WO2018128237A1 - Système d'authentification d'identité et équipement d'utilisateur utilisant une analyse de motif d'utilisation d'utilisateur - Google Patents
Système d'authentification d'identité et équipement d'utilisateur utilisant une analyse de motif d'utilisation d'utilisateur Download PDFInfo
- Publication number
- WO2018128237A1 WO2018128237A1 PCT/KR2017/007955 KR2017007955W WO2018128237A1 WO 2018128237 A1 WO2018128237 A1 WO 2018128237A1 KR 2017007955 W KR2017007955 W KR 2017007955W WO 2018128237 A1 WO2018128237 A1 WO 2018128237A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- authentication
- message
- user terminal
- usage pattern
- Prior art date
Links
- 238000004458 analytical method Methods 0.000 title claims abstract description 40
- 238000000034 method Methods 0.000 claims description 29
- 230000002159 abnormal effect Effects 0.000 claims description 9
- 230000005540 biological transmission Effects 0.000 claims description 7
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 claims description 2
- 238000012795 verification Methods 0.000 description 12
- 238000010586 diagram Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 8
- 230000009471 action Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000014509 gene expression Effects 0.000 description 2
- 230000003542 behavioural effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/26—Speech to text systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/725—Cordless telephones
Definitions
- the present invention relates to a user authentication system and a user terminal using analysis of a usage pattern of a user.
- Korean Patent Laid-Open No. 10-2015-0096063 discloses an authentication apparatus and method based on a digital signature.
- the present invention is determined to be in possession of the person as usual, and lowers the level of authentication. It is to provide a user authentication system and a user terminal utilizing analysis of a user's usage pattern that can secure the improved accuracy with the ease of authentication.
- a usage pattern collecting unit for collecting a usage pattern for the user terminal of the user;
- a usage pattern analyzer for analyzing whether the usage pattern is normal or not;
- an authentication user terminal using an analysis of a usage pattern of a user including an authentication level adjustment unit for adjusting an authentication level, is provided.
- the usage pattern relates to the location of the user terminal, and at the specific time point, the usage pattern analysis unit according to a result of comparing at least one of GPS information of the user terminal and identification information of the Wi-Fi router connected to the user terminal. It is possible to determine whether it is normal.
- the usage pattern relates to the call history through the user terminal, and primarily determines whether the use pattern analysis unit is normal according to a result of analyzing the call counterpart and the call time, and if necessary, According to a result of whether or not the result of STT conversion of the voice includes the designated follow-up for the user, the use pattern analyzer may determine whether it is normal.
- the usage pattern relates to the details of SNS usage, and primarily determines whether the usage pattern analysis unit is normal according to a result of analyzing the SNS chat partner and the chat time, and if necessary, a specific emoticon designated for the user.
- the pattern analysis unit may determine whether the input pattern is normal by analyzing the input deleted by the backspace when the backspace is input or when the character is input. have.
- the usage pattern may include at least one of a location of the user terminal, a call history through the user terminal, an SNS usage history, and an application occupancy rate of the application, and the usage pattern analyzer may determine whether it is normal through an OR condition calculation. .
- the authentication level adjusting unit may set the authentication level relatively low when the usage pattern is analyzed as normal, and set the authentication level relatively high when the usage pattern is analyzed as abnormal.
- the authentication level adjustment unit may include a message transmission unit for transmitting the authentication level adjusted in the form of a message.
- the apparatus may further include a key registration unit that registers a private key paired with a public key to be registered in a message authentication server to the user terminal, wherein the message transmission unit encrypts the authentication level message with the private key and transmits the private key to the web server.
- a user terminal for collecting and analyzing a user's usage pattern and transmitting a user authentication level message encrypted with a private key of the authentication level adjusted according to whether the usage pattern is normal;
- a web server configured to receive the encrypted identity authentication level message and perform login for each level according to the identity authentication level included in the identity authentication level message only when message authentication of the identity authentication level message is successful;
- a public key corresponding to the private key is registered, decrypts the encrypted user authentication level message with the public key according to a message authentication request from the web server, performs message authentication, and transmits an authentication result to the web server.
- a user authentication system utilizing a user pattern analysis, including a message authentication server.
- the message authentication server may transmit a message authentication success as the authentication result when the decryption is successful with the public key, and transmit a message authentication failure as the authentication result when decryption with the public key fails.
- the message authentication server may transmit the decrypted identity authentication message to the web server in the case of successful message authentication.
- the web server may log in by checking only n items, such as handwritten signature, iris recognition, fingerprint authentication, and password input, corresponding to the user authentication level.
- a user terminal such as a smart phone
- a level of authentication of the person if it is the same as usual, it is determined as the possession state of the user and lowers the level of authentication of the person, and if it is different from the usual, Increasing the level of authentication has the effect of simplifying identity verification and ensuring improved accuracy.
- FIG. 1 is a schematic configuration block diagram of a user terminal for user authentication using analysis of a user's usage pattern according to an embodiment of the present invention
- FIG. 2 is a flow chart of a user authentication method performed in the user terminal of FIG.
- FIG. 3 is a schematic block diagram of a user authentication system using a user pattern analysis according to an embodiment of the present invention and a flow chart of a user authentication method;
- FIG. 4 is a schematic structural block diagram of a financial server included in a personal authentication system
- FIG. 5 is a schematic structural block diagram of a message authentication server included in a user authentication system.
- first and second may be used to describe various components, but the components should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.
- FIG. 1 is a schematic block diagram of a user terminal for user authentication using analysis of a usage pattern of a user according to an embodiment of the present invention
- FIG. 2 is a flowchart of a user authentication method performed in the user terminal of FIG. .
- the user terminal 100 for the user authentication using the analysis of the use pattern of the user collects and analyzes the use pattern of the user to determine whether the user possesses the user according to the degree similar to the pattern normally used by the user. It is characterized in that it is possible to adjust the level of identity authentication in the situation where the identity verification is required.
- the user terminal 100 for identity verification includes a usage pattern collector 110, a usage pattern analyzer 120, and an authentication level adjuster 130.
- the use pattern collector 110, the use pattern analyzer 120, and the authentication level adjuster 130 may be implemented as software in an application form installed in the user terminal 100 such as a smartphone.
- the usage pattern collecting unit 110 collects information on the usage pattern of the user using the user terminal 100 (step S10).
- the usage pattern collection may be limited to within a predetermined time (for example, 3 hours) from the present time. This is because there may be difficulty in grasping the latest state of the user terminal 100 by information collected in the past despite the change in the recent state of the user terminal 100 due to loss or the like.
- the collection time of the usage pattern may be variously set according to at least one of a user attribute such as an age, a place of residence, and the like of the usage pattern.
- the usage pattern to be collected may include at least one of location information of the user terminal, call information through the user terminal, social network service (SNS) usage information using the user terminal, and application usage share.
- SNS social network service
- the usage pattern analyzer 120 analyzes the usage patterns collected by the usage pattern collector 110 to determine whether they are normal (step S15).
- the normal usage pattern means that the usage pattern is expected to be performed by a user designated for the user terminal 100.
- the analysis when the usage pattern is location information of the user terminal is as follows.
- the designated user has the corresponding user terminal 100, it is determined whether the user terminal 100 is located at the location where the user is expected to be present.
- the main location of the user is a home and a company
- the location information collected by the user terminal 100 is a home or a company set for the user, it is determined to be normal. It may be determined that the usage pattern of the user terminal is abnormal.
- the location information of the user terminal may be used for analysis in association with time information. For example, if the location set for the user is a home or a company, the usage pattern is normal only when the user terminal is located at or near the company if the workday is a weekday (for example, 9:00 AM to 18:00 AM). If the location of the user terminal is at home despite the working hours on weekdays, it may be determined that the usage pattern is abnormal.
- the location information of the user terminal used to analyze the usage pattern may be a GPS value.
- the usage pattern collector 110 may obtain location information of the user terminal from a GPS module separately provided in the user terminal 100.
- the location information of the user terminal may be identification information of the Wi-Fi router connected to the corresponding user terminal 100.
- the GPS value described above indicates the correct location when the user terminal 100 is located outdoors, but cannot be utilized because the GPS signal is not received when the user terminal 100 is located outdoors. Therefore, it is possible to utilize the Wi-Fi (WiFi) communication that is used a lot in the user terminal 100, such as a smart phone.
- the user terminal In order to perform Wi-Fi communication, the user terminal needs to access a Wi-Fi router installed at an arbitrary location in the room, and the Wi-Fi router to be connected has identification information (eg, a Mac address) that can be distinguished from other Wi-Fi routers.
- identification information eg, a Mac address
- the identification information of the Wi-Fi router which is currently connected to the user terminal is one of the identification information of the Wi-Fi router having a previously accessed history registered in the database, it may be determined that the usage pattern of the user terminal is normal.
- the identification information of the currently connected Wi-Fi router is compared with the identification information of the previously-connected Wi-Fi router registered in the database, when there is no identical information, the place where the user terminal has not been previously located As seen from, it may be determined that the usage pattern of the user terminal is abnormal.
- the frequency of the call is designated by the user, or according to the result of analyzing the past history, the top few persons having a large number of calls may be set as a reference for determining the normal pattern when analyzing the usage pattern.
- STT speech to text
- Corresponding to a user is not only a keyword that is important for conversation through analysis of past call history registered in the database, but a distinctive feature that frequently appears more than a predetermined number of times for the user (e.g. ',' Ah ', etc.).
- the usage pattern of the user terminal is normal by analyzing who the SNS counterpart is and when the chat time is performed when chatting through the user terminal. . Based on the past history registered in the database, it may be determined whether the usage pattern is normal according to whether the person frequently chats at a predetermined threshold or more, or whether the chat time with the corresponding party is a normal chat time. .
- the deleted previous input is included in the typo data registered in the database corresponding to the user, it may be determined that the usage pattern of the user terminal is normal.
- the typo data may be a result of collecting a previous input deleted for a predetermined period of time according to the backspace input. This is based on the character input result that is frequently different for each user in the character input process.
- the usage pattern of the user terminal is normal when the user share has a similarity or more than a predetermined ratio. For example, applications that are frequently used for each user may be different, and even if the same applications are used, the usage time for each application may be different according to the user's inclination. Therefore, it is possible to estimate the propensity for the user of the user terminal from the type of applications used and the usage occupancy in recent years.
- the usage pattern analyzer 120 may be used as a usage pattern for analyzing at least one of the above-described location of the user terminal, call history through the user terminal, SNS usage history, and usage share of the application. It is possible to determine whether it is normal through OR condition operation. That is, if at least one of the usage patterns is determined to be a normal pattern, the current user terminal is considered to be possessed by a normal user. This is because even a true user cannot satisfy a normal condition (a threshold value for making a normal pattern) at every moment, and if any one of the usage patterns satisfies the normal condition, it is sufficient to be determined as a true user.
- a normal condition a threshold value for making a normal pattern
- the authentication level adjusting unit 130 may adjust the authentication level according to the result analyzed by the use pattern analyzer 120.
- the authentication level is set relatively low (step S20). If the usage pattern is analyzed to be abnormal, the authentication level is set relatively high (step S25).
- the low level of identity verification means that if identity verification is required when running a particular application or performing a specific action within an application, it means that the identity verification requirements have been relaxed. For example, when there is a handwritten signature, iris recognition, fingerprint authentication, password input, etc. as a requirement for identity verification for financial transactions, the identity verification may be performed by checking only n or less of them.
- a high level of identity means that the identity verification requirement has been strengthened to verify at least n of the multiple identity requirements described above.
- the identity level adjusted by the authentication level adjusting unit 130 may be provided as an API (application platform interface).
- the authentication level may be transmitted in the form of a message to a web server such as a financial server to be described later.
- the usage pattern collector 110 may process the collected usage patterns into a data format that is easy to analyze.
- the usage pattern collected by the usage pattern collector 110 may be stored in a database and used as a past history for future usage pattern analysis.
- the usage pattern collector 110 may be activated and operate from time to time whenever the usage pattern occurs.
- the use pattern analysis unit 120 and the authentication level adjusting unit 130 may be activated and operate only when identity authentication is required.
- Smartphone users usually listen to music using the music app from 8:00 to 9 o'clock, and analyze the patterns such as socializing with friends during lunchtime, and suddenly use an app that they do not use. Or, if you see an abnormal pattern such as not using the music app at work, if you need to verify your identity, such as mobile banking by the judgment that you may not be able to use a stronger authentication means, but the pattern of the user In this case, you can finish the authentication by simple login.
- FIG. 3 is a schematic block diagram of a user authentication system utilizing a user pattern analysis according to an embodiment of the present invention and a flow chart of a user authentication method
- FIG. 4 is a schematic diagram of a financial server included in a user authentication system
- 5 is a schematic block diagram of a message authentication server included in an identity authentication system.
- the user authentication system 1 utilizing the user pattern analysis uses the user authentication level required for login in a web server such as a financial server using the user authentication level message transmitted from the user terminal described above. It can apply differently according to a pattern. In this process, authentication of the authentication level message is additionally performed through message authentication through the message authentication server, thereby preventing errors in authentication due to possible problems such as hacking in the message transmission process.
- the identity authentication system 1 includes a user terminal 100, a message authentication server 300, and a web server 200.
- the user terminal 100 has been described with reference to FIG. 1 and may further include a key register 140 and a message transmitter 150 which are additional components for message transmission.
- the web server 200 includes a message receiver 210, an authentication requester 220, an authentication result receiver 230, and a login performer 240 for each level.
- the message authentication server 300 includes a public key register 310. , The request receiving unit 320, the message authenticating unit 330, and the authentication result transmitting unit 340.
- the key registration unit 140 generates and registers a paired private key and public key for security in the process of transmitting the authentication level adjusted by the authentication level adjusting unit 130 in the form of a message.
- the private key generated by the key registration unit 140 is registered in the security area of the user terminal 100, and the public key is transmitted to the message authentication server 300, and the public key registration unit 310 in the message authentication server 300. It is registered (step S50).
- the message transmitter 150 transmits the user authentication level adjusted by the authentication level adjusting unit 130 in the form of a message in order to deliver it to the web server 200 (step S55).
- the message transmission unit 150 may encrypt and transmit the authentication level message using the private key registered in the key registration unit 140.
- the message receiving unit 210 of the web server 200 receives the identity authentication level message. At this time, the received authentication level message is encrypted with the private key and cannot be decrypted. Therefore, the authentication request unit 220 of the web server 200 requests authentication while transmitting the authentication level message received from the message authentication server 300 (step S60).
- the message authentication request may include a content request for decryption when the message is from a legitimate user terminal.
- the request receiving unit 320 of the message authentication server 300 receives a message authentication request from the authentication requesting unit 220 of the web server 200, and in this case, the message authentication unit 330 performs message authentication (step S65). ).
- the message authentication may be performed by using the public key registered in the message authentication server 300 to determine whether the user authentication level message encrypted with the private key can be decrypted.
- the authentication result transmitter 340 may transmit the authentication result due to the message authentication failure (step S70).
- the authentication result transmitter 340 may transmit the authentication result with the successful message authentication.
- the decrypted identity authentication message can be sent along with the authentication result.
- the authentication result receiver 230 of the web server 200 receives the authentication result from the message authentication server 300. If the received authentication result is a message authentication failure, the authentication level message itself may be regarded as a problem, and the login itself may be impossible.
- If the received authentication result is a message authentication success level login performing unit 240 may be performed to log in by the level according to the decrypted identity authentication level message received with the authentication result (step S75).
- the authentication level is set relatively low, the user can log in through a simple authentication process. If the authentication level is set relatively high, the user can log in only through a stronger authentication process.
- the degree of identity verification procedure for login according to the identity verification level may be set as needed.
- the authentication method according to the present embodiment described above can be embodied as computer readable codes on a computer readable recording medium.
- Computer-readable recording media include all kinds of recording media having data stored thereon that can be decrypted by a computer system. For example, there may be a read only memory (ROM), a random access memory (RAM), a magnetic tape, a magnetic disk, a flash memory, an optical data storage device, and the like.
- the computer readable recording medium can also be distributed over computer systems connected over a computer network, stored and executed as readable code in a distributed fashion.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- General Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- Economics (AREA)
- Multimedia (AREA)
- Acoustics & Sound (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Software Systems (AREA)
- Computational Linguistics (AREA)
- Telephonic Communication Services (AREA)
- Computing Systems (AREA)
- Social Psychology (AREA)
Abstract
L'invention concerne un système d'authentification d'identité et un équipement d'utilisateur utilisant une analyse de motif d'utilisation d'utilisateur. Un équipement d'utilisateur d'authentification d'identité utilisant une analyse de motif d'utilisation d'utilisateur selon un mode de réalisation de la présente invention peut comprendre : une unité de collecte de motif d'utilisation destinée à collecter un motif d'utilisation d'un d'utilisateur par rapport à un équipement d'utilisateur ; une unité d'analyse de motif d'utilisation destinée à analyser le motif d'utilisation et déterminer si le motif d'utilisation est normal ou non ; et une unité de réglage de niveau d'authentification destinée à ajuster un niveau d'authentification d'identité en fonction d'un résultat de détermination.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020170002560A KR101762615B1 (ko) | 2017-01-06 | 2017-01-06 | 사용자의 이용패턴 분석을 활용한 본인 인증 시스템 및 사용자 단말 |
KR10-2017-0002560 | 2017-01-06 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018128237A1 true WO2018128237A1 (fr) | 2018-07-12 |
Family
ID=59419169
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2017/007955 WO2018128237A1 (fr) | 2017-01-06 | 2017-07-24 | Système d'authentification d'identité et équipement d'utilisateur utilisant une analyse de motif d'utilisation d'utilisateur |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR101762615B1 (fr) |
WO (1) | WO2018128237A1 (fr) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102069689B1 (ko) * | 2018-03-30 | 2020-01-23 | 주식회사 플랫폼베이스 | 사용 패턴에 기반한 전자식 잠금 장치의 인증 방법 및 시스템 |
KR102143181B1 (ko) * | 2018-08-29 | 2020-08-10 | (주)페르소나에이아이 | 사기거래 탐지를 위한 본인확인 방법, 장치 및 프로그램 |
KR102259156B1 (ko) * | 2020-09-28 | 2021-06-01 | 박나은 | 네트워크 환경 내 디바이스 인증 시스템 및 방법 |
KR102641501B1 (ko) * | 2021-09-30 | 2024-02-27 | 주식회사 카카오뱅크 | 소셜인증을 이용한 이상거래 탐지 방법 |
KR102471998B1 (ko) * | 2022-06-23 | 2022-12-02 | (주)탭핀 | Fido 생체인증 보안키 기반의 파일 관리 서비스를 제공하는 컴퓨터 장치, 방법 및 컴퓨터 프로그램 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20070013969A (ko) * | 2005-07-27 | 2007-01-31 | 서울신용평가정보 주식회사 | 고객 행동 분석 정보를 이용한 식별주체 검증 시스템 및방법 |
KR20130085544A (ko) * | 2011-12-19 | 2013-07-30 | 주식회사 케이티 | 어플리케이션 서명 인증서를 이용한 어플리케이션 제어 장치 및 방법 |
KR20140065839A (ko) * | 2012-11-22 | 2014-05-30 | 한국전자통신연구원 | 개인 라이프로그 데이터를 업스트리밍하기 위한 장치, 시스템 및 그 방법 |
KR20150102292A (ko) * | 2014-02-28 | 2015-09-07 | 주식회사 시큐브 | 메시지를 이용한 위치 인증 서비스 제공 시스템 및 방법 |
JP2016062189A (ja) * | 2014-09-16 | 2016-04-25 | 株式会社ソットヴォーチェ | 本人認証システム |
-
2017
- 2017-01-06 KR KR1020170002560A patent/KR101762615B1/ko active IP Right Grant
- 2017-07-24 WO PCT/KR2017/007955 patent/WO2018128237A1/fr active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20070013969A (ko) * | 2005-07-27 | 2007-01-31 | 서울신용평가정보 주식회사 | 고객 행동 분석 정보를 이용한 식별주체 검증 시스템 및방법 |
KR20130085544A (ko) * | 2011-12-19 | 2013-07-30 | 주식회사 케이티 | 어플리케이션 서명 인증서를 이용한 어플리케이션 제어 장치 및 방법 |
KR20140065839A (ko) * | 2012-11-22 | 2014-05-30 | 한국전자통신연구원 | 개인 라이프로그 데이터를 업스트리밍하기 위한 장치, 시스템 및 그 방법 |
KR20150102292A (ko) * | 2014-02-28 | 2015-09-07 | 주식회사 시큐브 | 메시지를 이용한 위치 인증 서비스 제공 시스템 및 방법 |
JP2016062189A (ja) * | 2014-09-16 | 2016-04-25 | 株式会社ソットヴォーチェ | 本人認証システム |
Also Published As
Publication number | Publication date |
---|---|
KR101762615B1 (ko) | 2017-07-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018128237A1 (fr) | Système d'authentification d'identité et équipement d'utilisateur utilisant une analyse de motif d'utilisation d'utilisateur | |
US20170366556A1 (en) | Multichannel device utilizing a centralized out-of-band authentication system (cobas) | |
WO2018030707A1 (fr) | Système et procédé d'authentification, et équipement d'utilisateur, serveur d'authentification, et serveur de service pour exécuter ledit procédé | |
WO2011118871A1 (fr) | Procédé d'authentification et système utilisant un terminal mobile | |
WO2018155920A1 (fr) | Procédé et appareil d'authentification d'utilisateurs dans un environnement de l'internet des objets | |
WO2015069018A1 (fr) | Système d'ouverture de session sécurisée et procédé et appareil pour celui-ci | |
US20130305325A1 (en) | Methods for Thwarting Man-In-The-Middle Authentication Hacking | |
WO2019177298A1 (fr) | Procédé et appareil pour gérer une authentification d'utilisateur dans un réseau de chaîne de blocs | |
WO2018216988A1 (fr) | Système d'authentification de sécurité et procédé d'authentification de sécurité destinés à créer une clé de sécurité par combinaison de facteurs d'authentification de multiples utilisateurs | |
WO2022045419A1 (fr) | Procédé de service d'authentification de permis de conduire basé sur un réseau de chaîne de blocs utilisant un id décentralisé, et terminal utilisateur permettant d'effectuer un service d'authentification de permis de conduire | |
WO2018151480A1 (fr) | Procédé et système de gestion d'authentification | |
US7512967B2 (en) | User authentication in a conversion system | |
WO2020117020A1 (fr) | Procédé pour générer une clé pki sur la base d'informations biométriques et dispositif pour générer une clé au moyen de ce procédé | |
WO2021040283A1 (fr) | Serveur de système de gestion de temps et de présence pouvant effectuer une gestion de temps et de présence sur la base d'informations d'accès ap sans fil, et son procédé de fonctionnement | |
WO2018169150A1 (fr) | Système et procédé d'authentification d'utilisateur à base d'écran verrouillé | |
Giura et al. | Is it really you? User identification via adaptive behavior fingerprinting | |
JP2002229951A (ja) | 本人認証システム | |
US20110022841A1 (en) | Authentication systems and methods using a packet telephony device | |
WO2018043951A1 (fr) | Dispositif et système pos pour effectuer une authentification de paiement à l'aide d'informations biométriques, et son procédé de commande | |
JP2007199995A (ja) | アクセス制御装置及びアクセス制御方法及びプログラム | |
WO2018216991A1 (fr) | Procédé d'authentification de sécurité permettant de créer une clé de sécurité en combinant des facteurs d'authentification de multiples utilisateurs | |
WO2017115965A1 (fr) | Système et procédé d'identification d'utilisateur au moyen d'un autographe dans une pluralité de terminaux | |
US20110022844A1 (en) | Authentication systems and methods using a packet telephony device | |
WO2021071295A1 (fr) | Système d'authentification d'identité et procédé associé | |
WO2019112215A1 (fr) | Système de détermination de mauvaise conduite et procédé de détermination de mauvaise conduite dans un environnement de communication v2x |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17890130 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17890130 Country of ref document: EP Kind code of ref document: A1 |