KR20150089569A - Method for authentication using user apparatus, digital system, user apparatus, and authentication system thereof - Google Patents
Method for authentication using user apparatus, digital system, user apparatus, and authentication system thereof Download PDFInfo
- Publication number
- KR20150089569A KR20150089569A KR1020140010339A KR20140010339A KR20150089569A KR 20150089569 A KR20150089569 A KR 20150089569A KR 1020140010339 A KR1020140010339 A KR 1020140010339A KR 20140010339 A KR20140010339 A KR 20140010339A KR 20150089569 A KR20150089569 A KR 20150089569A
- Authority
- KR
- South Korea
- Prior art keywords
- authentication
- information
- terminal
- user
- digital system
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A user authentication method using a user device, a digital system therefor, a user device, and an authentication system are disclosed. A method for authenticating a user using a user apparatus according to an embodiment of the present invention includes the steps of: performing communication with a predetermined user apparatus for authenticating the digital system, authenticating, by the digital system, And transmitting an acknowledgment signal including the authentication information to an authentication system, and performing an authentication check procedure in which the transmitted acknowledgment signal is authenticated, wherein if the authentication check procedure is successful, The authentication request outputted from the processing device or the digital system to the authentication system or the service system connected with the authentication system is processed successively, and the authentication information is transmitted to the user device through the digital system, Information or a terminal generated by the digital system And is generated by the user device based on device authentication information including terminal authentication information including one-time information, device identification information of the user device, and device one-time information generated by the user device.
Description
The present invention relates to a method for authenticating a user using a user apparatus, a digital system, a user apparatus, and an authentication system for the same, and more particularly, If the user to be used is required to perform authentication (also referred to as user authentication), a simple and highly secure personal authentication using a user device (e.g., IC card) and a digital system (e.g., mobile terminal) Method and system thereof.
And more particularly, to an authentication method and a system therefor that enable a user apparatus to generate authentication information for authenticating not only itself but also the digital system.
Conventional technology related to identity authentication has traditionally used identity and password authentication. However, such a conventional authentication method has a problem that it is difficult to perform a normal authentication function when an ID and a password are leaked. To complement this, various authentication schemes have appeared.
For example, there are authentication of the mobile phone itself, authentication by a user using an authorized certificate, authentication using an OTP, authentication of an i-PIN (Internet Personal Identification Number), or authentication using a credit card.
Authorized certificate authentication is an authentication protocol with a relatively high security level, but it is not easy to carry the authorized certificate stably and there are disadvantages such as complicated authentication process. In addition, the public certificate has also recently been leaked in large quantities, thus posing a problem of safety.
The i-PIN is a method of authenticating the user by using a virtual identification number used on the Internet. The user must know a new identification number in advance, and it is difficult to perform a normal authentication function once an exposure is performed as in an ID password method There are constraints.
In addition, the authentication of the mobile phone itself is problematic in that it is susceptible to smsing and the like by a method of authenticating occupation of the mobile phone by using the authentication number.
Also, since all of these conventional technologies are a method of inputting a password (certificate password, I-PIN password) or an authentication number, if a password or an authentication number is exposed to another person, the authentication of the user is inevitable. There is a high risk of exposure to hacking.
In addition, in the case of authentication using the OTP, the user can authenticate only when the user has the OTP client (OTP token). Also, the user is required to generate the OTP through the OTP client, There is a presence.
Accordingly, a technical idea that can provide a highly secure personal authentication protocol while maintaining convenience compared with conventional authentication technologies is required along with a payment protocol.
In addition, online crime becomes more intelligent and frequent as online financial transactions become more active, so the need for 2-channel authentication is increasing. Technological thinking is required to enable users to easily perform authentication while enabling 2-channel authentication.
In this case, the authentication request and the authentication action to be performed by a legitimate user can be separated so that the authentication request and the authentication request are authenticated, so that the information necessary for authentication can be easily exposed to the other person. A technical idea that allows the use of the service without requiring the service is required.
Further, the user device generates authentication information for authenticating not only itself but also the digital system, thereby judging whether the user has performed the authentication using legitimate authentication tools (i.e., the user device and the digital system) Technical ideology is required.
SUMMARY OF THE INVENTION The present invention has been made in view of the above problems, and it is an object of the present invention to provide a digital system and a user device which are highly likely to be carried by a user. In addition, the present invention provides a two-channel personal authentication, a long-term personal authentication, or a technical idea enabling a third party to easily perform a personal authentication for allowing a legitimate user to provide a service.
In addition, since authentication can be performed using one-time information (e.g., OTP), it is necessary to have a separate one-time information generating device (e.g., OTP client) for generating one-time information It is to provide a technical idea that can carry out the simple and secure self-certification without.
In addition, the generation of the one-time information can be performed through a digital system or a user device (e.g., a smart card or the like) carried by the user, so that the risk that authentication due to illegal copying of the digital system or the user device can be performed And to provide technological ideas that can be significantly lowered.
In addition, it is another object of the present invention to provide a technique for providing higher security by implementing the authentication information generated by the user apparatus only when the digital system communicates with the user apparatus.
Also, even when the payment card is used for authentication of the user, the settlement financial information (for example, the card number, the expiration date, the CVC, etc.) may not be circulated on the network and even if the outflow of information occurs due to an attack, It is to provide a technical idea about the authentication method which can provide high security by reducing the risk of leakage of financial information.
In addition, it is not required to require a user to input the authentication information generated by the user device, thereby providing the user with the technical idea of authentication of the user, which is robust against attacks through key logging as well as convenience at the time of payment.
Further, the present invention provides a highly secure authentication method by allowing a user apparatus to generate authentication information capable of authenticating the digital system. And in particular, to provide a technical idea capable of generating the authentication information by a user apparatus that can not directly communicate with an authentication side.
The present invention also provides a technical idea that allows a digital system and / or a user device to be used for an authentication operation to be predetermined and perform authentication of the user only through the digital system and / or the user device.
In addition, a digital system to be used for the authentication operation and a user apparatus that is paired with the digital system are set in advance, and authentication is successful only when communication (for example, contact or non-contact type) So as to provide a technical idea capable of providing a synergistic effect of remarkable security.
According to another aspect of the present invention, there is provided a method of authenticating a user using a user device, the method comprising: performing communication with a predetermined user device for authenticating the digital system; The method comprising: receiving authentication information generated by a user device and transmitting an authentication signal including the authentication information to an authentication system; and performing an authentication verification procedure in which the transmitted authentication signal is authenticated, The authentication request output from the predetermined data processing apparatus or the digital system to the authentication system or the service system connected to the authentication system is successfully processed and the authentication information is transmitted to the user apparatus through the digital system The terminal identification information of the digital system Based on device authentication information including terminal authentication information including terminal one-time information generated by the digital system and device identification information of the user apparatus or device one-time information generated by the user apparatus, .
The authentication information may be generated by the user device based on the terminal identification information and the device identification information, or may be generated by the user device based on the terminal identification information and the device identification information .
The authentication information may be generated based on the first device one-time information generated by the user device based on the device identification information and the terminal authentication information, or may be generated based on the terminal authentication information and the device identification information And is generated based on the second device one-time information generated by the user device.
The authentication method using the user device may further include a step of transmitting the authentication request information output by the authentication system, which has received the authentication request including the identification information of the digital system output from the data processing device, The method further comprising displaying on the digital system, wherein when the authentication action request information is displayed, the digital system can perform the communication with the user device.
The authentication method using the user device may further include receiving the authentication action request information output from the data processing device that receives the identification information of the digital system, The digital system can perform the communication with the user equipment.
Further, when the authentication information is generated by the user device based on the terminal identification information and the device identification information, the terminal identification information and the device identification information are obtained from the authentication information by the authentication system, Characterized in that the authentication confirmation procedure is successful until the terminal identification information and the device identification information are authenticated, or when the authentication information is generated by the user apparatus based on the terminal one-time information and the device identification information, Wherein the terminal identification information and the terminal identification information are acquired from the authentication information by the authentication system and authenticated through server one-time information generated by the authentication system such that the terminal one-time information corresponds to the terminal one-time information, If the device identification information is authenticated, It may be characterized in that the ball.
When the authentication information is generated based on the first device one-time information and the terminal authentication information generated by the user apparatus based on the device identification information, The one-time information and the terminal authentication information are acquired and authenticated through the first server one-time information generated by the authentication system such that the first device one-time information corresponds to the first device one-time information, Or if the authentication information is generated based on the second device one-time information generated by the user device based on the terminal authentication information and the device identification information, Wherein the second device one-time information is obtained from the authentication information by the system, One-time information must be authenticated by the terminal authentication information to the second server, one-time information generated by the authentication system based on the device identification information it may be characterized in that the authentication procedure is successful.
The step of transmitting the confirmation signal to the authentication system may further include the step of the digital system further including the terminal authentication information in the confirmation signal and transmitting the terminal authentication information to the authentication system, The authentication information is authenticated before the authentication confirmation process is successful.
The user authentication method using the user device may further include determining whether the digital system is a preset pair so that the user device corresponds to the digital system, and if the user device is a preset pair, And transmits an acknowledgment signal to the authentication system.
Further, a method for authenticating a user using the user apparatus includes the steps of: the digital system or the authentication system requesting a user of the digital system for user authentication information corresponding to the user apparatus; Further comprising the step of transmitting, to the authentication system, the digital system or the data processing apparatus, wherein the authentication confirmation procedure is successful only when the user authentication information is further authenticated by the authentication system.
According to another aspect of the present invention, there is provided a method for authenticating a user using a user device, the method comprising: receiving a confirmation signal from the digital system, The method comprising the steps of: receiving an authentication message including authentication information generated by the user device; performing an authentication procedure to authenticate the received acknowledgment signal; and if the authentication procedure is successful, Characterized in that the predetermined data processing apparatus or the digital system successively processes an authentication request output to the authentication system or a service system connected to the authentication system, wherein the authentication information is transmitted to the user device through the digital system The terminal identification information of the digital system or the digital Information generated by the user apparatus based on device authentication information including terminal authentication information including terminal one-time information generated by the system, device identification information of the user apparatus, and device one-time information generated by the user apparatus .
The authentication information may be generated by the user device based on the terminal identification information and the device identification information, or may be generated by the user device based on the terminal identification information and the device identification information .
The authentication information may be generated based on the first device one-time information generated by the user device based on the device identification information and the terminal authentication information, or may be generated based on the terminal authentication information and the device identification information And is generated based on the second device one-time information generated by the user device.
The authentication method using the user device may further include the steps of the authentication system receiving the authentication request including the identification information of the digital system from the data processing apparatus, Or transmitting the authentication action request information to the data processing device, wherein, after transmitting the authentication action request information, the authentication system performs the authentication process so that the confirmation signal is received from the digital system . ≪ / RTI >
Further, the step of performing the authentication confirmation procedure for authenticating the authentication information based on the confirmation signal received by the authentication system may further include the step of, when the authentication information is received by the user apparatus based on the terminal identification information and the device identification information The authentication system obtains the terminal identification information and the device identification information from the authentication information, and successively processes the authentication confirmation procedure until the obtained terminal identification information and the device identification information are authenticated, Or when the authentication information is generated by the user device based on the terminal one-time information and the device identification information, the authentication system obtains the terminal one-time information and the device identification information from the authentication information, Information by the authentication system so as to correspond to the terminal's one- The authentication server is configured with a one-time information, the device identification information is to be authenticated is out of a successful authentication process the verification process may include any of them.
In addition, the step of performing an authentication confirmation procedure for authenticating the authentication information based on the confirmation signal received by the authentication system may further include a step of, when the authentication information is generated by the first device When the authentication information is generated based on the one-time information and the terminal authentication information, the authentication system obtains the first device one-time information and the terminal authentication information from the authentication information, and the first device one- The authentication information is authenticated through first server one-time information generated by the authentication system so as to correspond to the terminal authentication information and the authentication information is successfully authenticated before the terminal authentication information is authenticated, Information generated based on the second device one-time information generated by the user device based on the information , The second device one-time information is obtained from the authentication information, and the second device one-time information is generated from the authentication information by using the second server one-time information generated by the authentication system based on the terminal authentication information and the device identification information And successively processing the authentication confirmation procedure to be authenticated through the information.
The authentication signal further includes the terminal authentication information, and the step of performing the authentication verification procedure for authenticating the authentication information based on the confirmation signal received by the authentication system includes the steps of: Authenticating the included terminal authentication information, and successively processing the authentication confirmation procedure until the terminal authentication information is further authenticated.
The authentication method using the user device may further include the step of authenticating whether or not the digital system in which the authentication system has transmitted the confirmation signal determines whether the digital system and the user apparatus are paired in advance to be mutually associated , It can be determined that the authentication confirmation process is successful if the pair status is authenticated.
According to another aspect of the present invention, there is provided a method for authenticating a user using a user device, the method comprising the steps of: communicating with a digital system by a user device to authenticate the user; , Transmitting the authentication information generated by the user equipment to the digital system, transmitting an acknowledgment signal including the transmitted authentication information to the authentication system by the digital system, and transmitting the acknowledgment signal to the authentication system Wherein the authentication confirmation process is successful and the authentication request output from the predetermined data processing device or the digital system to the authentication system or the service system connected with the authentication system is successful And the authentication information is transmitted to the digital system The terminal identification information including the terminal identification information of the digital system transmitted to the user apparatus or the terminal one-time information generated by the digital system, the apparatus identification information of the user apparatus or the apparatus one-time information generated by the user apparatus And is generated by the user device based on the device authentication information included.
The user authentication method using the user device may further include determining whether the user equipment is a preset pair so that the digital system corresponds to the user device, and if the digital system is a preset pair, And generates the authentication information or transmits the generated authentication information to the digital system.
The step of generating the authentication information by the user device may further include the steps of the user device generating the authentication information based on the terminal identification information and the device identification information, And generating the authentication information based on the identification information.
The step of generating authentication information by the user apparatus may include generating the authentication information based on the first device one-time information and the terminal authentication information generated by the user apparatus based on the device identification information, And generating the authentication information based on the second device one-time information generated by the user device based on the terminal authentication information and the device identification information.
The user authentication method using the user device can be recorded in a computer-readable recording medium on which the program is recorded.
According to another aspect of the present invention, there is provided a digital system using a user device, the digital system comprising: a user equipment communication module for performing communication with a user equipment for authentication of an authentication request; And a control module for transmitting, to the authentication system, a confirmation signal when the communication with the user device is performed through the module, and the confirmation signal includes the authentication information generated by the user device, Wherein the authentication request output from the predetermined data processing apparatus or the digital system to the authentication system or the service system connected to the authentication system is successfully processed when the authentication confirmation procedure in which the confirmation signal is authenticated succeeds, The authentication information is transmitted to the user The terminal identification information including the terminal identification information of the digital system transmitted to the device or the terminal one-time information generated by the digital system and the device identification information of the user apparatus or the device one-time information generated by the user apparatus And is generated by the user device based on the device authentication information.
The authentication information may be generated by the user device based on the terminal identification information and the device identification information, or may be generated by the user device based on the terminal one-time information and the device identification information, Second device generated based on the first device one-time information and the terminal authentication information generated by the user device based on the terminal authentication information and generated by the user device based on the terminal authentication information and the device identification information, Information is generated based on the information.
In addition, the digital system may further include a terminal one-time information generation module for generating the terminal one-time information.
According to another aspect of the present invention, there is provided an authentication system using a user device, the method comprising: receiving a confirmation signal output by the digital system when the digital system communicates with a predetermined user device, A communication unit for receiving the authentication information generated by the user device, an authentication unit for performing an authentication confirmation procedure for authenticating the received confirmation signal, and an authentication unit for, if successful, And a control unit for successively processing an authentication request output from the data processing apparatus or the digital system to the authentication system or the service system connected to the authentication system, wherein the authentication information is transmitted to the user apparatus via the digital system The terminal identification information of the digital system or the digital Based on the device authentication information including the terminal authentication information including the terminal one-time information generated by the device and the device authentication information including the device identification information of the user device or the device one-time information generated by the user device .
The authentication information may be generated by the user device based on the terminal identification information and the device identification information, or may be generated by the user device based on the terminal one-time information and the device identification information, Second device generated based on the first device one-time information and the terminal authentication information generated by the user device based on the terminal authentication information and generated by the user device based on the terminal authentication information and the device identification information, Information is generated based on the information.
According to an aspect of the present invention, there is provided a user apparatus including communication means for performing communication with a digital system, and operation means for generating authentication information when the communication is performed through the communication means Wherein the authentication information generated by the computing means is transmitted to the digital system, and when an acknowledgment signal including the transmitted authentication information is transmitted to the authentication system by the digital system, And the authentication request output from the digital data processing apparatus or the digital system to the authentication system or the service system connected to the authentication system is successfully processed, The authentication information is transmitted to the user device via the digital system The device authentication information including the terminal identification information of the digital system transmitted or the terminal authentication information including the terminal one-time information generated by the digital system and the device one-time information generated by the user apparatus And is generated by the user device based on the information.
The computing means may generate the authentication information based on the terminal identification information and the device identification information, generate the authentication information based on the terminal's one-time information and the device identification information, Based on the first device one-time information generated based on the terminal authentication information and the terminal authentication information, or generates the authentication information based on the terminal authentication information and the second device one- Lt; / RTI >
Also, the calculating means may determine whether the digital system is a preset pair corresponding to the user apparatus, and if the digital system is determined to be a preset pair, the authentication means may generate the authentication information or transmit the generated authentication information to the digital system To the mobile station.
According to the technical idea of the present invention, there is an effect of providing high security and simplicity by performing self-authentication by using two independent objects of a digital system and a user device, both of which are highly likely to be carried by a user and are familiar.
In other words, the authentication request is performed by a data processing apparatus that is separate from the digital system, and the authentication operation is performed through the digital system, Channel authentication, the remote authentication, or the third-party authentication can be performed with high security because it can be performed by another person or by a person other than the authentication requester.
In addition, there is no need for a user to have a device for separate one-time information (e.g., OTP, etc.), and a user device (e.g., IC card, traffic card, electronic ID card, etc.) It is possible to increase both the security and the convenience of the user.
Further, when the user apparatus generates the authentication information including the one-time information, the user apparatus generates the authentication information using the identification information of the digital system received from the digital system or the terminal one-time information generated by the digital system , It is possible to authenticate not only the user equipment but also the digital system using the authentication information generated by the user equipment.
In addition, since the digital system can authenticate not only the user device but also the digital system using the authentication information generated by the user device, the digital system, which is relatively vulnerable to attack, generates authentication information and authenticates the authentication system. It is possible to obtain security.
Further, it is possible to prevent the user from being exposed to the hacking of the key input method such as key logging as well as convenience in authentication of the user by preventing the user from using a process of inputting the authentication information while using the authentication information generated by the user device have.
In addition, since the digital system to be used for authentication of the user can be preset and specified, it has the effect of having a strong characteristic against attack such as smishing or man in the middle attack. Online crime can be actively blocked.
In addition, since a user apparatus constituting a pair (pair) with the digital system can be set in advance, it is possible to set up a pair of apparatuses without having all the apparatuses constituting the pair (that is, The apparatus can not be normally authenticated), thereby remarkably improving the security.
BRIEF DESCRIPTION OF THE DRAWINGS A brief description of each drawing is provided to more fully understand the drawings recited in the description of the invention.
Figure 1 shows schematic systems for implementing identity authentication using a user device in accordance with an embodiment of the present invention.
2 shows a schematic configuration of a digital system according to an embodiment of the present invention.
3 shows a schematic configuration of an authentication system according to an embodiment of the present invention.
4 shows a schematic data flow of authentication of a user using a user device according to an embodiment of the present invention.
FIG. 5 shows a schematic data flow of authentication of a user using a user apparatus according to another embodiment of the present invention.
6 shows a schematic data flow of authentication of a user using a user apparatus according to another embodiment of the present invention.
FIGS. 7 to 9 show a schematic data flow when the user equipment generates authentication information using the terminal one-time information of the digital system.
FIG. 10 is a diagram illustrating a process of an authentication system performing an authentication procedure according to an embodiment of the present invention. Referring to FIG.
11 is a diagram for explaining a process in which a digital system transmits an acknowledgment signal according to an embodiment of the present invention.
12 is a diagram showing a schematic configuration of a user apparatus according to an embodiment of the present invention.
In order to fully understand the present invention, operational advantages of the present invention, and objects achieved by the practice of the present invention, reference should be made to the accompanying drawings and the accompanying drawings which illustrate preferred embodiments of the present invention.
Also, in this specification, when any one element 'transmits' data to another element, the element may transmit the data directly to the other element, or may be transmitted through at least one other element And may transmit the data to the other component. Conversely, when one element 'directly transmits' data to another element, it means that the data is transmitted to the other element without passing through another element in the element.
BEST MODE FOR CARRYING OUT THE INVENTION Hereinafter, the present invention will be described in detail with reference to the preferred embodiments of the present invention with reference to the accompanying drawings. Like reference symbols in the drawings denote like elements.
Figure 1 shows schematic systems for implementing identity authentication using a user device in accordance with an embodiment of the present invention.
Referring to FIG. 1, a
The
The
According to another embodiment, the
Hereinafter, for convenience of description, the
The
In this specification, tagging refers to the case where the
If the
In addition, when performing short-range wireless communication through tagging, it is not necessary to take out a user device (e.g., an electronic ID card or a payment card 300) from a pocket or a wallet.
Of course, another conventional authentication method (for example, authentication using an authorized certificate, etc.) may be performed before or after the authentication of the user according to the technical idea of the present invention is performed for higher security. It goes without saying that higher security can be provided when such dual security authentication is performed.
According to one embodiment, the
The authentication information may mean information that can be generated based on at least one piece of information to be authenticated. According to the technical idea of the present invention, the authentication information may be generated by the
The information capable of authenticating the
In addition, information that can authenticate the
Then, the authentication information according to the technical idea of the present invention is generated based on the device authentication information and the terminal authentication information, and the device authentication information and the terminal authentication information May be obtained, or at least information that the authentication information has been generated based on the device authentication information and the terminal authentication information may be authenticated.
Hereinafter, the information that can be authenticated by the authentication information is defined as the authentication information. Then, the authentication information may be generated based on the device authentication information, which is the authentication information, and the terminal authentication information. Also, the device authentication information may be device identification information or device one-time information as described above. The terminal authentication information may be terminal identification information or terminal one-time information.
On the other hand, when the authentication information is generated based on at least one of the pieces of authenticated information, the
As an example of combining, processing or converting the at least one piece of the information to be authenticated in a predetermined manner, it is possible to simply generate the combined information of the at least one piece of the information to be authenticated in a predetermined manner in the form of a predetermined file or information A case in which information including the at least one piece of authorized information is encrypted or a case where a part of the at least one piece of authenticated information is to be encrypted and the other piece of authenticated information is used to generate an encryption key or an encryption key Lt; / RTI > In addition, the
In any case, the fact that the authentication information is generated by the
When the authentication information is generated based on any one of the pieces of information to be authenticated (for example, device one-time information), the one piece of the information to be authenticated itself is not only the device authentication information of the
As a result, the authentication information may be generated based on the device identification information and the terminal identification information, or may be generated based on the device identification information and the terminal one-time information. Alternatively, the authentication information may be generated based on the device one-time information and the terminal identification information, or may be generated based on the device one-time information and the terminal one-time information. Alternatively, the authentication information may be generated based only on the device one-time information, and when the device one-time information is generated based on not only the identification information of the
The
In any case, the device one-time information may be generated by the
Further, when the device one-time information is generated based on the terminal authentication information (e.g., terminal identification information or terminal one-time information) as described above, the input value of the device one-time information is set based on the terminal authentication information or the terminal authentication information It may mean that information that can be obtained is used as an input value. Therefore, in this case, the
The manner in which the
The
In this case, the fact that the confirmation signal is authenticated to the
According to one embodiment, when the
As described above, according to the technical idea of the present invention, when authentication is simultaneously performed not only to the
The
The
When the authentication information includes the device identification information, the authentication unit uses the information stored in the
In addition, when the authentication information corresponding to the authentication information includes the terminal identification information, the authentication unit may authenticate the terminal identification information. To this end, the terminal identification information of the
As described above, according to the technical idea of the present invention, the
Also, according to one embodiment, the
1, the
In addition, the
In addition, when the terminal's one-time information is included in the confirmation signal separately from the authentication information, the terminal's one-time information may be generated in a manner different from the device one-time information generated by the
Also, the terminal's one-time information may be generated by using identification information of the
As a result, according to the technical idea of the present invention, the
In any case, the authentication unit of the
Further, the authentication unit may further perform pair authentication for authenticating whether the
The confirmation signal may be defined as including a series of information or signals including information necessary for the authentication procedure performed by the
In any case, according to the technical idea of the present invention, the
Meanwhile, the
Also, the authentication information generated by the
In addition, the
In any case, the confirmation signal transmitted by the
In addition, when the
The
On the other hand, even when the
As a result, when the
The procedure for authenticating the device identification information according to an embodiment may be performed by the
Of course, the procedure for authenticating the device identification information and / or the terminal identification information may be omitted when the terminal identification information (or device identification information) is used when generating the device one-time information (or the terminal one-time information) It is possible. That is, when the device one-time information (or the terminal one-time information) is generated using up to the terminal identification information (or the device identification information), the terminal identification information (or the device identification information) is separately authenticated There is an effect that the terminal identification information is authenticated if the device one-time information is authenticated.
The authentication procedure performed by the
Whether the two devices used in the authentication operation (
In some implementations, the
Meanwhile, the authentication request may be transmitted to the
Further, the
According to an embodiment, the
Of course, in some implementations, the
Although the
According to one embodiment, the authentication of the user according to the technical idea of the present invention may be performed for settlement. In this case, the
In some cases, the user may notify identification information of his or her
In addition, the authentication request and the payment request need not necessarily be performed separately. That is, the authentication request according to the embodiment of the present invention may be performed simultaneously with a predetermined service request (for example, payment, etc.). In this case, identification information of the
According to another embodiment, the authentication request may be output by the
When the authentication request is received and an acknowledgment signal is received from the
In addition, the authentication procedure may further include authenticating user authentication information (e.g., PIN) of the
The terminal identification information is information for identifying the hardware of the digital system 100 (e.g., USIM, identification information of a USIM, IMSI, IMEI, MAC Address, etc.). When the terminal identification information is included in the confirmation signal, the
Meanwhile, the device one-time information generated by the
The
For example, in the case of a payment service, the
Hereinafter, the process of authenticating the user according to the technical idea of the present invention will be described in more detail. Hereinafter, for convenience of explanation, the
2 shows a schematic configuration of a digital system according to an embodiment of the present invention.
Referring to FIG. 2, the
Herein, a module may mean a functional and structural combination of hardware for carrying out the technical idea of the present invention and software for driving the hardware. For example, each of the above configurations may refer to a logical unit of a predetermined code and a hardware resource for executing the predetermined code, and may be a code physically connected to one another or a specific type of hardware May be easily deduced to the average expert in the field of the present invention. Thus, each of the above configurations refers to a combination of hardware and software that performs the functions defined herein, and does not mean a specific physical configuration.
The
The user
The
The
The
Also, the terminal identification information (or terminal one-time information) of the
Of course, depending on the embodiment, the terminal identification information (or terminal one-time information) may be transmitted to the
The terminal authentication
The terminal authentication information acquired by the terminal authentication
The device identification information may be irrelevant to the settlement financial information. For example, when the
Then, the
Or may include an authentication request in the acknowledgment signal. Alternatively, the confirmation signal may include an authentication signal indicating an authentication result using the user authentication information. It should be understood that the acknowledgment signal is not limited to one information or a continuously transmitted signal, and the acknowledgment signal may be transmitted to the
The
Meanwhile, the
The authentication action request information may be displayed on a display device (not shown) included in the
The
Meanwhile, the
Also, the
If the user authentication using the user authentication information is not performed, the digital system may not transmit the confirmation signal to the
According to an embodiment, the user authentication using the user authentication information may be performed by the
3 shows a schematic configuration of an authentication system according to an embodiment of the present invention.
3, an
The configuration of the
Also, the
The
The control unit 331 can control functions and / or resources of other components included in the authentication system 200 (e.g., the
The
The
In addition, the device one-time information and / or the terminal one-time information may be information generated by using identification information of the corresponding device (or one-time information generated by the corresponding device). That is, the device one-time information may be information generated using up to the terminal identification information (or terminal one-time information). Also, the terminal's one-time information may be information generated by using up to the device identification information (or device one-time information).
In this case, the
Needless to say, the
If the
The device identification information of the
The
Then, the
For this, the
Meanwhile, when the authentication information corresponding to the authentication information includes the terminal identification information (or device identification information), the
The
When the user authentication information (for example, the PIN information of the payment card, etc.) of the
4 to 9 show data flow of the authentication method using the user apparatus according to the embodiment of the present invention. 4 to 6 illustrate an embodiment in which only the terminal identification information is transmitted from the
FIG. 4 shows a schematic data flow of a user authentication method using a user apparatus according to an embodiment of the present invention.
4 illustrates an example in which an authentication request is made via the
After confirming the authentication action request information displayed on the
Then, the
The authentication information may be generated based on the device identification information and the terminal identification information. Alternatively, the authentication information may be generated based on device one-time information (in which device one-time information is information generated without using the terminal identification information) and the terminal identification information.
Or the authentication information may be generated on the basis of the device one-time information generated based on the device identification information and the terminal identification information. Of course, at this time, the authentication information may be generated based on the device identification information or the terminal identification information as well as the device one-time information.
Of course, the
The
As a result, the
Then, the
If the authentication verification procedure is successful, the
FIG. 5 shows a schematic data flow of an authentication method using a user apparatus according to another embodiment of the present invention.
5, an example of an authentication request is performed by a predetermined
Or the authentication request includes information capable of specifying the digital system 100 (e.g., identification information of a user, etc.), and based on the information, the
The
According to an embodiment, the
According to another embodiment, the
Then, the
Or the authentication information may be generated based on the device one-time information generated based on the device identification information and the terminal identification information. Of course, at this time, the authentication information may be generated based on the device identification information or the terminal identification information as well as the device one-time information.
Also, the
The
Then, the
Meanwhile, the authentication request according to the embodiment of the present invention may be performed by a person other than the user of the
For example, when a non-user (authentication requestor) such as an authentication requestor who is an acquaintance of a user must log in to the user's web account, receives a certificate on behalf of a user, or requires payment by a third party, There may be a case where a service is to be provided from the
However, according to the technical idea of the present invention, the authentication request and the authentication operation can be performed in a spatially separated state, and the authentication request can be performed by the user without performing the authentication operation. It is not necessary to inform the user of the information.
Also, in the case of a payment service, when the authentication requester faces the identification information of the user or remotely notifies the affiliation shop side, the affiliate shop sends an authentication request (that is, a payment request ) To the authentication system (200). Of course, at this time, information on the authentication requester (for example, a name of a payment requester, a telephone number, etc.) may be further included, and information on the payment requester may be included in the authentication action request information.
In this case, the
4 and 5, since only identification information of the
According to another embodiment, as shown in FIG. 6, when an authentication requestor, not a user, inputs identification information of the
The authentication action request information may include information on the merchant, payment details, and / or information on the payment requester. If the user confirms the authentication action request information and wishes to settle the settlement request corresponding to the authentication action request information, the user can perform the authentication operation as described above. The
The
As a result, according to the technical idea of the present invention, it is possible to provide a solution with high security, which is very easy to perform authentication on behalf of a third party authentication requestor.
FIG. 6 shows a schematic data flow of an authentication method using a user apparatus according to another embodiment of the present invention.
6, when the user notifies or inputs the identification information of his / her
For example, when the user notifies the identification information of his / her
According to an embodiment, the
For example, when the technical idea of the present invention is applied to a payment service, when a settlement amount is input to a data processing apparatus (for example, an affiliate terminal 400), the user inputs the
When the authentication action request information (payment related information) is transmitted from the
Then, the
7 to 9 show a case where the
First, referring to FIG. 7, the embodiment shown in FIG. 7 can be performed in a manner similar to that shown in FIG. For example, the
After confirming the authentication action request information, the user can communicate with the
In any case, the terminal's one-time information can be transmitted to the
Then, the
The authentication information may be generated based on the device identification information and the terminal one-time information. Alternatively, the authentication information may be generated based on device one-time information (in which device one-time information is information generated without using the terminal one-time information) and the terminal one-time information.
Or the authentication information may be generated based on the device one-time information generated based on the device identification information and the terminal one-time information. Of course, at this time, the authentication information may be generated based on not only the device one-time information but also the device identification information or the terminal one-time information. For example, in addition to the device one-time information, the device identification information or the terminal one-time information may be included in the authentication information.
Then, the
The
In this case, if the authentication information is authenticated by the
The
Then, the
Of course, if the
The embodiment shown in FIG. 8 may be the case where authentication is performed in a manner similar to that shown in FIG.
The
Then, the user can perform the authentication operation in response thereto (S520).
The
The terminal one-time information is generated by the
The authentication information may be as described in FIG. That is, the authentication information may be generated based on the device identification information and the terminal one-time information. Alternatively, the authentication information may be generated based on device one-time information (in which device one-time information is information generated without using the terminal one-time information) and the terminal one-time information.
Or the authentication information may be generated based on the device one-time information generated based on the device identification information and the terminal one-time information. Of course, at this time, the authentication information may be generated based on not only the device one-time information but also the device identification information or the terminal one-time information. For example, in addition to the device one-time information, the device identification information or the terminal one-time information may be included in the authentication information.
Then, the
In addition, the
Then, the
In response, the
The embodiment shown in FIG. 9 may be the case where authentication is performed in a manner similar to that shown in FIG.
9, when the user notifies or inputs the identification information of the
When the authentication action request information is received, the
Also, the
Then, the
FIG. 10 is a diagram illustrating a process of an authentication system performing an authentication procedure according to an embodiment of the present invention. Referring to FIG.
Referring to FIG. 10, the
Further, in addition to the authentication information, additional information (for example, device identification information or terminal one-time information (or terminal identification information)) may be further included in the confirmation signal by the
In addition, the
If it is determined that the authentication is successful (S760), it is determined that the authentication is unsuccessful (S750).
Also, FIG. 10 shows the case where the authentication of the device identification information, the authentication of the terminal identification information, and the authentication of the pair are sequentially performed, but the order of these authentication can be changed in any way.
11 is a diagram for explaining a process in which a digital system transmits an acknowledgment signal according to an embodiment of the present invention.
11, a user may input user authentication information (e.g., a PIN of a payment card) of the
The
According to an embodiment, the
In order for the
In any case, if the
11 shows an example in which the user authentication is performed before the pair authentication, but it goes without saying that the pair authentication may be performed first.
Also, in FIG. 11, the user authentication information (e.g., PIN) of the
According to an embodiment, the
12 is a diagram showing a schematic configuration of a user apparatus according to an embodiment of the present invention.
Referring to FIG. 12, the
The
The computing means 310 may be an IC chip included in the IC card. The
According to another embodiment, the
The communication means 320 can perform communication with the
When the communication is performed, the computing means 310 can generate authentication information. The computing means 310 can generate the authentication information based on the identification information of itself, that is, the device identification information and / or the device one-time information and the terminal identification information and / or the terminal one-time information. According to an embodiment, the device one-time information may be generated based on the terminal identification information or the terminal one-time information.
The authentication information generated by the computing means 310 may be transmitted to the
The authentication method using the user apparatus according to the embodiment of the present invention can be implemented as a computer-readable code on a computer-readable recording medium. A computer-readable recording medium includes all kinds of recording apparatuses in which data that can be read by a computer system is stored. Examples of the computer-readable recording medium include a ROM, a RAM, a CD-ROM, a magnetic tape, a hard disk, a floppy disk, an optical data storage device, and the like in the form of a carrier wave (for example, . In addition, the computer-readable recording medium may be distributed over network-connected computer systems so that computer readable codes can be stored and executed in a distributed manner. And functional programs, codes, and code segments for implementing the present invention can be easily inferred by programmers skilled in the art to which the present invention pertains.
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed embodiments, but, on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims. Accordingly, the true scope of the present invention should be determined by the technical idea of the appended claims.
Claims (31)
Receiving the authentication information generated by the digital device by the digital device via the communication and transmitting an acknowledgment signal including the authentication information to the authentication system; And
And performing an authentication check procedure in which the transmitted confirmation signal is authenticated,
If the authentication confirmation process is successful, the authentication request output from the predetermined data processing device or the digital system to the authentication system or the service system connected with the authentication system is successfully processed,
The authentication information includes:
Terminal authentication information including terminal identification information of the digital system transmitted to the user apparatus through the digital system or terminal one-time information generated by the digital system, device identification information of the user apparatus, Is generated by the user device based on the device authentication information including the device one-time information of the device.
The terminal identification information, and the device identification information,
Wherein the authentication information is generated by the user device based on the terminal's one-time information and the device identification information.
Based on the first device one-time information and the terminal authentication information generated by the user device based on the device identification information,
Wherein the authentication information is generated based on second device one-time information generated by the user device based on the terminal authentication information and the device identification information.
Further comprising the step of displaying the authentication action request information output by the authentication system which has received the authentication request including the identification information of the digital system output from the data processing apparatus, on the data processing apparatus or the digital system,
And when the authentication action request information is displayed, the digital system uses the user device performing the communication with the user device.
Further comprising receiving, by the digital system, authentication action request information output from the data processing apparatus that has received the identification information of the digital system,
Wherein the digital system performs the communication with the user device when the authentication action request information is received.
When the authentication information is generated by the user apparatus based on the terminal one-time information and the device identification information, the terminal one-time information and the device identification information are obtained from the authentication information by the authentication system, Wherein the authentication information is authenticated through server one-time information generated by the authentication system so that the information corresponds to the terminal one-time information, and the authentication confirmation procedure is successful if the device identification information is authenticated.
When the authentication information is generated based on the second device one-time information generated by the user apparatus based on the terminal authentication information and the device identification information, the authentication system generates the second device one- And the authentication confirmation procedure is successful if the second device one-time information is authenticated through the second server one-time information generated by the authentication system based on the terminal authentication information and the device identification information. Authentication method using a user device.
The digital system further including the terminal authentication information in the confirmation signal and transmitting the terminal authentication information to the authentication system,
By the authentication system,
Wherein the authentication procedure is successful if the terminal authentication information is authenticated.
Further comprising the step of the digital system determining whether the user equipment is a preset pair to correspond to the digital system,
And if it is determined that the user device is a predetermined pair, transmits the confirmation signal to the authentication system.
The digital system or the authentication system requesting a user of the digital system for user authentication information corresponding to the user equipment; And
Further comprising the step of transmitting the input user authentication information in response to the request to the digital system or the data processing apparatus to the authentication system,
Wherein the authentication procedure is successful if the user authentication information is further authenticated by the authentication system.
Performing an authentication verification procedure for the authentication system to authenticate the received confirmation signal; And
The authentication system successively processes the authentication request output from the predetermined data processing apparatus or the digital system to the authentication system or the service system connected to the authentication system,
The authentication information includes:
Terminal authentication information including terminal identification information of the digital system transmitted to the user apparatus through the digital system or terminal one-time information generated by the digital system, device identification information of the user apparatus, Wherein the device authentication information is generated by the user device based on the device authentication information including the device one-time information.
The terminal identification information, and the device identification information,
Wherein the authentication information is generated by the user device based on the terminal's one-time information and the device identification information.
Based on the first device one-time information and the terminal authentication information generated by the user device based on the device identification information,
Wherein the authentication information is generated based on second device one-time information generated by the user device based on the terminal authentication information and the device identification information.
The authentication system receiving the authentication request including identification information of the digital system from the data processing apparatus; And
Wherein the authentication system further comprises transmitting authentication action request information to the digital system or the data processing device in response to the reception,
Wherein the authentication system performs the authentication procedure after transmitting the authentication action request information and receiving the confirmation signal from the digital system.
When the authentication information is generated by the user device based on the terminal identification information and the device identification information, the authentication system obtains the terminal identification information and the device identification information from the authentication information, Successively processing the authentication confirmation process before the identification information and the device identification information are authenticated; or
When the authentication information is generated by the user device based on the terminal one-time information and the device identification information, the authentication system obtains the terminal one-time information and the device identification information from the authentication information, Is authenticated through the server one-time information generated by the authentication system so that the terminal identification information is associated with the terminal's one-time information, and the authentication confirmation process is not performed until the device identification information is authenticated Using authentication method.
When the authentication information is generated based on the first device one-time information and the terminal authentication information generated by the user apparatus based on the device identification information, the authentication system obtains, from the authentication information, the first device one- Wherein the terminal authentication information is authenticated through first server one-time information generated by the authentication system such that the first device one-time information corresponds to the first device one-time information, Processing the confirmation procedure successfully; or
When the authentication information is generated based on the second device one-time information generated by the user apparatus based on the terminal authentication information and the device identification information, the authentication system obtains the second device one- And successively processing the authentication confirmation procedure so that the second device one-time information is authenticated through the second server one-time information generated by the authentication system based on the terminal authentication information and the device identification information The authentication method using the user device.
Wherein the step of performing an authentication procedure for authenticating the authentication information based on the confirmation signal received by the authentication system comprises:
Authenticating the terminal authentication information included in the confirmation signal; And
And successively processing the authentication confirmation procedure if the terminal authentication information is further authenticated.
Further comprising the step of authenticating whether or not the pair is determined by determining whether the digital system to which the authentication signal transmitted the authentication signal and the user apparatus are previously set to correspond to each other,
And determining that the authentication confirmation procedure has succeeded if the pair status is authenticated.
The user device generating authentication information;
Transmitting the authentication information generated by the user device to the digital system;
Transmitting an acknowledgment signal including the transmitted authentication information to the authentication system by the digital system; And
Wherein the authentication confirmation procedure is performed in which the transmitted confirmation signal is authenticated by the authentication system,
If the authentication confirmation process is successful, the authentication request output from the predetermined data processing device or the digital system to the authentication system or the service system connected with the authentication system is successfully processed,
The authentication information includes:
Terminal authentication information including terminal identification information of the digital system transmitted to the user apparatus through the digital system or terminal one-time information generated by the digital system, device identification information of the user apparatus, Wherein the device authentication information is generated by the user device based on the device authentication information including the device one-time information.
Further comprising the step of the user device determining whether the digital system is a preset pair corresponding to the user device,
Wherein the digital system generates the authentication information or transmits the generated authentication information to the digital system when the digital system is a preset pair.
The user device generating the authentication information based on the terminal identification information and the device identification information; or
And the user device generates the authentication information based on the terminal one-time information and the device identification information.
Generating the authentication information based on the first device one-time information and the terminal authentication information generated by the user device based on the device identification information; or
And generating the authentication information based on the second device one-time information generated by the user device based on the terminal authentication information and the device identification information.
A user device communication module for communicating with a user device for authenticating the authentication request;
And a control module for transmitting an acknowledgment signal to the authentication system when communication with the user device is performed through the user equipment communication module, wherein the acknowledgment signal includes authentication information generated by the user device,
By the authentication system,
Wherein the authentication request output from the predetermined data processing apparatus or the digital system to the authentication system or the service system connected with the authentication system is successfully processed when the authentication confirmation procedure in which the confirmation signal is authenticated is successful,
The authentication information includes:
Terminal authentication information including terminal identification information of the digital system transmitted to the user apparatus through the digital system or terminal one-time information generated by the digital system, device identification information of the user apparatus, The device authentication information being generated by the user device based on the device authentication information including the device one-time information.
The terminal identification information, and the device identification information,
Generated by the user device based on the terminal one-time information and the device identification information,
Based on the first device one-time information and the terminal authentication information generated by the user device based on the device identification information,
Based on the terminal authentication information and the device identification information, the second device one-time information generated by the user device.
And a terminal one-time information generating module for generating the terminal one-time information.
An authentication unit for performing an authentication procedure for authenticating the received confirmation signal; And
And a control unit for successively processing the authentication request output from the predetermined data processing apparatus or the digital system to the authentication system or the service system connected to the authentication system if the authentication confirmation procedure for authenticating the confirmation signal is successful,
The authentication information includes:
Terminal authentication information including terminal identification information of the digital system transmitted to the user apparatus through the digital system or terminal one-time information generated by the digital system, device identification information of the user apparatus, Wherein the authentication information is generated by the user device based on the device authentication information including the device one-time information.
The terminal identification information, and the device identification information,
Generated by the user device based on the terminal one-time information and the device identification information,
Based on the first device one-time information and the terminal authentication information generated by the user device based on the device identification information,
Wherein the authentication information is generated based on second device one-time information generated by the user device based on the terminal authentication information and the device identification information.
And calculation means for generating authentication information when the communication is performed through the communication means,
Wherein the authentication information generated by the computing means is transmitted to the digital system, and when an acknowledgment signal including the transmitted authentication information is transmitted to the authentication system by the digital system, the transmitted acknowledgment signal is transmitted by the authentication system An authenticating authentication procedure is performed,
If the authentication confirmation process is successful, the authentication request output from the predetermined data processing device or the digital system to the authentication system or the service system connected with the authentication system is successfully processed,
The authentication information includes:
Terminal authentication information including terminal identification information of the digital system transmitted to the user apparatus through the digital system or terminal one-time information generated by the digital system, device identification information of the user apparatus, The one or more device information being generated by the user device based on device authentication information including device one-time information.
Generates the authentication information based on the terminal identification information and the device identification information,
Generating the authentication information based on the terminal one-time information and the device identification information,
Generates the authentication information based on the first device one-time information generated based on the device identification information and the terminal authentication information, or
And generates the authentication information based on the second device one-time information generated based on the terminal authentication information and the device identification information.
Wherein the digital system determines whether the digital system is a preset pair corresponding to the user apparatus, and if the digital system is a predetermined pair, it generates the authentication information or transmits the generated authentication information to the digital system User device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020140010339A KR20150089569A (en) | 2014-01-28 | 2014-01-28 | Method for authentication using user apparatus, digital system, user apparatus, and authentication system thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020140010339A KR20150089569A (en) | 2014-01-28 | 2014-01-28 | Method for authentication using user apparatus, digital system, user apparatus, and authentication system thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20150089569A true KR20150089569A (en) | 2015-08-05 |
Family
ID=53885987
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020140010339A KR20150089569A (en) | 2014-01-28 | 2014-01-28 | Method for authentication using user apparatus, digital system, user apparatus, and authentication system thereof |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20150089569A (en) |
-
2014
- 2014-01-28 KR KR1020140010339A patent/KR20150089569A/en not_active Application Discontinuation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10917405B2 (en) | Methods and systems for providing FIDO authentication services | |
KR101542111B1 (en) | Method for payment using card, digital system, and settlment side system thereof | |
US20230062507A1 (en) | User authentication at access control server using mobile device | |
KR101467242B1 (en) | Digital system for pair user authentication, authentication system, and providing method thereof | |
KR20140020337A (en) | Method for authentication using user apparatus, digital system, and authentication system thereof | |
KR101574169B1 (en) | Method for authentication using user apparatus, digital system, and authentication system thereof | |
KR20150077379A (en) | Method for authentication using user apparatus, digital system, and authentication system thereof | |
KR20160084789A (en) | Method for authentication, digital system, and authentication system thereof | |
KR101835718B1 (en) | Mobile authentication method using near field communication technology | |
KR101491515B1 (en) | Method for authentication using user apparatus, digital system, and authentication system thereof | |
KR20140117078A (en) | Mobile payment system, mobile terminal, and mobile payment method | |
KR101603683B1 (en) | Method for authentication using user apparatus, digital system, user apparatus, and authentication system thereof | |
KR101621265B1 (en) | Method for authentication using user apparatus, digital system, and authentication system thereof | |
KR101875257B1 (en) | Mobile authentication and/or moile payment method using near wireless communication with host computer | |
KR20160084786A (en) | Method for authentication using user apparatus, digital system, and authentication system thereof | |
KR20150089569A (en) | Method for authentication using user apparatus, digital system, user apparatus, and authentication system thereof | |
KR20140033189A (en) | Method for authentication using user apparatus, digital system, user apparatus, and authentication system thereof | |
US11960581B2 (en) | Mobile device secret protection system and method | |
KR20150088571A (en) | Method for authentication using user apparatus, digital system, user apparatus, and authentication system thereof | |
KR20150075620A (en) | Method for authentication using user apparatus, digital system, and authentication system thereof | |
KR20160111190A (en) | Method for authentication using user apparatus, digital system, and authentication system thereof | |
KR20150083562A (en) | Method for authentication using user apparatus, digital system, and authentication system thereof | |
KR20150075569A (en) | Method for payment using card, digital system, and settlment side system thereof | |
KR20150075568A (en) | Method for payment using card, digital system, and settlment side system thereof | |
KR20150072956A (en) | Method for payment using card, digital system, and settlment side system thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WITN | Withdrawal due to no request for examination |