[go: up one dir, main page]

WO2006065002A1 - User authentication method in another network using digital signature made by mobile terminal - Google Patents

User authentication method in another network using digital signature made by mobile terminal Download PDF

Info

Publication number
WO2006065002A1
WO2006065002A1 PCT/KR2005/000490 KR2005000490W WO2006065002A1 WO 2006065002 A1 WO2006065002 A1 WO 2006065002A1 KR 2005000490 W KR2005000490 W KR 2005000490W WO 2006065002 A1 WO2006065002 A1 WO 2006065002A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
user
authentication
digital signature
random data
Prior art date
Application number
PCT/KR2005/000490
Other languages
French (fr)
Inventor
Taesung Kim
Seung Hun Jin
Yeong Sub Cho
Sang Rae Cho
Dae Seon Choi
Jong Hyouk Noh
Seung Hyun Kim
Original Assignee
Electronics And Telecommunications Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Electronics And Telecommunications Research Institute filed Critical Electronics And Telecommunications Research Institute
Publication of WO2006065002A1 publication Critical patent/WO2006065002A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • the present invention relates to a user authentication method in another network using a digital signature made by a mobile terminal, and more particularly to a user authentication method in another network using a digital signature made by a mobile terminal that enables an application server of a wire/wireless Internet to exploit the mobile terminal owned by a user when the application server authenticates the user.
  • the authentication is a procedure of judging whether a person or an object is surely the actual reported person or object.
  • the authentication in a public network including an individual network or Internet is mostly performed through the use of a password when a login is made.
  • a person who knows the password is once considered to be a believable user. All the users first register their desired passwords, and thereafter, they should remember and use the previously reported passwords whenever the authentication procedure is required.
  • the mobile terminal has a built-in key code, and a device authentication of the terminal may be performed in a mobile network.
  • a certificate may be built in a smart card such as a USIM (Universal Subscriber Identity Module) in order to perform an authentication usable in financial transaction and so on.
  • USIM Universal Subscriber Identity Module
  • the mobile terminal has become a universal device that a modern possesses for making a phone call all the time or almost every day.
  • the advantages of the mobile terminal having a built-in smart cart as an authentication device are that the mobile terminal uses a certificate that is an authentication method stronger than the existing password-based authentication and or it is not necessary to possess a separate device such as a smart card for the authentication.
  • an object of the present invention is to provide a user authentication method in another network using a digital signature made by a mobile terminal that enables an application server to perform a user authentication using the digital signature made by the mobile terminal of the user when the user connects to the application server through a PC, a notebook computer, a PDA, etc., for a safer and stronger authentication of the application server.
  • a user authentication method in another network using a digital signature made by a mobile terminal comprises the steps of a) a user device connecting to an application server by transmitting an ID to the application server, b) the application server generating and transmitting random data corresponding to the ID to the user device and transmitting the generated random data and the ID transmitted from the user device to an authentication server, c) the authentication server transmitting the random data to the corresponding mobile terminal, and d) the mobile terminal making the digital signature with respect to the random data using a private key of a certificate and transferring the digital signature to the application server.
  • the step c) may further comprise the step of the authentication server searching the mobile terminal of the user that corresponds to the ID.
  • the step d) comprises the steps of outputting the random data to the mobile terminal, the mobile terminal making the digital signature using the private key of the certificate, the mobile terminal transmitting the digital signature to the authentication server, the authentication server verifying the digital signature and transmitting a result of authentication to the application server, and the application server deciding whether to permit an access of the user device in accordance with the result of authentication.
  • the step d) compares the random data between the user device and the mobile terminal through by the steps of the user device and the mobile terminal hashing the random data using a hash function that is one-way function, dividing a hash value into a predetermined number of fragments and giving numbers to the respective fragments, and displaying the fragment of the hash value that corresponds to a certain input number among the given numbers on the user device and the mobile terminal.
  • the application server can authenticate the user stronger than the password type authentication method. Additionally, it is not required for the user to possess a separate authentication or to install the note of authentication in many user devices, and thus the convenience and the security can be increased.
  • FIG. 1 is a view illustrating the whole construction of a system and an authentication procedure according to an embodiment of the present invention.
  • FIG. 2 is a flowchart illustrating a procedure of comparing random data between a user device and a mobile terminal according to an embodiment of the present invention. Best Mode for Carrying Out the Invention
  • FIG. 1 is a view illustrating the whole construction of a system and an authentication procedure according to an embodiment of the present invention which enables a user who possesses a mobile terminal to connect to a wire Internet or a wireless Internet with an Internet-connectable device such as a computer, a notebook computer, a PDA, etc., through an authentication procedure performed by an authentication server of a mobile communication network.
  • an Internet-connectable device such as a computer, a notebook computer, a PDA, etc.
  • the system according to the present invention includes a mobile terminal 100, a user device 101, an authentication server 102 and an application server 103.
  • the mobile terminal 100 owned by a user has a digital authentication function.
  • the user device 101 is a kind of an Internet-connectable device such as a PC, a notebook computer, a PDA, etc., and a device that a user can access, use and carry.
  • the authentication server 102 can directly communicate with the user's mobile terminal 100, and stores a terminal number for the user's ID.
  • the application server 103 which is a server that needs to authenticate the user device, is communicable with servers of sites of Internet shopping malls, the electronic government, banks, companies, etc., and the authentication server of the mobile communication network.
  • the user accesses the application server 103 through the user device 101 (step Sl), and in this case, the application server 103 requests the user to input the user's ID (step S2). If the user inputs the ID (step S3), the application server 103 generates and transmits random data to the user device 101 (step S4), and simultaneously transmits the random data and the user's ID to the authentication server (step S5).
  • the authentication server 102 searches for the user's mobile terminal 100 corresponding to the ID and transmits the random data to the mobile terminal 100 (step S6).
  • the user confirms whether the random data from the user device 101 coincides with that from the mobile terminal 100, and if they coincide with each other, the user makes a digital signature with a private key of the certificate with respect to the random data.
  • the mobile terminal 100 transmits the digital signature to the authentication server
  • step S7 and the authentication server 102 verify the digital signature and then transmits the result of authentication to the application server 103 (step S8).
  • the application server permits the access of the user device according to the result of authentication.
  • FIG. 2 is a flowchart illustrating the procedure of comparing the random data between the user device and the mobile terminal according to an embodiment of the present invention. Specifically, FIG. 2 shows the logic for enabling the user to easily compare the random data between the user device 101 and the mobile terminal 100.
  • the user device 101 and the mobile terminal 100 hash the random data using a hash function that is a one-way function (step S20), divide the hash value into 10 units, i.e., segments, and give numbers 0 to 9 to the respective segments (step S21). If the user inputs a certain figure, the devices display the fragment of the hash value corresponding to the input number on a display screen (step S22). Accordingly, the user can easily compare the random data (step S23).
  • FIG. 1 can be implemented by a program and stored in a computer-readable recording medium (such as a CD ROM, RAM, ROM, floppy disc, hard disc, optomagnetic disc, etc.).
  • a computer-readable recording medium such as a CD ROM, RAM, ROM, floppy disc, hard disc, optomagnetic disc, etc.
  • the application server can authenticate the user stronger than the password type authentication method. Additionally, it is not required for the user to possess a separate authentication or to install the certificate in many user devices, and thus the convenience and the security can be increased.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Disclosed is a user authentication method in another network using a digital signature made by a mobile terminal that includes the steps of a user device connecting to an application server by transmitting an ID to the application server, the application server generating and transmitting random data corresponding to the ID to the user device and transmitting the generated random data and the ID transmitted from the user device to an authentication server, the authentication server transmitting the random data to the corresponding mobile terminal, and the mobile terminal making the digital signature with respect to the random data using a private key of a certificate and transferring the digital signature to the application server. The application server can authenticate the user stronger than the password type authentication method, and the user can use the digital signature for the authentication without installing a certificate in a user device such as a PC, a notebook computer, a PDA, etc., so that the convenience and the security can be increased.

Description

Description
USER AUTHENTICATION METHOD IN ANOTHER NETWORK USING DIGITAL SIGNATURE MADE BY MOBILE TERMINAL
Technical Field
[1] The present invention relates to a user authentication method in another network using a digital signature made by a mobile terminal, and more particularly to a user authentication method in another network using a digital signature made by a mobile terminal that enables an application server of a wire/wireless Internet to exploit the mobile terminal owned by a user when the application server authenticates the user. Background Art
[2] The authentication is a procedure of judging whether a person or an object is surely the actual reported person or object. The authentication in a public network including an individual network or Internet is mostly performed through the use of a password when a login is made. A person who knows the password is once considered to be a believable user. All the users first register their desired passwords, and thereafter, they should remember and use the previously reported passwords whenever the authentication procedure is required.
[3] The mobile terminal has a built-in key code, and a device authentication of the terminal may be performed in a mobile network. Recently, a certificate may be built in a smart card such as a USIM (Universal Subscriber Identity Module) in order to perform an authentication usable in financial transaction and so on.
[4] The mobile terminal has become a universal device that a modern possesses for making a phone call all the time or almost every day. The advantages of the mobile terminal having a built-in smart cart as an authentication device are that the mobile terminal uses a certificate that is an authentication method stronger than the existing password-based authentication and or it is not necessary to possess a separate device such as a smart card for the authentication.
[5] In an electronic transaction that requires a high-level stability such as Internet banking, the authentication is performed using a certificate stronger than the conventional password-based authentication.
[6] However, a public PC in a place such as a government office, a library, a PC game room, etc., is not safe enough to store a certificate and private key. Accordingly, before performing the Internet banking, the user should perform a procedure of installing a certificate in the public PC and then delete it after he/she uses it, and this causes the user inconvenience. Additionally, the certificate should separately be kept in a device that has an excellent security such as a smart card rather than be stored in a personal PC, a notebook computer, a PDA, etc., and this also causes inconvenience. Disclosure of Invention Technical Problem
[7] Therefore, the present invention has been made to solve the above-mentioned problems occurring in the prior art, and an object of the present invention is to provide a user authentication method in another network using a digital signature made by a mobile terminal that enables an application server to perform a user authentication using the digital signature made by the mobile terminal of the user when the user connects to the application server through a PC, a notebook computer, a PDA, etc., for a safer and stronger authentication of the application server.
[8] Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention. Technical Solution
[9] In order to accomplish the above-mentioned objects, a user authentication method in another network using a digital signature made by a mobile terminal according to the present invention comprises the steps of a) a user device connecting to an application server by transmitting an ID to the application server, b) the application server generating and transmitting random data corresponding to the ID to the user device and transmitting the generated random data and the ID transmitted from the user device to an authentication server, c) the authentication server transmitting the random data to the corresponding mobile terminal, and d) the mobile terminal making the digital signature with respect to the random data using a private key of a certificate and transferring the digital signature to the application server.
[10] The step c) may further comprise the step of the authentication server searching the mobile terminal of the user that corresponds to the ID.
[11] Additionally, the step d) comprises the steps of outputting the random data to the mobile terminal, the mobile terminal making the digital signature using the private key of the certificate, the mobile terminal transmitting the digital signature to the authentication server, the authentication server verifying the digital signature and transmitting a result of authentication to the application server, and the application server deciding whether to permit an access of the user device in accordance with the result of authentication.
[12] It is preferable that the step d) compares the random data between the user device and the mobile terminal through by the steps of the user device and the mobile terminal hashing the random data using a hash function that is one-way function, dividing a hash value into a predetermined number of fragments and giving numbers to the respective fragments, and displaying the fragment of the hash value that corresponds to a certain input number among the given numbers on the user device and the mobile terminal.
Advantageous Effects
[13] According to the user authentication method in another network using a digital signature made by a mobile terminal according to the present invention, if the user device of another network is authenticated using the digital signature made by the mobile terminal, the application server can authenticate the user stronger than the password type authentication method. Additionally, it is not required for the user to possess a separate authentication or to install the note of authentication in many user devices, and thus the convenience and the security can be increased. Brief Description of the Drawings
[14] The above objects, other features and advantages of the present invention will become more apparent by describing the preferred embodiments thereof with reference to the accompanying drawings, in which:
[15] FIG. 1 is a view illustrating the whole construction of a system and an authentication procedure according to an embodiment of the present invention; and
[16] FIG. 2 is a flowchart illustrating a procedure of comparing random data between a user device and a mobile terminal according to an embodiment of the present invention. Best Mode for Carrying Out the Invention
[17] Now, a user authentication method in another network using a digital signature made by a mobile terminal according to a preferred embodiment of the present invention will be described in detail with reference to the annexed drawings.
[18] FIG. 1 is a view illustrating the whole construction of a system and an authentication procedure according to an embodiment of the present invention which enables a user who possesses a mobile terminal to connect to a wire Internet or a wireless Internet with an Internet-connectable device such as a computer, a notebook computer, a PDA, etc., through an authentication procedure performed by an authentication server of a mobile communication network.
[19] Referring to FIG. 1, the system according to the present invention includes a mobile terminal 100, a user device 101, an authentication server 102 and an application server 103.
[20] The mobile terminal 100 owned by a user has a digital authentication function.
[21] The user device 101 is a kind of an Internet-connectable device such as a PC, a notebook computer, a PDA, etc., and a device that a user can access, use and carry. [22] The authentication server 102 can directly communicate with the user's mobile terminal 100, and stores a terminal number for the user's ID.
[23] The application server 103, which is a server that needs to authenticate the user device, is communicable with servers of sites of Internet shopping malls, the electronic government, banks, companies, etc., and the authentication server of the mobile communication network.
[24] In the system as constructed above, the user accesses the application server 103 through the user device 101 (step Sl), and in this case, the application server 103 requests the user to input the user's ID (step S2). If the user inputs the ID (step S3), the application server 103 generates and transmits random data to the user device 101 (step S4), and simultaneously transmits the random data and the user's ID to the authentication server (step S5).
[25] Then, the authentication server 102 searches for the user's mobile terminal 100 corresponding to the ID and transmits the random data to the mobile terminal 100 (step S6). The user confirms whether the random data from the user device 101 coincides with that from the mobile terminal 100, and if they coincide with each other, the user makes a digital signature with a private key of the certificate with respect to the random data.
[26] The mobile terminal 100 transmits the digital signature to the authentication server
(step S7), and the authentication server 102 verify the digital signature and then transmits the result of authentication to the application server 103 (step S8). The application server permits the access of the user device according to the result of authentication.
[27] FIG. 2 is a flowchart illustrating the procedure of comparing the random data between the user device and the mobile terminal according to an embodiment of the present invention. Specifically, FIG. 2 shows the logic for enabling the user to easily compare the random data between the user device 101 and the mobile terminal 100.
[28] Referring to FIG. 2, since the typical random data subject to be a large size, it is not easy for the user to compare them with his/her eyes. The user device 101 and the mobile terminal 100 hash the random data using a hash function that is a one-way function (step S20), divide the hash value into 10 units, i.e., segments, and give numbers 0 to 9 to the respective segments (step S21). If the user inputs a certain figure, the devices display the fragment of the hash value corresponding to the input number on a display screen (step S22). Accordingly, the user can easily compare the random data (step S23).
[29] The logic for the user's easy comparing of the random data between the user device
101 and the mobile terminal 100 as illustrated in FIG. 1 can be implemented by a program and stored in a computer-readable recording medium (such as a CD ROM, RAM, ROM, floppy disc, hard disc, optomagnetic disc, etc.). This process can be easily performed by an ordinary skilled in the art that the present invention belongs to, and thus the detailed explanation thereof will be omitted.
[30]
Industrial Applicability
[31] As apparent from the above description, according to the user authentication method in another network using a digital signature made by a mobile terminal according to the present invention, if the user device of another network is authenticated using the digital signature made by the mobile terminal, the application server can authenticate the user stronger than the password type authentication method. Additionally, it is not required for the user to possess a separate authentication or to install the certificate in many user devices, and thus the convenience and the security can be increased.
[32] The forgoing embodiments are merely exemplary and are not to be construed as limiting the present invention. The present teachings can be readily applied to other types of apparatuses. The description of the present invention is intended to be illustrative, and not to limit the scope of the claims. Many alternatives, modifications, and variations will be apparent to those skilled in the art.
[33]

Claims

Claims
[1] A user authentication method in another network using a digital signature made by a mobile terminal, comprising the steps of: a) a user device connecting to an application server by transmitting an ID to the application server; b) the application server generating and transmitting random data corresponding to the ID to the user device and transmitting the generated random data and the ID transmitted from the user device to an authentication server; c) the authentication server transmitting the random data to the corresponding mobile terminal; and d) the mobile terminal making the digital signature with respect to the random data using a private key of a certificate and transferring the digital signature to the application server.
[2] The user authentication method as claimed in claim 1, wherein the step c) further comprises the step of the authentication server searching the mobile terminal of the user that corresponds to the ID. [3] The user authentication method as claimed in claim 1, wherein the step d) comprises the steps of: outputting the random data to the mobile terminal; the mobile terminal making the digital signature using the private key of the certificate; the mobile terminal transmitting the digital signature to the authentication server; the authentication server verifying the digital signature and transmitting a result of authentication to the application server; and the application server deciding whether to permit an access of the user device in accordance with the result of authentication. [4] The user authentication method as claimed in claim 1, wherein the step d) compares the random data between the user device and the mobile terminal through the steps of: the user device and the mobile terminal hashing the random data using a hash function that is a one-way function; dividing a hash value into a predetermined number of fragments and giving numbers to the respective fragments; and displaying the fragment of the hash value that corresponds to a certain input number among the given numbers on the user device and the mobile terminal.
PCT/KR2005/000490 2004-12-17 2005-02-24 User authentication method in another network using digital signature made by mobile terminal WO2006065002A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020040108115A KR20060069611A (en) 2004-12-17 2004-12-17 User Authentication Method in Heterogeneous Network Using Signature of Mobile Communication Terminal
KR10-2004-0108115 2004-12-17

Publications (1)

Publication Number Publication Date
WO2006065002A1 true WO2006065002A1 (en) 2006-06-22

Family

ID=36588030

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2005/000490 WO2006065002A1 (en) 2004-12-17 2005-02-24 User authentication method in another network using digital signature made by mobile terminal

Country Status (2)

Country Link
KR (1) KR20060069611A (en)
WO (1) WO2006065002A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2166697A1 (en) * 2008-09-17 2010-03-24 GMV Soluciones Globales Internet S.A. Method and system for authenticating a user by means of a mobile device
WO2010063091A3 (en) * 2008-11-04 2010-09-02 Securekey Technologies Inc. System and methods for online authentication
WO2011060739A1 (en) * 2009-11-23 2011-05-26 南京新神郁网络科技有限公司 Security system and method
WO2011123940A1 (en) * 2010-04-08 2011-10-13 Securekey Technologies Inc. Credential provision and proof system
CN102906776A (en) * 2010-03-31 2013-01-30 帕特尔有限公司 A method for mutual authentication of a user and service provider
US8484709B2 (en) 2006-01-13 2013-07-09 Authenticor Identity Protection Services Inc. Multi-mode credential authentication
US8756674B2 (en) 2009-02-19 2014-06-17 Securekey Technologies Inc. System and methods for online authentication
CN113055161A (en) * 2021-03-09 2021-06-29 武汉大学 Mobile terminal authentication method and system based on SM2 and SM9 digital signature algorithms

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100907825B1 (en) * 2006-12-04 2009-07-14 한국전자통신연구원 Authentication method for roaming in heterogeneous wireless interworking system
KR100936920B1 (en) 2007-12-14 2010-01-18 한국전자통신연구원 Management server reservation connection method, client and system using one-time password
KR101285362B1 (en) * 2012-12-11 2013-07-11 이지강 Authentication system for electronic signature
KR102053993B1 (en) * 2013-07-05 2019-12-13 주식회사 비즈모델라인 Method for Authenticating by using Certificate

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002015626A1 (en) * 2000-08-15 2002-02-21 Telefonaktiebolaget Lm Ericsson (Publ) Network authentication by using a wap-enabled mobile phone
WO2004056038A1 (en) * 2002-12-18 2004-07-01 Nokia Corporation Mobile user authentication in connection with access to mobile services
EP1487176A1 (en) * 2003-06-09 2004-12-15 Lucent Technologies Inc. A method of paying from an account by a customer having a mobile user terminal, and a customer authenticating network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002015626A1 (en) * 2000-08-15 2002-02-21 Telefonaktiebolaget Lm Ericsson (Publ) Network authentication by using a wap-enabled mobile phone
WO2004056038A1 (en) * 2002-12-18 2004-07-01 Nokia Corporation Mobile user authentication in connection with access to mobile services
EP1487176A1 (en) * 2003-06-09 2004-12-15 Lucent Technologies Inc. A method of paying from an account by a customer having a mobile user terminal, and a customer authenticating network

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8484709B2 (en) 2006-01-13 2013-07-09 Authenticor Identity Protection Services Inc. Multi-mode credential authentication
US8261089B2 (en) 2008-09-17 2012-09-04 Gmv Soluciones Globales Internet, S.A. Method and system for authenticating a user by means of a mobile device
EP2166697A1 (en) * 2008-09-17 2010-03-24 GMV Soluciones Globales Internet S.A. Method and system for authenticating a user by means of a mobile device
US9160732B2 (en) 2008-11-04 2015-10-13 Securekey Technologies Inc. System and methods for online authentication
AU2009322102B2 (en) * 2008-11-04 2015-02-19 Securekey Technologies Inc. System and methods for online authentication
WO2010063091A3 (en) * 2008-11-04 2010-09-02 Securekey Technologies Inc. System and methods for online authentication
US8943311B2 (en) 2008-11-04 2015-01-27 Securekey Technologies Inc. System and methods for online authentication
US8578467B2 (en) 2008-11-04 2013-11-05 Securekey Technologies, Inc. System and methods for online authentication
US8756674B2 (en) 2009-02-19 2014-06-17 Securekey Technologies Inc. System and methods for online authentication
US9083533B2 (en) 2009-02-19 2015-07-14 Securekey Technologies Inc. System and methods for online authentication
US9860245B2 (en) 2009-02-19 2018-01-02 Secure Technologies Inc. System and methods for online authentication
WO2011060739A1 (en) * 2009-11-23 2011-05-26 南京新神郁网络科技有限公司 Security system and method
CN102906776A (en) * 2010-03-31 2013-01-30 帕特尔有限公司 A method for mutual authentication of a user and service provider
WO2011123940A1 (en) * 2010-04-08 2011-10-13 Securekey Technologies Inc. Credential provision and proof system
US10210489B2 (en) 2010-04-08 2019-02-19 Securekey Technologies Inc. Credential provision and proof system
CN113055161A (en) * 2021-03-09 2021-06-29 武汉大学 Mobile terminal authentication method and system based on SM2 and SM9 digital signature algorithms
CN113055161B (en) * 2021-03-09 2021-11-26 武汉大学 Mobile terminal authentication method and system based on SM2 and SM9 digital signature algorithms

Also Published As

Publication number Publication date
KR20060069611A (en) 2006-06-21

Similar Documents

Publication Publication Date Title
JP6992105B2 (en) Query system and method for determining authentication capability
US8807426B1 (en) Mobile computing device authentication using scannable images
US9813236B2 (en) Multi-factor authentication using a smartcard
US9240891B2 (en) Hybrid authentication
US8041954B2 (en) Method and system for providing a secure login solution using one-time passwords
US9117324B2 (en) System and method for binding a smartcard and a smartcard reader
CN108804906B (en) System and method for application login
US20110185181A1 (en) Network authentication method and device for implementing the same
US20130023241A1 (en) Authentication method and system using portable terminal
US9344896B2 (en) Method and system for delivering a command to a mobile device
CN101517562A (en) Method for registering and certificating user of one time password by a plurality of mode and computer-readable recording medium where program executing the same method is recorded
EP2404255A1 (en) Method and computer program for generation and verification of otp between server and mobile device using multiple channels
WO2008123939A1 (en) Method and apparatus for generating one-time passwords
CN105164689A (en) User authentication
JP2002055955A (en) Method and system for personal authentication
CN109063438A (en) A kind of data access method, device, local data secure access equipment and terminal
TW200910894A (en) Authentication system and method thereof for wireless networks
WO2006065002A1 (en) User authentication method in another network using digital signature made by mobile terminal
US20070150942A1 (en) Centralized identity verification and/or password validation
Manurung Designing of user authentication based on multi-factor authentication on wireless networks
KR20050071768A (en) System and method for one time password service
WO2014140426A1 (en) Multi-factor authentication techniques
CA2611549C (en) Method and system for providing a secure login solution using one-time passwords
CN111222858A (en) Method for realizing block chain fingerprint identification authentication of personal wallet
CN101383816B (en) wireless network authentication system and method thereof

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 05726743

Country of ref document: EP

Kind code of ref document: A1