WO2017086757A1 - Procédé et dispositif de maîtrise de la sécurité d'un dispositif cible à l'aide d'un tunnel sécurisé - Google Patents

Procédé et dispositif de maîtrise de la sécurité d'un dispositif cible à l'aide d'un tunnel sécurisé Download PDF

Info

Publication number
WO2017086757A1
WO2017086757A1 PCT/KR2016/013406 KR2016013406W WO2017086757A1 WO 2017086757 A1 WO2017086757 A1 WO 2017086757A1 KR 2016013406 W KR2016013406 W KR 2016013406W WO 2017086757 A1 WO2017086757 A1 WO 2017086757A1
Authority
WO
WIPO (PCT)
Prior art keywords
target device
user terminal
identifier
otp information
secure tunnel
Prior art date
Application number
PCT/KR2016/013406
Other languages
English (en)
Korean (ko)
Inventor
서원일
Original Assignee
(주)엔에스비욘드
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by (주)엔에스비욘드 filed Critical (주)엔에스비욘드
Publication of WO2017086757A1 publication Critical patent/WO2017086757A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key

Definitions

  • Circuit switching refers to a method of creating a network path between two devices and transferring data only between the two devices.
  • Packet switching refers to a method of transferring data divided into packets without a predetermined path.
  • Circuit network has low transmission efficiency but strong data security, and packet communication has high transmission efficiency but weak data security. Properly combining circuit switching with packet switching can improve data security while maintaining high transmission efficiency.
  • the embodiments below provide a technique for safely controlling the security of a target device using a user terminal.
  • an operation method of a user terminal includes receiving an identifier of the target device through short-range communication with a target device; Establishing a secure tunnel with the authentication server; Transmitting the identifier of the target device to the authentication server via the secure tunnel; Receiving, via the secure tunnel, first OTP information generated by the authentication server based on the identifier of the target device; And transmitting the first OTP information to the target device through the short range communication, wherein the security of the target device is generated based on the first OTP information and an identifier of the target device in the target device. 2 is released based on the OTP information.
  • Each of the first OTP information and the second OTP information may be generated based on an identifier of the target device and a current time.
  • the identifier of the target device may be transmitted by the target device when the user terminal is registered with the target device.
  • the first OTP information may be transmitted by the authentication server when the user terminal is registered in the target device.
  • the method of operating the user terminal may further include receiving internal information of the target device through the short range communication as the security of the target device is released. As the security of the target device is released, a user of the user terminal may log in to the target device.
  • the secure tunnel may connect a user terminal, a first gateway connected with the user terminal, and a second gateway connected with the first gateway.
  • the target device may be any one of a door lock, a vehicle, a measurement device, and a computer.
  • a method of operating a target device includes transmitting an identifier of the target device through short-range communication with a user terminal; Generating second OTP information based on an identifier of the target device; Receiving first OTP information generated by the authentication server from the user terminal through the short range communication based on the identifier of the target device; And releasing security of the target device based on the first OTP information and the second OTP information, wherein the identifier of the target device is through the secure tunnel between the user terminal and the authentication server. Is transmitted to the authentication server, and the first OTP information is transmitted from the authentication server to the user terminal through the secure tunnel.
  • Each of the first OTP information and the second OTP information may be generated based on an identifier of the target device and a current time.
  • the transmitting of the identifier of the target device may include determining whether the user terminal is registered with the target device; And transmitting the identifier of the target device to the user terminal when registered with the target device.
  • the step of releasing security of the target device may include desecuring the target device when the first OTP information and the second OTP information are the same and the distance between the user terminal and the target device is closer than a predetermined threshold. It may include the step.
  • the method of operating the target device may further include transmitting internal information of the target device to the user terminal through the short range communication as the security of the target device is released. As the security of the target device is released, a user of the user terminal may log in to the target device.
  • a method of operating an authentication server includes establishing a secure tunnel with a user terminal; Receiving an identifier of a target device from the user terminal through the secure tunnel; Generating first OTP information based on the identifier of the target device; And transmitting the first OTP information to the user terminal through the secure tunnel, wherein the identifier of the target device is from the target device to the user terminal through short-range communication between the user terminal and the target device. And the first OTP information is transmitted from the user terminal to the target device through the short range communication, and the security of the target device is generated based on the first OTP information and an identifier of the target device in the target device. Based on the generated second OTP information.
  • FIG. 1 illustrates a security system according to one embodiment.
  • FIG. 2 is a diagram for describing a process of creating a secure tunnel, according to an exemplary embodiment.
  • FIG 3 is a view for explaining a security process of the door lock according to an embodiment.
  • FIG. 4 is a diagram illustrating a security process of a computer according to one embodiment.
  • FIG. 5 is a diagram illustrating a security process of a measurement apparatus according to an embodiment.
  • FIG. 6 is a diagram illustrating a traffic blocking operation according to one embodiment.
  • FIG. 7 is a flowchart illustrating a method of operating a user terminal according to an exemplary embodiment.
  • FIG. 8 is a flowchart illustrating a method of operating a target device, according to an exemplary embodiment.
  • FIG. 9 is a flowchart illustrating a method of operating an authentication server according to an exemplary embodiment.
  • Embodiments according to the inventive concept may be variously modified and have various forms, so embodiments are illustrated in the drawings and described in detail herein. However, this is not intended to limit the embodiments in accordance with the concept of the present invention to specific embodiments, and includes modifications, equivalents, or substitutes included in the spirit and scope of the present invention.
  • first or second may be used to describe various components, but the components should not be limited by the terms. The terms are only for the purpose of distinguishing one component from another component, for example, without departing from the scope of the rights according to the inventive concept, the first component may be called a second component, Similarly, the second component may also be referred to as the first component.
  • the security system includes a target device 110, a user terminal 120, and an authentication server 130.
  • the user may release the security of the target device 110 using the user terminal 120.
  • the target device 110 may be any one of a door lock, a vehicle, a measurement device, and a computer.
  • the door lock may be unlocked as the user approaches the door lock with the user terminal 120.
  • the vehicle may be unlocked as the vehicle approaches the vehicle with the user terminal 120, or internal information of the vehicle may be transmitted to the user terminal 120.
  • the user terminal 120 may include a mobile device or wearable device such as a smart phone, a smart watch, smart glasses, a tablet PC, a notebook computer, and a PDA. Since smart phones and the like are very common, the user may conveniently release the security of the target device 110 or receive internal information of the target device 110 through such a smart phone.
  • the internal information is information stored in the target device 110 and may include information obtained according to an operation of the target device 110 and information obtained by the target device 110 from an external device. For example, if the target device 110 is a door lock, the internal information may include a record about the time when the door lock is unlocked, and if the target device 110 is a gas meter, the internal information may be the target system. It may include the gas usage of.
  • the user may be freed from memorizing a password for releasing the security of the target device 110, and the password may be prevented from being exposed in the process of inputting the password to the target device 110.
  • a problem of recognition rate may occur according to the state of fingerprint, iris, etc., which is a medium of authentication, and according to the embodiment, it may be free from such problem of recognition rate.
  • the target device 110 and the user terminal 120 may exchange information through short-range communication.
  • the short range communication may include Bluetooth, near field communication (NFC), beacon based communication, zigbee, infrared communication, visible light communication, and the like.
  • the local area network for short-range communication between the target device 110 and the user terminal 120 may be established as the user terminal 120 approaches the target device 110.
  • the distance between the target device 110 and the user terminal 120 may be determined based on the strength of the signal for short range communication.
  • the target device 110 may request the user terminal 120 to establish a local area network as the strength of a signal received from the user terminal 120 exceeds a predetermined threshold. In this case, a request for establishing a local area network may be transmitted from the user terminal 120 to the target device 110.
  • the authentication application 121 may be installed in the user terminal 120.
  • the authentication application 121 may be executed according to a user input or may reside in a memory of the user terminal 120 without a separate input from the user. According to an embodiment, at least some of the operations of the user terminal 120 described below may be performed by the authentication application 121.
  • the authentication application 121 may support a locking function, and the locking function of the authentication application 121 may be released through a password, biometric information, and a pattern. Therefore, even if the user terminal 120 is lost, the security of the target device 110 may be maintained.
  • the user terminal 120 requests the identifier of the target device 110 from the target device 110.
  • the identifier of the target device 110 may include a unique ID of the target device 110, a unique token of the target device 110, or the like.
  • the target device 110 may transmit an identifier of the target device 110 to the user terminal 120 at the request of the user terminal 120.
  • the target device 110 may determine whether the user terminal 120 is a terminal registered with the target device 110.
  • the user terminal 120 may be registered in advance in the target device 110 under a separate security scheme. For example, when the target device 110 is a door lock, the door lock may include a USB terminal or a registration button toward the interior.
  • the user terminal 120 may be registered with the target device 110 through a corresponding USB terminal or a corresponding registration button.
  • the target device 110 when the user terminal 120 passes through a separate security system such as an input of a password, such as a door lock while the user terminal 120 is connected to the corresponding USB terminal, the target device 110.
  • the user terminal 120 may be registered in the target device 110 through a hub in the home, or may be registered in the target device 110 through an apartment management office or a company management office.
  • the target device 110 may include an initialization button for initializing registration. The target device 110 may initialize at least some of the user terminals registered in the target device 110 as the reset button is pressed.
  • the target device 110 may transmit an identifier of the target device 110 to the user terminal 120 through short-range communication.
  • the user terminal 120 may transmit the identifier of the target device 110 to the authentication server 130.
  • the user terminal 120 and the authentication server 130 may establish a secure tunnel 160 between the user terminal 120 and the authentication server 130, and exchange information through the secure tunnel 160.
  • the secure tunnel 160 is a dedicated path for the secure network between the user terminal 120 and the authentication server 130, and may be a network path that is not accessible from the external device 150.
  • the user terminal 120 may request the authentication server 130 to establish the secure tunnel 160, and the authentication server 130 may request the user terminal 120 and the authentication server 130 according to a request of the user terminal 120.
  • a secure tunnel 160 can be established between them.
  • the authentication server 130 may inform the user terminal 120 of the information about the secure tunnel 160.
  • the information about the secure tunnel 160 may include information about an access point assigned to the user terminal 120.
  • the user terminal 120 may block a route other than the secure tunnel 160.
  • the user terminal 120 may be controlled to access only the access point of the first gateway to be described below. In this case, a route for near field communication may be allowed.
  • the user terminal 120 may block the short-range communication with the target device 110 and the traffic transmission through the remaining routes except for the secure tunnel 160.
  • the authentication application 121 may check for itself whether the original code is modified, and if it is determined that the original code is modified, the authentication application 121 may forcibly release the secure tunnel 160. As a result, an operation of blocking traffic from leaking through a path other than the secure tunnel 160 may be safely ensured.
  • the authentication server 130 may include a security gateway 131 and an authentication device 132.
  • the security gateway 131 may include a first gateway connected with the user terminal 120 and a second gateway connected with the authentication device 132.
  • the first gateway and the terminal 120 may be connected through a wireless communication network 170 such as 3G, LTE, and Wi-Fi, and the second gateway and the authentication device 132 may be connected through an intranet disconnected from the wireless communication network 170.
  • the security gateway 131 connects any one of the plurality of points provided by the first gateway with one of the plurality of points provided by the second gateway, so that the virtual private network cannot be viewed from the external device 150.
  • the authentication server 130 may create a secure tunnel 160 based on the virtual private tunnel. More details regarding the secure tunnel 160 will be described later.
  • the authentication device 132 may generate one time password (OTP) information.
  • OTP time password
  • the authentication device 132 may generate OTP information based on the identifier of the target device 110 and the current time.
  • the OTP is not generated by the authentication device 132, but may be generated by an OTP generation server outside the authentication server 130 and transferred to the authentication device 132.
  • the authentication device 132 may generate OTP information when receiving a request for establishing the secure tunnel 160 from the user terminal 120 or when the secure tunnel 160 is established.
  • the authentication device 132 may transmit the OTP information to the user terminal 120 through the secure tunnel 160.
  • the user may provide the authentication device 132 with information about the target device 110 and the user terminal 120 to use the service according to the embodiment.
  • the information about the target device 110 may include an identifier of the target device 110 and information about user terminals registered in the target device 110, and the information about the user terminals may be included in the user terminal. And an identifier of 120.
  • the user terminal 120 may provide the authentication device 132 with the identifier of the user terminal 120 together with the identifier of the target device 110.
  • the authentication device 132 checks whether the user terminal 120 is registered with the target device 110 based on the identifier of the target device 110 and the identifier of the user terminal 120, and transmits the OTP information to the user terminal according to the verification result.
  • 120 may be provided.
  • the authentication device 132 may include a database in which target devices and user terminals registered in the target devices are mapped. The authentication device 132 may check whether the user terminal 120 is registered with the target device 110 based on the corresponding database. When the user terminal 120 is registered with the target device 110, the authentication device 132 may transmit the OTP information to the user terminal ( 120). If the unregistered terminal requests creation of a secure tunnel or transmits an identifier of the target device 110, the authentication device 132 may inform the user terminal 120 of the access of the unregistered terminal.
  • the security level may be improved by using the OTP information in a state blocked from the outside through the secure tunnel 160.
  • the OTP information cannot be leaked to the external device 150 by using the secure tunnel 160, and since the information of the OTP information is lost after the secure tunnel 160 is released, the OTP information is malicious code 122. Even if it leaks to the external device 150 through, there is no fear of abuse to the user's authentication.
  • the authentication application 121 installed in the user terminal 120 may perform an operation for enhancing security.
  • the user terminal 120 may transmit the OTP information generated by the authentication device 132 to the target device 110 through short range communication.
  • the target device 110 may generate OTP information.
  • the OTP generated by the authentication device 132 may be referred to as first OTP information
  • the OTP generated by the target device 110 may be referred to as second OTP information.
  • the target device 110 may generate second OTP information based on the identifier of the target device 110 and the current time.
  • the target device 110 may generate second OTP information when the identifier of the target device 110 is transmitted to the user terminal 120 or when the first OTP information is received from the target device 110.
  • the target device 110 may generate OTP information based on the identifier of the target device 110 and the current time.
  • the target device 110 may release the security of the target device 110 based on the first OTP information and the second OTP information. For example, the target device 110 of the target device 110 when the first OTP information and the second OTP information is the same and the distance between the target device 110 and the user terminal 120 is closer than a predetermined threshold. You can turn off security. Therefore, when the first OTP information and the second OTP information are different, or when the distance between the target device 110 and the user terminal 120 is greater than a predetermined threshold, the target device 110 secures the security of the target device 110. Can be maintained.
  • the target device 110 and the authentication server 130 may generate OTP information using the same algorithm.
  • the OTP generation algorithm may generate OTP information based on the identifier and the current time, and may generate the same OTP information with respect to the same identifier within a predetermined change period. Therefore, when the first OTP information and the second OTP information are generated at a similar time, the first OTP information and the second OTP information may be the same. In this case, the security of the target device 110 may be released according to the first OTP information and the second OTP information.
  • the target device 110 may repeat the above-described security procedure a predetermined number of times. For example, when the first OTP information and the second OTP information are different, the target device 110 may request the user terminal 120 to regenerate the first OTP information, and the user terminal 120 may secure the request. It may transmit to the authentication device 132 through the tunnel 160. The authentication device may regenerate and transmit the first OTP information to the user terminal 120 according to the request, and the user terminal 120 may transmit it to the target device 110.
  • the target device 110 may generate second OTP information when requesting regeneration of the first OTP information or when receiving the regenerated first OTP information.
  • the target device 110 may release security of the target device 110 based on the regenerated first OTP information and the regenerated second OTP information.
  • the user terminal 210 may communicate with the authentication device 230 through the security gateway 220.
  • the security gateway 220, the authentication device 230, and the management device 240 may configure an authentication server.
  • the management device 240 may manage the entire process for creating a secure tunnel.
  • the security gateway 220 may include a first gateway 221 connected to the user terminal 210 and a second gateway 222 connected to the authentication device 230.
  • the user terminal 210 and the first gateway 221 may be connected through a public network, and the authentication device 230 and the second gateway 222 may be connected through a private network.
  • the first gateway 221 and the second gateway 222 may be connected to the control path 20 and the secure paths 30 to 60.
  • the control path 20 is an externally accessible path.
  • the control path 20 may be a VPT connecting a point 21 provided by the first gateway 221 and a point 22 provided by the second gateway 222.
  • the management device 240 may be connected to the outside through the control path 20.
  • the secure paths 30, 40, and 50 are paths to which access is restricted from the outside.
  • the secure paths 30, 40, 50 are points 31, 41, 51 provided by the first gateway 221 and points 32, 42, 52 provided by the second gateway 222. It may be VPTs connecting between them.
  • the secure paths 30, 40, and 50 may be generated or released under the control of the management device 240.
  • the first gateway 221 may check whether the type of the packet received from the outside is a tunnel type, and drop the corresponding packet if the type of the received packet is not the tunnel type. If the type of the received packet is a tunnel type, the packet may be delivered to the authentication device 230 through a security path corresponding to the packet.
  • the first gateway 221 manages the authentication packet through the control path 20 when it is determined that the authentication packet is transmitted from the terminal listed in the white list. ) Can be delivered.
  • the authentication packet may be a packet requesting creation of a secure tunnel.
  • the management device 240 may receive a request for creating a secure tunnel from the user terminal 210 and generate a secure tunnel according to the request.
  • the management device 240 may transmit information about the generated secure tunnel to the user terminal 210.
  • the management device 240 creates a secure tunnel 40 connecting between the point 41 provided by the first gateway 221 and the point 42 provided by the second gateway 222, Information about the secure tunnel 40 may be transmitted to the user terminal 210.
  • a secure tunnel 60 may be formed that connects the user terminal 210 and the endpoint (eg, point 42) of the secure tunnel 40.
  • the authentication application installed in the user terminal 210 and the authentication device 232 may communicate with each other through the secure tunnel 60.
  • the secure tunnel 40 Since the secure tunnel 40 is isolated from the other secure tunnels 30 and 50, authentication devices 231 connected to the remaining secure tunnels 30 and 50 even when information about the secure tunnel 40 is leaked. 233, the security can be maintained.
  • the secure tunnel 40 may be created at an appropriate time.
  • the management device 240 generates the secure tunnel 40 in response to receiving the request for creating the secure tunnel from the user terminal 210 or generates the secure tunnel 40 in response to receiving the execution information of the authentication application. can do.
  • the authentication device 232 may generate the OTP information and transmit the OTP information to the user terminal 210 through the secure tunnel 40 after the creation of the secure tunnel 40.
  • the target device may generate OTP information, compare the OTP information generated by the authentication device 232 with the OTP information generated by the target device, and release the security. Therefore, the user can simply release the security of the target device without having to separately record or memorize information such as a password. If the target device is determined to release security or maintain security based on the OTP information, the target device may inform the user terminal 210 of the security release result or the security maintenance result, and the user terminal 210 may perform a security procedure to the management server 240. You can tell it is done. The management server 240 may release the secure tunnel 40 as the security procedure is completed.
  • the door lock 310 includes an OTP generator 311.
  • the OTP generator 311 may generate second OTP information based on the identifier of the door lock 310 and the current time.
  • the door lock 310 may transmit an identifier of the door lock 310 to the user terminal 320 at the request of the user terminal 320.
  • the user terminal 320 may request the service server 330 to establish a secure tunnel, and transmit the identifier of the door lock 310 to the service server 330 through the secure tunnel.
  • the authentication server 330 may include a gateway 331, an authentication device 332, and an OTP server 330.
  • the gateway 331, the authentication device 332, and the OTP server 330 may be connected to a network that is not exposed to the outside, such as an intranet.
  • the secure tunnel can be established based on the gateway 331.
  • the OTP server 333 may generate and transmit a second OTP to the authentication server 332 based on the identifier of the door lock 310 and the current time. Unlike FIG. 3, the OTP server 333 may be located outside the authentication server 330, and the second OTP information may be generated by the authentication server 332.
  • the second OTP information may be transmitted to the door lock 310 through a secure tunnel between the user terminal 320 and the authentication server 330 and near field communication between the user terminal 320 and the door lock 310.
  • the door lock 310 may release the lock based on the first OTP information and the second OTP information. For example, the door lock 310 may release the lock when the first OTP information and the second OTP information are the same and the distance between the user terminal 320 and the door lock 310 is less than a predetermined threshold. . Therefore, when the user approaches the door lock 310 with the user terminal 320, the door lock 310 may be unlocked even if no action is taken.
  • FIG. 4 is a diagram illustrating a security process of a computer, according to an exemplary embodiment.
  • computer 410 includes an OTP generator 411.
  • the OTP generator 411 may generate second OTP information based on the identifier of the computer 410 and the current time.
  • the computer 410 may transmit an identifier of the computer 410 to the user terminal 320 at the request of the user terminal 320.
  • the user terminal 320 may request the service server 330 to establish a secure tunnel, and transmit the identifier of the computer 410 to the service server 330 through the secure tunnel.
  • the authentication server 430 may include a gateway 431, an authentication device 432, and an OTP server 430.
  • the gateway 431, the authentication device 432, and the OTP server 430 may be connected to a network that is not exposed to the outside, such as an intranet.
  • the secure tunnel can be established based on the gateway 431.
  • the OTP server 433 may generate and transmit a second OTP to the authentication server 432 based on the identifier of the computer 410 and the current time.
  • the second OTP information may be transmitted to the computer 410 through a secure tunnel between the user terminal 420 and the authentication server 430 and near field communication between the user terminal 420 and the computer 410.
  • the computer 410 may release security based on the first OTP information and the second OTP information.
  • the computer 410 may release the lock. Accordingly, when the user approaches the computer 410 with the user terminal 320, the computer 410 may be unlocked even if no action is taken. In addition, when the computer 410 is unlocked, the user may log in to the computer 410 based on the user information. If the user moves away from the computer 410, the lock of the computer 410 may be activated, or the user may log out of the computer 410.
  • the measurement device 510 includes an OTP generator 511.
  • the OTP generator 511 may generate second OTP information based on the identifier of the measurement device 510 and the current time.
  • the measurement device 510 may obtain information from the target system.
  • the measuring device 510 may include an electric meter, a gas meter, a vehicle driving recorder, and the like.
  • the measurement device 510 may release security of the measurement device 510 based on the second OTP information and the first OTP information generated by the authentication device 532, and may measure the measurement information stored in the measurement device 510. It may be provided to the terminal 520.
  • the measurement device 510 may transmit an identifier of the measurement device 510 to the user terminal 520 according to a request of the user terminal 520.
  • the user terminal 520 may request the establishment of a secure tunnel to the service server 330, and transmit the identifier of the measurement device 510 to the service server 330 through the secure tunnel.
  • the authentication server 530 may include a gateway 531, an authentication device 532, an OTP server 533, and a meter reading server 534.
  • the gateway 531, the authentication device 532, the OTP server 533, and the meter reading server 534 may be connected to a network that is not exposed to the outside, such as an intranet.
  • the secure tunnel can be established based on the gateway 531.
  • the OTP server 533 may generate and transmit a second OTP to the authentication server 532 based on the identifier of the measurement device 510 and the current time.
  • the authentication device 532 may check whether the user terminal 520 is registered with the measurement device 510 and transmit second OTP information to the user terminal 520.
  • the meter reading server 532 may include a database in which the measurement devices and the user terminals registered in each of the measurement devices are mapped.
  • the user terminal 520 may provide the identifier of the user terminal 520 to the authentication device 532 through the secure tunnel together with the identifier of the measurement device 510, and the authentication device 532 may be configured to provide the identifier of the measurement device 510.
  • the identifier and the identifier of the user terminal 520 may be transmitted to the meter reading server 532.
  • the meter reading server 532 may check whether the user terminal 520 is registered with the measurement device 510 based on the database, and provide the verification result to the authentication device 532.
  • the authentication server 530 may provide the second OTP to the user terminal 520 based on the verification result.
  • the second OTP information may be transmitted to the measurement device 510 through a secure tunnel between the user terminal 520 and the authentication server 530 and near field communication between the user terminal 520 and the measurement device 510.
  • the measurement device 510 may release security based on the first OTP information and the second OTP information. For example, when the first OTP information and the second OTP information are the same and the distance between the user terminal 520 and the measurement device 510 is less than a predetermined threshold, the measurement device 510 may release the lock. .
  • the measurement device 510 may transmit measurement information of the measurement device 510 to the user terminal 520.
  • the measurement information may include electricity usage, gas usage, and vehicle driving record.
  • the user terminal 520 may transmit the measurement information to the meter reading server 534 through a secure tunnel, and the metering server 534 may manage the recording of the target system through the metering information.
  • the metering information may be used to charge a home or manage a vehicle's driving record.
  • the user can easily obtain the measurement information from the measurement device 510 while maintaining the high level of security of the measurement device 510.
  • the gas meter reader may recognize the gas usage of the target system by approaching the measuring device 510 while having the user terminal 520, and the vehicle manager may measure the measuring device (with the user terminal 520).
  • Approaching 510 can recognize the driving record of the vehicle.
  • the user terminal 600 includes a plurality of processes 611, 612, 613, and 614, a TCP / IP protocol stack 620, a virtual private network interface 640, an authentication application 630, and a physical. It may be implemented with a network interface 650.
  • Output packets sent externally from process 611, 612, 613, or 614 and input packets received from process 611, 612, 613, or 614 from the outside may be controlled through authentication application 630.
  • the authentication application 630 may temporarily block all data traffic except for packets for authentication, thereby preventing the transmission of data by a malicious program such as a remote computing service (RCS).
  • the authentication application 630 may determine whether to transmit according to the type of packet. For example, the authentication application 630 may drop all packets except packets for authentication.
  • the user terminal receives an identifier of the target device through short-range communication with the target device.
  • the user terminal establishes a secure tunnel with the authentication server.
  • the user terminal transmits the identifier of the target device to the authentication server through a secure tunnel.
  • the user terminal receives, via the secure tunnel, the first OTP information generated by the authentication server based on the identifier of the target device.
  • the user terminal transmits the first OTP information to the target device through short range communication.
  • the security of the target device is released based on the first OTP information and the second OTP information generated based on the identifier of the target device in the target device.
  • the above description may be applied to the operation of the user terminal, and a detailed description thereof will be omitted.
  • step 810 the target device transmits an identifier of the target device through short-range communication with the terminal.
  • step 820 the target device generates second OTP information based on the identifier of the target device.
  • the target device receives first OTP information generated by the authentication server based on the identifier of the target device from the terminal through short-range communication.
  • step 840 the target device releases security of the target device based on the first OTP information and the second OTP information.
  • the identifier of the target device is transmitted from the user terminal to the authentication server through a secure tunnel between the user terminal and the authentication server, and the first OTP information is transmitted from the authentication server to the user terminal through the secure tunnel.
  • the above description may be applied to the operation of the target device, and a detailed description thereof will be omitted.
  • step 9 is a flowchart illustrating a method of operating an authentication server, according to an exemplary embodiment.
  • the authentication server establishes a secure tunnel with the terminal.
  • the authentication server receives the identifier of the target device from the terminal through a secure tunnel.
  • the authentication server generates the first OTP information based on the identifier of the target device.
  • the authentication server transmits the first OTP information to the terminal through a secure tunnel.
  • the identifier of the target device is transmitted from the target device to the user terminal through short-range communication between the user terminal and the target device
  • the first OTP information is transmitted from the user terminal to the target device through the short-range communication
  • the security of the target device Is released based on the first OTP information
  • the second OTP information generated based on the identifier of the target device in the target device.
  • the above description may be applied to the operation of the authentication server, and a detailed description thereof will be omitted.
  • the apparatus described above may be implemented as a hardware component, a software component, and / or a combination of hardware components and software components.
  • the devices and components described in the embodiments are, for example, processors, controllers, Arithmetic Logic Units (ALUs), digital signal processors, microcomputers, field programmable gate arrays (FPGAs).
  • ALUs Arithmetic Logic Units
  • FPGAs field programmable gate arrays
  • PLU programmable logic unit
  • the processing device may execute an operating system (OS) and one or more software applications running on the operating system.
  • the processing device may also access, store, manipulate, process, and generate data in response to the execution of the software.
  • processing device includes a plurality of processing elements and / or a plurality of types of processing elements. It can be seen that it may include.
  • the processing device may include a plurality of processors or one processor and one controller.
  • other processing configurations are possible, such as parallel processors.
  • the software may include a computer program, code, instructions, or a combination of one or more of the above, and configure the processing device to operate as desired, or process it independently or collectively. You can command the device.
  • Software and / or data may be any type of machine, component, physical device, virtual equipment, computer storage medium or device in order to be interpreted by or to provide instructions or data to the processing device. Or may be permanently or temporarily embodied in a signal wave to be transmitted.
  • the software may be distributed over networked computer systems so that they may be stored or executed in a distributed manner.
  • Software and data may be stored on one or more computer readable recording media.
  • the method according to the embodiment may be embodied in the form of program instructions that can be executed by various computer means and recorded in a computer readable medium.
  • the computer readable medium may include program instructions, data files, data structures, etc. alone or in combination.
  • the program instructions recorded on the media may be those specially designed and constructed for the purposes of the embodiments, or they may be of the kind well-known and available to those having skill in the computer software arts.
  • Examples of computer-readable recording media include magnetic media such as hard disks, floppy disks, and magnetic tape, optical media such as CD-ROMs, DVDs, and magnetic disks, such as floppy disks.
  • Examples of program instructions include not only machine code generated by a compiler, but also high-level language code that can be executed by a computer using an interpreter or the like.
  • the hardware device described above may be configured to operate as one or more software modules to perform the operations of the embodiments, and vice versa.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

L'invention concerne un procédé et un dispositif de maîtrise de la sécurité d'un dispositif cible en utilisant un tunnel sécurisé. Un procédé d'exploitation d'un terminal d'utilisateur, selon un mode de réalisation, comporte les étapes consistant à: recevoir un identifiant d'un dispositif cible via une communication à courte portée avec le dispositif cible; établir un tunnel sécurisé avec un serveur d'authentification; envoyer l'identifiant du dispositif cible au serveur d'authentification via le tunnel sécurisé; recevoir, via le tunnel sécurisé, des premières informations d'OTP générées par le serveur d'authentification d'après l'identifiant du dispositif cible; et envoyer les premières informations d'OTP au dispositif cible via la communication à courte portée, la sécurité du dispositif cible étant libérée d'après les premières informations d'OTP et de deuxièmes informations d'OTP générées sur le dispositif cible d'après l'identifiant du dispositif cible.
PCT/KR2016/013406 2015-11-20 2016-11-21 Procédé et dispositif de maîtrise de la sécurité d'un dispositif cible à l'aide d'un tunnel sécurisé WO2017086757A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR20150163551 2015-11-20
KR10-2015-0163551 2015-11-20

Publications (1)

Publication Number Publication Date
WO2017086757A1 true WO2017086757A1 (fr) 2017-05-26

Family

ID=58717537

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2016/013406 WO2017086757A1 (fr) 2015-11-20 2016-11-21 Procédé et dispositif de maîtrise de la sécurité d'un dispositif cible à l'aide d'un tunnel sécurisé

Country Status (2)

Country Link
KR (4) KR101795450B1 (fr)
WO (1) WO2017086757A1 (fr)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101976168B1 (ko) * 2017-06-19 2019-05-10 (주)엔에스비욘드 투 채널을 이용하여 로그인 또는 서비스 이용을 수행하는 방법 및 이를 수행하는 장치
KR102027326B1 (ko) * 2018-11-13 2019-11-14 주식회사 한줌 스마트 단말장치 보안 시스템 및 방법
KR102150484B1 (ko) 2019-11-28 2020-09-01 주식회사 넷앤드 보안 강화를 위한 일회성 비밀번호 기반 접속 인증 시스템
CN115667944A (zh) * 2020-05-28 2023-01-31 三菱电机株式会社 查表系统、服务器及数据收集程序
KR102236656B1 (ko) * 2020-06-23 2021-04-07 주식회사 이노스코리아 다기능을 가지는 보안 연결을 제공하는 보안 통신 장치 및 그 동작 방법

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090013618A (ko) * 2007-08-02 2009-02-05 주식회사 제이디씨텍 일회용비밀번호를 이용한 도어록 개폐시스템
KR20120057602A (ko) * 2009-10-08 2012-06-05 최운호 운전자 인증을 통한 차량 제어 방법, 차량 단말기, 생체인식 카드 및 시스템과, 생체인식 카드와 단말기를 이용한 탑승자 보호 추적 기능을 제공하는 방법
KR101211477B1 (ko) * 2011-08-31 2012-12-12 주식회사 아이레보 모바일키 서비스 제공 방법
KR101259546B1 (ko) * 2011-11-04 2013-04-30 주식회사 아이레보 스마트키 서비스 제공 방법
KR20140117264A (ko) * 2013-03-26 2014-10-07 (주) 은광시스템 디지탈 도어락과 무선통신 단말기를 이용한 출입 인증 방법 및 그 장치

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101926020B1 (ko) * 2011-07-11 2018-12-06 주식회사 비즈모델라인 동적 결정된 인증번호를 이용한 결제 운영 시스템
KR20150034147A (ko) * 2015-02-16 2015-04-02 (주)엔텔스 IPSec 프로토콜을 통해 서비스 정보를 제공하는 네트워크 시스템 및 IPSec 프로토콜을 통해 서비스 정보를 전송하는 방법

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090013618A (ko) * 2007-08-02 2009-02-05 주식회사 제이디씨텍 일회용비밀번호를 이용한 도어록 개폐시스템
KR20120057602A (ko) * 2009-10-08 2012-06-05 최운호 운전자 인증을 통한 차량 제어 방법, 차량 단말기, 생체인식 카드 및 시스템과, 생체인식 카드와 단말기를 이용한 탑승자 보호 추적 기능을 제공하는 방법
KR101211477B1 (ko) * 2011-08-31 2012-12-12 주식회사 아이레보 모바일키 서비스 제공 방법
KR101259546B1 (ko) * 2011-11-04 2013-04-30 주식회사 아이레보 스마트키 서비스 제공 방법
KR20140117264A (ko) * 2013-03-26 2014-10-07 (주) 은광시스템 디지탈 도어락과 무선통신 단말기를 이용한 출입 인증 방법 및 그 장치

Also Published As

Publication number Publication date
KR20170124510A (ko) 2017-11-10
KR20170124511A (ko) 2017-11-10
KR101795451B1 (ko) 2017-11-09
KR101969752B1 (ko) 2019-04-17
KR20170059359A (ko) 2017-05-30
KR101795450B1 (ko) 2017-11-09
KR20170059426A (ko) 2017-05-30
KR102011763B1 (ko) 2019-08-19

Similar Documents

Publication Publication Date Title
WO2017086757A1 (fr) Procédé et dispositif de maîtrise de la sécurité d'un dispositif cible à l'aide d'un tunnel sécurisé
WO2018124857A1 (fr) Procédé et terminal d'authentification sur la base d'une base de données de chaînes de blocs d'un utilisateur sans face-à-face au moyen d'un id mobile, et serveur utilisant le procédé et le terminal
WO2018066961A1 (fr) Communication d'élément sécurisé d'environnement d'exécution de confiance
WO2017111383A1 (fr) Dispositif d'authentification sur la base de données biométriques, serveur de commande relié à celui-ci, et procédé de d'ouverture de session sur la base de données biométriques
EP3659092A1 (fr) Procédé et appareil de paiement hors ligne sécurisé
US10581849B2 (en) Data packet transmission method, data packet authentication method, and server thereof
WO2012144849A2 (fr) Procédé d'authentification d'accès pour multiples dispositifs et plateformes
WO2021256669A1 (fr) Procédé et système de gestion de sécurité d'accès
WO2020138525A1 (fr) Procédé d'authentification distribuée d'un dispositif dans un environnement de chaînes de blocs de l'internet des objets, et système d'authentification distribuée de dispositif l'utilisant
WO2014185594A1 (fr) Système et procédé à authentification unique dans un environnement vdi
WO2015130031A1 (fr) Système et procédé de sécurité pour l'internet des objets
WO2014003362A1 (fr) Système et procédé d'authentification fondée sur otp
WO2016148483A1 (fr) Appareil et procédé de gestion d'énergie domestique au moyen d'une balise dans un système de gestion d'énergie domestique
WO2019093808A1 (fr) Procédé, appareil et support d'enregistrement lisible par ordinateur pour le stockage sécurisé d'une mnémonique d'un portefeuille de bitcoin matériel
WO2020045823A1 (fr) Système de contrat intelligent utilisant une machine virtuelle et son procédé de traitement
WO2021206289A1 (fr) Procédé, dispositif et programme d'authentification d'utilisateur
WO2024090845A1 (fr) Procédé d'authentification de propriété de portefeuille de chaîne de blocs sans fonction de signature, et système l'utilisant
WO2018004042A1 (fr) Système de vérification mutuelle et son procédé d'exécution
WO2012169752A2 (fr) Système et procédé d'authentification d'un dispositif qui tente d'établir une connexion
WO2020189871A1 (fr) Appareil de commande d'accès à internet d'un dispositif ido et procédé associé
WO2016153123A1 (fr) Système permettant d'effectuer une authentification à l'aide d'une adresse mac et procédé s'y rapportant
WO2018088680A1 (fr) Système de sécurité et procédé de traitement de demande d'accès à un site bloqué
WO2022075563A1 (fr) Dispositif électronique pour générer et authentifier des informations d'identification d'un dispositif matériel et son procédé de fonctionnement
WO2017014614A1 (fr) Procédé de fonctionnement d'un client de communication d'un dispositif iot, et dispositif iot comprenant un client de communication
WO2012121497A2 (fr) Système et procédé d'authentification sur la base d'un identifiant distinct

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16866709

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16866709

Country of ref document: EP

Kind code of ref document: A1