WO2017116008A1 - Procédé, étiquette et application pour réaliser une fonction de verrouillage de terminal d'utilisateur - Google Patents

Procédé, étiquette et application pour réaliser une fonction de verrouillage de terminal d'utilisateur Download PDF

Info

Publication number
WO2017116008A1
WO2017116008A1 PCT/KR2016/013597 KR2016013597W WO2017116008A1 WO 2017116008 A1 WO2017116008 A1 WO 2017116008A1 KR 2016013597 W KR2016013597 W KR 2016013597W WO 2017116008 A1 WO2017116008 A1 WO 2017116008A1
Authority
WO
WIPO (PCT)
Prior art keywords
tag
terminal
user terminal
lock
application
Prior art date
Application number
PCT/KR2016/013597
Other languages
English (en)
Korean (ko)
Inventor
송영상
윤지은
Original Assignee
송영상
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 송영상 filed Critical 송영상
Publication of WO2017116008A1 publication Critical patent/WO2017116008A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor

Definitions

  • the present invention relates to a method, a tag and a computer program for providing a user terminal lock function, and more particularly, to register an NFC tag on a user terminal to perform a lock or unlock function of the terminal through the registered NFC tag.
  • a tag and a computer program To a method, a tag and a computer program.
  • the present invention is to solve the above problems of the prior art, it is to be able to lock and unlock the terminal only by the registered NFC tag, it is possible to enhance the terminal use restriction function.
  • the present invention is to solve the above-described problems of the prior art, according to an embodiment of the present invention, in the method of providing a lock function of the user terminal, (a) the tag information encryption from the tag through the near field communication with the tag Receiving a value and a lock request of the terminal; (b) verifying the tag information encryption value; And (c) if it is authenticated that the tag is a tag having use authority through verification of the tag information password value, a lock setting is performed in the user terminal.
  • the terminal lock function providing method Prior to the step (a), by the short-range communication with the tag, a tag usage registration step of receiving and storing the tag information encryption value of the tag is provided, the terminal lock function providing method is provided.
  • the step (b) includes the step of checking whether the tag information password value stored in the tag use registration step and the tag information password value received in the terminal lock request receiving step are provided, providing a method for providing a terminal lock function. do.
  • the terminal lock function providing method This is provided.
  • step (a) in accordance with the short-range communication with the tag, accessing the application management server to request the terminal lock application transmission; And installing the terminal locking application transmitted to the user terminal according to the request.
  • step (c) After the step (c), according to the lock setting time, further comprising the step of providing a link page to the user terminal to use the services provided by other applications or websites associated with the terminal lock application, providing a terminal lock function A method is provided.
  • step (c) After the step (c), receiving a tag information encryption value and the terminal unlocking request from the tag through short-range communication with the tag; Checking a tag information password value received together with the terminal lock release request and checking whether the tag information password value matches the tag information password value received in the terminal lock request receiving step; And if it is determined that the check result matches, unlocking the locked user terminal is provided.
  • the tag information for identification of the tag is stored as a password value and is transmitted together with the terminal lock request or the unlock request.
  • a tag verification password storage unit for storing the tag information password value for determining whether the tag is an encrypted tag;
  • a terminal unique information storage unit for storing terminal unique information received from the user terminal by short-range communication with the user terminal;
  • a terminal recognizing unit configured to determine whether terminal unique information received by the user terminal coincides with the stored terminal unique information in a lock setting or unlocking process of the terminal.
  • the short-range communication tag further includes a tag write protection unit performing a write protection procedure for protecting the stored terminal unique information.
  • a terminal locking application is disposed at the top of the user terminal, and locks by limiting the use of other functions disposed below the terminal.
  • An application stored on the medium is provided to execute a step in which the setting is performed.
  • step (a) in accordance with the short-range communication with the tag, accessing the application management server to request the terminal lock application transmission; And installing the terminal locking application transmitted to the user terminal according to the request.
  • step (c) the application stored in the medium to execute the step of providing the page linked to the user terminal to use the service provided by other applications or websites associated with the terminal lock application Is provided.
  • step (c) After the step (c), receiving a tag information encryption value and the terminal unlocking request from the tag through short-range communication with the tag; Checking a tag information password value received together with the terminal lock release request and checking whether the tag information password value matches the tag information password value received in the terminal lock request receiving step; And if it is determined that the result matches, the application stored in the medium is also provided to stop the execution of the terminal lock application disposed on the top of the user terminal and perform the unlocking of the user terminal.
  • the terminal can be locked and unlocked only by the registered NFC tag, thereby enhancing the terminal use restriction function.
  • the user in the process of using the service by allowing a single tag touch to perform various functions such as downloading an application, executing an application, setting a terminal lock, and unlocking a terminal without any other procedure.
  • the convenience of can be increased.
  • FIG. 1 is a block diagram of a terminal locking system by NFC tag touch according to an embodiment of the present invention.
  • FIG. 2 is a block diagram showing a schematic configuration of a user terminal according to an embodiment of the present invention.
  • FIG. 3 is a block diagram showing a schematic configuration of an NFC tag according to an embodiment of the present invention.
  • FIG. 4 is a flowchart illustrating a terminal lock application installation process through NFC tag touch and a mutual registration process between a tag and a terminal according to an embodiment of the present invention.
  • FIG. 5 is a flowchart illustrating a terminal lock setting and unlocking process through the NFC tag touch according to an embodiment of the present invention.
  • FIG. 6 is a diagram illustrating a screen on a smartphone in a process of installing a dedicated application according to an embodiment of the present invention.
  • FIG. 7 is a diagram illustrating a screen on a smartphone at the time of registration using NFC tag in a user terminal according to an embodiment of the present invention.
  • FIG. 8 is a diagram illustrating a terminal lock setting screen according to an embodiment of the present invention.
  • FIG. 9 is a diagram illustrating a terminal lock release screen according to an embodiment of the present invention.
  • FIG. 1 is a block diagram of a terminal locking system by NFC tag touch according to an embodiment of the present invention.
  • a terminal locking system using an NFC tag touch may include a user terminal 100, an NFC tag 200, and an application management server 300 capable of communicating with each other through a communication network.
  • a communication network can be configured without regard to its communication aspects such as wired and wireless.
  • Local area network LAN
  • metropolitan area network MAN: Metropolitan Area Network
  • WAN wide area network
  • the communication network according to an embodiment may be implemented as a World Wide Web (WWW).
  • WWW World Wide Web
  • the user terminal 100 may be connected to an external server such as an application management server 300 through a network such as a mobile phone, a smart phone, a personal digital assistant (PDA), a portable multimedia player (PMP), a tablet PC, and the like. It can include any type of handheld-based wireless communication device that can be supported, in addition to application management server 300 over a network, such as IPTV including desktop PCs, tablet PCs, laptop PCs, and set-top boxes. It may be connected to an external server such as, and may also include a communication device capable of supporting NFC technology. NFC technology and NFC tag touch will be described later. According to another embodiment of the present invention, even if the NFC technology is not mounted on the user terminal 100, an NFC function may be added to the user terminal 100 by mounting an external device on the user terminal 100.
  • an NFC function may be added to the user terminal 100 by mounting an external device on the user terminal 100.
  • the user terminal 100 may be installed with a terminal lock application that can lock or release the user terminal 100 according to the user's needs.
  • the terminal locking application is a program module that can communicate with an external device, and can be included in the user terminal 100 or another device that can communicate with it in the form of an operating system, an application module, and other program modules. Can be stored on a storage device.
  • program modules include, but are not limited to, routines, subroutines, programs, objects, components, data structures, etc. that perform particular tasks or execute particular abstract data types, described below, in accordance with the present invention.
  • near field communication is performed between the user terminal 100 and the NFC tag 200.
  • the user terminal 100 performs near field communication with the NFC tag 200 located in a predetermined area, and the NFC terminal 200 is disposed within a short range communication area of the user terminal 100, thereby providing a user terminal ( Communication between the 100 and the NFC tag 200 may be made.
  • a proximity arrangement between the user terminal 100 and the NFC tag 200 specifically, direct contact and being located within a predetermined distance between each other will be referred to as “touch”.
  • the terminal lock application is executed in the user terminal 100, the lock setting or unlocking function of the user terminal 100 is executed.
  • a terminal lock setting request (hereinafter referred to as a 'lock request') is transmitted from the NFC tag 200 to the user terminal 100.
  • a terminal unlock request (hereinafter referred to as a 'unlock request') is transmitted from the NFC tag 200 to the user terminal 100.
  • the lock request and the lock release request the lock setting and the unlock function of the user terminal 100 are executed.
  • the terminal lock application when the terminal lock application is not installed in the user terminal 100, when the user terminal 100 and the NFC tag 200 are touched according to an embodiment of the present disclosure, the user locks the application to the installation page of the terminal lock application. Allows the user to install a terminal lock application.
  • the NFC tag 200 touches the user terminal 100, page movement on the user terminal 100, information transmission and reception with the user terminal 100, and the user terminal 100 are performed. It is possible to perform the locking and unlocking of the.
  • NFC Near Field Communication
  • a NFC-supporting communication device such as a smartphone to a NFC tag at a short distance
  • NFC should be understood as a concept including all short-range wireless communication technology operating in the frequency domain other than 13.56MHz.
  • NFC tag 200 is formed of a chip and an antenna, it may be implemented as a product such as a sticker or a card that can be linked to the user terminal 100 utilized as a reader in the near field communication.
  • the application management server 300 may provide an application store for distributing various applications, and an operator server (not shown) that provides a terminal locking service registers the terminal locking application in the application store.
  • the user terminal 100 may download the terminal lock application registered in the application store and install it in the memory.
  • FIG. 2 is a block diagram showing a schematic configuration of a user terminal 100 according to an embodiment of the present invention.
  • the user terminal 100 includes an application installation unit 110, a tag registration unit 120, a tag recognition unit 130, an application execution unit 140, a communication unit 150, and a control unit 160. can do.
  • the application installer 110 may make a terminal lock application installation request to the application management server.
  • the application installation unit 110 may receive the request when the application management server receiving the request approves the terminal lock application installation and provides the corresponding application installation page. Accordingly, the application installer 110 may install the terminal lock application in the user terminal 100.
  • the user terminal 100 may be automatically connected to the application management server, and the terminal lock application installation page may be displayed.
  • the tag registration unit 120 may register and store a verification tag information encryption value (Cryptogram) for identifying an NFC tag in a memory of the user terminal 100.
  • the verification tag information encryption value Cryptogram will be described with reference to FIG. 3.
  • the tag recognition unit 130 may recognize any NFC tag touched by the user terminal 100 and receive the recognized NFC tag information password value.
  • the NFC tag information password value received from the tag recognition unit 130 that is, the tag information password value (Cryptogram) for the verification of the tag tag information password value of the NFC tag registered and stored in the tag registration unit 120 ( Cryptogram) can be compared and verified.
  • the terminal lock setting or unlocking is not performed.
  • the tag recognition unit 130 recognizes the invalid NFC tag as an invalid NFC tag in the tag information encryption value (Cryptogram) verification procedure, and does not perform an operation in this case. .
  • the application execution unit 140 may approve and perform the lock setting or the unlock of the user terminal 100.
  • the application execution unit 140 receives a lock request from a registered NFC tag through a tag touch in the unlock state of the user terminal 100 to set a lock setting of the user terminal 100. Can be done.
  • the user terminal 100 may enable only basic functions, for example, a phone call or a text message transmission and reception. Therefore, in the case of a smart device, it is impossible to execute various applications or systems such as a camera.
  • Such a lock setting of the user terminal 100 is performed by the execution of the terminal locking application.
  • the terminal locking application according to the embodiment of the present invention may be executed or executed on the user terminal 100 and other applications. It may operate preferentially for the systems.
  • the application execution unit 140 may preferentially execute the terminal lock application with respect to other systems of the user terminal 100 to be placed on the top of the system. Can be. As such, when the terminal locking application is operated at the top of the system, other applications or systems disposed below it are impossible to perform.
  • the state of the user terminal 100 will be referred to as a 'locking state'. The lock state of the user terminal 100 may not be released unless the touch of the registered NFC tag used in setting the lock is made again.
  • the application execution unit 140 receives a lock release request from the registered NFC tag to perform unlocking of the user terminal 100. can do.
  • the unlocking of the application executing unit 140 may be performed by stopping the execution of the terminal locking application. That is, the terminal lock application, which is executed at the top and is prevented from being executed by the lower applications or systems, is stopped, thereby enabling the operation of the applications or systems disposed below.
  • the execution stop state of the terminal lock application will be referred to as an 'unlock state'.
  • the application execution unit 140 may allow the terminal locking application to be associated with another application or another web site, and may provide a service through another application or another web site.
  • the user can earn points that can be used in a children's shopping mall associated with a terminal lock application in proportion to the lock setting time, and the children can use the accumulated points in the shopping mall.
  • a service may be provided.
  • a corporate advertisement through a web site or the like associated with the terminal lock application may be executed during the lock time in the terminal lock state.
  • Communication unit 150 enables the exchange of information through the NFC tag and the near field communication.
  • the present invention functions to receive a lock request and an unlock request from an NFC tag.
  • the communication unit 150 enables not only a short range communication function but also an application installation page reception and application download through communication with an application management server.
  • the communicator 150 may be implemented to include a chip for near field communication, including NFC.
  • the control unit 160 has a function of controlling the flow of data between the application installation unit 110, the tag registration unit 120, the tag recognition unit 130, the application execution unit 140, and the communication unit 150. Can be done. That is, the control unit 160 according to the present invention to perform a unique function in the application installation unit 110, tag registration unit 120, tag recognition unit 130, application execution unit 140, communication unit 150, respectively. Can be controlled.
  • FIG. 3 is a block diagram showing a schematic configuration of an NFC tag 200 according to an embodiment of the present invention.
  • the block diagram of FIG. 3 is a functional representation to illustrate the operations performed by the NFC tag 200.
  • NFC tag refers to a tag made exclusively for the terminal lock application of the present invention. The application is not executed by the general NFC tag touch.
  • the NFC tag 200 may include a tag verification password storage unit 210, a terminal unique information storage unit 220, a terminal recognition unit 230, and a tag write protection unit 240.
  • the tag verification password storage unit 210 may store a tag information password value (Cryptogram) of each NFC tag 200 generated when the NFC tag 200 is manufactured.
  • the tag information password value may be generated when the NFC tag 200 is generated for identification of each NFC tag 200.
  • the generated tag information password value is stored in the password verification password storage unit 210. Can be stored.
  • the tag information encryption value may be generated based on the tag information, and various encryption algorithms such as DES, 3DES, or AES may be used as the encryption method.
  • the terminal lock application is executed, and the tag information password value (Cryptogram) stored in the tag verification password storage unit 210 of the NFC tag 200 is displayed. Can be registered to.
  • the tag information encryption value (Cryptogram) of the touched NFC tag 200 is a tag of the NFC tag 200 that is pre-registered in the user terminal. A check is made to see if it matches the information cryptogram.
  • the tag information password value may not recognize any NFC tag in the verification procedure and perform no operation.
  • the terminal unique information storage unit 220 and the terminal recognition unit 230 When the terminal unique information storage unit 220 and the terminal recognition unit 230 first touches the NFC tag 200 on the user terminal, the terminal unique information storage unit 220 and the terminal recognition unit 230 acquire unique information of the user terminal and store the unique information of the user terminal in the NFC tag 200.
  • the terminal recognition unit 230 may recognize the touched user terminal information and store the unique information of the recognized user terminal in the terminal unique information storage unit 220. Thereafter, when a touch of the NFC tag 200 and an arbitrary user terminal is made, the terminal recognition unit 230 recognizes the unique information of the corresponding user terminal and the terminal unique information previously stored in the terminal unique information storage unit 220. You can check whether they match.
  • the terminal unique information storage unit 220 may store only one terminal unique information so that only one user terminal may be controlled by the corresponding NFC tag 200, or according to another embodiment
  • a plurality of terminal unique information may be stored to control several user terminals registered by one NFC tag 200. For example, in a building of an enterprise requiring information security, in order to control the use of a terminal, a single NFC tag 200 locks and unlocks a plurality of user terminals entering and exiting the building.
  • a tag write protection procedure may be performed by the tag write protection unit 240.
  • the tag write protection unit 240 is a component that protects terminal unique information recorded in a tag, and performs a write protection procedure such as write prohibition and memory erasure prevention. That is, it performs a function to prevent the data stored in the tag from being inadvertently changed or erased.
  • FIG. 4 is a flowchart illustrating a terminal locking application installation process through a touch between the user terminal 100 and the NFC tag 200 and a mutual registration process between the tag and the terminal according to an embodiment of the present invention. This is an installation and registration process for using the service before using the terminal lock service.
  • the verification tag information encryption value is generated in the NFC tag 200 generation process, and stored in the NFC tag 200 as described above.
  • first tag touch S401 When an initial touch (first tag touch S401) occurs between the user terminal 100 and the NFC tag 200, the user terminal 100 transmits a terminal lock application installation request to the application management server 300 (S402). ). Upon receiving the application installation request, the application management server 300 may provide an application installation page to the user terminal 100 as shown in FIG. 6 (S403).
  • the terminal locking application may be downloaded and installed in the user terminal 100 according to the user's manipulation (S404).
  • the NFC tag 200 makes an execution request for the terminal lock application pre-installed to the user terminal 100 (S406).
  • the terminal lock application is executed in the user terminal 100 receiving the request (S407)
  • the NFC tag 200 provides the user terminal 100 with the tag information password value stored in the password storage 210 for tag verification.
  • the user terminal 100 stores the tag information password value to register tag usage, that is, tag information password value storage (S409-1).
  • FIG. 7 is a diagram illustrating a tag usage registration screen in a user terminal.
  • the terminal tag application is automatically executed by the second tag touch S405 and is displayed in a process of registering a tag usage.
  • the user terminal 100 when the second tag touch (S405) occurs, the user terminal 100 also transmits the terminal specific information to the NFC tag 200 (S408-2).
  • the transmitted unique information is stored in the NFC tag 200 (S409-2).
  • the NFC tag 200 compares the terminal unique number of the recognized terminal with the terminal unique information stored in step S409-2, and matches or not. You can perform a check on.
  • FIG. 5 is a flowchart illustrating a terminal lock setting and unlocking process through a touch of the user terminal 100 and the NFC tag 200 according to an embodiment of the present invention.
  • the process described in FIG. 5 is a process according to interworking between the user terminal 100 and the NFC tag 200, and this process may be performed through a terminal locking application.
  • the user terminal 100 is unlocked, the touch of the pre-registered NFC tag 200 (third tag touch (S501) ), The terminal lock procedure is performed.
  • the NFC tag 200 may perform a terminal unique information check process (S502).
  • the terminal unique information checking process is performed by determining whether the terminal unique information recognized by the NFC tag 200 matches the previously stored terminal unique information.
  • the NFC tag 200 transmits the terminal lock application automatic execution request and the terminal lock request to the user terminal 100 (S503).
  • the tag information encryption value is transmitted together from the NFC tag 200 to the user terminal 100.
  • the terminal lock application When the user terminal 100 receives the request including the tag information password value from the NFC tag 200, the terminal lock application is automatically executed, and the tag information password value verification procedure for verifying the NFC tag requesting the lock request It may be performed (S504). If it is determined that the tag information password value of the lock request NFC tag recognized by the user terminal 100 matches the tag information password value of the pre-registered tag, the terminal lock setting is performed (S505).
  • FIG. 8 is a diagram illustrating a screen displayed on a user terminal when the terminal lock is set.
  • the terminal lock application is preferentially executed in other applications and systems, such that the terminal lock application screen is placed on the top of the user terminal 100. Therefore, the user cannot use applications other than the basic functions such as telephone or text.
  • a corporate advertisement screen may be displayed by another application or a web site associated with the terminal lock application, and the points available in a predetermined shopping mall may be proportional to the duration of the locked state.
  • a screen indicating that the money is accumulated may be displayed.
  • the NFC tag 200 When the fourth tag touch S506 occurs, the NFC tag 200 first receives terminal unique information from the touched user terminal 100 to check whether the terminal unique information matches previously stored terminal unique information. It goes through the procedure (S507). When the terminal unique information is determined to match, the NFC tag 200 transmits a terminal lock application automatic execution request and a terminal lock release request to the user terminal 100 (S508).
  • the tag information password value and the user terminal 100 receiving the request, the tag information password value of the fourth tag touch (S506) and the tag information password value of the registered NFC tag 200 used when setting the terminal lock A tag information encryption value verification procedure (S509) for comparing and verifying the data is performed. If the two tag information password values match, the unlocking process of the user terminal 100 is performed (S510).
  • the screen as shown in FIG. 9 is displayed on the user terminal.
  • FIG. 9 is a diagram illustrating a screen that appears on a terminal when the terminal is unlocked. In the unlocked state of FIG. 9, all applications and functions of the user terminal that are disposed under the terminal lock application in the locked state may be used.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

Un mode de réalisation de la présente invention concerne un procédé pour réaliser une fonction de verrouillage de terminal d'utilisateur, comprenant les étapes suivantes : (a) réception, de la part d'une étiquette, d'une valeur de mot de passe d'informations d'étiquette et d'une demande de verrouillage pour le terminal par le biais d'une communication en champ proche avec l'étiquette; (b) vérification de la valeur de mot de passe d'informations d'étiquette; et (c) exécution d'une mise en place du verrouillage dans le terminal d'utilisateur s'il est vérifié que l'étiquette est une étiquette ayant une autorisation d'utilisation, par le biais de la vérification de la valeur de mot de passe d'informations d'étiquette.
PCT/KR2016/013597 2015-12-30 2016-11-24 Procédé, étiquette et application pour réaliser une fonction de verrouillage de terminal d'utilisateur WO2017116008A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR10-2015-0189249 2015-12-30
KR1020150189249A KR101764985B1 (ko) 2015-12-30 2015-12-30 사용자 단말기 잠금 기능 제공을 위한 방법, 태그 및 애플리케이션

Publications (1)

Publication Number Publication Date
WO2017116008A1 true WO2017116008A1 (fr) 2017-07-06

Family

ID=59225097

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2016/013597 WO2017116008A1 (fr) 2015-12-30 2016-11-24 Procédé, étiquette et application pour réaliser une fonction de verrouillage de terminal d'utilisateur

Country Status (2)

Country Link
KR (1) KR101764985B1 (fr)
WO (1) WO2017116008A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112560082A (zh) * 2020-12-01 2021-03-26 Oppo(重庆)智能科技有限公司 一种锁定终端设备的方法及终端设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002351623A (ja) * 2001-05-23 2002-12-06 Fujitsu Ltd 携帯電話機
JP2008250923A (ja) * 2007-03-30 2008-10-16 Ntt Docomo Inc 認証処理システム、移動通信端末、及び認証処理方法
US20110113477A1 (en) * 2009-07-29 2011-05-12 Sony Corporation Information processing apparatus, information providing server, program, communication system, and login information providing server
JP2013109695A (ja) * 2011-11-24 2013-06-06 Systena Corp アプリケーションのロック解除システムおよびロック解除用プログラム
KR20150110906A (ko) * 2014-03-21 2015-10-05 에스케이플래닛 주식회사 화면 잠금 기능 제어를 통한 부가정보 제공 방법, 이를 위한 시스템 및 장치

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002351623A (ja) * 2001-05-23 2002-12-06 Fujitsu Ltd 携帯電話機
JP2008250923A (ja) * 2007-03-30 2008-10-16 Ntt Docomo Inc 認証処理システム、移動通信端末、及び認証処理方法
US20110113477A1 (en) * 2009-07-29 2011-05-12 Sony Corporation Information processing apparatus, information providing server, program, communication system, and login information providing server
JP2013109695A (ja) * 2011-11-24 2013-06-06 Systena Corp アプリケーションのロック解除システムおよびロック解除用プログラム
KR20150110906A (ko) * 2014-03-21 2015-10-05 에스케이플래닛 주식회사 화면 잠금 기능 제어를 통한 부가정보 제공 방법, 이를 위한 시스템 및 장치

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112560082A (zh) * 2020-12-01 2021-03-26 Oppo(重庆)智能科技有限公司 一种锁定终端设备的方法及终端设备
CN112560082B (zh) * 2020-12-01 2023-09-08 Oppo(重庆)智能科技有限公司 一种锁定终端设备的方法及终端设备

Also Published As

Publication number Publication date
KR20170079075A (ko) 2017-07-10
KR101764985B1 (ko) 2017-08-23

Similar Documents

Publication Publication Date Title
WO2017222169A1 (fr) Procédé d'approbation de paiement effectué à l'aide d'une carte à puce, serveur de société à carte l'exécutant et carte à puce
US7810146B2 (en) Security device, terminal device, gate device, and device
WO2018012747A1 (fr) Système mandataire d'authentification à deux canaux permettant de détecter l'altération frauduleuse d'une application et procédé associé
WO2015119417A1 (fr) Dispositif de clé électronique pouvant commander sans fil un système de verrouillage et transmettre une authentification de commande du système de verrouillage, système et procédé associés
WO2019225921A1 (fr) Procédé de stockage de clé numérique, et dispositif électronique
JP4726950B2 (ja) 携帯電話機及びアクセス制御方法
WO2019074326A1 (fr) Procédé et appareil de paiement hors ligne sécurisé
WO2013191325A1 (fr) Procédé pour authentifier un identifiant d'ouverture par plate-forme de confiance, et appareil et système associés
KR102124838B1 (ko) 스마트 키를 이용한 출입관리방법 및 이를 위한 출입관리시스템
WO2013100419A1 (fr) Système et procédé de commande d'accès à un applet
CN101667233A (zh) 基于非典型用户行为来保护设备
WO2018169150A1 (fr) Système et procédé d'authentification d'utilisateur à base d'écran verrouillé
WO2020190099A1 (fr) Dispositif électronique de gestion d'informations personnelles et procédé de fonctionnement de celui-ci
WO2020045826A1 (fr) Dispositif électronique pour traiter une clé numérique et son procédé de fonctionnement
WO2016085050A1 (fr) Terminal utilisateur fonctionnant conjointement avec des dispositifs périphériques, et procédé pour empêcher une fuite d'informations à l'aide de ce dernier
WO2014061897A1 (fr) Procédé pour mettre en œuvre un service de confirmation de connexion et d'autorisation au moyen d'un terminal d'utilisateur mobile
WO2015069028A1 (fr) Authentification multicanal, procédé de transfert financier et système utilisant un terminal de communication mobile
KR102112975B1 (ko) 하이브리드 보안환경 기반의 스마트 키를 이용한 출입관리방법 및 이를 위한 출입관리시스템
WO2017116008A1 (fr) Procédé, étiquette et application pour réaliser une fonction de verrouillage de terminal d'utilisateur
WO2014084608A1 (fr) Procédé et système de gestion d'élément sécurisé
JP2014153741A (ja) 情報管理装置、携帯端末装置及びプログラム
JP6071109B2 (ja) 携帯端末装置及びプログラム
WO2022050726A1 (fr) Appareil et système de commande d'ouverture et de fermeture de porte
WO2021225329A1 (fr) Procédé et système pour détecter la falsification d'une application mobile en utilisant un identifiant d'utilisateur et une collecte de signature
WO2020197283A1 (fr) Procédé d'authentification de dispositif électronique, et appareil correspondant

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16881961

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16881961

Country of ref document: EP

Kind code of ref document: A1