WO2022186653A1 - Dispositif à carte à puce, ainsi que dispositif et procédé de génération d'un code de sécurité virtuel par détermination d'une correspondance entre des données - Google Patents
Dispositif à carte à puce, ainsi que dispositif et procédé de génération d'un code de sécurité virtuel par détermination d'une correspondance entre des données Download PDFInfo
- Publication number
- WO2022186653A1 WO2022186653A1 PCT/KR2022/003087 KR2022003087W WO2022186653A1 WO 2022186653 A1 WO2022186653 A1 WO 2022186653A1 KR 2022003087 W KR2022003087 W KR 2022003087W WO 2022186653 A1 WO2022186653 A1 WO 2022186653A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- security code
- virtual security
- code
- card
- user
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 60
- 239000000284 extract Substances 0.000 claims description 3
- 230000006870 function Effects 0.000 description 61
- 238000010586 diagram Methods 0.000 description 6
- 238000010845 search algorithm Methods 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 239000000835 fiber Substances 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 230000002159 abnormal effect Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 101150012579 ADSL gene Proteins 0.000 description 1
- 102100020775 Adenylosuccinate lyase Human genes 0.000 description 1
- 108700040193 Adenylosuccinate lyases Proteins 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000001151 other effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10237—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the reader and the record carrier being capable of selectively switching between reader and record carrier appearance, e.g. in near field communication [NFC] devices where the NFC device may function as an RFID reader or as an RFID tag
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/351—Virtual cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/355—Personalisation of cards for use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/405—Establishing or using transaction specific rules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
Definitions
- the present invention relates to a smart card device, an apparatus for generating a virtual security code by determining whether data matches, and a method therefor.
- Coded data is used in many areas.
- the IPIN number and resident registration number for user identification are code-type data.
- OTP One Time Password
- a separate OTP generating device is required, which is inconvenient, and in particular, in the case of a user terminal, there is a security vulnerability due to leakage of seed data used for OTP generation.
- OTP code is generated like generating a virtual security code required for user authentication based on the card data of the card possessed by many users.
- an appropriate method for this has not yet been proposed.
- An object of the present invention is to provide a smart card device, an apparatus for generating a virtual security code by determining whether data matches, and a method therefor.
- the device for generating a virtual security code when tagging a card having an IC chip and an NFC chip embedded therein, seed data required for generating a virtual security code from the card and receiving a chip unique value, determining whether the received chip unique value matches a pre-stored chip unique value, and if the received chip unique value matches the stored chip unique value, the seed and generating a virtual security code based on data and time data corresponding to a time point at which the seed data is received.
- the method may include transmitting a command and a user key value to the card when tagging the card, and receiving the seed data from the card according to whether the user key value is normal have.
- the card determines whether the user key value matches a pre-stored user key value, and if the user key value matches the pre-stored user key value, the card generates the virtual security code. Seed data can be transmitted.
- the user key value is a value uniquely assigned to the user to map the card issued to the user and the user, and the user key value may be transmitted in a form combined with the command.
- the card number of the card, the seed data, the user key value, and the chip unique value may be assigned to a user to whom the card is to be issued.
- the chip unique value is received from the card through the card tagging and stored in the application, and the virtual security code generating device may be transmitted to the server through , and stored in the server mapped with user identification information.
- the method further comprises the step of requesting user authentication by sending the virtual security code to a server, wherein the server searches for a storage location of user identification information based on the virtual security code, whereby the user Identification information may be extracted, and user authentication may be performed based on the extracted user identification information.
- the virtual security code includes a plurality of detailed codes, wherein the plurality of detailed codes are based on a first code for setting a starting point of a search for a storage location of the user identification information and a preset search method, and a second code for setting a search path from a starting point to a storage location of the user identification information.
- a smart card device for solving the above-described problems is for generating a virtual security code through an NFC module and an applet that performs NFC-based communication at the time of tagging with a virtual security code generation device.
- an IC module for storing data, wherein the IC module includes seed data and a unique chip value required for generating the virtual security code by the device for generating the virtual security code through the NFC module when tagging with the device for generating a virtual security code , and the virtual security code is based on the seed data and time data corresponding to the time of reception of the seed data when the transmitted chip unique value matches the chip unique value pre-stored in the virtual security code generating device. is created by
- the IC module receives a command and a user key value from the virtual security code generating device through the NFC module when tagging with the virtual security code generating device, and the user key in which the received user key value is pre-stored It is determined whether the value matches the value, and when the received user key value matches the pre-stored user key value, the seed data may be transmitted to the virtual security code generating device.
- a user can generate a virtual security code required for user authentication with card data obtained based on the NFC method without a separate OTP device.
- the smart card device checks whether the user key value is normal, and provides the seed data for generating the virtual security code to the virtual security code generating device only when the user key value is normal, exposure to the seed data is prevented. can do.
- the virtual security code generating device checks whether the chip unique value is normal, and generates the virtual security code only when the chip unique value is normal, abnormal access using card duplication can be prevented.
- FIG. 1 is a block diagram of a system for generating a virtual security code by determining whether data is consistent according to the present invention.
- FIG. 2 is a schematic configuration diagram of a smart card device according to the present invention.
- FIG. 3 is a schematic configuration diagram of an apparatus for generating a virtual security code according to the present invention.
- FIG. 4 is a flowchart of a method of generating a virtual security code by determining whether or not data matches according to the present invention.
- FIG. 5 is a view for explaining the generation of a virtual security code by checking the unique value of the chip according to the present invention.
- FIG. 6 is a view for explaining the generation of a virtual security code by checking a user key value according to the present invention.
- FIG. 7 is a view for explaining the generation of a virtual security code by checking the chip unique value and the user key value according to the present invention.
- character is a component constituting a code, and includes all or part of uppercase alphabets, lowercase alphabets, numbers, and special characters.
- code means a character string in which characters are listed.
- a "virtual security code” is a random code (eg, One Time Password (OTP)) that is temporarily generated for user authentication and is changed every unit time, and may include a code of a specific number of digits made of characters.
- the virtual security code may be used to search for user identification information stored in the server according to an embodiment of the present invention.
- the "virtual security code” is additionally 2 after the primary authentication of the user is performed through the authentication virtual code (OTAC: One Time Authentication Code) temporarily generated for the user authentication and the authentication virtual code. It may include a random code (eg, One Time Password (OTP)) used for car authentication.
- OAC One Time Authentication Code
- “smart card device” refers to a card that provides data for generating a virtual security code.
- it may be any card that conducts financial transactions, such as a credit card, a check card, and a cash card, and there is no limitation on the type and purpose of the card.
- a “virtual security code generating device” is a terminal used by a user, and is any electronic device having an application processor (AP) capable of driving an application.
- the user terminal is a non-portable desktop (desktop).
- a computer or a portable mobile device eg, a smart phone, a tablet PC, a personal digital assistant (PDA), an enterprise digital assistant (EDA), a portable multimedia player (PMP), a personal navigation device (PND) , wearable devices, and the like, but are not limited thereto.
- virtual security code generation function refers to a function that generates a virtual security code. Examples include, but are not limited to, One Time Password (OTP).
- OTP One Time Password
- the "detail code generation function” refers to a function that generates each detailed code constituting the virtual security code.
- the "detail code combination function” refers to a function that generates a virtual security code by combining or combining a plurality of detailed codes.
- UID user identification
- unit count is a unit defined as being set at a specific time interval and changing as the time interval elapses. For example, 1 count may be set to a specific time interval (eg, 1.5 seconds) and used.
- the term “storage location” refers to a point (count) on a track corresponding to a time when card registration is requested by a user.
- FIG. 1 is a block diagram of a system for generating a virtual security code by determining whether data is consistent according to the present invention.
- FIG. 2 is a schematic configuration diagram of a smart card device according to the present invention.
- FIG. 3 is a schematic configuration diagram of an apparatus for generating a virtual security code according to the present invention.
- FIG. 4 is a flowchart of a method of generating a virtual security code by determining whether or not data matches according to the present invention.
- FIG. 5 is a view for explaining the generation of a virtual security code by checking the unique value of the chip according to the present invention.
- FIG. 6 is a view for explaining the generation of a virtual security code by checking a user key value according to the present invention.
- FIG. 7 is a view for explaining the generation of a virtual security code by checking the chip unique value and the user key value according to the present invention.
- a system for generating a virtual security code by determining whether data matches includes a smart card device 10 , a virtual security code generating device 20 , and a server 30 .
- the system may include fewer or more components than the components shown in FIG. 1 .
- the smart card device 10 refers to a real card used by a user. Depending on the embodiment, only some of the card or user-identifiable information may be displayed on the surface of the smart card device 10, or no information may be displayed.
- the virtual security code generating device 20 generates a virtual security code for user authentication based on card data received and obtained from the smart card device 10 .
- the program or application in the virtual security code generating device 20 generates a virtual security code based on the seed data obtained from the smart card device (10).
- the program or application may include an OTP function.
- the seed data of the smart card device 10 may include user identification information [UID (User ID)] of the corresponding smart card device 10 .
- the user identification information may be generated based on information input by the user or log-in information of the user.
- the server maps user identification information based on the login information of the corresponding user and data related to the card to be issued to the corresponding user.
- the mapped information may be stored in the server 30 .
- the user identification information of the present invention is not limited thereto, and specific unique information set as a default when the smart card device 10 is manufactured, which is not set by the user, such as the serial number of the smart card device 10, is a specific user It may be set or used as user information by being mapped to .
- the user identification information may include personal information such as a resident registration number, a bank account number, and a credit card number, as well as a UID.
- the virtual security code generating device 20 generates a virtual security code based on the seed data obtained from the smart card device 10 .
- the virtual security code may be generated by an OTP (One Tim Password) function.
- OTP One Tim Password
- the virtual security code is based on the seed data and time data at the time when the generation of the virtual security code is requested or the seed data is obtained. is created with
- the virtual security code is generated by a virtual security code generation function provided in the virtual security code generating device 20, and in particular, the virtual security code may include at least one or a plurality of detailed codes. to be described in detail later.
- the server 30 performs user authentication based on the virtual security code received from the virtual security code generating device 20 .
- the server 30 may be a financial company server that communicates with the virtual security code generating device 20 , but is not limited thereto.
- the server 30 is shown as being configured as one server, but a plurality of servers may be configured in a system form linked to each other.
- the server 30 may further perform a process of verifying whether the received virtual security code is normally generated or used repeatedly.
- the smart card device 10 may transmit/receive various data, signals, or information to each other through a communication network.
- various types of communication networks may be used, for example, wireless LAN (Wireless LAN), Wi-Fi, Wibro, Wimax, High Speed Downlink Packet Access (HSDPA), etc.
- a communication method or a wired communication method such as Ethernet, xDSL (ADSL, VDSL), HFC (Hybrid Fiber Coax), FTTC (Fiber to The Curb), FTTH (Fiber To The Home) may be used.
- the communication network is not limited to the communication method presented above, and may include all types of communication methods which are well known or to be developed in the future in addition to the above communication methods.
- the smart card device 10 may include an NFC module 12 and an IC module 14 .
- the smart card device 10 may include fewer or more components than the components shown in FIG. 2 .
- the NFC (Narrow Frequency Communication) module 12 (ie, NFC chip) is a communication module, and may perform NFC-based communication when tagging with the virtual security code generating device 20 .
- the IC module 14 (ie, the IC chip) may store data for generating a virtual security code through an applet.
- the IC module 14 is mounted in the PCB board and contacts the terminals of the IC type card reader to perform data exchange.
- the IC module 14 includes any form, such as a component including an integrated circuit (IC), a system on chip (SoC), or the like.
- the IC chip may be an ISO 14443 NXP Mifare Classic type according to the present invention, but is not limited thereto.
- the smart card device 10 may include a memory (not shown) storing card data.
- the card data may include all data necessary for generating a virtual security code. More specifically, the card data may include user identification information of a user who applied for issuance of a corresponding smart card and card identification information of a card issued to the user.
- the applet stores card data in the smart card device 10 .
- the applet of the smart card device 10 may store card data in the storage area of the memory based on NDEF (NFC Data Exchange Format). That is, the card data is stored in the smart card device 10 in a standardized NDEF format so that the smart card device 10 and the virtual security code generating device 20 can exchange information with each other through NFC.
- NDEF NFC Data Exchange Format
- the IC module 14 may transmit data necessary for generating the virtual security code to the virtual security code generating device 20 through the NFC module 12 when tagging with the virtual security code generating device 20 .
- the transmitted data may be seed data and a chip-specific value, but is not limited thereto.
- the intrinsic value of the chip may be an intrinsic value of an IC chip or an intrinsic value of an NFC chip.
- the seed data and the seed data are received (or virtual security code generation request time). ) may be generated based on time data corresponding to . A detailed description thereof will be provided later.
- the IC module 14 receives a command and a user key value from the virtual security code generating device 20 through the NFC module 12 when tagging with the virtual security code generating device 20, It is determined whether the received user key value matches the pre-stored user key value, and if the received user key value matches the pre-stored user key value, the seed data is transmitted to the virtual security code generating device 20 . can send A detailed description thereof will be provided later.
- the virtual security code generating apparatus 20 may include a communication unit 22 , a memory 24 , and a processor 26 .
- the virtual security code generating apparatus 20 may include a smaller number of components or more components than the components shown in FIG. 3 .
- the communication unit 22 sends a command and a user key value for requesting a return of the chip unique value to the smart card device 10 through the communication network. and may receive the seed data and the chip unique value from the smart card device 10 . In addition, the two devices may transmit/receive various data to each other during tagging.
- the memory 24 may store data supporting various functions of the virtual security code generating device 20 .
- the memory 24 is a plurality of application programs (application program or application) driven in the virtual security code generating device 20, at least one process for the operation of the virtual security code generating device 20, data, Commands can be stored. At least some of these application programs may exist for a basic function of the virtual security code generating device 20 .
- the processor 26 may generally control the overall operation of the virtual security code generating device 20 .
- the processor 26 processes signals, data, information, etc. input or output through the above-described components, or by driving an application program stored in the memory 24, which is suitable for the smart card device 10 or the server 30 . may provide or process information or functions;
- the processor 26 may control at least some of the components discussed with reference to FIG. 3 in order to drive an application program stored in the memory 24 . Furthermore, the processor 26 may operate by combining at least two or more of the components included in the virtual security code generating device 20 to drive the application program.
- the processor 26 may include a code generation unit 262 and a verification request unit 264 .
- the processor 26 may include fewer or more components than the components shown in FIG. 3 .
- the code generator 262 may generate a virtual security code using the seed data and time data received from the smart card device 10 .
- the verification request unit 264 may transmit the virtual security code to the server 30 through the communication unit 22 and request that the server 30 perform verification and user authentication on the virtual security code.
- the processor 26 may further include components that perform various arithmetic operations and determination operations in addition to the code generation unit 262 and the verification request unit 264 .
- the virtual security code generating apparatus 20 may receive seed data and a unique chip value required for generating a virtual security code from the card when tagging a card having an IC chip and an NFC chip embedded therein (S110). ).
- the card may refer to the smart card device 10 described above.
- the virtual security code generating apparatus 20 may determine whether the received chip unique value matches a pre-stored chip unique value (S120).
- the virtual security code generating device 20 generates a virtual security code based on the seed data and time data corresponding to the time of reception of the seed data when the received chip unique value matches the pre-stored chip unique value. can be (S130).
- the intrinsic value of the chip may be a unique value of an IC chip or an intrinsic value of an NFC chip.
- the intrinsic value of the chip is an intrinsic value of the IC chip.
- the virtual security code generating device 20 After the virtual security code generating device 20 checks whether the received chip unique value and the chip unique value previously stored in the device match, generating the virtual security code only when the two values match is to duplicate the chip data of the card. This is to prevent abnormal access to request payment. That is, although the hacker can use the chip data in the card by duplicating it, since the hacker cannot know the unique value of the chip itself given at the time of chip manufacturing, the virtual security code generating device 20 determines whether the received chip unique value is a normal value. After confirming, a virtual security code for payment is generated. In this regard, it will be described in more detail with reference to FIG. 5 .
- the virtual security code generating device 20 transmits a command to the smart card device 10 ( S51 ).
- the command may be a command requesting to return a chip-specific value.
- the smart card device 10 transmits the chip unique value to the virtual security code generating device 20 in response to the command (S52).
- the virtual security code generating device 20 determines whether the received chip unique value matches the pre-stored chip unique value (S53). As a result of the determination, if the unique values of the two chips match, the virtual security code generating device 20 receives the seed data received from the smart card device 10 and the seed data at the reception time (or the virtual security code generation request time). A virtual security code is generated using the acquired time data (S54).
- the method for generating a virtual security code performed by the device for generating a virtual security code of the present invention includes the steps of: transmitting a command and a user key value to the card when tagging the card; The method may further include receiving the seed data from the card according to whether it is normal.
- the card may refer to the smart card device 10 described above.
- the card determines whether or not the user key value matches the pre-stored user key value, and if the user key value matches the pre-stored user key value, the card generates the virtual security code (20).
- the seed data may be transmitted.
- the user key value is a value uniquely assigned to the user in order to map the card issued to the user and the user. That is, when a user subscribes to the application and applies for card issuance, the server 30 may map the card and the user by setting a user key value for a card to be issued to the user.
- the user key value When the user key value is transmitted to the card, it may be transmitted in a form combined with the command.
- the user key value may be transmitted to the smart card device 10 in a combined form after an Application Protocol Data Unit (APDU) command.
- APDU Application Protocol Data Unit
- the binding form is not limited thereto.
- the smart card device 10 checks whether the received user key value and the user key value previously stored in the device match, and transmits the seed data only when the two values match, the seed data is exposed to a person other than the user. to prevent it from happening. In this regard, it will be described in more detail with reference to FIG. 6 .
- the virtual security code generating device 20 transmits the user key value in the form of a command to the smart card device 10 ( S61 ).
- the smart card device 10 determines whether the received user key value matches a pre-stored user key value (S62). As a result of the determination, if the two user key values match, the smart card device 10 transmits the seed data to the virtual security code generating device 20 (S63).
- the virtual security code generating apparatus 20 generates a virtual security code by using the received seed data and time data obtained at the time the seed data is received (S64).
- the data matching process is performed in each of the smart card device 10 and the virtual security code generating device 20, Since the virtual security code is generated only when both determination results are normal, security can be enhanced in generating the virtual security code.
- the virtual security code generating device 20 transmits a chip unique value return request command to the smart card device 10 , but in this case, the user key value is combined with the command and transmitted together (S71).
- the smart card device 10 checks whether the received user key value is normal (S72). When the received user key value matches the pre-stored user key value, the chip unique value is transmitted in response to the command together with the seed data to the virtual security code generating device 20 (S73).
- the virtual security code generating device 20 checks whether the received chip unique value is normal (S74). When the received chip unique value matches the previously stored chip unique value, a virtual security code is generated by using the received seed data and time data of a seed data reception time (virtual security code generation request time) (S75).
- the smart card device 10 may not transmit the seed data to the virtual security code generating device 20 .
- the smart card device 10 may transmit a unique chip value to the virtual security code generating device 20 in response to the command, but since the seed data is not transmitted You cannot create a virtual security code.
- the chip unique value return request command and the command in which the user key value is combined may be different depending on the embodiment. That is, when the card is tagged, the virtual security code generating device 20 may transmit a chip unique value return request command and a command in which the user key value is combined to the smart card device 10 , respectively.
- the code generator 262 serves to generate one or a plurality of detailed codes.
- the detailed code refers to some codes constituting the virtual security code.
- the virtual security code may consist only of the detailed code, or by combining one or more detailed codes with the first virtual security code generated by the OTP function, the final It may be formed in the form of a virtual security code (OTAC).
- OTP virtual security code
- the virtual security code generation device 20 includes a virtual security code generation function for generating a virtual security code, and the virtual security code generation function combines a detailed code generation function for generating one or more detailed codes and the detailed codes to create a virtual It includes a subcode combining function (ie, a rule for combining a plurality of subcodes) that generates a security code.
- a virtual security code generation function for generating a virtual security code
- the virtual security code generation function combines a detailed code generation function for generating one or more detailed codes and the detailed codes to create a virtual It includes a subcode combining function (ie, a rule for combining a plurality of subcodes) that generates a security code.
- the virtual security code generating function when the virtual security code includes a plurality of detailed codes, the virtual security code generating function generates a plurality of detailed codes using a plurality of detailed code generating functions, and the plurality of detailed codes through the detailed code combining function are combined in a preset combination to generate a virtual security code.
- the code generator 262 may generate the virtual security code by a detailed code generation function based on seed data obtained as the smart card device 10 is tagged.
- the server 30 has a search algorithm (storage space search algorithm), and the search algorithm extracts a plurality of detailed codes included in the virtual security code received from the virtual security code generating device 20, and the plurality of Search the storage space of user identification information [UID (User identification)] assigned to a user based on the correlation of the detailed code
- the search algorithm included in the server 30 determines the correlation between the plurality of detailed codes from a waypoint corresponding to one or more detailed codes among the plurality of detailed codes. Based on the calculation, the storage location of the user identification information may be searched. In this case, there may be one or a plurality of the waypoints, and there is no limitation on the number and order.
- the plurality of detailed codes may include a first code and a second code, and the code generator 262 generates the first function and the second function as the detailed code generation function. Including, the first code and the second code are generated. The first code and the second code have a correlation for searching the storage space of the user identification information (UID) in the server 30, but the virtual security code generating device 20 uses the first code to increase security.
- the first function to generate the first function and the second function to generate the second code may be included as the detailed code generation function, and data on the correlation between the first code and the second code may not be included.
- the first code and the second code may perform respective roles for searching a storage space of user identification information (UID). That is, the first code may include information on the waypoint, and the second code may include information necessary for an operation that can reach the storage space of the user identification information from the waypoint.
- UID user identification information
- the first code may be generated based on the first count
- the second code may be generated based on the second count.
- the first count is the number of unit counts that have elapsed from the first time the virtual security code generation function is driven in the server 30 to the time when the virtual security code is generated
- the second count is the user's user identification information (UID) may include the number of unit counts that have elapsed from the time of registration with the server 30 or the time of registering with the server 30 through the virtual security code generating device 20 after the user's smart card device 10 is issued. have.
- the first function generating the first code is a function providing a specific code value corresponding to the first count
- the second function generating the second code is a function providing a specific code value corresponding to the second count. to be.
- the first code is any one of the codes matched for each count from the initial time when the first function is driven in the server 300 [eg, the time when generation of the virtual security code is requested ( or a code value corresponding to the count)], and the virtual security code generating apparatus 20 generates a first code having a different code value at each generation time of the virtual security code in the same user.
- each virtual security code generating device 20 always has a different second count value, and the virtual security code generating device 20 always generates a different second code at the same time point for each user. That is, the first code becomes a different code value for each count, and the second code has a different code value for each app card application installed in the virtual security code generating device 20 of each user at the same time, resulting in the first
- the virtual security code (OTAC) in which the code and the second code are combined is always output as a code value that is not the same or does not overlap regardless of the user and the time of requesting the generation of the virtual security code.
- the virtual security code generation function may generate the N-digit first code or the second code with M characters, in this case, the virtual security code generation function is The code includes a first function and a second function for providing a first code or a second code sequentially changed for each unit count, respectively. That is, the first function or the second function is a function that generates MN codes not to be duplicated as the count increases, and a specific one of the MN codes is generated as the first code or the second code at a count corresponding to a specific time point. .
- the virtual security code generation device 20 does not duplicate the same first code or second code within the MN count (ie, the length of time corresponding to the MN counts), and a new detailed code (that is, for each unit count) first code or second code) to generate a new virtual security code (OTAC) for each unit count.
- MN count ie, the length of time corresponding to the MN counts
- a new detailed code that is, for each unit count first code or second code
- the virtual security code generation function generates the N-digit first code or the second code with M characters.
- the first code or The second code is matched for each count from the initial time point when the detailed code generation function is driven.
- the unit count is set to 1 second
- different MN codes are matched every second from the time when the detailed code generation function is first driven.
- the period using a specific detailed code generation function or the period of use of a program or application for generating a virtual security code in the virtual security code generation device 20 is a time length corresponding to the MN count (eg, 1 count is 1).
- the time length is set to be shorter than MN seconds
- the first code or the second code is not duplicated with the same code during the use period.
- the virtual security code generating device 20 returns a code value matched to the count corresponding to the specific point in time to the first code Alternatively, it can be generated with the second code.
- various methods may be applied as a method of generating one virtual security code (OTAC) by combining a plurality of detailed codes.
- the detailed code combination function may generate a virtual security code by alternately arranging an M-digit first code and an N-digit second code.
- the detailed code combining function may generate a virtual security code by combining the second code after the first code.
- a corresponding virtual security code may also be generated in various ways without being duplicated.
- the code generator 262 serves to generate a virtual security code by combining one or more detailed codes.
- the virtual security code generation method performed by the virtual security code generating apparatus of the present invention may further include the step of requesting user authentication by transmitting the virtual security code to the server.
- the server 30 may extract the user identification information by searching a storage location of the user identification information based on the virtual security code, and perform user authentication based on the extracted user identification information.
- the virtual security code and a plurality of detailed codes are included, and the plurality of detailed codes are the starting point according to a first code for setting a starting point of a search for a storage location of the user identification information and a preset search method. and a second code for setting a search path from the to the storage location of the user identification information.
- the server 30 when the server 30 receives the virtual security code from the virtual security code generating device 20, it compares the time data of the virtual security code with the time data at which the virtual security code is received. Thus, the virtual security code can be verified.
- the server 30 eg, a financial institution server
- a virtual security code generation function ie, OTP function
- the server 30 applies the inverse function of the virtual security code generation function to the virtual security code to find a count corresponding to the time when the virtual security code is generated. As a difference exists between the time when the virtual security code is generated by the virtual security code generating device 20 and the time when the server 30 receives the virtual security code due to the transmission time or delay of the virtual security code, the server 30 Since the count of receiving the virtual security code and the count of generating the OTP number corresponding to the virtual security code may not match, the server 30 allows an error range from the count of receiving the virtual security code.
- the server 30 searches a storage location of user identification information based on the virtual security code to extract the user identification information, and performs user authentication based on the extracted user identification information. can do.
- the virtual security code includes a plurality of detailed codes, the plurality of detailed codes according to a first code for setting a start point of a search for a storage location of user identification information and a preset search method, It may be composed of a second code for setting a search path from a starting point to a storage location of the user identification information.
- the code value (the first code value) corresponding to the first code is the first in the OTP code in the count corresponding to the current time based on the driving time of the virtual security code generation function. It may be a value obtained by adding a virtual security code value.
- the first code value serves as a waypoint in the actual code search process.
- the code value (second code value) corresponding to the second code may be a value obtained by subtracting a storage location value of user identification information (eg, UID) from the first code value.
- the second code value is a count from the waypoint (first code value) to the storage location value of the user identification information.
- an embodiment of the first code and the second code generated by the virtual security code generating device 20 are as follows.
- the final virtual security code may be composed of the first virtual security code, the first code, and the second code generated by the OTP function.
- the first virtual security code is a code generated by the OTP function, and is a code generated differently every time. Therefore, since the detailed code is generated differently depending on the generation time of the virtual security code, it is possible to prevent duplicated generation, and there is an effect of enhancing security.
- a code value (first code value) corresponding to the first code is a value obtained by adding user identification information (UID) to an OTP code value
- a code value corresponding to the second code (second code value) may be an OTP code value.
- the value of the user identification information (UI D) is given to the user or the virtual security code generating device 20 at a specific time (for example, the card manufacturing time, the card registration time, etc.), each user or virtual security code It is a code value capable of identifying the generating device 20 .
- another embodiment of the first code generated by the virtual security code generating device 20 is as follows. At this time, the virtual security code is generated based on the first virtual security code and the first code.
- the card number of the card, the seed data, the user key value, and the chip unique value may be allocated to the user to whom the card is to be issued.
- the user applies for card issuance through the application in the virtual security code generation device (20).
- the server 30 receives the card issuance application, the server 30 allocates a card number, seed data, and user key value of the card to be issued to the user, maps and stores the user identification information of the user. That is, the card number, seed data, and user key values are values set in the server.
- the server 30 transmits the card number, the seed data, and the user key value while requesting a card issuance to the card issuing agency.
- the card issuing agency injects the received card number, the seed data, and the user key value into the card to be issued to complete the card issuance.
- the card issuing agency transmits the unique chip value to the server 30 , and the server 30 additionally maps the transmitted chip unique value to the user identification information and stores it.
- the chip unique value is a value given to the chip when the chip included in the card is manufactured, and since it is not a value set by the server 30, the server 30 must separately receive the corresponding value from the card issuing agency. .
- the server 30 transmits a user key value and a unique chip value among data mapped to the user's identification information and stored according to a request to the virtual security code generating device 20 .
- the virtual security code generating device 20 may store the received user key value and the chip unique value, and then use it when generating the virtual security code.
- the present invention is not limited thereto, and other data as well as the user key value and the chip unique value may be transmitted from the server 30 and stored in the virtual security code generating device 20 during card registration.
- the server 30 starts driving the virtual security code generation function for the user or the virtual security code generating device 20 at the time when the registration is requested, and at the time registration is requested User identification information can be stored in the corresponding count (point). Accordingly, the server 30 can then perform user authentication by searching for user identification information from the virtual security code received from the virtual security code generating device 20 .
- the chip unique value is received from the card issuing agency and stored in the server 30 before card registration. and may be stored in the server 30 .
- the chip unique value is received from the card through the card tagging and stored in the application when the user registers the card with the application in the virtual security code generating device 20, and the virtual security code generating device ( 20) may be transmitted to the server 30, and may be stored in the server 30 mapped with the user identification information.
- the method according to an embodiment of the present invention described above may be implemented as a program to be executed in combination with a computer, which is hardware, and stored in a computer-readable recording medium.
- the above-described program is C, C++, JAVA, machine language, etc. that a processor (CPU) of the computer can read through a device interface of the computer in order for the computer to read the program and execute the methods implemented as a program
- It may include code (Code) coded in the computer language of Such code may include functional code related to a function defining functions necessary for executing the methods, etc. can do.
- the code may further include additional information necessary for the processor of the computer to execute the functions or code related to memory reference for which location (address address) in the internal or external memory of the computer should be referenced. have.
- the code uses the communication module of the computer to determine how to communicate with any other computer or server remotely. It may further include a communication-related code for whether to communicate and what information or media to transmit and receive during communication.
- a software module may include random access memory (RAM), read only memory (ROM), erasable programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), flash memory, hard disk, removable disk, CD-ROM, or It may reside in any type of computer-readable recording medium well known in the art to which the present invention pertains.
- RAM random access memory
- ROM read only memory
- EPROM erasable programmable ROM
- EEPROM electrically erasable programmable ROM
- flash memory hard disk, removable disk, CD-ROM, or It may reside in any type of computer-readable recording medium well known in the art to which the present invention pertains.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Finance (AREA)
- Signal Processing (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Electromagnetism (AREA)
- General Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Storage Device Security (AREA)
Abstract
La présente invention concerne un dispositif à carte à puce, ainsi qu'un dispositif et un procédé de génération d'un code de sécurité virtuel par la détermination d'une correspondance entre des données. Le procédé comprend les étapes consistant à : recevoir, en provenance d'une carte, des données germes et une valeur unique de puce qui sont requises pour générer un code de sécurité virtuel lors du marquage d'une carte qui incorpore une puce CI et une puce NFC ; déterminer si la valeur unique de puce correspond à une valeur unique de puce stockée au préalable ; et générer un code de sécurité virtuel sur la base des données germes et de données de temps correspondant à un temps de réception des données de germe lorsque la valeur unique de puce reçue correspond à la valeur unique de puce stockée au préalable.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20210029035 | 2021-03-04 | ||
KR10-2021-0029035 | 2021-03-04 | ||
KR10-2022-0027774 | 2022-03-04 | ||
KR1020220027774A KR20220125186A (ko) | 2021-03-04 | 2022-03-04 | 스마트 카드 장치, 데이터 일치 여부 판단을 통해 가상보안코드를 생성하는 장치 및 그 방법 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022186653A1 true WO2022186653A1 (fr) | 2022-09-09 |
Family
ID=83154287
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2022/003087 WO2022186653A1 (fr) | 2021-03-04 | 2022-03-04 | Dispositif à carte à puce, ainsi que dispositif et procédé de génération d'un code de sécurité virtuel par détermination d'une correspondance entre des données |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR20230096928A (fr) |
WO (1) | WO2022186653A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118506481A (zh) * | 2024-07-15 | 2024-08-16 | 杭州海康威视数字技术股份有限公司 | 门禁卡验证系统及方法 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101272600B1 (ko) * | 2011-08-23 | 2013-06-10 | (주)에이티솔루션즈 | 엔에프씨를 이용한 무선 결제 방법 및 시스템과 이를 위한 무선단말 |
KR20150011933A (ko) * | 2013-07-24 | 2015-02-03 | 백기영 | 가맹점 코드를 이용한 결제시스템 |
KR101561499B1 (ko) * | 2014-11-27 | 2015-10-20 | 주식회사 미래테크놀로지 | 엔에프씨 인증카드를 이용한 인증방법 |
KR101788149B1 (ko) * | 2013-06-13 | 2017-10-20 | 주식회사 비즈모델라인 | 오티피 생성 방법 |
KR20210022018A (ko) * | 2018-08-09 | 2021-03-02 | 주식회사 센스톤 | 인증용가상코드를 이용한 사용자 인증 방법 및 시스템 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101316466B1 (ko) | 2012-11-20 | 2013-10-08 | 신한카드 주식회사 | 다이나믹 트랙 2 정보를 이용한 모바일 결제 시스템 및 방법 |
-
2022
- 2022-03-04 WO PCT/KR2022/003087 patent/WO2022186653A1/fr active Application Filing
-
2023
- 2023-06-13 KR KR1020230075628A patent/KR20230096928A/ko active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101272600B1 (ko) * | 2011-08-23 | 2013-06-10 | (주)에이티솔루션즈 | 엔에프씨를 이용한 무선 결제 방법 및 시스템과 이를 위한 무선단말 |
KR101788149B1 (ko) * | 2013-06-13 | 2017-10-20 | 주식회사 비즈모델라인 | 오티피 생성 방법 |
KR20150011933A (ko) * | 2013-07-24 | 2015-02-03 | 백기영 | 가맹점 코드를 이용한 결제시스템 |
KR101561499B1 (ko) * | 2014-11-27 | 2015-10-20 | 주식회사 미래테크놀로지 | 엔에프씨 인증카드를 이용한 인증방법 |
KR20210022018A (ko) * | 2018-08-09 | 2021-03-02 | 주식회사 센스톤 | 인증용가상코드를 이용한 사용자 인증 방법 및 시스템 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118506481A (zh) * | 2024-07-15 | 2024-08-16 | 杭州海康威视数字技术股份有限公司 | 门禁卡验证系统及方法 |
Also Published As
Publication number | Publication date |
---|---|
KR20230096928A (ko) | 2023-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018030707A1 (fr) | Système et procédé d'authentification, et équipement d'utilisateur, serveur d'authentification, et serveur de service pour exécuter ledit procédé | |
WO2018124857A1 (fr) | Procédé et terminal d'authentification sur la base d'une base de données de chaînes de blocs d'un utilisateur sans face-à-face au moyen d'un id mobile, et serveur utilisant le procédé et le terminal | |
WO2011118871A1 (fr) | Procédé d'authentification et système utilisant un terminal mobile | |
WO2018124856A1 (fr) | Procédé et terminal d'authentification d'un utilisateur au moyen d'un id mobile grâce à une base de données de chaînes de blocs, et serveur utilisant le procédé et le terminal | |
WO2015069018A1 (fr) | Système d'ouverture de session sécurisée et procédé et appareil pour celui-ci | |
WO2013141602A1 (fr) | Procédé d'authentification et système pour ce procédé | |
WO2019031644A1 (fr) | Système de fourniture de transaction financière basé sur un numéro de carte virtuelle, dispositif de génération de numéro de carte virtuelle et dispositif de vérification de numéro de carte virtuelle, procédé de fourniture de transaction financière basé sur un numéro de carte virtuelle et programme de fourniture de transaction financière basé sur un numéro de carte virtuelle | |
WO2018151480A1 (fr) | Procédé et système de gestion d'authentification | |
WO2020032498A1 (fr) | Procédé et système d'authentification d'utilisateur faisant appel à un code d'authentification virtuel | |
WO2019031627A1 (fr) | Système de fourniture de code virtuel, dispositif de génération de code virtuel, dispositif de vérification de code virtuel, procédé de fourniture de code virtuel et programme de fourniture de code virtuel | |
WO2018169150A1 (fr) | Système et procédé d'authentification d'utilisateur à base d'écran verrouillé | |
WO2022186653A1 (fr) | Dispositif à carte à puce, ainsi que dispositif et procédé de génération d'un code de sécurité virtuel par détermination d'une correspondance entre des données | |
WO2015069028A1 (fr) | Authentification multicanal, procédé de transfert financier et système utilisant un terminal de communication mobile | |
WO2022255757A1 (fr) | Système et procédé de certification de sécurité utilisant un otid | |
WO2012074275A2 (fr) | Appareil d'authentification d'utilisateur pour un usage sécurisé de l'internet, procédé d'authentification d'utilisateur pour un usage sécurisé de l'internet et support enregistré l'enregistrant | |
WO2014084608A1 (fr) | Procédé et système de gestion d'élément sécurisé | |
WO2015163739A1 (fr) | Système de se en nuage basé sur un se en nuage, terminal mobile et procédé associé de paiement mobile | |
WO2022186605A1 (fr) | Dispositif de carte à puce, dispositif de génération de code virtuel pour authentification, procédé de génération de code virtuel pour authentification l'utilisant, et serveur pour vérifier un code virtuel pour authentification | |
WO2018004042A1 (fr) | Système de vérification mutuelle et son procédé d'exécution | |
WO2020184815A1 (fr) | Procédé de paiement automatique mobile basé sur un mot de passe à usage unique et système l'utilisant | |
WO2021172876A1 (fr) | Dispositif et procédé d'autorisation de processus basé sur un code d'autorisation virtuel | |
WO2014163420A1 (fr) | Système de certification d'identité et procédé pour le réaliser | |
WO2017018861A1 (fr) | Dispositif financier utilisant des informations biométriques et son procédé de fonctionnement | |
WO2020162739A1 (fr) | Procédé, programme et appareil pour identifier un dispositif à l'aide d'un code virtuel sur la base d'une valeur unique de puce | |
JP2004206258A (ja) | 多重認証システム、コンピュータプログラムおよび多重認証方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22763634 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 22763634 Country of ref document: EP Kind code of ref document: A1 |