WO2017074090A1 - 투 채널 기반의 인증 방법 및 시스템 - Google Patents
투 채널 기반의 인증 방법 및 시스템 Download PDFInfo
- Publication number
- WO2017074090A1 WO2017074090A1 PCT/KR2016/012228 KR2016012228W WO2017074090A1 WO 2017074090 A1 WO2017074090 A1 WO 2017074090A1 KR 2016012228 W KR2016012228 W KR 2016012228W WO 2017074090 A1 WO2017074090 A1 WO 2017074090A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- server
- requester
- telephone
- computer
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/42—User authentication using separate channels for security data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3215—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3223—Realising banking transactions through M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/42—Confirmation, e.g. check or permission by the legal debtor of payment
- G06Q20/425—Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Definitions
- the present invention relates to a two-channel based authentication method and system that can be securely authenticated while inputting only user identification information such as a user ID.
- an authentication method and an authentication system capable of securely authenticating while inputting only user identification information such as a user ID without inputting a password may be provided.
- a computer-implemented two channel based authentication method in a two channel based authentication system including a computer of an authentication requester, a telephone of an authentication requestor, an authentication server, and a call processing server.
- the authentication server receives the authentication request, storing the telephone number of the authentication requestor in a temporary DB;
- the telephone of the authentication requester calling the line number received from the authentication server;
- the call processing server when the call comes to the selected line number, transmitting a telephone number of the telephone that called the selected line number to the authentication server;
- the authentication server comparing the telephone number received from the call processing server with the authentication requester telephone number stored in the temporary DB; And when the phone number received from the call processing server and the authentication
- the two-channel-based authentication system comprising a computer of the requester, the telephone of the requester, the authentication server, and a call processing server,
- the computer of the requestor for authentication displays an authentication request screen for requesting an authentication, including a menu for inputting authentication requester identification information and requesting an authentication request.
- the authentication requester's computer When the authentication requester's computer receives an authentication request from the authentication requester on the authentication request screen, the computer transmits an authentication request to the authentication server.
- the authentication server selects any one of the available line numbers and transmits the selected line number to the telephone of the authentication requester,
- the authentication requester's telephone dials the line number received from the authentication server.
- the call processing server When the call processing server comes to the selected line number, the call processing server transmits the telephone number of the telephone that called the selected line number to the authentication server.
- the authentication server compares the telephone number received from the call processing server with the authentication requester phone number, and if the telephone number received from the call processing server and the authentication requester phone number match, an authentication request from the computer of the authentication requester.
- a two channel based authentication system may be provided, which determines to approve.
- FIG. 1 is a view for explaining a two-channel based authentication system according to an embodiment of the present invention.
- FIG. 2 to 7 are diagrams for describing various embodiments of the two-channel based authentication system of FIG. 1.
- ID input section 15 login menu
- a component is mentioned as being on another component, it means that it may be formed directly on the other component or a third component may be placed therebetween.
- the terms “... unit”, “... unit”, “module”, etc. described herein mean a unit that processes at least one function or operation, which may be implemented by hardware or software or a combination of hardware and software. Can be.
- the term 'transmission', 'communication', 'transmission', 'receive', 'providing', or 'delivering' of a signal, data, or information means one component ('component' In addition to the direct transmission of signals, data, or information from a ') to another component (' component b '), it also passes to at least one other component (' component c ') to component b. Included.
- component a and component b are 'operatively related' if they are wired and / or wirelessly connected to transmit and / or receive data with each other.
- component a is from component b Receives the output signal, data, or information to perform the operation of itself (component a), or the component b receives the signal, data, or information output from component a to operate its own (component b)
- component a and component b are 'operatively related' if they are
- the communication network is, for example, Wi-Fi, the Internet (Internet), a local area network (LAN), a wireless local area network (WLAN), a wide area network (WAN), a telephone network, a personal area network (PAN), 3G, 4G, LTE, voice network or a combination of two or more thereof.
- Internet a local area network
- WLAN wireless local area network
- WAN wide area network
- PAN personal area network
- 3G, 4G, LTE voice network or a combination of two or more thereof.
- FIG. 1 is a view for explaining a two-channel based authentication system according to an embodiment of the present invention.
- an authentication requester's computer 10 an authentication server 20, a call processing server 30, and an authentication requestor's phone 40 ) May be included. These components can communicate with each other via a communication network.
- the call processing server 30 manages (stores, adds, deletes, corrects) the DB 20 including the list of the communicable circuits in order to manage the communicable circuits, and the authentication server 20 is a temporary DB 50. Manage it.
- the authentication server 20 generates a temporary DB 50 for the authentication requestor when there is an authentication request from the authentication requester, and deletes the temporary DB 50 after determining approval or disapproval for such authentication request.
- the temporary DB 50 is generated for each requestor of authentication.
- a computer 10 of an authentication requestor includes a computer processor (not shown), a memory (not shown), and an operating system (not shown), and a communication network.
- the web site 11 is provided from a web server (not shown) connected to the display.
- the computer 10 includes software and hardware (not shown) capable of receiving the web site 11 through communication with a web server (not shown) connected to a communication network.
- the computer 10 refers to a device capable of displaying a web site by accessing the Internet, such as a desktop computer, a smartphone, or a laptop computer.
- the term 'authentication' may be a procedure required to log in to the web site 11.
- a member is authenticated by inputting an ID and password.
- the user can be authenticated safely even by inputting only an ID or a phone number.
- the computer 10 may input identification information (eg, a user ID) of the authentication requestor and display an authentication request screen including menus 13 and 15 for requesting authentication.
- identification information eg, a user ID
- the authentication requestor enters his ID on the authentication request screen displayed by the computer 10, selects the login 15 menu, and the computer 10 transmits an authentication request to the authentication server 20.
- the authentication request may include an ID of the authentication requester or a phone number of the authentication requester.
- the authentication server 20 When the authentication server 20 receives the authentication request from the computer 10, the authentication server 20 stores the time when the authentication request is received (hereinafter referred to as an authentication request reception time) in the temporary DB 50. The authentication server 20 associates the authentication request reception time with the authentication requester's phone number in the temporary DB 50 and stores the association.
- the authentication server 20 may obtain the telephone number of the authentication requestor by referring to the member DB (not shown)-a DB stored in association with IDs of members subscribed to the website 11 and a member's telephone number. .
- the member DB (not shown) may be managed by a web server (not shown) providing the web site 11.
- the authentication server 20 selects a callable line number and transmits it to the authentication requester's telephone 40 (hereinafter referred to as 'phone 40'). do.
- the telephone 40 calls the line number received.
- the telephone 40 includes a computer processor (not shown), a memory (not shown), and an operating system (not shown), and a service program 41 capable of receiving a line number through an internet communication with the authentication server 20. It includes.
- the phone 40 is capable of data communication with the authentication server 20 connected to the Internet network, and has software and hardware (not shown) for making voice calls.
- the phone 40 may be, for example, a device such as a smartphone, smart watch, tablet PC, PDA phone, or the like.
- a smart phone means a mobile phone that provides advanced functions as well as a PC-like function
- a smart watch means an embedded system wrist watch equipped with advanced functions than a normal watch
- a tablet PC is a main input of a touch screen.
- a PDA phone means a PDA (PDA) equipped with a mobile communication module (personal information terminal).
- the service program 41 installed in the telephone 40 is to perform at least some of the functions required to provide the authentication service according to the present invention. If there is a line number transmitted from the authentication server 20, the telephone 41 is connected to the telephone 41. Call the provided dialing program (not shown) to make a call.
- the service program 41 calls the dialing program (not shown)
- the service program 41 provides the dialing program with the line number received from the authentication server 20.
- the dialing program then dials the line number provided from the service program 41.
- the call processing server 30 may be, for example, an exchange device such as an IP PBX, and may manage a plurality of telephone numbers.
- the line number received by the phone 40 from the authentication server 20 may be any one of the phone numbers managed by the call processing server 30.
- the call processing server 30 transmits the caller's telephone number (ie, the telephone number of the telephone 40) to the authentication server 20 when the telephone comes from the telephone 40.
- the caller's telephone number ie, the telephone number of the telephone 40
- the authentication server 20 may compare the calling party's telephone number received from the call processing server 30 with the telephone number of the authentication requestor stored in the temporary DB 50, and if the match is matched, may approve (determine that the authentication request) the authentication request. have. In addition, the authentication server 20 approves the authentication request only when the time when the caller's telephone number is received from the call processing server 30 is within a predetermined time from the 'time to receive the authentication request' stored in the temporary DB 50. can do.
- the authentication server 20 transmits the caller's telephone number received from the call processing server 30 when the time when the caller's telephone number is transmitted from the call processing server 30 has elapsed a predetermined time from the 'authentication request reception time'. And, the phone number of the authentication requestor stored in the temporary DB is disapproved for the authentication request regardless of the comparison result (determination not to recognize).
- FIG. 1 will be described with reference to the drawings of FIGS. 2 to 7, respectively.
- FIG. 2 illustrates a two channel based authentication system according to an embodiment of the present invention, and the two channel based authentication system of FIG. 1 may be implemented to operate as shown in FIG. 2.
- the computer 10 displays an authentication request screen, and when the authentication requestor inputs identification information of the authentication requestor such as a user ID or a telephone number of the authentication requestor on the authentication request screen, the computer 10 ) Makes an authentication request 20 to the authentication server 20.
- the authentication request sent to the authentication server 20 includes identification information input by the authentication requester.
- the identification information of the authentication requestor may be an ID or a telephone number of the authentication requestor.
- the authentication server 20 When the authentication server 20 receives an authentication request from the computer 10, the authentication server 20 generates a temporary DB 50 corresponding to the authentication requester, and at the time when the authentication request is received from the computer 10 in the temporary DB 50, The telephone numbers of certificate requesters are stored in association with each other. The telephone number of the authentication requestor may be included in the authentication request or, if not included in the authentication request, may be obtained by the authentication server 20 as described with reference to FIG. 1.
- the authentication requester operates the service program 41 installed in his phone 40.
- the service program 41 displays an authentication request screen for making an authentication request on the phone 40, and the authentication requester makes an authentication request on the authentication request screen.
- the telephone 40 requests an authentication to the authentication server 20 when the authentication requestor makes an authentication request on the authentication request screen provided by the service program 41.
- the authentication server 20 When the authentication server 20 receives the authentication request layer from the service program 41 installed in the telephone 40, the authentication server 20 randomly selects one line number among a plurality of callable line numbers managed by the call processing server 30. .
- the selected line number is intended to be transmitted only to the telephone 40 and cannot be selected for another authentication requester unless a predetermined time has elapsed.
- the predetermined time may be, for example, about 15 seconds from the time when the authentication server 20 receives the authentication request from the computer 10.
- 15 seconds may be set to other values as exemplary values.
- the authentication server 20 transmits the selected line number to the service program 41 of the telephone 40.
- a dialing program (not shown) is a basic program provided for the phone 40 to make a call.
- the dialing program (not shown) dials the line number provided from the service program 41.
- the line number provided by the service program 41 from the authentication server 20 is one of the line numbers managed by the call processing server 30, a dialing program (not shown) is provided from the service program 41.
- the call processing server 30 receives the call.
- the call processing server 30 immediately provides the calling server number (here, the telephone number of the telephone 40) to the authentication server 20.
- the authentication server 20 compares the calling party's telephone number provided from the call processing server 30 with the authentication requester's telephone number stored in the temporary DB 50 and makes a determination to approve the authentication request. 10) Notify.
- the authentication server 30 when the time when the caller's telephone number is received from the call processing server 30 is out of a predetermined time from the time when the authentication request from the computer 10 is received, the call processing server 30 Regardless of the result of comparing the caller's phone number and the requester's phone number provided from), it is judged to be disapproved.
- the predetermined time may be stored in the temporary DB 50 or in another separately provided storage device (memory (not shown) or hard disk provided in the authentication server 20).
- FIG. 3 is a diagram for describing a two channel based authentication system according to an embodiment of the present invention, and the two channel based authentication system of FIG. 1 may be implemented to operate as shown in FIG. 3.
- the service program 41 differs in that the service program 41 does not perform an authentication request to the authentication server 20.
- the embodiment of FIG. 3 will be described based on differences from the embodiment of FIG. 2.
- the authentication server 20 when the authentication server 20 receives an authentication request from the computer 10, the authentication server 20 generates a temporary DB 50 corresponding to the authentication requester, and creates a temporary DB. At 50, the time at which the authentication request is received from the computer 10 and the telephone number of the authentication requester are stored. If the authentication requester's phone number is included in the authentication request or not included in the authentication request, the authentication server 20 may obtain the same as described with reference to FIG. 1. Upon receiving the authentication request from the computer 10, the authentication server 20 also randomly selects one usable line number from among a plurality of communicable line numbers managed by the call processing server 30. The authentication server 20 transmits the selected line number to the telephone 40. The rest of the operation of the embodiment of FIG. 3 is the same as that of the embodiment of FIG. 2, so please refer to the description of the embodiment of FIG. 2.
- FIG. 4 is a diagram for describing a two channel based authentication system according to an embodiment of the present invention, and the two channel based authentication system of FIG. 1 may be implemented to operate as shown in FIG. 4.
- the embodiment of FIG. 4 is not directly selected by the authentication server 20 when the line to be transmitted to the telephone 40 is selected, but the call processing 30 is called. From the possible line numbers, any one of the line numbers is selected and provided to the authentication server 20, and the authentication server 20 transmits the line number selected by the call processing server 30 to the telephone 40.
- FIG. There is a difference from the embodiment.
- FIG. 4 will be described based on differences from the embodiment of FIG. 2.
- the authentication server 20 when describing the embodiment of FIG. 4, when the authentication server 20 receives an authentication request from the computer 10, the authentication server 20 generates a temporary DB 50 corresponding to the authentication requestor, and temporarily The DB 50 stores the time when the authentication request is received from the computer 10 and the telephone number of the authentication requestor.
- the authentication server 20 upon receiving the authentication request from the computer 10 or the authentication request from the telephone 40, requests the call processing server 30 to select a callable line.
- the call processing server 30 randomly selects one line number from among a plurality of callable line numbers managed by the call processing server 30 and provides it to the authentication server 20.
- the authentication server 20 transmits the line number provided from the call processing server 30 to the telephone 40. Since the rest of the operation of the embodiment of FIG. 4 is the same as that of the embodiment of FIG. 2, please refer to the description of the embodiment of FIG. 2.
- FIG. 5 illustrates a two channel based authentication system according to an embodiment of the present invention.
- the two channel based authentication system of FIG. 1 may be implemented to operate as shown in FIG. 5.
- the embodiment of FIG. 5 differs from the first in that the service program 41 does not operate to request an authentication server 20 for authentication.
- the authentication server 20 does not select directly, but the call processing 30 selects any one of the line numbers available for call and provides it to the authentication server 20, and the authentication server 20
- the second difference is that call processing server 30 transmits the selected line number to phone 40.
- FIG. 5 will be described based on differences from the embodiment of FIG. 2.
- the authentication server 20 when the embodiment of FIG. 5 is described, when the authentication server 20 receives an authentication request from the computer 10, the authentication server 20 generates a temporary DB 50 corresponding to the authentication requestor, and temporarily The DB 50 stores the time at which the authentication request from the computer 10 is received and the telephone number of the authentication requestor in association with each other.
- the authentication server 20 requests the call processing server 30 to select a callable line.
- the call processing server 30 randomly selects one line number from among a plurality of callable line numbers managed by the call processing server 30 and provides it to the authentication server 20.
- the authentication server 20 transmits the line number provided from the call processing server 30 to the telephone 40. Since the rest of the operations of the embodiment of FIG. 5 are the same as those of the embodiment of FIG. 2, please refer to the description of the embodiment of FIG. 2.
- FIG. 6 illustrates a two channel based authentication system according to an embodiment of the present invention.
- the two channel based authentication system of FIG. 1 may be implemented to operate as shown in FIG. 6.
- the embodiment of FIG. 6 differs in that it additionally uses an authentication number.
- FIG. 6 will be described based on differences from the embodiment of FIG. 2.
- the authentication server 20 when the authentication server 20 receives an authentication request from the computer 10, the authentication server 20 generates a temporary DB 50 corresponding to the authentication requestor, and temporarily The DB 50 stores the time when the authentication request is received from the computer 10 and the telephone number of the authentication requestor.
- the authentication server 20 When receiving the authentication request from the computer 10 or the telephone 40, the authentication server 20 randomly selects one line number from among the plurality of callable line numbers. The authentication server 20 also generates an authentication number (this authentication number is a unique secret only for the authentication requestor) upon receiving the authentication request from the computer 10 or the telephone 40. The authentication number may be stored in association with the telephone number of the authentication requestor in the temporary DB 50.
- the authentication server 20 transmits the selected line number and authentication number to the telephone 40.
- the telephone 40 calls the line number and the authentication number. For example, if the line number is 070-1234-0001 and the authentication number is 34, the telephone 40 calls 07012340001,34.
- the call processing server 30 can know the telephone number (caller number) and authentication number of the telephone 40, and transmits a calling party number and an authentication number to the authentication server 20.
- FIG. 1 A call processing server 30 can know the telephone number (caller number) and authentication number of the telephone 40, and transmits a calling party number and an authentication number to the authentication server 20.
- the authentication server 20 compares the calling party number with the authentication requester phone number stored in the temporary DB 50, and compares the authentication number received from the call processing server 30 with the authentication number stored in the temporary DB 50.
- the authentication server 20 accepts the authentication request only when both of them match.
- the authentication server 30 when the time when the caller's telephone number is received from the call processing server 30 deviates from the predetermined time from the time when the authentication request from the computer 10 is received, the comparison result with the above comparison result. Irrespective of this, the judgment is disapproved.
- FIG. 7 illustrates a two channel based authentication system according to an embodiment of the present invention.
- the two channel based authentication system of FIG. 1 may be implemented to operate as shown in FIG. 7.
- the embodiment of FIG. 6 has a first difference in that the service program 41 does not perform an operation for requesting an authentication server 20 for authentication.
- the second difference is that it uses numbers.
- FIG. 7 will be described based on differences from the embodiment of FIG. 2.
- the authentication server 20 when the embodiment of FIG. 7 is described, the authentication server 20 generates a temporary DB 50 corresponding to the authentication requestor when receiving the authentication request from the computer 10.
- the DB 50 stores the time at which the authentication request from the computer 10 is received and the telephone number of the authentication requestor in association with each other.
- the authentication server 20 When receiving the authentication request from the computer 10, the authentication server 20 randomly selects one line number from among the plurality of callable line numbers. The authentication server 20 also generates an authentication number (this authentication number is a unique secret value only for the authentication requestor) upon receiving the authentication request from the computer 10. The authentication number may be stored in association with the telephone number of the authentication requestor in the temporary DB 50.
- the authentication server 20 transmits the selected line number and authentication number to the telephone 40.
- the telephone 40 calls the line number and the authentication number.
- the call processing server 30 can know the telephone number (caller number) and authentication number of the telephone 40, and transmits a calling party number and an authentication number to the authentication server 20.
- FIG. 1 A call processing server 30 can know the telephone number (caller number) and authentication number of the telephone 40, and transmits a calling party number and an authentication number to the authentication server 20.
- the authentication server 20 compares the calling party number with the authentication requester phone number stored in the temporary DB 50, and compares the authentication number received from the call processing server 30 with the authentication number stored in the temporary DB 50.
- the authentication server 20 accepts the authentication request only when both of them match.
- the authentication server 30 when the time when the caller's telephone number is received from the call processing server 30 deviates from the predetermined time from the time when the authentication request from the computer 10 is received, the comparison result with the above comparison result. Irrespective of this, the judgment is disapproved.
- An authentication system to which a computer-implemented two channel based authentication method according to an embodiment of the present invention is applied may be a two channel based authentication system described with reference to FIG. 1.
- a computer-implemented two channel based authentication method according to an embodiment of the present invention is applied to the authentication system of FIG. 1, a two channel based authentication method according to an embodiment of the present invention Will be described.
- the authentication server 20 receives the authentication request from the computer 10, storing the telephone number of the authentication requestor in the temporary DB 50;
- a line number selection step of the authentication server 20 selecting one of the line numbers among the callable line numbers;
- a second transmission step of the authentication server 20 transmitting the line number selected in the line number selection step to the telephone 40 of the authentication requester;
- the telephone of the authentication requester 40 calling the line number received from the authentication server 20;
- the authentication server 20 compares the telephone number received from the call processing server 30 with the authentication requester telephone number stored in the temporary
- the computer-implemented two channel-based authentication method described above may further include a fourth transmission step of transmitting, by the authentication requester's telephone 40, the authentication server 20 to the authentication server 20.
- the authentication server 20 may perform the line number selection step when receiving the authentication request from the telephone requester 40 or the computer 10 of the authentication requester.
- the fourth transmission step may be implemented to be performed before the first transmission step.
- the authentication server 20 when receiving the authentication request from the computer 10 of the requesting authentication, the computer 10 of the authentication requestor The time at which the authentication request from the server is received may be further included in the temporary DB 50 and stored.
- the call processing server 30 causes the authentication requester's telephone 40 to perform. If the time when the call was received from the caller or the caller's number from the call processing server 30 was later than a predetermined time from the time when the authentication request stored in the temporary DB 50 was received, the computer 10 of the requester of the authentication requester. It is determined that the authentication request from the client is not approved.
- an authentication request transmitted by the authentication requester's telephone 40 to the authentication server 20 is installed in the authentication requestor's telephone 40.
- the authentication requester's phone 40 displays an authentication request screen for including an authentication request to the authentication server 20, including a menu for making an authentication request. 20) may include an ID of a program for requesting authentication.
- the line number selection step is any one of the lines that the authentication server 20 can call from among the lines managed by the call processing server 30.
- the authentication server 20 may request the call processing server 30 to select a line number and receive a line number from the call processing server 30.
- the computer-implemented two channel-based authentication method described above may further include generating an authentication number when the authentication server 20 receives an authentication request from the computer 10 of the authentication requestor. can do.
- the authentication server 20 performs the line number selection step when receiving the authentication request from the telephone 40 of the authentication requester.
- the authentication server 20 transmits the selected line number together with the authentication number, and the telephone requester 40 of the authentication requester calls the telephone number consisting of the selected line number and the authentication number.
- the call processing server 30 authenticates the authentication number from the caller together with the phone number of the caller (the telephone requester 40 of the authentication requester) when performing the third transmission step. Send to server 20.
- the authentication server 30 compares the telephone number received from the call processing server 30 with the authentication requestor telephone number stored in the temporary DB 50, and the authentication server 50 generates the authentication server 50.
- the authentication number received from the call processing server 30 is compared with one authentication number.
- the authentication server 50 performs the determining step, the comparison result of the comparing step, the telephone number received from the call processing server 30 and the authentication requester telephone number stored in the temporary DB 50, and, If the authentication number generated by the authentication server 20 and the authentication number received from the call processing server 30 match, the authentication request from the computer 10 of the authentication requester is approved.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims (13)
- 인증 요청자의 컴퓨터, 인증 요청자의 전화기, 인증 서버, 및 호 처리 서버를 포함하는 투 채널 기반의 인증 시스템에서 컴퓨터로 구현되는(computer-implemented) 투 채널 기반의 인증 방법에 있어서상기 인증 요청자의 컴퓨터가, 인증 요청을 할 수 있는 인증요청화면 - 인증 요청자 식별정보를 입력하고, 인증 요청을 할 수 있는 메뉴를 포함 - 을 표시하는 단계;상기 인증요청자의 컴퓨터가, 상기 인증요청화면상에서 상기 인증 요청자로부터 인증 요청을 수신하면, 상기 인증 서버에게 인증 요청을 전송하는 제1전송단계;상기 인증 서버가 상기 인증 요청을 수신하면 인증 요청자의 전화 번호를 임시 DB에 저장하는 단계;상기 인증 서버가 통화 가능한 회선 번호들 중에서 어느 하나의 회선 번호를 선택하는 회선 번호 선택단계;상기 인증 서버가 상기 회선 번호 선택단계에서 선택된 회선 번호를 상기 인증 요청자의 전화기에게 전송하는 제2전송단계;상기 인증 요청자의 전화기가 상기 인증 서버로부터 전송받은 회선 번호로 전화를 하는 단계;상기 호 처리 서버는, 상기 선택된 회선 번호로 전화가 오면, 상기 선택된 회선 번호로 전화를 한 전화기의 전화 번호를 상기 인증 서버에게 전송하는 제3전송단계;상기 인증 서버는 상기 호 처리 서버로부터 전송받은 전화 번호와 상기 임시 DB에 저장된 인증 요청자 전화 번호를 비교하는 단계; 및상기 인증 서버는, 상기 비교하는 단계의 비교 결과, 상기 호 처리 서버로부터 전송받은 전화 번호와 상기 임시 DB에 저장된 인증 요청자 전화 번호가 일치하면, 상기 인증 요청자의 컴퓨터로부터의 인증 요청을 승인하는 것으로 판단하는 단계;를 포함하는 것인, 컴퓨터로 구현되는(computer-implemented) 투 채널 기반의 인증 방법.
- 제1항에 있어서,상기 인증 요청자의 전화기가 상기 인증 서버에게 인증 요청을 전송하는 제4전송단계;를 더 포함하며,상기 인증 서버는, 상기 인증 요청자의 전화기로부터 상기 인증 요청을 수신하는 경우에, 상기 회선 번호 선택단계를 수행하는 것인, 컴퓨터로 구현되는(computer-implemented) 투 채널 기반의 인증 방법.
- 제1항에 있어서,상기 인증 서버는, 상기 인증 요청자의 컴퓨터로부터 상기 인증 요청을 수신하는 경우에, 상기 회선 번호 선택단계를 수행하는 것인, 컴퓨터로 구현되는(computer-implemented) 투 채널 기반의 인증 방법.
- 제2항 또는 제3항에 있어서,상기 인증 서버가, 상기 인증 요청자의 컴퓨터로부터의 인증 요청을 수신할 경우, 상기 인증 요청자의 컴퓨터로부터의 인증 요청을 수신한 시각을 상기 임시 DB에 더 포함시켜 저장하는 것인, 컴퓨터로 구현되는(computer-implemented) 투 채널 기반의 인증 방법.
- 제4항에 있어서,상기 인증 서버는, 상기 판단하는 단계를 수행할 때,상기 호 처리 서버가 상기 인증 요청자의 전화기로부터 전화를 수신한 시각 또는 상기 호 처리 서버로부터 발신자 번호를 수신한 시각이, 상기 임시 DB에 저장된 인증 요청을 수신한 시각으로부터 미리 정한 시간 이후 인 경우에는 상기 인증 요청자의 컴퓨터로부터의 인증 요청을 승인하지 않는 것으로 판단하는 것인, 컴퓨터로 구현되는(computer-implemented) 투 채널 기반의 인증 방법.
- 제5항에 있어서,상기 인증 요청자의 전화기가 상기 인증 서버에게 전송하는 인증 요청은,상기 인증 요청자의 전화기에 설치되어, 상기 인증 요청자의 전화기가 상기 인증 서버에게 인증 요청을 할 수 있는 인증요청화면 - 인증 요청을 할 수 있는 메뉴를 포함 - 을 표시하고 상기 메뉴 상에서 사용자가 인증 요청을 하면 상기 인증 서버에게 인증 요청을 하는 프로그램의 ID를 포함하는 것인, 컴퓨터로 구현되는(computer-implemented) 투 채널 기반의 인증 방법.
- 제2항 또는 제3항에 있어서,상기 회선 번호 선택단계는,상기 인증 서버가 상기 호 처리 서버가 관리하는 회선들 중에서 통화 가능한 회선 중에서 어느 하나를 선택하거나, 또는상기 인증 서버가 상기 호 처리 서버에게 회선 번호 선택을 요청하여, 상기 호 처리 서버로부터 회선 번호를 선택받는 단계인 것인, 컴퓨터로 구현되는(computer-implemented) 투 채널 기반의 인증 방법.
- 제2항 또는 제3항에 있어서,상기 인증 서버가 상기 인증 요청자의 컴퓨터로부터 인증 요청을 수신하면, 인증 번호를 생성하는 단계;를 더 포함하며,상기 인증 서버는, 상기 인증 요청자의 전화기로부터 상기 인증 요청을 수신하는 경우에서, 상기 회선 번호 선택단계를 수행하며,상기 인증 서버가 상기 제2전송단계를 수행할 때, 상기 할당된 회선 번호를 상기 인증 번호와 같이 전송하고, 상기 인증 요청자의 전화기는 상기 선택된 회선 번호와 상기 인증 번호로 이루어진 전화번호로 전화를 하고,상기 호 처리 서버는 상기 선택된 회선 번호로 전화가 오면, 상기 제3전송단계를 수행할 때, 상기 선택된 회선 번호로 전화를 한 전화기의 전화 번호와 함께 상기 인증 번호를 상기 인증 서버에게 전송하며,상기 인증 서버는 상기 비교하는 단계를 수행할 때, 상기 호 처리 서버로부터 전송받은 전화 번호와 상기 임시 DB에 저장된 인증 요청자 전화 번호를 비교하고, 상기 인증 서버가 생성한 인증 번호와 상기 호 처리 서버로부터 전송받은 인증 번호를 비교하며,상기 인증 서버는 상기 판단하는 단계를 수행할 때, 상기 비교하는 단계의 비교 결과, 상기 호 처리 서버로부터 전송받은 전화 번호와 상기 임시 DB에 저장된 인증 요청자 전화 번호가 일치하고, 상기 인증 서버가 생성한 인증 번호와 상기 호 처리 서버로부터 전송받은 인증 번호가 일치하면, 상기 인증 요청자의 컴퓨터로부터의 인증 요청을 승인하는 것인, 컴퓨터로 구현되는(computer-implemented) 투 채널 기반의 인증 방법.
- 인증 요청자의 컴퓨터, 인증 요청자의 전화기, 인증 서버, 및 호 처리 서버를 포함하는 투 채널 기반의 인증 시스템에 있어서,상기 인증 요청자의 컴퓨터는, 인증 요청을 할 수 있는 인증요청화면 - 인증 요청자 식별정보를 입력하고, 인증 요청을 할 수 있는 메뉴를 포함 - 을 표시하며,상기 인증요청자의 컴퓨터는, 상기 인증요청화면상에서 상기 인증 요청자로부터 인증 요청을 수신하면, 상기 인증 서버에게 인증 요청을 전송하며,상기 인증 서버는 통화 가능한 회선 번호들 중에서 어느 하나의 회선 번호를 선택하고, 선택된 회선 번호를 상기 인증 요청자의 전화기에게 전송하며,상기 인증 요청자의 전화기는 상기 인증 서버로부터 전송받은 회선 번호로 전화를 하고,상기 호 처리 서버는, 상기 선택된 회선 번호로 전화가 오면, 상기 선택된 회선 번호로 전화를 한 전화기의 전화 번호를 상기 인증 서버에게 전송하고,상기 인증 서버는 상기 호 처리 서버로부터 전송받은 전화 번호와 상기 인증 요청자 전화 번호를 비교하여 상기 호 처리 서버로부터 전송받은 전화 번호와 상기 인증 요청자 전화 번호가 일치하면, 상기 인증 요청자의 컴퓨터로부터의 인증 요청을 승인하는 것으로 판단하는 것인, 투 채널 기반의 인증 시스템.
- 제9항에 있어서,상기 인증 요청자의 전화기는 상기 인증 서버에게 인증 요청을 전송하며,상기 인증 서버는, 상기 인증 요청자의 전화기로부터 상기 인증 요청을 수신하는 경우에, 통화 가능한 회선 번호들 중에서 어느 하나의 회선 번호를 선택하는 동작을 수행하는 것인, 투 채널 기반의 인증 시스템.
- 제9항에 있어서,상기 인증 서버는, 상기 인증 요청자의 컴퓨터로부터 상기 인증 요청을 수신하는 경우에, 통화 가능한 회선 번호들 중에서 어느 하나의 회선 번호를 선택하는 동작을 수행하는 것인, 투 채널 기반의 인증 시스템.
- 제10항 또는 제11항에 있어서,상기 인증 서버는,상기 호 처리 서버가 상기 인증 요청자의 전화기로부터 전화를 수신한 시각 또는 상기 호 처리 서버로부터 발신자 번호를 수신한 시각이, 상기 인증 요청자의 컴퓨터로부터 인증 요청을 수신한 시각으로부터 미리 정한 시간 이후 인 경우에는 상기 인증 요청자의 컴퓨터로부터의 인증 요청을 승인하지 않는 것을 판단하는 것인, 투 채널 기반의 인증 시스템.
- 제10항 또는 제11항에 있어서,상기 인증 서버는 상기 인증 요청자의 컴퓨터로부터 인증 요청을 수신하면, 인증 번호를 생성하며,상기 인증 서버는 상기 인증 요청자의 전화기로부터 상기 인증 요청을 수신하면 통화 가능한 회선 번호들 중에서 어느 하나의 회선 번호를 선택하며,상기 인증 서버는, 상기 선택된 회선 번호를 상기 인증 번호와 같이 상기 인증 요청자의 전화기에게 전송하고, 상기 인증 요청자의 전화기는 상기 선택된 회선 번호와 상기 인증 번호로 이루어진 전화번호로 전화를 하고,상기 호 처리 서버는 상기 선택된 회선 번호로 전화가 오면, 상기 선택된 회선 번호로 전화를 한 전화기의 전화 번호와 함께 상기 인증 번호를 상기 인증 서버에게 전송하며,상기 인증 서버는 상기 호 처리 서버로부터 전송받은 전화 번호와 상기 임시 DB에 저장된 인증 요청자 전화 번호를 비교하고, 상기 인증 서버가 생성한 인증 번호와 상기 호 처리 서버로부터 전송받은 인증 번호를 비교하며, 비교 결과, 상기 호 처리 서버로부터 전송받은 전화 번호와 상기 임시 DB에 저장된 인증 요청자 전화 번호가 일치하고, 상기 인증 서버가 생성한 인증 번호와 상기 호 처리 서버로부터 전송받은 인증 번호가 일치하면, 상기 인증 요청자의 컴퓨터로부터의 인증 요청을 승인하는 것인, 투 채널 기반의 인증 시스템.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/772,069 US20180349594A1 (en) | 2015-10-30 | 2016-10-28 | Two-channel based authentication method and system |
JP2018542075A JP2019500708A (ja) | 2015-10-30 | 2016-10-28 | ツーチャンネルベースの認証方法及びシステム |
CN201680063026.8A CN108352988A (zh) | 2015-10-30 | 2016-10-28 | 基于双通道的认证方法及系统 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2015-0152066 | 2015-10-30 | ||
KR20150152066 | 2015-10-30 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017074090A1 true WO2017074090A1 (ko) | 2017-05-04 |
Family
ID=58631850
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2016/012228 WO2017074090A1 (ko) | 2015-10-30 | 2016-10-28 | 투 채널 기반의 인증 방법 및 시스템 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20180349594A1 (ko) |
JP (1) | JP2019500708A (ko) |
KR (2) | KR20170051335A (ko) |
CN (1) | CN108352988A (ko) |
WO (1) | WO2017074090A1 (ko) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112448935A (zh) * | 2019-09-03 | 2021-03-05 | 华为技术有限公司 | 建立网络连接的方法及电子设备 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002111897A (ja) * | 2000-09-29 | 2002-04-12 | Canon Inc | ネットワークシステム、その制御方法およびネットワークシステムにおけるユーザの登録方法 |
KR20110018022A (ko) * | 2009-08-17 | 2011-02-23 | (주)유비몰 | 임시번호를 이용한 통신서비스 방법 및 그 서비스 제공 방법 그리고 그를 위한 시스템 |
KR20110134801A (ko) * | 2010-06-09 | 2011-12-15 | 주식회사 케이티 | 결제 인증 시스템 및 방법 |
KR101474144B1 (ko) * | 2013-06-19 | 2014-12-17 | (주)에이티솔루션즈 | 일회용착신번호를 이용한 전화 인증 방법 |
KR20150004543A (ko) * | 2013-07-03 | 2015-01-13 | (주)에이티솔루션즈 | 발신인증을 이용한 전화 인증 방법 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002037358A1 (fr) * | 2000-10-31 | 2002-05-10 | Arkray, Inc. | Procede d'authentification d'utilisation en reseau |
CN101072105B (zh) * | 2007-05-21 | 2011-05-11 | 腾讯科技(深圳)有限公司 | 一种网络身份认证的方法和系统 |
CN101150631A (zh) * | 2007-09-20 | 2008-03-26 | 华为技术有限公司 | 一种设置呼叫转移的方法及其装置 |
CN101145905A (zh) * | 2007-10-25 | 2008-03-19 | 中国工商银行股份有限公司 | 一种实现电话银行在线支付的认证方法、装置及系统 |
US8255983B2 (en) * | 2009-03-31 | 2012-08-28 | Telefonaktiebolaget L M Ericsson (Publ) | Method and apparatus for email communication |
EP2737657A1 (en) * | 2011-07-25 | 2014-06-04 | Emue Holdings Pty Ltd | Call authentication methods and systems |
-
2016
- 2016-10-28 KR KR1020160142022A patent/KR20170051335A/ko not_active Application Discontinuation
- 2016-10-28 WO PCT/KR2016/012228 patent/WO2017074090A1/ko active Application Filing
- 2016-10-28 KR KR1020160142028A patent/KR20170051336A/ko not_active Application Discontinuation
- 2016-10-28 JP JP2018542075A patent/JP2019500708A/ja active Pending
- 2016-10-28 CN CN201680063026.8A patent/CN108352988A/zh active Pending
- 2016-10-28 US US15/772,069 patent/US20180349594A1/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002111897A (ja) * | 2000-09-29 | 2002-04-12 | Canon Inc | ネットワークシステム、その制御方法およびネットワークシステムにおけるユーザの登録方法 |
KR20110018022A (ko) * | 2009-08-17 | 2011-02-23 | (주)유비몰 | 임시번호를 이용한 통신서비스 방법 및 그 서비스 제공 방법 그리고 그를 위한 시스템 |
KR20110134801A (ko) * | 2010-06-09 | 2011-12-15 | 주식회사 케이티 | 결제 인증 시스템 및 방법 |
KR101474144B1 (ko) * | 2013-06-19 | 2014-12-17 | (주)에이티솔루션즈 | 일회용착신번호를 이용한 전화 인증 방법 |
KR20150004543A (ko) * | 2013-07-03 | 2015-01-13 | (주)에이티솔루션즈 | 발신인증을 이용한 전화 인증 방법 |
Also Published As
Publication number | Publication date |
---|---|
CN108352988A (zh) | 2018-07-31 |
US20180349594A1 (en) | 2018-12-06 |
KR20170051336A (ko) | 2017-05-11 |
JP2019500708A (ja) | 2019-01-10 |
KR20170051335A (ko) | 2017-05-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2013183814A1 (ko) | 개선된 보안 기능 기반의 클라우드 서비스 시스템 및 이를 지원하는 방법 | |
WO2013141632A1 (ko) | 인증 방법 및 그 시스템 | |
WO2016129929A1 (ko) | 온라인 웹사이트의 회원 로그인을 위한 보안인증 시스템 및 그 방법 | |
WO2019098413A1 (ko) | 디지털 도어락 시스템 및 그 제어 방법 | |
US11824854B2 (en) | Communication system and computer readable storage medium | |
WO2015020360A1 (ko) | 무선 통신 시스템에서 기기 등록 및 인증을 수행하는 방법 및 장치 | |
WO2016088970A1 (en) | Electronic apparatus and control method thereof | |
WO2019143044A1 (ko) | 약전계 환경에서 콜 연속성을 제공하는 전자 장치 및 제어 방법 | |
WO2019039811A1 (ko) | 블록체인 기반 원 아이디 서비스 시스템 및 방법 | |
JPH10215488A (ja) | 移動無線システムにおけるホストアクセス方法 | |
WO2013085144A1 (en) | Method of providing sns-group inviting service and sns server therefor | |
RU2642483C2 (ru) | Способ и устройство для доступа к конференции | |
WO2015105289A1 (ko) | 인터넷 환경에서의 사용자 보안 인증 시스템 및 그 방법 | |
WO2018151392A1 (ko) | 메신저서비스를 이용한 스마트 로그인 방법 및 그 장치 | |
JPH09214618A (ja) | 通信装置及び通信システム | |
WO2017074090A1 (ko) | 투 채널 기반의 인증 방법 및 시스템 | |
US20070254637A1 (en) | Device, Method and Computer Program Product Readable Medium for Establishing a Communication Session | |
WO2019088411A1 (ko) | 발신번호 변경 시스템 및 발신번호 변경 서비스 제공 방법 | |
WO2017078358A1 (ko) | 생체 인식을 통한 보안 통신 시스템 및 방법 | |
KR20120007222A (ko) | 이동통신 단말기를 이용한 출입관리 방법 | |
WO2021225329A1 (ko) | 사용자 식별자 및 서명 수집을 이용한 모바일 애플리케이션 위변조 탐지 방법 및 시스템 | |
JP2009232108A (ja) | 通信装置及びコンピュータプログラム | |
WO2011074878A2 (ko) | 서비스 보안 시스템 및 그 방법 | |
JP5069959B2 (ja) | 認証装置 | |
WO2023277229A1 (ko) | 정보 제공 방법 및 이를 이용한 전자 장치 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16860273 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2018542075 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22.08.2018) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16860273 Country of ref document: EP Kind code of ref document: A1 |