015-11-11 | Authentify Inc | SECURE AUTHENTICATION IN A MULTIPARTY SYSTEM |
EP2834729A4 (en) * | 2012-04-01 | 2016-02-17 | Authentify Inc | SECURE AUTHENTICATION IN A MULTI-PARTY SYSTEM |
EP2834730A4 (en) * | 2012-04-01 | 2016-05-25 | Authentify Inc | SECURE AUTHENTICATION IN A MULTI-PARTY SYSTEM |
US9398012B2 (en) | 2012-04-01 | 2016-07-19 | Authentify, Inc. | Secure authentication in a multi-party system |
AU2013243771B2 (en) * | 2012-04-01 | 2017-01-12 | Payfone, Inc. | Secure authentication in a multi-party system |
US9641520B2 (en) | 2012-04-01 | 2017-05-02 | Early Warning Services, Llc | Secure authentication in a multi-party system |
WO2013151851A2 (en) | 2012-04-01 | 2013-10-10 | Authentify, Inc. | Secure authentication in a multi-party system |
US9742763B2 (en) | 2012-04-01 | 2017-08-22 | Early Warning Services, Llc | Secure authentication in a multi-party system |
AU2013243768B2 (en) * | 2012-04-01 | 2017-12-21 | Payfone, Inc. | Secure authentication in a multi-party system |
AU2013243769B2 (en) * | 2012-04-01 | 2018-03-15 | Payfone, Inc. | Secure authentication in a multi-party system |
WO2016153123A1 (ko) * | 2015-03-24 | 2016-09-29 | 손태식 | Mac 어드레스를 이용하여 인증을 수행하기 위한 시스템 및 그 방법 |
Also Published As
Publication number | Publication date |
---|---|
US20130023241A1 (en) | 2013-01-24 |
KR100992573B1 (ko) | 2010-11-05 |
CA2794398A1 (en) | 2011-09-29 |
CN103039098A (zh) | 2013-04-10 |
EP2552142A1 (en) | 2013-01-30 |
JP2013524314A (ja) | 2013-06-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2011118871A1 (ko) | 휴대단말기를 이용한 인증 방법 및 시스템 | |
WO2018124857A1 (ko) | 블록체인 기반의 모바일 아이디를 이용하여 사용자를 비대면 인증하는 방법, 단말 및 이를 이용한 서버 | |
US8739266B2 (en) | Universal authentication token | |
WO2011062364A2 (ko) | 유비쿼터스 인증 관리를 위한 사용자 인증 시스템, 사용자 인증장치, 스마트 카드 및 사용자 인증방법 | |
WO2018030707A1 (ko) | 인증 시스템 및 방법과 이를 수행하기 위한 사용자 단말, 인증 서버 및 서비스 서버 | |
WO2013141602A1 (ko) | 인증 방법 및 그 시스템 | |
WO2019177298A1 (en) | Method and apparatus for managing user authentication in a blockchain network | |
WO2017043717A1 (ko) | 생체인식 본인인증 방법 | |
WO2012043963A1 (en) | Authentication method and server | |
US20200351263A1 (en) | Dynamic user id | |
WO2015163558A1 (ko) | 생체 정보 인식을 이용한 결제 방법, 이를 위한 장치 및 시스템 | |
WO2022045419A1 (ko) | 블록체인 네트워크 기반의 분산 아이디를 이용한 운전 면허증 인증 서비스 방법 및 운전 면허증 인증 서비스를 수행하는 사용자 단말 | |
WO2019010669A1 (zh) | 一种身份合法性验证的方法、装置及系统 | |
WO2021071259A1 (ko) | 모바일 단말기용 개인정보 보안 디바이스 | |
WO2018169150A1 (ko) | 잠금화면 기반의 사용자 인증 시스템 및 방법 | |
WO2022097982A1 (ko) | 안면인식 기반 전자서명 서비스 제공 방법 및 서버 | |
WO2018128237A1 (ko) | 사용자의 이용패턴 분석을 활용한 본인 인증 시스템 및 사용자 단말 | |
WO2012074275A2 (ko) | 인터넷 보안을 위한 본인인증 장치, 그 방법 및 이를 기록한 기록매체 | |
WO2018043951A1 (ko) | 생체정보를 이용하여 결제 인증을 수행하는 포스 장치, 시스템 및 그 제어방법 | |
WO2011136464A1 (ko) | 비밀번호 키의 이동값을 이용하는 비밀번호 안전 입력 시스템 및 그 비밀번호 안전 입력 방법 | |
TW202405680A (zh) | 使用者登入及權限管理之方法及系統 | |
WO2012169752A2 (ko) | 접속 시도 기기 인증 시스템 및 방법 | |
KR20200004666A (ko) | 머신러닝과 블록체인을 이용한 생체정보 인증 시스템 | |
WO2014163420A1 (ko) | 본인 인증 시스템 및 그 제공방법 | |
JP6887551B1 (ja) | 認証システム、認証システムの制御方法及び認証装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201080066844.6 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10848513 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2794398 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2013501170 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010848513 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 9091/CHENP/2012 Country of ref document: IN |