WO2015137404A1 - Dispositif d'authentification, système d'authentification et programme - Google Patents

Dispositif d'authentification, système d'authentification et programme Download PDF

Info

Publication number
WO2015137404A1
WO2015137404A1 PCT/JP2015/057172 JP2015057172W WO2015137404A1 WO 2015137404 A1 WO2015137404 A1 WO 2015137404A1 JP 2015057172 W JP2015057172 W JP 2015057172W WO 2015137404 A1 WO2015137404 A1 WO 2015137404A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
image
user
image group
user terminal
Prior art date
Application number
PCT/JP2015/057172
Other languages
English (en)
Japanese (ja)
Inventor
半田 富己男
輝明 城
Original Assignee
大日本印刷株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 大日本印刷株式会社 filed Critical 大日本印刷株式会社
Priority to JP2016507796A priority Critical patent/JP6315080B2/ja
Publication of WO2015137404A1 publication Critical patent/WO2015137404A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Definitions

  • the present invention relates to an authentication technique using an image.
  • Patent Literature 1 discloses an authentication method that uses a color that is selectively displayed in a terminal screen area as a password.
  • the main object of the present invention is to provide an authentication device, an authentication system, and a program that can suitably execute highly secure user authentication without requiring a complicated password.
  • the authentication device includes a storage unit that stores, for each user, an image group constituting an authentication image set for each user, and a connection that receives a connection request including user identification information from the terminal.
  • a request reception unit For each image group, a request reception unit generates an authentication table indicating the image group candidate set for the user indicated by the user identification information and a code corresponding to the candidate, and transmits the authentication table to the terminal.
  • the authentication device includes a storage unit, a connection request reception unit, an authentication table transmission unit, a response reception unit, and a determination unit.
  • the storage unit stores, for each user, an image group constituting an authentication image set for each user.
  • the connection request receiving unit receives a connection request including user identification information from the terminal.
  • the authentication table transmission unit generates an authentication table indicating an image group candidate of an authentication image set for the user indicated by the user identification information and a code corresponding to the candidate for each image group constituting the authentication image, Send to the terminal.
  • the response receiving means receives, for each authentication table, a code corresponding to an image group candidate constituting the authentication image selected by the user of the terminal.
  • the determination unit determines whether or not the code received by the response reception unit indicates a code of an image group constituting the authentication image set by the user.
  • the user visually stores the authentication image
  • the authentication apparatus causes the user of the terminal to select the image group constituting the authentication image as a password.
  • the authentication device can increase the security by increasing the number of authentication elements without excessively increasing the burden for the user to remember the password.
  • the authentication table includes a name indicating the candidate for the image group, and the authentication table transmission unit sets the name indicating the image group set for the user for each authentication session.
  • the authentication apparatus prevents the name indicating the image group set for the user from being included in the authentication table every time, and the code of the authentication image set for the user can be detected by an attacker who intercepts communication repeatedly. Can be suitably suppressed.
  • the storage unit may include at least one of an image indicating a theme of the authentication image, an image indicating a background of the authentication image, and a conversion instruction of the theme as the image group.
  • an image indicating a theme of the authentication image an image indicating a background of the authentication image
  • a conversion instruction of the theme as the image group.
  • the authentication apparatus further includes key generation means for generating a session key shared with the terminal, and the authentication table transmission means encrypts and transmits the authentication table based on the session key. According to this aspect, user authentication can be executed more safely.
  • an authentication system comprising any one of the above-described authentication devices and a terminal connected to the authentication device via a network, wherein the terminal receives each of the authentication tables.
  • a selection receiving means for selectively displaying an image representing a candidate of the image group included in the authentication table for each of the authentication tables, and the image selected for each authentication table
  • Response transmitting means for transmitting a code corresponding to an image group candidate to be transmitted to the authentication device.
  • the authentication system can perform user authentication by causing the user to suitably specify an authentication image necessary for user authentication.
  • the transmission order of the codes corresponding to the candidates to be transmitted for each authentication table is changed for each authentication session.
  • the authentication system can make it difficult for the communication interceptor to guess the code of the authentication image.
  • the authentication table includes a name indicating a candidate for the image group
  • the authentication table transmission unit includes the image group set for the user to be included in the authentication table.
  • the name to be shown is determined by applying an algorithm shared with the terminal, and the selection receiving unit applies the algorithm to the name showing the image group set for the user included in the authentication table. Then, the image to be displayed is recognized.
  • the authentication system can change only the name of the image group for each authentication session without changing the entity of the image group set for the user, and communicates the code of the authentication image set for the user. It is possible to suitably suppress analogy to the eavesdropper.
  • a terminal device connected to the authentication device according to any one of the above through a network, an authentication table receiving unit that receives each of the authentication tables from the authentication device, and the authentication table
  • a selection receiving means for selectively displaying an image representing the image group candidate included in the authentication table, and an image group candidate corresponding to the image selected for each authentication table.
  • Response transmitting means for transmitting a code to the authentication device, the authentication table includes a name indicating the candidate image group, and the authentication device is set to the user included in the authentication table.
  • the name indicating the image group is determined by applying an algorithm shared with the terminal device, and the selection receiving means By applying the algorithm to the name indicating the image group set to the user contained in the authentication table, it recognizes an image to be displayed.
  • the terminal device performs user authentication by causing the user to preferably designate an image group that constitutes an authentication image necessary for user authentication.
  • the terminal device can intercept the code of the authentication image set for the user by changing only the name of the image group for each authentication session without changing the entity of the image group set for the user. It is possible to suitably suppress analogy to a person.
  • the program causes a computer to function as any one of the authentication devices described above.
  • the authentication apparatus according to the present invention can be configured by installing this program in a computer and causing it to function.
  • the program causes the computer to function as the terminal device described above. By installing this program in a computer and causing it to function, the terminal device according to the present invention can be configured.
  • user authentication can be performed safely based on an image group constituting an authentication image set for each user without requiring a complicated password input. .
  • the structure of the transaction system which concerns on 1st Embodiment is shown.
  • the block diagram of an authentication server is shown.
  • the block diagram of a user terminal is shown.
  • An example of the data structure of a password table is shown.
  • generated by the 1st authentication session is shown.
  • generated by the 2nd authentication session is shown.
  • the example of a display of a theme image selection screen is shown.
  • the example of a display of a background image selection screen is shown.
  • the structure of the transaction system which concerns on a modification is shown.
  • FIG. 1 shows a configuration of a transaction system according to the first embodiment.
  • the transaction system includes a service provider server 1 managed by a service provider such as a bank, and a user terminal 3 used by a user who receives the above service.
  • the service provider server 1 and the user terminal 3 perform data communication via a communication network 2 such as the Internet.
  • the service provider server 1 includes two servers, an authentication server 1A that performs user authentication of the user terminal 3 and a transaction server 1B that performs processing related to transactions after the user authentication.
  • the authentication server 1A and the transaction server 1B exchange data necessary for executing the assigned processing as necessary.
  • the authentication server 1A causes the user terminal 3 to specify an authentication image (also referred to as “authentication image”) registered for each user from the image group, and an image configured based on the specified image group is displayed. If it matches the registered authentication image, the user is authenticated as a valid user.
  • the transaction server 1B transmits display information of a transaction screen to the user terminal 3 or performs a transaction from the user terminal 3. Receive input information on the screen. Thereby, transaction server 1B performs the transaction which the user of user terminal 3 desires.
  • the user terminal 3 is a communication terminal such as a smartphone, for example, and has a display 41 on which a touch panel 42 is stacked in the example of FIG.
  • the user terminal 3 communicates with the authentication server 1A and receives user authentication from the authentication server 1A before executing processing related to the transaction with the transaction server 1B.
  • FIG. 2 is a block diagram of the authentication server 1A.
  • the authentication server 1A includes a display unit 11 such as a display, an input unit 12 such as a keyboard, a storage unit 13, a communication unit 14 that performs data communication, and a control unit 15. Each of these elements is connected to each other via a bus line 10.
  • the storage unit 13 is configured by a memory such as a hard disk or a flash memory.
  • the storage unit 13 stores a program executed by the control unit 15.
  • the storage unit 13 stores a table (also referred to as “password table Tp”) indicating image groups constituting authentication images set for each user.
  • the password table Tp includes, for each user, a “theme image” indicating an object displayed as the theme of the authentication image, a “background image” displayed on the background of the object, A “conversion instruction” for designating the direction of the object is stored as an image group of authentication images.
  • a specific example of the password table Tp will be described later with reference to FIG.
  • the control unit 15 includes a CPU (Central Processing Unit), a ROM (Read Only Memory), a RAM (Random Access Memory), and the like (not shown), and performs various controls on each component in the authentication server 1A.
  • CPU Central Processing Unit
  • ROM Read Only Memory
  • RAM Random Access Memory
  • the control unit 15 sets the image group registered in the password table Tp for each type of image group that forms the authentication image.
  • a table indicating candidates (also referred to as “authentication table Tc”) is generated and transmitted to the user terminal 3.
  • the authentication table Tc includes the file name of the theme image or background image or the command name of the conversion instruction, and the authentication code associated therewith.
  • the control part 15 determines whether the user of the user terminal 3 is a valid user by receiving the authentication code which shows the selection result in the authentication table Tc from the user terminal 3. .
  • the control unit 15 functions as a “connection request receiving unit”, “authentication table transmitting unit”, “response receiving unit”, “determination unit”, and a program executed by a computer.
  • the authentication table Tc including the file name of the theme image is also referred to as “first authentication table Tc1”, and the authentication table Tc including the file name of the background image is also referred to as “second authentication table Tc2”.
  • the authentication table Tc including the command name is also referred to as “third authentication table Tc3”.
  • FIG. 3 is a block diagram of the user terminal 3.
  • the user terminal 3 includes a display unit 31 such as a display 41, an input unit 32 such as a touch panel 42, a storage unit 33, a communication unit 34 that performs data communication, and a control unit 35. These elements are connected to each other via a bus line 30.
  • the storage unit 33 is configured by a memory such as a hard disk or a flash memory.
  • the storage unit 33 stores a program executed by the control unit 35.
  • the storage unit 33 stores image data corresponding to each file name of the theme image included in the first authentication table Tc1 transmitted from the authentication server 1A.
  • the storage unit 33 stores image data corresponding to each file name of the background image included in the second authentication table Tc2.
  • the storage unit 33 stores the setting of the orientation of the theme image corresponding to each command name of the conversion instruction included in the third authentication table Tc3.
  • the control unit 35 includes a CPU, a ROM, a RAM, and the like (not shown), and performs various controls on each component in the user terminal 3.
  • the control unit 35 performs a predetermined process by executing a program stored in the storage unit 33. For example, the control unit 35 displays a plurality of images on the display 41 based on the authentication table Tc received from the authentication server 1A, and accepts selection by the touch panel 42 or the like. Then, the control unit 35 transmits an authentication code corresponding to the image selected by the user to the authentication server 1A.
  • the control unit 35 functions as an “authentication table receiving unit”, a “selection receiving unit”, a “response transmitting unit”, and a program executed by the computer in the present invention.
  • FIG. 4 shows an example of the data structure of the password table Tp stored in advance in the storage unit 13.
  • the file name of the theme image, the file name of the background image, and the command name of the conversion instruction are associated with each user ID (user identification information).
  • the user ID of each user registered in the authentication server 1A is recorded in the item “user ID”.
  • file names of the theme image and the background image are recorded, respectively.
  • the file name “Dog1.jpg” of the theme image and the file name “back2.jpg” of the background image are associated with the user ID “0001”.
  • conversion instruction a command name for specifying a direction for displaying an object to be the subject of the authentication image on the display unit is recorded.
  • the command name “Rotate0” is associated with the user ID “0001”.
  • Rotate 0 and “Rotate 90” indicate that the orientation of the target object of the authentication image is rotated by 0 ° and 90 ° in the counterclockwise direction from the standard state, respectively.
  • “Fliphorizontal” indicates that the orientation of the target object of the authentication image is reversed left and right from the standard state.
  • “FlipVertical” (not shown) indicates that the orientation of the target object of the authentication image is inverted from the standard state.
  • FIG. 5A to 5C show the data structure of each authentication table Tc generated in the first authentication session of the user ID “0001”. Specifically, FIG. 5A shows the data structure of the first authentication table Tc1 including the file name of the theme image. FIG. 5B shows the data structure of the second authentication table Tc2 including the file name of the background image. FIG. 5C shows the data structure of the third authentication table Tc3 including the command name of the conversion instruction.
  • Each authentication table Tc is randomly selected as a file name or command name (also referred to as “registered file name” or “registered command name”) registered in the password table Tp in association with the person to be authenticated. Incorrect file name or command name (also referred to as “dummy file name” or “dummy command name”). Each file name or each command name in each authentication table Tc is associated with a unique authentication code generated at random.
  • a column corresponding to the registered file name or registered command name of the user ID “0001” who is the subject of authentication is surrounded by a broken line frame.
  • the above-mentioned dummy file name is the file name of the image for incorrect answer of the theme image, and a predetermined number is randomly selected for each authentication session.
  • the image data indicated by the registered file name and the dummy file name is stored in advance by the storage unit 33 of the user terminal 3.
  • the right column of the first authentication table Tc1 is associated with a unique authentication code for each file name in the left column.
  • the background image such as the registered file name “back2.jpg” and “back1.jpg” of the background image corresponding to the user ID “0001” is displayed.
  • the dummy file names are listed. A predetermined number of the above dummy file names are randomly selected for each authentication session.
  • the registered file name and the image data indicated by each dummy file name are stored in advance by the storage unit 33.
  • a unique authentication code is associated with each file name in the left column.
  • a registration command name “Rotate0” and a dummy command name such as “Rotate90” corresponding to the user ID “0001” are displayed. Are lined up. A predetermined number of the above dummy command names are randomly selected for each authentication session. The contents of the subject image conversion instruction indicated by the registered command name and each dummy command name are stored in advance in the storage unit 33. Also, a unique authentication code is associated with each command name in the left column in the right column of the third authentication table Tc3 shown in FIG.
  • each authentication code included in the authentication table Tc is randomly generated for each authentication session.
  • 6A to 6C show the data structure of each authentication table Tc generated in the second authentication session with the user ID “0001”.
  • the registered file name “Dog1.jpg” of the theme image corresponding to the user ID “0001” is stored. There is a column shown (see dashed line frame).
  • the authentication codes corresponding to these registered file names are “37Yxp ′′ ⁇ 6” in the case of FIG. 5A, and “jr3O2qnbT” in the case of FIG.
  • a column indicating “jpg” is present (see a broken line frame).
  • the authentication codes corresponding to these registered file names are different from each other.
  • the conversion command registration command name “Rotate0” corresponding to the user ID “0001” is set. There is a column shown (see dashed line frame).
  • authentication codes corresponding to these registered command names are different from each other.
  • FIG. 7 is a flowchart showing a procedure of authentication processing executed by the user terminal 3 and the authentication server 1A.
  • the user terminal 3 and the authentication server 1A execute the processing of the flowchart shown in FIG. 7 when a predetermined operation is performed on the user terminal 3.
  • the user terminal 3 displays a login screen with a Web browser and accepts an input such as a login ID (step S101). Then, after confirming the input content on the login screen, the user terminal 3 transmits a connection request including the input user ID to the authentication server 1A (step S102).
  • the authentication server 1A generates authentication tables Tc1 to Tc3 for each type of image group constituting the authentication image, based on the user ID included in the connection request received from the user terminal 3 (step S103). . Specifically, first, the authentication server 1A extracts the registration file name of the theme image and background image and the registration command name of the conversion instruction corresponding to the user ID included in the connection request from the password table Tp, and these The dummy file name and dummy command name are selected at random. Next, the authentication server 1A randomly generates an authentication code corresponding to the extracted or selected file name and command name, thereby generating authentication tables Tc1 to Tc3 as shown in FIG. Then, the authentication server 1A transmits the generated authentication tables Tc1 to Tc3 to the user terminal 3 (step S104).
  • the user terminal 3 displays a screen for selecting a theme image (also referred to as “theme image selection screen”) based on the received first authentication table Tc1, and accepts an input for selecting the theme image (step S105). ).
  • the user terminal 3 reads out the images indicated by the file names included in the first authentication table Tc1 from the storage unit 33 and displays them in a selectable manner.
  • the theme image selection screen will be described later with reference to FIG.
  • the user terminal 3 transmits an authentication code corresponding to the file name of the selected image to the authentication server 1A (step S106).
  • the user terminal 3 displays a screen for selecting a background image (also referred to as a “background image selection screen”) based on the received second authentication table Tc2, and accepts an input for selecting the background image (step). S107).
  • the user terminal 3 reads out the image indicated by each file name included in the second authentication table Tc2 from the storage unit 33, displays the image combined with the theme image selected in step S105.
  • the background image selection screen will be described later with reference to FIG.
  • the user terminal 3 transmits an authentication code corresponding to the file name of the background image combined with the selected image to the authentication server 1A ( Step S108).
  • the user terminal 3 displays a screen for selecting the direction of the theme image (also referred to as “conversion instruction selection screen”), and inputs for selecting the direction of the theme image. Accept (step S109).
  • the user terminal 3 converts and displays the theme image selected in step S105 according to the conversion instruction indicated by each command name included in the third authentication table Tc3.
  • the conversion instruction selection screen will be described later with reference to FIG.
  • the user terminal 3 transmits an authentication code corresponding to the command name of the conversion instruction applied to the selected image to the authentication server 1A (step). S110).
  • the authentication server 1A collates the authentication code received from the user terminal 3 (step S111). Specifically, the authentication server 1A determines whether the file name of the theme image indicated by the authentication code transmitted in step S106 matches the registered file name of the theme image, and the authentication code transmitted in step S108. Whether the background image file name shown matches the registered image name of the background image, and the command name of the conversion instruction indicated by the authentication code transmitted in step S110 matches the registered command name of the conversion instruction Judge whether to do. When the file name and command name indicated by the authentication code received from the user terminal 3 match the registered file name and registered command name stored in the password table Tp, the authentication server 1A has succeeded in user authentication. Judge.
  • the authentication server 1A permits communication related to the transaction between the user terminal 3 and the transaction server 1B, and the user terminal 3 starts communication with the transaction server 1B.
  • the authentication server 1A failed in user authentication. Judge. In this case, the authentication server 1A does not permit communication related to the transaction between the user terminal 3 and the transaction server 1B.
  • FIG. 8 is an example of a theme image selection screen displayed by the user terminal 3 in step 105 of FIG.
  • the user terminal 3 displays images 50 to 53 corresponding to the file names included in the first authentication table Tc1 received from the authentication server 1A on the display 41 as candidates for the subject image.
  • the image 50 corresponds to the registered file name “Dog1.jpg” in the first authentication table Tc1 shown in FIG. 5A
  • the image 51 corresponds to the dummy file name “Cat3.jpg”
  • the image 52 Corresponds to the dummy file name “wine1.jpg”
  • the image 53 corresponds to the dummy file name “Dog5.jpg”.
  • step 105 of FIG. 7 the user terminal 3 reads the image indicated by the file name included in the first authentication table Tc1 from the storage unit 33 and displays it in a selectable manner.
  • the user terminal 3 detects that the image 50 has been selected by the touch panel 42, and transmits an authentication code “37Yxp ′′ ⁇ 6” corresponding to the image 50 to the authentication server 1A.
  • FIG. 9 is an example of a background image selection screen displayed on the user terminal 3 in step S107 of FIG.
  • the user terminal 3 combines the background image indicated by the four file names included in the second authentication table Tc2 received from the authentication server 1A with the image 50 selected on the theme image selection screen of FIG.
  • the images 50A to 50D are displayed on the display 41.
  • the image 50A is an image obtained by combining the image 50 and the background image indicated by the registered file name “back2.jpg” of the second authentication table Tc2 shown in FIG.
  • the user terminal 3 generates and displays the image 50A by replacing the background of the dog displayed in the image 50 with the background image indicated by the file name “back2.jpg”.
  • the image 50B is an image obtained by combining the image 50 and the background image indicated by the dummy file name “back1.jpg”
  • the image 50C is the background image indicated by the image 50 and the dummy file name “back5.jpg”.
  • the image 50D is an image obtained by combining the image 50 and the background image indicated by the dummy file name “back7.jpg”.
  • the user terminal 3 reads the background image indicated by each file name included in the second authentication table Tc2 from the storage unit 33, and displays the background image combined with the image 50 that is the theme image selected in FIG. .
  • the user terminal 3 detects that the image 50 ⁇ / b> A has been selected by the touch panel 42, and the authentication code “back2.jpg” combined with the image 50 ⁇ / b> A is associated with the authentication code “back2.jpg”.
  • 7uIeV53T is transmitted to the authentication server 1A.
  • FIG. 10 is an example of a conversion instruction selection screen displayed on the user terminal 3 in step S109 of FIG.
  • the user terminal 3 gives a conversion instruction indicated by four command names included in the third authentication table Tc3 received from the authentication server 1A to the image 50A selected on the background image selection screen of FIG.
  • the applied images 50Aa to 50Ad are displayed on the display 41.
  • the image 50Aa is an image obtained by rotating the dog displayed on the image 50A by 0 ° in accordance with the conversion instruction indicated by the command name “Rotate0” of the third authentication table Tc3 shown in FIG.
  • the image 50Ab is an image obtained by horizontally inverting the dog displayed on the image 50A in accordance with the conversion instruction indicated by the command name “FlipVertical”.
  • the image 50Ac is an image obtained by rotating the dog displayed in the image 50A by 90 ° in accordance with the conversion instruction indicated by the command name “Rotate90”.
  • the image 50Ad is an image obtained by inverting the dog displayed on the image 50A upside down in accordance with the conversion instruction indicated by the command name “Fliporyzontal”.
  • the user terminal 3 converts the subject image portion in the image 50A selected in FIG. 9 according to the conversion instruction indicated by each command name included in the third authentication table Tc3, and converts the converted image. Is displayed in a selectable manner.
  • the user terminal 3 detects that the image 50Aa has been selected by the touch panel 42, and sends the authentication code “2y0Qmv54” corresponding to the command name “Rotate0” applied to the image 50Aa to the authentication server. Send to 1A.
  • the authentication server 1A allows the user of the user terminal 3 to specify a plurality of image groups for specifying an authentication image set for each user, thereby performing user authentication. I do.
  • the authentication server 1 can increase the number of authentication elements and increase the safety without excessively burdening the user to remember the password.
  • the authentication server 1A allows a user to specify a theme image, a background image, and a conversion instruction as an image group constituting an authentication image used for user authentication.
  • the types of image groups constituting the authentication image applicable to the present invention are not limited to the above three types.
  • the authentication server 1A allows the user to specify the size and color of the object indicated by the theme image, the background color and pattern, etc. as an image group constituting the authentication image. May be. Further, the types of image groups constituting the authentication image are not limited to three, and may be two or more. Even in this case, the authentication server 1A stores the password table Tp indicating the image group that configures the authentication image set for each user, and performs authentication for each image group that configures the authentication image. A table Tc is generated and transmitted to the user terminal 3. Further, the user terminal 3 displays a selection image for each authentication table Tc received from the authentication server 1A, and transmits an authentication code corresponding to the selected image to the authentication server 1A.
  • the user terminal 3 may randomly change the order in which the user selects the theme image, the background image, and the orientation of the theme image for each authentication session. That is, the user terminal 3 may randomly determine the execution order of steps S105, S107, and S109 for each authentication session. For example, the user terminal 3 may allow the user to specify the orientation of the background image or the theme image before the theme image. In this case, on the conversion instruction selection screen, the user terminal 3 may apply and display a conversion instruction for each command name in the third authentication table Tc3 on the temporary theme image.
  • the user terminal 3 randomly changes the transmission order of the authentication code indicating the theme image, the background image, and the orientation of the theme image selected by the user for each authentication session. You may change to That is, the user terminal 3 may randomly determine the execution order of steps S106, S108, and S110 for each authentication session. Thereby, the tolerance to the estimation of the registration file name and registration command name by a communication interceptor can be improved suitably.
  • the configuration of the transaction system shown in FIG. 1 is an example, and the configuration to which the present invention is applicable is not limited to this.
  • the service provider server 1 may be composed of a single server.
  • FIG. 11 shows a configuration example of a transaction system according to a modification.
  • the service provider server 1 has both functions of the authentication server 1A and the transaction server 1B shown in FIG.
  • the user terminal 3 is realized by a personal computer instead of the mobile terminal.
  • the service provider server 1 transmits the authentication table Tc to the user terminal 3, and the user terminal 3 displays the user selection result.
  • the authentication code based on this is transmitted to the service provider server 1.
  • the service provider server 1 can perform user authentication suitably.
  • the service provider server 1 may be composed of three or more servers.
  • the authentication server 1A may be configured by two servers, a server that stores the password table Tp and a server that executes the flowchart of FIG. Even in this case, each server is connected to other servers via a network such as the communication network 2 and exchanges information necessary for processing.
  • Modification 4 In the example of the flowchart of FIG. 7, the user terminal 3 individually transmits the authentication code in steps S106, S108, and S110. Instead of this, the user terminal 3 may receive the input for selecting each of the theme image, the background image, and the orientation of the theme image, and then transmit the authentication code in a batch.
  • FIG. 12 is a flowchart showing a procedure of authentication processing according to this modification.
  • the user terminal 3 and the authentication server 1A execute the processing from steps S201 to S205 in the same manner as steps S101 to S105 in FIG.
  • the user terminal 3 accepts an input for selecting a background image in step S206 without sending an authentication code.
  • the user terminal 3 accepts an input for selecting the orientation of the theme image in step S207 without transmitting an authentication code.
  • step S208 the user terminal 3 collectively transmits the three authentication codes to be transmitted in steps S106, S108, and S110 in FIG. Also by this, the user terminal 3 can suitably transmit the authentication code corresponding to the image selected by the user to the authentication server 1A.
  • step S209 the authentication server 1A collates the received authentication code as in step S111 in FIG.
  • the user terminal 3 may rearrange the order of the authentication codes randomly for each authentication session when transmitting the three authentication codes together. Thereby, the tolerance to the estimation of the registration file name and registration command name by a communication interceptor can be improved suitably.
  • the authentication server 1A extracts, for each authentication session, a registration file name and a registration command name that are extracted from the password table Tp and included in the authentication table Tc with a predetermined algorithm. (Also referred to as “name change algorithm”). Accordingly, the user terminal 3 prevents the registered file name and the registered command name from being inferred even when the authentication table Tc is intercepted repeatedly.
  • a predetermined algorithm Also referred to as “name change algorithm”.
  • the authentication server 1A and the user terminal 3 store the same name change algorithm in advance. Then, the authentication server 1A changes the names by applying a name change algorithm to the registered file name and the registered command name included once in the authentication table Tc. Similarly, when the user terminal 3 receives the authentication table Tc, the user terminal 3 changes these names by applying a name change algorithm to the registered file name and the registered command name included in the authentication table Tc.
  • the image indicated by the registered file name and the conversion instruction indicated by the registered command name are unchanged. Thereby, the authentication server 1A and the user terminal 3 can suitably change these names without changing the entity indicated by the registration file name and the registration command name for each authentication session.
  • FIG. 13 a specific example in which a name change algorithm that rotates and uses a set of ten file names with respect to a registered file name of a theme image will be described with reference to FIGS. 13 and 14.
  • FIG. 13 a specific example in which a name change algorithm that rotates and uses a set of ten file names with respect to a registered file name of a theme image will be described with reference to FIGS. 13 and 14.
  • FIG. 13 is an example of a table showing registered file names of theme images used in each authentication session with the user ID “0001”.
  • FIG. 14A shows the first authentication table Tc1 generated in the first authentication session of the user ID “0001”, and FIG. 14B is generated in the second authentication session.
  • the 1st authentication table Tc1 is shown.
  • the theme image of the user ID “0001” indicates the dog image 50 shown in FIG.
  • the authentication server 1A and the user terminal 3 store in advance the table shown in FIG.
  • the authentication server 1A refers to the table shown in FIG. 13 and, as shown in FIG. 14A, the theme image (that is, the dog image 50). ) Is set to “Dog1.jpg”, and the first authentication table Tc1 is generated.
  • the user terminal 3 that has received the first authentication table Tc1 refers to the table shown in FIG. 13 so that the file name “Dog1.jpg” included in the first authentication table Tc1 is the file of the dog image 50. It is recognized as a name.
  • the user terminal 3 displays a theme image selection image that displays an image corresponding to each file name included in the first authentication table Tc1.
  • the authentication server 1A and the user terminal 3 store in advance a table for determining the registered file name of the background image and the registered command name of the conversion instruction, and authenticate based on the table.
  • the table Tc is generated and the background image selection screen and the conversion instruction selection screen are displayed.
  • the authentication server 1A refers to the table shown in FIG. 13 and, as shown in FIG. 14B, the theme image (that is, the dog image). 50) is set to “Dog2.jpg”, and the first authentication table Tc1 is generated. Further, the user terminal 3 that has received the first authentication table Tc1 refers to the table shown in FIG. 13 in the same way as the authentication server 1A, so that the file name “Dog2.jpg” included in the first authentication table Tc1 is obtained. The file name of the dog image 50 is recognized. Then, the user terminal 3 displays a theme image selection screen that displays an image corresponding to each file name included in the first authentication table Tc1.
  • the authentication server 1A and the user terminal 3 perform the authentication session after the 3rd time, registration of a theme image (namely, dog image 50) by referring to the table shown in FIG.
  • the file name is determined, and the first authentication table Tc1 is generated and the theme image selection screen is displayed.
  • the authentication server 1A and the user terminal 3 refer to the table for determining the file name of the background image and the command name of the conversion instruction, thereby obtaining the registered file name of the background image and the registered command name of the conversion instruction.
  • the authentication table Tc is generated and the background image selection screen and the conversion instruction selection screen are displayed.
  • the authentication server 1A and the user terminal 3 can suitably change the registration file name and the registration command name for each authentication session without changing the entity indicated by the registration file name and the registration command name.
  • the authentication server 1A and the user terminal 3 apply the name change algorithm to the registration file name and the registration command name for each authentication session, without changing the entity indicated by these, Change only the name.
  • the registration table name and the registration command name that are different for each authentication session are included in the authentication table Tc, and the user terminal 3 repeats the registration file name and the registration command name having the same name in the authentication table Tc. It can be prevented from being included. Therefore, even when there is an attacker who repeatedly intercepts the authentication table Tc, the attacker always searches for the same file name or command name in each authentication session. Cannot make an estimate.
  • the transaction system of the second embodiment has the same effects as the transaction system of the first embodiment.
  • the authentication server 1A and the user terminal 3 generate and share an encryption session key for each authentication session, and use the session key to generate an authentication table Tc. And encryption of communication of authentication code. As in the second embodiment, this also prevents the user terminal 3 from guessing the registered file name and the registered command name by a person who repeatedly intercepts the authentication table Tc.
  • FIG. 15 is a flowchart showing a procedure of authentication processing when a session key is generated and shared by the Diffie-Hellman (DH) key sharing method. Note that it is assumed that the authentication server 1A and the user terminal 3 share a predetermined prime number “p” and a predetermined primitive root “ ⁇ ” in advance before the execution of FIG.
  • DH Diffie-Hellman
  • the user terminal 3 generates a different random number “a” for each authentication session (step S301).
  • the user terminal 3 calculates the value “A” based on the following equation (1) (step S302).
  • A ⁇ a mod p (1)
  • the user terminal 3 displays a login screen with a Web browser and accepts an input such as a login ID (step S303). Then, after confirming the input content on the login screen, the user terminal 3 transmits a connection request including the input user ID and the value A calculated by the equation (1) to the authentication server 1A (step S304).
  • the authentication server 1A that has received the connection request generates an arbitrary random number “b” that is different for each authentication session (step S305).
  • the authentication server 1A calculates the value “B” based on the following equation (2) (step S306).
  • B ⁇ b mod p (2)
  • the user terminal 3 makes a response to the connection request including the calculated value B (step S307). Then, the user terminal 3 that has received the response generates a shared key K based on the following equation (3) (step S308).
  • the authentication server 1A generates a shared key K based on the following formula (4) (step S309).
  • the authentication server 1A generates the first to third authentication tables Tc1 to Tc3 as in step S103 of FIG. 7, and performs encryption using the key K generated in step S309 (step S310). Then, the authentication server 1A transmits the encrypted authentication table Tc to the user terminal 3 (step S311). Then, the user terminal 3 decrypts the encrypted authentication table Tc with the key K generated in step S308 (step S312). Then, similarly to step S105 of FIG. 7, the user terminal 3 receives an input for selecting the theme image (step S313), encrypts the authentication code corresponding to the selected theme image with the key K, and authenticates the authentication server 1A. (Step S314).
  • the user terminal 3 receives an input for selecting a background image (step S315), encrypts an authentication code corresponding to the selected background image with the key K, and transmits it to the authentication server 1A (step S316). Further, the user terminal 3 receives an input for selecting the orientation of the theme image (step S317), encrypts an authentication code corresponding to the selected orientation with the key K, and transmits it to the authentication server 1A (step S318). Then, the user terminal 3 decrypts the received encrypted authentication code with the key K, and compares the authentication code with reference to the password table Tp (step S319).
  • the authentication server 1A and the user terminal 3 generate a different common key K for each authentication session, and exchange the authentication table Tc and the authentication code encrypted using the common key K.
  • the transaction system of 3rd Embodiment has the same effect as the transaction system of 1st Embodiment.
  • the authentication server 1A and the user terminal 3 generate a common session key by the Diffie-Hellman (DH) key sharing method. Instead, the authentication server 1A and the user terminal 3 may generate and share a session key by any other method. For example, the authentication server 1A and the user terminal 3 may generate a one-time password by a time synchronization method or a challenge and response method, and perform encrypted communication of the authentication table Tc and the authentication code using the one-time password as a session key. .
  • DH Diffie-Hellman

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

La présente invention concerne un système commercial ayant un serveur d'authentification (1A) et un terminal utilisateur (3). Le serveur d'authentification (1A) stocke une table de mot de passe (Tp) indiquant un groupe d'images destiné à spécifier une image d'authentification définie pour chaque utilisateur. Le serveur d'authentification (1A) effectue une authentification d'utilisateur par l'envoi d'une table d'authentification (Tc) qui indique des candidats pour un groupe d'images d'authentification au terminal utilisateur (3) et amène l'utilisateur du terminal utilisateur (3) à spécifier un groupe d'images.
PCT/JP2015/057172 2014-03-12 2015-03-11 Dispositif d'authentification, système d'authentification et programme WO2015137404A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2016507796A JP6315080B2 (ja) 2014-03-12 2015-03-11 認証装置、認証システム及びプログラム

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2014-048879 2014-03-12
JP2014048879 2014-03-12

Publications (1)

Publication Number Publication Date
WO2015137404A1 true WO2015137404A1 (fr) 2015-09-17

Family

ID=54071845

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2015/057172 WO2015137404A1 (fr) 2014-03-12 2015-03-11 Dispositif d'authentification, système d'authentification et programme

Country Status (2)

Country Link
JP (1) JP6315080B2 (fr)
WO (1) WO2015137404A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017145273A1 (fr) * 2016-02-24 2017-08-31 株式会社日立製作所 Dispositif d'authentification d'utilisateur

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007094523A (ja) * 2005-09-27 2007-04-12 Nec Nexsolutions Ltd 画像配列型認証システム
JP2008257701A (ja) * 2007-03-12 2008-10-23 Yahoo Japan Corp 認証システム

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007094523A (ja) * 2005-09-27 2007-04-12 Nec Nexsolutions Ltd 画像配列型認証システム
JP2008257701A (ja) * 2007-03-12 2008-10-23 Yahoo Japan Corp 認証システム

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017145273A1 (fr) * 2016-02-24 2017-08-31 株式会社日立製作所 Dispositif d'authentification d'utilisateur

Also Published As

Publication number Publication date
JP6315080B2 (ja) 2018-04-25
JPWO2015137404A1 (ja) 2017-04-06

Similar Documents

Publication Publication Date Title
KR101132368B1 (ko) 비밀번호 키의 이동값을 이용하는 비밀번호 안전 입력 시스템 및 그 비밀번호 안전 입력 방법
JP4713694B1 (ja) 二要素ユーザ認証システム、およびその方法
CN101427510B (zh) 用于网络功能描述的数字通行
JP6399382B2 (ja) 認証システム
JP6426791B2 (ja) ユーザ認証方法及びこれを実現するためのシステム
US9960919B2 (en) Method for providing security using secure computation
US10848304B2 (en) Public-private key pair protected password manager
JP7202688B2 (ja) 認証システム、認証方法、アプリケーション提供装置、認証装置、及び認証用プログラム
KR20180117715A (ko) 개선된 보안성을 갖는 사용자 인증을 위한 방법 및 시스템
NO324315B1 (no) Metode og system for sikker brukerautentisering ved personlig dataterminal
JPWO2012046303A1 (ja) オフライン二要素ユーザ認証システム、その方法、およびそのプログラム
CN1894882B (zh) 认证系统
JP2011505034A (ja) 使い捨て用仮想秘密情報認証システムおよび認証方法
JP2008176383A (ja) ワンタイムパスワード生成方法、ワンタイムパスワード認証方法、ワンタイムパスワード生成装置、ワンタイムパスワードの生成機能を備えたicカード、ワンタイムパスワード認証装置、icカードプログラム及びコンピュータプログラム
KR101151367B1 (ko) 온라인 금융거래 인증 방법 및 그 장치
JP4028849B2 (ja) 通信システム、携帯端末及びプログラム
JP6315080B2 (ja) 認証装置、認証システム及びプログラム
JP6714551B2 (ja) 認証鍵共有システム及び端末間鍵コピー方法
CN105281916A (zh) 一种便携式密码系统
JP2012079284A (ja) オフライン二要素ユーザ認証システム、その方法、およびそのプログラム
JP2011164837A (ja) 認証システムおよび認証方法
WO2021106445A1 (fr) Système d'authentification d'utilisateur, serveur d'authentification d'utilisateur et procédé d'authentification d'utilisateur
JP5602055B2 (ja) 二要素ユーザ認証システム、およびその方法
JP6165044B2 (ja) 利用者認証装置、システム、方法及びプログラム
KR101479246B1 (ko) 위치심볼을 이용한 인증시스템 및 그 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15761514

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2016507796

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15761514

Country of ref document: EP

Kind code of ref document: A1