KR20170049317A - Apparatus and method for authenticating using speech recognition - Google Patents

Apparatus and method for authenticating using speech recognition Download PDF

Info

Publication number
KR20170049317A
KR20170049317A KR1020150150572A KR20150150572A KR20170049317A KR 20170049317 A KR20170049317 A KR 20170049317A KR 1020150150572 A KR1020150150572 A KR 1020150150572A KR 20150150572 A KR20150150572 A KR 20150150572A KR 20170049317 A KR20170049317 A KR 20170049317A
Authority
KR
South Korea
Prior art keywords
information
authentication
word information
user
disposable
Prior art date
Application number
KR1020150150572A
Other languages
Korean (ko)
Other versions
KR101741917B1 (en
Inventor
정원만
김태우
박무성
김윤정
유원석
주은종
허솔
최종인
황성현
백영선
Original Assignee
브이피 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 브이피 주식회사 filed Critical 브이피 주식회사
Priority to KR1020150150572A priority Critical patent/KR101741917B1/en
Publication of KR20170049317A publication Critical patent/KR20170049317A/en
Application granted granted Critical
Publication of KR101741917B1 publication Critical patent/KR101741917B1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • G06F17/30985
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computational Linguistics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Telephonic Communication Services (AREA)

Abstract

An authentication technique utilizing voice recognition with enhanced security is disclosed. To this end, an authentication method using speech recognition according to an embodiment of the present invention includes: requesting authentication of a voice additional authentication from an authentication server of a user terminal; Receiving customer registered word information previously registered by the user from the authentication server and disposable word information randomly extracted from the word DB; Presenting the customer registered word information and the disposable word information to the user; Receiving voice information from a user; Comparing and verifying voice information, customer registered word information, and disposable word information; And transmitting the comparison result of the voice information, the customer registration word information and the disposable word information to the authentication server.

Description

[0001] APPARATUS AND METHOD FOR AUTHENTICATING USING SPEECH RECOGNITION [0002]

The present invention relates to an authentication apparatus and method using voice recognition. More particularly, the present invention relates to an authentication apparatus and method using voice recognition having enhanced security.

Today, with the development of the Internet, various kinds of online services are being provided. Most online service systems authenticate whether a client computer device accessing the system via the Internet is entitled to use the online service.

The most commonly used user authentication method is an authentication method using a user identifier (ID) and a password. When a user subscribes to an online service system, a user identifier and a password are registered, and the user then accesses the corresponding system When the user ID and password are registered, the user is authenticated.

However, the authentication method using the user identifier and the password has a problem that the authentication information (the user identifier and the password) is easily stolen or hacked, and malicious access attempts can not be blocked if the authentication information is exposed.

In the online service system, a variety of personal information is managed. In recent years, real money transactions have been carried out online through internet banking services and online stock trading services. Intangible assets (for example, items in online games, Cyber money, etc.), there is a need for stronger authentication methods for users using the online service system.

According to the request, a one-time authentication key based authentication method using a user's mobile communication terminal is used. This one-time authentication key-based authentication method generally follows the following procedure. First, the online service system confirms the user identifier and the password, and requests the authentication server to authenticate the user. The authentication server sends a text message (SMS) including the disposable authentication key to the mobile communication terminal of the pre-registered user. The online service system receives the disposable authentication key through the user's computer device and delivers it to the authentication server. Then, the authentication server verifies whether the one-time authentication key sent to the user's mobile communication terminal is the same as the one-time authentication key inputted through the online service system.

Although the one-time authentication key based authentication method can enhance the security strength of the authentication of the user to some extent, there is still a problem that various vulnerabilities due to various hacks exist. Also, there is a problem that resources of the online service system are unjustly occupied by multiple logins by sharing one user identifier and a password with a plurality of acquaintances.

Korean Patent Laid-Open Publication No. 1997-7001374 discloses a 'transaction system using an authentication system and an authentication system', and Korean Patent Publication No. 2002-0089416 discloses an authentication method, an authentication system, an authentication device, and an authentication module Lt; / RTI >

It is an object of the present invention to provide an authentication service with enhanced security utilizing speech recognition.

It is another object of the present invention to provide a voice recognition authentication step in a simple authentication system using an electronic signature password, thereby realizing an authentication service that enhances user convenience and enhances security.

In addition, It is an object of the present invention to perform authentication based on personal identification information such as a card certificate serial number to prevent the theft by another user or device.

According to another aspect of the present invention, there is provided an authentication method using speech recognition, the method comprising: requesting authentication of a voice additional authentication from an authentication server of a user terminal; Receiving customer registered word information previously registered by the user from the authentication server and disposable word information randomly extracted from the word DB; Presenting the customer registered word information and the disposable word information to the user; Receiving voice information from the user; Comparing the voice information with the customer registration word information and the disposable word information to verify; And transmitting the comparison result of the voice information, the customer registration word information and the disposable word information to the authentication server.

Receiving a pre-registered digital signature password from the user before requesting verification of the voice additional authentication; And performing an authentication procedure based on the electronic signature password to the authentication server.

At this time, in the presenting step, the order of presenting the customer registered word information and the disposable word information can be randomly presented.

At this time, in the presenting step, the customer registered word information can be presented with an inscription.

In this case, before the step of requesting verification of the voice additional authentication, the step of connecting to the authentication server by connecting the personal identification information of the user to the customer registered word information may be further included.

At this time, the personal identification information may include at least one of a phone number of the user terminal and card certificate serial number information.

In this case, after the step of requesting verification of the voice additional authentication, the authentication server verifies the individual identification information, extracts the disposable word information from the word DB only when verification is performed, And transmitting the registered word information together with the registered word information.

At this time, when the user terminal is a PC, the step of receiving the customer registered word information and the disposable word information, the step of presenting, the step of receiving the voice information, the step of verifying, The transmitting step may be performed in the mobile terminal of the pre-registered user.

At this time, the customer registered word information and the disposable word information may each be at least two syllable words.

According to another aspect of the present invention, there is provided an authentication apparatus using voice recognition, the apparatus including: a voice authentication request unit for requesting a user terminal to verify voice additional authentication with an authentication server; A word information receiving unit for receiving customer registration word information previously registered by the user from the authentication server and disposable word information randomly extracted from the word DB; A display unit for presenting the customer registered word information and the disposable word information to the user; A voice information receiver for receiving voice information from the user; A comparison and verification unit comparing and verifying the voice information, the customer registration word information, and the disposable word information; And a transmitter for transmitting the comparison result of the voice information, the customer registration word information and the disposable word information to the authentication server.

In this case, the authentication server may further include an electronic signature authentication unit for receiving the electronic signature password pre-registered by the user and performing an authentication procedure based on the electronic signature password to the authentication server.

According to the present invention, it is possible to provide an authentication service with enhanced security using speech recognition.

In addition, the present invention adds a voice recognition authentication step to a simple authentication system using an electronic signature password, thereby realizing an authentication service that enhances user convenience and enhances security.

In addition, The authentication can be performed based on the personal identification information such as the card certificate serial number so that the theft by the other user or the device can be prevented in advance.

1 is a flowchart for explaining a pre-registration process in an authentication method using speech recognition according to an embodiment of the present invention.
2 is a flowchart illustrating an authentication process using speech recognition according to an embodiment of the present invention.
FIG. 3 and FIG. 4 show an embodiment of a screen for presenting user registered word information and disposable word information to a user in an authentication method using speech recognition according to an embodiment of the present invention.
5 is a block diagram illustrating a configuration of an authentication apparatus using speech recognition according to an embodiment of the present invention.

The present invention will now be described in detail with reference to the accompanying drawings. Hereinafter, a repeated description, a known function that may obscure the gist of the present invention, and a detailed description of the configuration will be omitted. Embodiments of the present invention are provided to more fully describe the present invention to those skilled in the art. Accordingly, the shapes and sizes of the elements in the drawings and the like can be exaggerated for clarity.

Hereinafter, an authentication method using speech recognition according to an embodiment of the present invention will be described.

1 is a flowchart for explaining a pre-registration process in an authentication method using speech recognition according to an embodiment of the present invention.

Referring to FIG. 1, in the authentication method using voice recognition according to an embodiment of the present invention, the pre-registration process receives a customer registration word to be used for authentication from the user at the user terminal 100 by voice and recognizes (S101) . At this time, the customer registration word may be a word of at least two syllables. The user terminal 100 can be used as an authentication device utilizing speech recognition.

Then, the customer registration word received in step S101 is hashed encrypted (step S102).

Thereafter, the hash value of the customer registration word and the individual identification information are transmitted from the user terminal 100 to the authentication server 200 (S103). At this time, the personal identification information may include at least one of the telephone number of the user terminal 100 and the credit card certificate serial number information.

The authentication server 200 completes the voice recognition registration procedure for the user based on the hash value of the received customer registration word and the personal identification information (S104).

2 is a flowchart illustrating an authentication process using speech recognition according to an embodiment of the present invention. FIG. 3 and FIG. 4 show an embodiment of a screen for presenting user registered word information and disposable word information to a user in an authentication method using speech recognition according to an embodiment of the present invention.

Referring to FIG. 2, in the authentication method using voice recognition according to an embodiment of the present invention, the authentication process is a process in which the user terminal 100, which receives the authentication request before using a predetermined service, performs authentication through the authentication server Lt; / RTI > At this time, the user terminal 100 may correspond to an authentication apparatus utilizing speech recognition. The authentication process according to FIG. 2 may be performed after the user terminal 100 receives the digital signature password pre-registered by the user and the authentication procedure based on the electronic signature password is normally performed in the authentication server 200.

First, the user terminal 100 requests the authentication server 200 to verify voice additional authentication (S201).

Upon receiving the request, the authentication server 200 extracts a disposable word to be used for authentication after generating a random number in the word DB (S202). In step S202, the authentication server 200 verifies the individual identification information of the user terminal 100 and extracts the disposable word information from the word DB 300 only when verification is performed. At this time, the disposable word information may be a word of at least two syllables.

Then, the authentication server 200 transmits the disposable word information and the customer registered word information to the user terminal 100 (S203). At this time, the customer registered word information is information previously registered by the user according to FIG. The authentication server 200 transmits the customer registration word information matched based on the individual identification information of the user terminal 100 to the user terminal 100. [

Then, the user terminal 100 can present the customer registered word information and the disposable word information to the user (S204). In step S204, the order of presentation of the customer registered word information and the disposable word information can be randomly presented. At this time, the customer registered word information can be presented by inscription processing. 3 and 4, an embodiment of a screen presented to the user is shown. In FIG. 3, the disposable word information (server word) and the customer registered word information (customer word) are listed in the order of the disposable word information (server word) Customer words), and disposable word information (server words). At this time, the disposable word information is presented as a tree, and the customer registered word information can be presented to the extent that it shows the number of characters without being visualized by inscription processing.

After step S204, the user terminal 100 receives voice information from the user (S205).

In step S206, the user's voice information received in step S205 is compared with the disposable word information and the customer registration word information received in step S203. Then, the result of the comparison and verification in step S206 is transmitted to the authentication server 200 (S207).

In the case where the user terminal 100 is a PC, if verification of the voice additional authentication is requested to the authentication server 200 through the user terminal 100, steps S203, S204, S205, S206, May be performed in the mobile terminal of the registered user.

Further, by using the voice recognition function of the authentication method using the above-described voice recognition, menu movement in a program or an app can be easily called and executed by voice command.

The authentication method using the speech recognition according to the present invention may be implemented in the form of a program command that can be executed through various computer means and recorded in a computer readable medium. The computer-readable medium may include program instructions, data files, data structures, and the like, alone or in combination. The program instructions recorded on the medium may be those specially designed and configured for the present invention or may be available to those skilled in the art of computer software. Examples of computer-readable media include magnetic media such as hard disks, floppy disks and magnetic tape; optical media such as CD-ROMs and DVDs; magnetic media such as floppy disks; Includes all types of hardware devices that are specially configured to store and execute magneto-optical media and program instructions such as ROM, RAM, flash memory, and the like. Examples of program instructions may include machine language code such as those generated by a compiler, as well as high-level language code that may be executed by a computer using an interpreter or the like. Such a hardware device may be configured to operate as one or more software modules to perform the operations of the present invention, and vice versa.

The teachings of the principles of the present invention may be implemented as a combination of hardware and software. In addition, the software can be implemented as an application program that is actually implemented on the program storage unit. The application program can be uploaded to and executed by a machine that includes any suitable architecture. Advantageously, the machine may be implemented on a computer platform having hardware such as one or more central processing units (CPUs), a computer processor, a random access memory (RAM), and input / output (I / . In addition, the computer platform may include an operating system and microinstruction code. The various processes and functions described herein may be part of microcommand codes or a portion of an application program, or any combination thereof, and they may be executed by various processing devices including a CPU. In addition, various other peripheral devices such as additional data storage and printers may be connected to the computer platform.

It is to be understood that the actual connections between system components or process functional blocks may vary depending on how the principles of the present invention are programmed, as some of the constituent system components and methods illustrated in the accompanying drawings are preferably implemented in software It should be further understood. Given the teachings herein, those skilled in the relevant art (s) will be able to contemplate these and similar implementations or configurations of the principles of the invention.

5 is a block diagram illustrating a configuration of an authentication apparatus using speech recognition according to an embodiment of the present invention.

5, an authentication apparatus 100 using speech recognition according to an exemplary embodiment of the present invention includes an electronic signature authentication unit 110, a registration unit 120, a voice authentication request unit 130, a word information receiving unit 140, a display unit 150, an audio information receiving unit 160, a comparison verification unit 170, and a transmission unit 180. The authentication apparatus 100 using the voice recognition may be the user terminal 100 described with reference to FIGS. 1 and 2. Detailed operation will be described with reference to FIGS. 1 and 2. FIG.

The digital signature authentication unit 110 receives the digital signature password pre-registered by the user, and performs an authentication procedure based on the digital signature password to the authentication server. The voice additional authentication procedure can be performed only when the authentication procedure using the digital signature password is completed.

The registration unit 120 receives the predetermined customer registration word from the user and transmits the related information to the authentication server so as to be registered in the authentication server.

The voice authentication request unit 130 requests the authentication server to verify the voice additional authentication.

The word information receiving unit 140 receives the customer registration word information previously registered by the user from the authentication server and the disposable word information randomly extracted from the word DB.

The display unit 150 displays or displays the customer registration word information and the disposable word information to the user.

The audio information receiving unit 160 receives audio information from the user. Then, the comparison verification unit 170 compares and verifies the voice information, the customer registered word information, and the disposable word information.

The transmitting unit 180 transmits the comparison result of the voice information, the customer registration word information and the disposable word information to the authentication server.

As described above, the authentication apparatus and method using voice recognition according to the embodiment of the present invention are not limited to the configuration and method of the embodiments described above, but various modifications may be made to the embodiments All or some of the embodiments may be selectively combined.

100; User terminal
110; The electronic signature authentication unit
120; register
130; The voice authentication request unit
140; The word information receiver
150; Display portion
160; Audio information receiver
170; The comparison verification unit
180; Transmitter
200; Authentication server
300; Word DB

Claims (10)

Requesting the user terminal to verify the voice additional authentication with the authentication server;
Receiving customer registered word information previously registered by the user from the authentication server and disposable word information randomly extracted from the word DB;
Presenting the customer registered word information and the disposable word information to the user;
Receiving voice information from the user;
Comparing the voice information with the customer registration word information and the disposable word information to verify; And
And transmitting the comparison result of the voice information, the customer registration word information and the disposable word information to the authentication server.
The method according to claim 1,
Receiving a pre-registered electronic signature password from the user before requesting verification of the voice additional authentication; And
Further comprising the step of performing an authentication procedure based on the electronic signature password to the authentication server.
The method according to claim 1,
In the presenting step,
And the presentation order of the customer registered word information and the disposable word information is randomly presented.
The method according to claim 1,
In the presenting step,
Wherein the customer registered word information is provided with an inscription and presented.
The method according to claim 1,
Before the step of requesting verification of the voice additional authentication,
And registering the user identification information of the user in the authentication server by connecting the user identification information to the customer registration word information.
The method of claim 5,
Wherein the personal identification information comprises:
Wherein the authentication information includes at least one of a phone number of the user terminal and card certificate serial number information.
The method of claim 5,
After the step of requesting verification of the voice additional authentication,
Wherein the authentication server further comprises verifying the individual identification information and extracting the disposable word information from the word DB only when verified, and transmitting the disposable word information together with the customer registered word information to the user terminal Authentication method using speech recognition.
A program stored in a medium for executing an authentication method utilizing speech recognition according to any one of claims 1 to 7. A voice authentication request unit for requesting a user terminal to verify the voice additional authentication with the authentication server;
A word information receiving unit for receiving customer registration word information previously registered by the user from the authentication server and disposable word information randomly extracted from the word DB;
A display unit for presenting the customer registered word information and the disposable word information to the user;
A voice information receiver for receiving voice information from the user;
A comparison and verification unit comparing and verifying the voice information, the customer registration word information, and the disposable word information; And
And a transmitting unit for transmitting the comparison result of the voice information, the customer registered word information, and the disposable word information to the authentication server.
The method of claim 9,
Further comprising an electronic signature authentication unit for receiving an electronic signature password pre-registered from the user and performing an authentication procedure based on the electronic signature password to the authentication server.
KR1020150150572A 2015-10-28 2015-10-28 Apparatus and method for authenticating using speech recognition KR101741917B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150150572A KR101741917B1 (en) 2015-10-28 2015-10-28 Apparatus and method for authenticating using speech recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150150572A KR101741917B1 (en) 2015-10-28 2015-10-28 Apparatus and method for authenticating using speech recognition

Publications (2)

Publication Number Publication Date
KR20170049317A true KR20170049317A (en) 2017-05-10
KR101741917B1 KR101741917B1 (en) 2017-06-01

Family

ID=58744094

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150150572A KR101741917B1 (en) 2015-10-28 2015-10-28 Apparatus and method for authenticating using speech recognition

Country Status (1)

Country Link
KR (1) KR101741917B1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20190012066A (en) * 2017-07-26 2019-02-08 네이버 주식회사 Method for certifying speaker and system for recognizing speech
WO2019078492A1 (en) * 2017-10-20 2019-04-25 주식회사 공훈 Voice authentication system
KR102277422B1 (en) 2020-07-24 2021-07-19 이종엽 Voice verification and restriction method of the voice system
US11465102B2 (en) 2019-03-18 2022-10-11 Korea University Research And Business Foundation Method of preparing heterogeneous zeolite membranes
US11545154B2 (en) 2019-10-29 2023-01-03 Samsung Electronics Co., Ltd. Method and apparatus with registration for speaker recognition
US11911188B2 (en) 2019-10-30 2024-02-27 Samsung Electronics Co., Ltd. Apparatus and method for monitoring health, and mobile device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20190012066A (en) * 2017-07-26 2019-02-08 네이버 주식회사 Method for certifying speaker and system for recognizing speech
WO2019078492A1 (en) * 2017-10-20 2019-04-25 주식회사 공훈 Voice authentication system
US11465102B2 (en) 2019-03-18 2022-10-11 Korea University Research And Business Foundation Method of preparing heterogeneous zeolite membranes
US11596905B2 (en) 2019-03-18 2023-03-07 Korea University Research And Business Foundation Method of preparing heterogeneous zeolite membranes
US11545154B2 (en) 2019-10-29 2023-01-03 Samsung Electronics Co., Ltd. Method and apparatus with registration for speaker recognition
US11911188B2 (en) 2019-10-30 2024-02-27 Samsung Electronics Co., Ltd. Apparatus and method for monitoring health, and mobile device
KR102277422B1 (en) 2020-07-24 2021-07-19 이종엽 Voice verification and restriction method of the voice system

Also Published As

Publication number Publication date
KR101741917B1 (en) 2017-06-01

Similar Documents

Publication Publication Date Title
US11405380B2 (en) Systems and methods for using imaging to authenticate online users
KR101741917B1 (en) Apparatus and method for authenticating using speech recognition
CN107196922B (en) Identity authentication method, user equipment and server
US10045210B2 (en) Method, server and system for authentication of a person
CN106899551B (en) Authentication method, authentication terminal and system
US9667626B2 (en) Network authentication method and device for implementing the same
US9124571B1 (en) Network authentication method for secure user identity verification
US20200196143A1 (en) Public key-based service authentication method and system
US20160127134A1 (en) User authentication system and method
CN104662864A (en) User-convenient authentication method and apparatus using a mobile authentication application
JP6538872B2 (en) Common identification data replacement system and method
KR20220167366A (en) Cross authentication method and system between online service server and client
TW201419888A (en) Method, system of server authentication, and a computer-readable medium
US8910260B2 (en) System and method for real time secure image based key generation using partial polygons assembled into a master composite image
CN105556531A (en) Method and system for authenticating user using out-of-band channel
EP2916509B1 (en) Network authentication method for secure user identity verification
KR102284876B1 (en) System and method for federated authentication based on biometrics
KR101625065B1 (en) User authentification method in mobile terminal
KR102016976B1 (en) Unified login method and system based on single sign on service
CN106533685B (en) Identity authentication method, device and system
KR102267628B1 (en) User authentication method using one time identifier and authentication system performing the same
KR20200018546A (en) Public key infrastructure based service authentication method and system
KR101754682B1 (en) System and method for user authentication using another person's mobile phone
KR101879842B1 (en) User authentication method and system using one time password
KR101788959B1 (en) Apparatus and method for authenticating mobile device

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E701 Decision to grant or registration of patent right
GRNT Written decision to grant