WO2014175642A1 - Identity authentication system capable of non-repudiation and method for providing same - Google Patents
Identity authentication system capable of non-repudiation and method for providing same Download PDFInfo
- Publication number
- WO2014175642A1 WO2014175642A1 PCT/KR2014/003520 KR2014003520W WO2014175642A1 WO 2014175642 A1 WO2014175642 A1 WO 2014175642A1 KR 2014003520 W KR2014003520 W KR 2014003520W WO 2014175642 A1 WO2014175642 A1 WO 2014175642A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- identity authentication
- password
- identity
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/22—Interactive procedures; Man-machine interfaces
- G10L17/24—Interactive procedures; Man-machine interfaces the user being prompted to utter a password or a predefined phrase
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- the present invention relates to an identity authentication system and a method of providing the same, which allow a user to verify that he or she is a legitimate user authorized to use a predetermined service (for example, online payment) using his mobile phone number.
- a predetermined service for example, online payment
- the security can be increased by separating the channel for requesting authentication from the channel for inputting the password required for authentication, and man-in-the-middle-attack and rely attack.
- the present invention relates to a self-authentication system capable of preventing repudiation and a method of providing the same.
- Identity verification refers to the process of verifying that the person requesting a particular service (eg, online payment) is a legitimate user.
- a method of authenticating a legitimate user by using a pre-registered password or security key is commonly used. Such a method uses a user's personal information obtained through an illegal channel to register as a member or uses an ID. There is a problem that can be obtained illegally password.
- Man-in-the-middle attack by intercepting or illegally modifying or generating data, or by relying on security information such as passwords by illegal methods, and retransmitting it later to replicate It is very vulnerable to attack. If such a man-in-the-middle attack or a retransmission attack is possible, the person performing the authentication request can deny that the authentication request is not by itself, which seriously affects the reliability of the system.
- the present invention has been made to solve the above-mentioned problems, the technical problem to be achieved by the present invention is to secure a high security that can be prevented by the identity authentication system that is not vulnerable to man-in-the-middle attack or retransmission attack And it provides a method of providing the same.
- the identity authentication system sends an identity authentication request including a mobile telephone number of a user's mobile terminal from a user's user terminal through a wired or wireless data communication network; Receiving, (b) the identity authentication system, the one-time authentication information corresponding to the identity authentication request to be transmitted to the user terminal, (c) the identity verification system, included in the received identity authentication request Connecting a telephone call with the mobile terminal using the mobile telephone number, (d) the first authentication system receiving a first password and a second password through the telephone call from the mobile terminal; and e) the first password received from the mobile terminal and the authentication information previously stored in the identity authentication system; Value and if a second password received from the mobile terminal matches the authentication information, the one-time transmission to the user terminal, there is provided a method for providing identity authentication system comprising: I determined that authentication is successful.
- the step (d) may include: receiving, by the identity authentication system, a voice signal corresponding to the second password through the telephone call, and by the identity authentication system, the voice signal through voice recognition. Recognizing the second password from may include.
- the method of providing a personal authentication system further includes the step of the user authentication system analyzing the voice signal to determine whether the voice signal is uttered by the user, and (e) The first password received from the mobile terminal matches the authentication information previously stored in the identity authentication system, and the second password received from the mobile terminal matches the one-time authentication information transmitted to the user terminal. If it is determined that the voice signal corresponding to the second password is uttered by the user, it may include determining that the identity authentication is successful.
- the step (d) may further include receiving, by the identity verification system, a DTMF signal corresponding to the first password through the telephone call.
- the step (c), the identity authentication system, when the identity authentication system attempts a call connection to the mobile telephone number is the source number of the identity authentication system to be output to the mobile terminal is Outputting to a user terminal and connecting the telephone call with the mobile terminal using the mobile telephone number included in the received personal authentication request.
- the method may include transmitting a message and connecting a telephone call from the mobile terminal to the identity authentication system using the transmitted callback message.
- the step (b) may include the step of transmitting, by the identity authentication system, an issuance request of one-time authentication information corresponding to the identity authentication request to a predetermined issuing server, wherein the issuing server is configured as: In response to the issuance request, the one-time authentication information may be issued and transmitted to the user terminal.
- the identity authentication request further includes a predetermined check information
- the step (b), the identity verification system, the step of determining whether the check information corresponds to the mobile phone number and the determination result If it corresponds the method may include transmitting one-time authentication information corresponding to the identity authentication request to the user terminal.
- a method for providing an identity authentication system wherein (a) the identity authentication system requests a user authentication request including a mobile phone number of a mobile terminal of a user from a user terminal of a wired / wireless data communication network. Receiving through, (b) the identity authentication system, the one-time authentication information corresponding to the identity authentication request is transmitted to the user terminal, (c) the identity authentication system, the call back message to the mobile phone number Transmitting a telephone call from the mobile terminal to the identity authentication system according to the transmitted callback message, and (d) the identity authentication system using a first password and a second call from the mobile terminal through the telephone call.
- Receiving a password and (e) the first password received from the mobile terminal Determining that the user authentication is successful when the second password received from the mobile terminal matches the one-time authentication information transmitted from the mobile terminal and matches the authentication information previously stored in the user authentication system.
- a method for providing an authentication system is provided.
- a method for providing an identity authentication system wherein (a) the identity authentication system requests a user authentication request including a mobile phone number of a mobile terminal of a user from a user terminal of a wired / wireless data communication network. (B) allowing the identity verification system to transmit one-time authentication information corresponding to the identity verification request to the user terminal, and (c) the identity verification system to the received identity verification request. Connecting a telephone call to the mobile terminal using the included mobile telephone number; and (d) receiving, by the identity verification system, a voice signal from the mobile terminal through the telephone call; An authentication system performing voice recognition on the voice signal; and (f) voice recognition result on the voice signal.
- a method for providing identity authentication system comprising: I determined that authentication is successful.
- the method for providing the identity authentication system further includes a step of analyzing the voice signal to determine whether the voice signal is uttered by the user, and the step (f) includes: If it is determined that the voice recognition result with respect to the one-time authentication information and the voice signal is uttered by the user, it may include the step of determining that the identity authentication is successful.
- a computer-readable recording medium having recorded thereon a program for performing the above method.
- an identity authentication system includes a processor and a memory storing a program, wherein the program, when executed by the processor, causes the identity authentication system to perform the above-described method.
- An identity authentication system is provided.
- a request receiving module including a mobile phone number of the user's mobile terminal and receives a user authentication request corresponding to a predetermined service from the user's user terminal through a wired or wireless data communication network, the user authentication
- a one-time authentication information module for transmitting one-time authentication information corresponding to the request to the user terminal, a phone call module for connecting a phone call with the mobile terminal by using the mobile phone number included in the received identity authentication request;
- a password receiving module for receiving a first password and a second password through the telephone call from a mobile terminal and the first password received from the mobile terminal correspond to authentication information previously stored in the identity authentication system and received from the mobile terminal.
- the second password is the user end When a match the one time authentication information transmission group, is provided with a person authentication system including a control module that determines that identity authentication is successful.
- the password receiving module receives a voice signal corresponding to the second password through the telephone call, and the identity authentication system recognizes the second password from the voice signal through voice recognition. It may further include a voice recognition module.
- the identity authentication system further comprises a voiceprint analysis module for determining whether the voice signal is uttered by the user by voice analysis of the voice signal, the control module is received from the mobile terminal
- the first password matches an authentication password previously stored in the identity authentication system
- the second password received from the mobile terminal matches at least a portion of the one-time password sent to the user terminal and corresponds to the second password. If it is determined that the voice signal is uttered by the user, it can be determined that the authentication of the person is successful.
- a request receiving module including a mobile phone number of the user's mobile terminal and receives a user authentication request corresponding to a predetermined service from the user's user terminal through a wired or wireless data communication network, the user authentication
- a one-time authentication information module for transmitting one-time authentication information corresponding to the request to the user terminal, transmitting a callback message to the mobile phone number, and connecting a telephone call from the mobile terminal to the identity authentication system by the transmitted callback message.
- a telephone call module configured to receive a first password and a second password through the telephone call from the mobile terminal, the first password received from the mobile terminal, and the authentication information previously stored in the identity authentication system. Match and said mobile stage When the second password received from the terminal is matched with the one-time authentication information transmitted to the user terminal, a personal authentication system is provided that includes a control module that determines that the user authentication is successful.
- a request receiving module including a mobile phone number of the user's mobile terminal and receives a user authentication request corresponding to a predetermined service from the user's user terminal through a wired or wireless data communication network, the user authentication
- a one-time authentication information module for transmitting one-time authentication information corresponding to the request to the user terminal, a telephone call module for connecting a telephone call to the mobile terminal by using the mobile phone number included in the received authentication request;
- a password receiving module for receiving a voice signal corresponding to a password from the mobile terminal through the telephone call, a voice recognition module for recognizing the password by performing voice recognition on the voice signal, and the recognized password and the one-time authentication information. If there is a match, the identity verification was successful
- An identity authentication system including a control module for determining is provided.
- a channel i.e. data communication network such as wired or wireless internet
- a channel i.e., telephone network
- the one-time authentication information that is discarded after being used once is used for authentication, a vulnerability to retransmission attack can be prevented.
- the one-time authentication information is discarded immediately after the end of the authentication process so that it cannot be used for the next authentication, so that another person may overhear it. Therefore, by inputting password information corresponding to the one-time authentication information by voice, it is possible to provide input convenience to the user while maintaining security.
- the one-time authentication information is input as the voice signal, it may be guaranteed that the voice information to be uttered is not previously recorded. Therefore, by confirming that the voice signal is uttered by a legitimate user through voiceprint analysis, it is possible to clearly ensure that the person who has confirmed the one-time authentication information (that is, the person who has made the authentication request) is the legitimate user.
- FIG. 1 is a view for conceptually explaining a user authentication system according to an embodiment of the present invention.
- FIG. 2 is a block diagram illustrating a schematic configuration of a user authentication system according to an embodiment of the present invention.
- FIG. 3 is a view showing an example of information that can be maintained in the identity authentication system according to an embodiment of the present invention.
- FIG. 4 is a view for explaining the flow of a method for providing a user authentication system according to an embodiment of the present invention.
- FIG. 5 is a diagram illustrating an example of a user authentication request UI provided to a user terminal to implement a method for providing a user authentication system according to an embodiment of the present invention.
- FIG. 6 is a diagram illustrating an example of a guide UI provided to a user terminal to implement a method for providing a user authentication system according to an embodiment of the present invention.
- FIG. 7 is a diagram illustrating an example of a screen output to a mobile terminal of a user in a method for providing a user authentication system according to an embodiment of the present invention.
- first and second may be used to describe various components, but the components should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.
- the component when one component 'transmits' data to another component, the component may directly transmit the data to the other component, or through at least one other component. Means that the data may be transmitted to the other component.
- the component when one component 'directly transmits' data to another component, it means that the data is transmitted from the component to the other component without passing through the other component.
- FIG. 1 is a view for conceptually explaining a user authentication system according to an embodiment of the present invention.
- a predetermined user authentication system 100 may be provided.
- the identity authentication system 100 may receive an identity authentication request corresponding to a predetermined service from the user terminal 210.
- the service may be an online payment request.
- the user terminal 210 may transmit an authentication request for the user who uses the user terminal 210 to the personal authentication system 100 together with the online payment request or on the premise of the online payment request. .
- the user terminal 210 may be used to include all types of data processing devices (eg, laptops, desktops, mobile terminals, set-top boxes, etc.) capable of requesting identity authentication to the identity authentication system 100. have.
- data processing devices eg, laptops, desktops, mobile terminals, set-top boxes, etc.
- the identity authentication system 100 is accessible to the user terminal 210, all types of data processing system that can receive the identity authentication request (for example, a predetermined website, page, interactive broadcast server, etc.) Can be provided.
- a predetermined merchant system may exist between the user terminal 210 and the identity authentication system 100, and the identity authentication system 100 receives an identity authentication request from the merchant system. Can be received. That is, the affiliated store system may receive an identity authentication request together with a payment request through the user's terminal 210 and transmit the identity authentication request to the identity authentication system 100.
- the identity authentication request may be performed through a predetermined wired or wireless data communication network, that is, a first communication channel (for example, the Internet, as shown in FIG. 1).
- a predetermined wired or wireless data communication network for example, a first communication channel (for example, the Internet, as shown in FIG. 1).
- the user may input his mobile phone number (eg, a mobile phone number, USIM number, etc.) through his user terminal 210.
- the mobile phone number may be a phone number of the mobile terminal 220 possessed by the user requesting identity verification.
- the identity authentication request may include the mobile phone number of the mobile terminal 220 of the user input by the user terminal 210. That is, the user can enter his mobile phone number (cell phone number, USIM number, etc.) while making a request for identity verification through his terminal 210.
- the mobile phone number may be a phone number of the mobile terminal 220 used by the user for requesting identity verification.
- the user may further input user identification information (for example, an ID or name, a date of birth, a login password, etc.) registered through the terminal 210.
- user identification information for example, an ID or name, a date of birth, a login password, etc.
- the user identification information may be used as predetermined check information. Since the mobile phone number may be information that has already been disclosed to many people, there may be a case where additional information (for example, a login password) required for identity verification is requested after the identity verification request using the corresponding mobile phone number. Therefore, if the requester is to be identified by the mobile phone number, which is the publicly disclosed information, the predetermined check information may be further used to increase stability. Therefore, the identity verification request may include a mobile phone number and check information. When the identity authentication request is received, the identity verification system 100 may determine whether the mobile phone number corresponds to the check information. Only when it is determined that they correspond to each other, the remaining identity authentication procedure can be performed as described below.
- additional information for example, a login password
- the identity authentication system 100 may store the mobile phone number and corresponding check information in advance. As a result, according to the present embodiment, such check information can be received together with the mobile telephone number and used as information for the first authentication. After the first authentication using the check information and the second authentication by performing the authentication as described below, there is an effect that the stability of the service can be significantly increased. In addition, the identity authentication system 100, if the identity verification request received while changing the check information for the same mobile phone number within a predetermined time or more than a predetermined number of times to reject the request or perform a separate additional authentication process stability Can increase.
- the identity authentication system 100 may allow the user terminal 210 that sent the identity authentication request to receive one-time authentication information (eg, one time password (OTP)) corresponding to the identity authentication request. . Then, the user terminal 210 may display the received one-time authentication information so that the user can recognize it.
- one-time authentication information eg, one time password (OTP)
- one-time authentication information may be issued by the identity authentication system 100.
- the identity authentication system 100 may issue one-time authentication information and transmit the one-time authentication information to the user terminal 210.
- the one-time authentication information may be issued by another server (for example, the card company system 300) by the request of the identity authentication system 100, in this case, the one-time authentication information Issuing the server (for example, card company system 300) may transmit the one-time authentication information issued to the user terminal 210. Then, the user terminal 210 may display the received one-time authentication information so that the user can recognize it.
- another server for example, the card company system 300
- the one-time authentication information is issued by another server (for example, the card company system 300) at the request of the personal authentication system 100, but the server (for example, the one-time authentication information is issued).
- the card company system 300 may transmit the issued one-time authentication information to the identity verification system 100.
- the subject that transmits the issued one-time authentication information to the user terminal 210 may be the identity verification system 100.
- the one-time authentication information may be a value written once and discarded. That is, the one-time authentication information, as will be described later can be used for identity authentication for the user corresponding to the user terminal 210, once the one-time authentication information is used for identity authentication, the one-time authentication information is It may be discarded and cannot be used again.
- the identity authentication system 100 may perform a predetermined process for identity verification using the mobile phone number of the mobile terminal 220 received according to the technical idea of the present invention.
- the identity authentication system 100 uses the mobile telephone number to provide predetermined identity information (eg, personal information and / or password) to be used for identity authentication to the user's mobile terminal 220.
- predetermined identity information eg, personal information and / or password
- the identification information may be received from the mobile terminal 220.
- the identity authentication system 100 may request the identity information required for authentication through a second communication channel (for example, a mobile communication network as shown in FIG. 1) different from the first communication channel. have.
- the identity authentication system 100 may include a predetermined Auto Response System (ARS) for connecting a telephone call with the mobile terminal 220, and the telephone call with the mobile terminal 220 Connect and receive the identity information via ARS.
- ARS Auto Response System
- the identity authentication system 100 may be connected to a predetermined ARS to control the ARS to implement the technical idea of the present invention.
- the identity authentication system 100 may perform an ARS call to the mobile terminal 220 corresponding to the mobile phone number, information for identity authentication when an ARS call, that is, a telephone call is connected. You can ask for input. For example, the identity authentication system 100 may extract the mobile phone number included in the received identity authentication request, and output the extracted mobile phone number to a predetermined ARS. Then, the ARS may connect a wireless call to the mobile terminal 220. That is, you can make a call. Then, the ARS may request identity verification information necessary for identity authentication from the mobile terminal 220. When the user inputs the identification information in response to the request, the identity authentication system 100 may receive the information input from the ARS system and perform identity verification.
- the identity verification information may include only one password to be compared with the one-time authentication information transmitted to the user terminal 210 later.
- another embodiment may include two passwords (a first password and a second password). In this case, whether or not the first password is set by the user later and matches the authentication information previously stored in the identity authentication system 100 will be compared, and the second password will be transmitted later to the user terminal 210. Matching with the one-time authentication information may be compared.
- the user may enter the first password and the second password through the telephone authentication (ie, ARS call) formed with the identity authentication system 100 and the identity authentication system 100. ) Can be sent. That is, the two passwords may be transmitted to the identity verification system 100 through one telephone call instead of the other telephone call. As the length of the password increases, it becomes harder to find out the password, so the security can be enhanced. Therefore, for example, a higher security can be achieved by transmitting an eight-digit password combining the first password and the second password at a time than when transmitting the first four-digit password and the second four-digit password, respectively. It can be secured.
- the telephone authentication ie, ARS call
- the first password or the second password is composed of numbers may be input as a DTMF tone on a telephone call (for example, ARS call).
- a telephone call for example, ARS call
- the identity authentication system 100 may include a voice recognition module for voice recognition of the voice signal.
- the personal authentication system 100 may verify whether the speech is uttered by the user by analyzing the received voice signal.
- the identity authentication system 100 may store voiceprint information of the user in advance, and may include a voiceprint analysis module.
- Voice analysis may be a method for identifying the personality of a person's voice. Individual vocal tracts are based on the anatomical shape of the voice organs, ie the size, shape, and physical characteristics of the vocal tract, vocal cords, nasal cavity, teeth, etc. It may be determined by pronunciation, vocabulary, intonation, and the like.
- the voice analysis module may compare the features and identify the sameness between the user's voice stored in advance and the user's voice received through a telephone call.
- the mobile terminal 220 when information necessary for identity authentication is received through a telephone call, the mobile terminal 220 does not need to install a predetermined IC chip or separate software for identity verification. It works. Therefore, the service according to the embodiment of the present invention may be utilized even in a conventional 2G phone.
- the mobile terminal 220 may be a computing device including a mobile phone, a smart phone, a tablet PC, a personal digital assistant (PDA), and a wireless computing device or another including a handheld device having other wireless access functions. It may be a processing device connected to a wireless modem.
- a computing device including a mobile phone, a smart phone, a tablet PC, a personal digital assistant (PDA), and a wireless computing device or another including a handheld device having other wireless access functions. It may be a processing device connected to a wireless modem.
- PDA personal digital assistant
- the identity authentication system 100 may provide a technical idea that allows a user to identify himself or herself before receiving identity verification information required for authentication through the mobile terminal 220. That is, according to an embodiment of the present invention, the user authentication system 100 can confirm to the user that he is a legitimate identity authority.
- the identity authentication system 100 first outputs predetermined system identification information to the user terminal 210, and then inputs identification information necessary for authentication through the mobile terminal 220. When receiving the same system confirmation information may be output to the mobile terminal 220. For example, the identity authentication system 100 may output the calling number of the ARS call to the user terminal 210. Thereafter, when the identity authentication system 100 connects an ARS call to the mobile terminal 220 of the user, an origination number of the ARS call may be output to the mobile terminal 220 of the user. Therefore, the user may confirm that the subject to which the ARS call is connected to his mobile terminal 220 is the identity authentication system 100.
- the system identification information is not necessarily the calling number.
- the predetermined notice text for example, a guide letter of a lettering service of a mobile service provider
- the guide phrase may change every time.
- the user authentication system 100 allows the user to confirm that the system that is being asked for identity authentication through the user terminal 210 and the system that is requesting identity verification information through the mobile terminal 220 are the same. can do.
- the identity verification information and / or the identity verification request may further include additional personal information to be used for identity verification.
- the personal information may include, but is not limited to, a user's social security number, owned card number, password, date of birth, and the like.
- the identity authentication system 100 may transmit and receive data necessary for a predetermined identity authentication process with a predetermined authentication server 300.
- the authentication server 300 may be, for example, a server of a mobile communication company or a server of a credit card company.
- the identity authentication system 100 transmits the password information received from the mobile terminal 220 to the authentication server 300. It is possible to compare whether or not the received password is the same as the one-time authentication information.
- the identity authentication system 100 transmits the personal information and the mobile phone number input from the user to the authentication server of the mobile communication company, by confirming whether the user is the name of the mobile phone number identity authentication ( In other words, by performing the owner authentication of the mobile phone, or by transmitting the card information received from the user to the credit card company's authentication server, and confirming that the user is the name of the credit card (identification of the owner of the credit card) You can also do
- the identity authentication system 100 includes a request reception module 110, a one-time authentication information module 120, a telephone call module 130, a password reception module 140, and a control module 150.
- Voice recognition module 160, voiceprint analysis module 170 and DB may be included.
- the identity authentication system 100 may Of course, it may include more components than this.
- the identity authentication system 100 may include hardware resources and / or software necessary to implement the technical idea of the present invention, and means one physical component or one device. no. That is, the identity authentication system 100 may refer to a logical combination of hardware and / or software provided to implement the technical idea of the present invention. If necessary, the identity authentication system 100 may be installed in devices spaced apart from each other. It may be implemented as a set of logical configurations for implementing the technical idea of the present invention by performing. In addition, the identity authentication system 100 may refer to a set of components that are separately implemented for each function or role for implementing the technical idea of the present invention.
- the analysis module 170 may be located in different physical devices or may be located in the same physical device.
- the combination of software and / or hardware constituting each of the voice analysis module 170 may also be located on different physical devices, and components located on different physical devices may be organically combined with each other to implement the respective modules.
- module in the present specification may mean a functional and structural combination of hardware for performing the technical idea of the present invention and software for driving the hardware.
- the module may mean a logical unit of a predetermined code and a hardware resource for performing the predetermined code, and does not necessarily mean a physically connected code or a kind of hardware. It can be easily inferred by the average expert in the technical field of the present invention.
- the control module 150 includes other components included in the identity authentication system 100 (for example, request reception module 110, one-time authentication information module 120, telephone call module 130, password receiving module). 140, the voice recognition module 160, and / or the voiceprint analysis module 170, and the like, and / or the resource.
- the DB 180 may store various information that may be stored or maintained in advance in the identity authentication system 100.
- 3 is a diagram illustrating an example of information stored in the DB 180.
- the DB 180 may store authentication information (password) corresponding to each mobile phone number.
- identification information, check information, etc. of a user corresponding to each mobile phone number may be further stored.
- the authentication information may be used to verify whether the user occupying the mobile terminal corresponding to the mobile telephone number is a legitimate user together with the one-time authentication information.
- the check information may be used for primary authentication as to whether a user who has requested a user authentication through the user terminal 210 is a legitimate user.
- the DB 180 may store voiceprint information for each user.
- the request receiving module 110 may receive a personal authentication request corresponding to a predetermined service (eg, online commerce, internet banking) through a wired or wireless data communication network (eg, internet, mobile internet).
- a predetermined service eg, online commerce, internet banking
- the request receiving module 110 may directly receive the identity authentication request from the user terminal 210, or may be received through a predetermined affiliate server.
- the identity authentication request may include a mobile phone number of the user's mobile terminal 220, according to an embodiment check information and / or the user terminal 210 corresponding to the mobile phone number Personal information of the user corresponding to may be further included.
- the one-time authentication information module 120 may allow one-time authentication information corresponding to the identity authentication request to be transmitted to the user terminal.
- the one-time authentication information module 120 may request issuance of the one-time authentication information to a predetermined authentication server (300).
- the authentication server 300 may be, for example, a card company system or a mobile communication system.
- the authentication server 300 may issue one-time authentication information in response to the issuing request.
- the authentication server 300 may directly transmit the issued authentication information to the user terminal 210.
- the authentication server 300 may transmit the issued authentication information to the user authentication system 100 so that the one-time authentication information module 120 transmits it to the user terminal 210.
- the identity authentication system 100 may temporarily store the one-time authentication information, and verify the password to be received from the mobile terminal 220 by using this.
- the telephone call module 130 may connect a telephone call with the mobile terminal using the mobile telephone number included in the identity authentication request. In one embodiment, the phone call module 130 may attempt to connect to the mobile phone number, and the mobile terminal 220 may connect the phone call by accepting the call connection.
- the call connection module 130 may transmit a callback message to the mobile phone number. have. Then, when the user is in a situation of performing authentication, the user may select a callback message transmitted to the user terminal 210.
- the callback message may include a telephone number (ie, calling number) of the ARS included in or connected to the identity authentication system 100. Therefore, when the user selects the callback message, a telephone call may be connected to the ARS.
- the phone call module 130 may attempt to connect a phone call to the mobile phone number, and if the phone call is not connected, the call back message may be transmitted to the mobile phone number. Authentication can also be performed using the back message.
- the telephone call module 130 may transmit the calling number of the identity authentication system 100 to the user terminal 210 before connecting the telephone call with the mobile terminal 220.
- the user terminal 210 may display the received caller ID so as to recognize that the subject to which the ARS call is to be connected later is the identity authentication system 100.
- the password receiving module 140 may request input of a password through a connected telephone call and may receive a password from the mobile terminal 220.
- the password may be preset and correspond to authentication information stored in the DB 180 or may correspond to the one-time authentication information described above.
- the password can be divided into two parts (a first password and a second password).
- the first password may be a portion corresponding to the authentication information stored in the DB 180 in advance
- the second password may be a portion corresponding to the one-time authentication information described above.
- Some of the password information received by the password receiving module 140 from the mobile terminal 220 may be voice signals.
- a second password corresponding to one-time authentication information among the password information may be a voice signal.
- the voice recognition module 160 may recognize the second password from the voice signal through voice recognition, and the voiceprint analysis module 170 may analyze the voice signal and perform the voice signal analysis. It is possible to determine whether or not the user is uttered.
- the identity authentication system 100 may store in advance the lexical model information or the acoustic model information necessary for the voice recognition module 160 to perform voice recognition in the DB 180.
- the voice recognition rate can be increased by separately managing the acoustic model information for each user.
- the identity authentication system 100 may previously store information necessary for the voiceprint analysis module 170 to perform voiceprint analysis, that is, user's voiceprint information in the DB 180. Since the human voice is a complex wave in which various frequency components are mixed, the user's voice information can be grasped by frequency analyzing the user's voice. Voice information may include various acoustic parameters such as resonance frequency, frequency intensity, vocal cord vibration type and sound height due to vocal cord vibration. In one embodiment, the voiceprint analysis module 170 may analyze voice signals received from the mobile terminal 220 to extract voiceprint information, and compare the voiceprint information with pre-stored voiceprint information to perform voiceprint analysis.
- the control module 150 may perform identity verification using the information received from the mobile terminal 220.
- the control module 150 may determine whether the portion (ie, the second password described above) corresponding to the one-time authentication information and the one-time authentication information of the information received from the mobile terminal 220 do not coincide with each other. You can check. According to an embodiment, the control module 150 transmits the second password to the authentication server 300 that issued the one-time authentication information, so that the authentication server 300 has the second password and the one-time authentication information. It can be determined whether it matches. If the identity authentication system 100 stores the one-time authentication information, the control module 150 may directly determine whether the second password matches the one-time authentication information.
- control module 150 may include a portion (ie, the first password described above) corresponding to the authentication information previously stored in the DB 180 among the information received from the mobile terminal 220 and the previously stored information. It may be determined whether the authentication information matches.
- the control module 150 may authenticate the user based on a comparison result between the second password and the one-time authentication information. In addition, according to an embodiment, the control module 150 may improve the security level by further considering the comparison result between the first password and the pre-stored authentication information and / or the comparison result of the voiceprint analysis module 170. .
- control module 150 may perform additional identity authentication for the user using predetermined personal information.
- the personal information about the user may include a mobile phone number, a resident number, a date of birth, a credit card number, an address, etc. for the user, and the personal information is the personal authentication request transmitted by the user terminal 210. And / or identity verification information transmitted by the mobile terminal 220.
- the control module 150 transmits the received personal information to a predetermined authentication server (for example, 300) to request an authentication of the user, thereby performing additional identification.
- a predetermined authentication server for example, 300
- the control module 150 may enable the service requested by the user to be provided through the user terminal 210.
- the control module 150 may allow the user terminal 210 to provide an initial procedure for starting internet banking.
- the control module 150 may transmit a predetermined guide message when the user authentication fails, and may not allow the service to be provided to the user terminal 210.
- FIG. 4 is a view for explaining the flow of a method for providing a user authentication system according to an embodiment of the present invention.
- a user may transmit a user authentication request to the user authentication system 100 using his user terminal 210 (S100).
- the identity authentication request may include a mobile phone number, and in some embodiments, may include at least some of the user's personal information.
- FIG. 5 is a diagram illustrating an example of a user authentication request UI provided to a user terminal in order to implement a method for providing a user authentication system according to an embodiment of the present invention.
- the UI 10 as shown in FIG. 5 may be provided to the user terminal 210.
- the user may input a mobile phone number (eg, a mobile phone number) through a predetermined input UI 11 included in the UI 10.
- the payment information (for example, credit card information, payment amount, etc.) may be input using the payment information input UI 13 for inputting the payment information, and the input information may be input to the personal authentication request. It may be included and transmitted to the identity verification system 100.
- the identity authentication system 100 is a one-time authentication information to a predetermined authentication server (card company system 300 in the example of FIG. 4) so that one-time authentication information corresponding to the identity authentication request can be issued. May issue a request (S110). Then, the card company system 300 may issue one-time authentication information (OTP) (S120). One-time authentication information (OTP), together with the authentication information previously stored in the identity authentication system 100, may be used to perform identity authentication for the user later.
- OTP one-time authentication information
- the card company system 300 transmits the issued one-time authentication information (OTP) to the user terminal 210 (S130), the one-time authentication information (OTP) received by the user terminal 210 It can be output (S140). In addition, the card company system 300 may notify the identity authentication system 100 that one-time authentication information has been issued. According to an embodiment, unlike steps S130 and S150 of FIG. 4, the card company system 300 transmits the issued one-time authentication information (OTP) to the identity verification system 100, and the identity verification system 100. ) May transmit one-time authentication information (OTP) to the user terminal 210.
- the identity authentication system 100 transmits the calling number (for example, the ARS call originating number) of the identity authentication system 100 to the user terminal 210 (S160), the user terminal 210
- the caller ID of the identity authentication system 100 may be output to the caller (S170).
- the user terminal 210 is the one-time authentication information and the calling number of the identity authentication system 100 as shown in FIG. It can be output on one guide UI.
- 6 is a diagram illustrating an example of a guide UI provided to a user terminal to implement a method for providing a user authentication system according to an embodiment of the present invention.
- the guide UI 20 includes a UI 21 for guiding the calling number of the identity authentication system 100 and a UI 22 for guiding one-time authentication information (OTP). can do.
- the UI 21 may include a message informing that an ARS identity verification call is coming from an ABC authentication center (call number: 070-1010-1234).
- the name (ABC authentication center) and the calling number 21 of the identity authentication system 100 included in the UI 21 are later output to the user's mobile terminal 220 again, so that the user is authenticated by the identity authentication system 100. ) Can be verified.
- the user can be mixed with the arrangement of the characters constituting each authentication information.
- the identity authentication system 100 may share the arrangement information regarding the position where the characters constituting the pre-stored authentication information and the position where the characters constituting the one-time authentication information are arranged with the user terminal 210. have.
- the identity verification system 100 may transmit the batch information to the user terminal 210.
- the user terminal 210 has the one-time authentication information and the pre-stored authentication information.
- UI 22 may be displayed to guide the order in which should be entered.
- the identity authentication system 100 may divide the input password into two parts (first password and second password) based on the batch information. have.
- the identity authentication system 100 may connect a telephone call with the user's mobile terminal 220 using a mobile telephone number included in the identity authentication system 100.
- the caller's number and / or caller information may be output to the user's mobile terminal 220, as shown in FIG. 7 is a diagram illustrating an example of a screen output to the user's mobile terminal 220 in the method for providing a user authentication system according to an embodiment of the present invention.
- the same information as the caller information and the call number information (see FIG. 6) guided through the user terminal 210 may be output to the mobile terminal 220. In this way, the user can check the identity between the subject that he or she made the authentication request and the subject that wants to connect the ARS call.
- the identity authentication system 100 distinguishes a channel (i.e., a data communication network such as a wired or wireless internet) for which identity authentication is requested from a channel (i.e., a telephone network) for confirming a password, thereby preventing information leakage from any one channel. Even if it happens, it can provide a system structure that can maintain security. In addition, when receiving a password through the ARS, there is a high effect that the information is not likely to leak through attacks, such as viruses, worms, or malware in the data communication network. In addition, in the case of a telephone call, unlike a packet communication network, eavesdropping / tapping is very difficult. The identity authentication system 100 can effectively prevent vulnerabilities for man-in-the-middle attacks because it receives various information necessary for identity authentication via a telephone call having such a feature.
- a channel i.e., a data communication network such as a wired or wireless internet
- a channel i.e., a telephone network
- the identity authentication system 100 via a connected telephone call, has a first password pw1 corresponding to authentication information previously stored in the DB 180 and a second corresponding to the one-time authentication information.
- Password information including the password pw2 may be input (S190). For example, when the user is guided as shown in FIG. 6, the user places four characters corresponding to the first password after the second, third, and fourth digits of the one-time authentication information 452178. Password information can be entered after the sixth digit.
- the identity verification system 100 may perform identity verification with the input password information.
- the user authentication system 100 may determine whether the first password is the same as previously stored authentication information (S200).
- the identity authentication system 100 may determine whether the voice signal is uttered by the user through voice text analysis (S210). The second password may be recognized by performing voice recognition on the signal (S220).
- the one-time authentication information is discarded immediately after the authentication process so that it cannot be used for the next authentication, so that other people may overhear it. Therefore, as described above, in the case of the embodiment in which the password information corresponding to the one-time authentication information is input by voice, input convenience can be provided to the user while maintaining security.
- the one-time authentication information is input as the voice signal, it may be guaranteed that the voice information to be uttered is not previously recorded. Therefore, by confirming that the voice signal is uttered by a legitimate user through voiceprint analysis, it is possible to clearly ensure that the person who has confirmed the one-time authentication information (that is, the person who has made the authentication request) is the legitimate user.
- the identity authentication system 100 transmits the second password to the card company system 300 that issued the one-time authentication information (S230), and the card company system 300 is connected to the second password. It may be determined whether the one-time authentication information is the same, and the determination result may be transmitted to the personal authentication system 100 (S240).
- the identity authentication system 100 may determine whether the user who requested the authentication is a legitimate user, based on a result of the voiceprint analysis, a comparison with the previously stored authentication information, and a comparison with the one-time authentication information. If it is determined that the service can be provided to the user (S260).
- the one-time authentication information discarded after being used once can be used for authentication, thereby preventing a vulnerability to a retransmission attack.
- authentication since authentication is performed through a telephone call as described above, there is an effect that can prevent the vulnerability to the man-in-the-middle attack. After all, according to the technical idea of the present invention there is an effect that can be prevented.
- the first password and the second password are transmitted to the identity authentication system 100 through one procedure (telephone call connected between the person authentication system 100 and the mobile terminal 220), so that the two passwords are separated from each other in one procedure. There is an effect that different authentication procedures are performed at the same time. Therefore, it is possible to obtain higher security than two different methods of authentication, which are weak in man-in-the-middle attack or retransmission attack, respectively.
- the identity authentication system 100 may include a processor and a memory for storing a program executed by the processor.
- the processor may include a single core CPU or a multi core CPU.
- the memory may include fast random access memory and may include nonvolatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other nonvolatile solid state memory devices. Access to memory by the processor and other components may be controlled by the memory controller.
- the user authentication system 100 when the program is executed by the processor, the user authentication system 100 according to the present embodiment may allow the above-described method of providing the user authentication system.
- the method for providing a user authentication system may be implemented in a computer-readable program command form and stored in a computer-readable recording medium.
- the program may also be stored in a computer-readable recording medium.
- the computer-readable recording medium includes all kinds of recording devices in which data that can be read by a computer system is stored.
- the program instructions recorded on the recording medium may be those specially designed and constructed for the present invention, or may be known and available to those skilled in the software art.
- Examples of computer-readable recording media include magnetic media such as hard disks, floppy disks, and magnetic tape, optical media such as CD-ROMs, DVDs, floppy disks, and the like. Included are hardware devices specifically configured to store and execute the same magneto-optical media and program instructions such as ROM, RAM, flash memory, and the like.
- the above-described medium may be a transmission medium such as an optical or metal wire, a waveguide, or the like including a carrier wave for transmitting a signal specifying a program command, a data structure, and the like.
- the computer readable recording medium can also be distributed over network coupled computer systems so that the computer readable code is stored and executed in a distributed fashion.
- Examples of program instructions include not only machine code generated by a compiler, but also devices that process information electronically using an interpreter, for example, high-level language code that can be executed by a computer.
- the hardware device described above may be configured to operate as one or more software modules to perform the operations of the present invention, and vice versa.
- the present invention can be applied to a system for authenticating a user.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Acoustics & Sound (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
๋ณธ ๋ฐ๋ช ์ ์ ์ ๊ฐ ์์ ์ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ์ด์ฉํ์ฌ ์์ ์ด ์์ ์ ์๋น์ค(์๋ฅผ ๋ค๋ฉด, ์จ๋ผ์ธ ๊ฒฐ์ )๋ฅผ ์ด์ฉํ ๊ถํ์ด ์๋ ์ ๋นํ ์ฌ์ฉ์์์ ํ์ธํ ์ ์๋๋ก ํ๋ ๋ณธ์ธ ์ธ์ฆ ์์คํ ๋ฐ ๊ทธ ์ ๊ณต๋ฐฉ๋ฒ์ ๊ดํ ๊ฒ์ผ๋ก์, ๋ณด๋ค ์์ธํ๊ฒ๋ ๋ณธ์ธ ์ธ์ฆ์ ์์ฒญํ๋ ์ฑ๋๊ณผ ๋ณธ์ธ ์ธ์ฆ์ ํ์ํ ํจ์ค์๋๋ฅผ ์ ๋ ฅํ๊ธฐ ์ํ ์ฑ๋์ ๋ถ๋ฆฌํจ์ผ๋ก์จ ๋ณด์์ฑ์ ๋์ผ ์ ์์ผ๋ฉฐ, ์ค๊ฐ์ ๊ณต๊ฒฉ(man-in-the-middle-attack) ๋ฐ ์ฌ์ ์ก ๊ณต๊ฒฉ(reply attack)์ ๋ฐฉ์งํจ์ผ๋ก์จ ๋ถ์ธ๋ฐฉ์ง๊ฐ ๊ฐ๋ฅํ ๋ณธ์ธ ์ธ์ฆ ์์คํ ๋ฐ ๊ทธ ์ ๊ณต๋ฐฉ๋ฒ์ ๊ดํ ๊ฒ์ด๋ค.The present invention relates to an identity authentication system and a method of providing the same, which allow a user to verify that he or she is a legitimate user authorized to use a predetermined service (for example, online payment) using his mobile phone number. In detail, the security can be increased by separating the channel for requesting authentication from the channel for inputting the password required for authentication, and man-in-the-middle-attack and rely attack. The present invention relates to a self-authentication system capable of preventing repudiation and a method of providing the same.
์ต๊ทผ์ ๋ค์ด ์ ๋ฌด์ ํต์ ๋ง์ด ๋ฐ๋ฌํ๊ณ , ์ปดํจํฐ์ ์ธํฐ๋ท์ด ๊ฐ ๊ฐ์ ์ ๋ณด๊ธ๋จ์ ๋ฐ๋ผ ์จ๋ผ์ธ ์๊ฑฐ๋๋ ์ธํฐ๋ท ๋ฑ ํน ๋ฑ๊ณผ ๊ฐ์ ๋ค์ํ ์จ๋ผ์ธ ์๋น์ค ์ ๊ณต๋๊ณ ์๋ค. ์ด๋ฌํ ์๋น์ค๋ค์ ๊ทธ ํน์ฑ์ ์ฌ์ฉ์๊ฐ ์๋น์ค๋ฅผ ์ด์ฉํ ์ ๋นํ ๊ถํ์ด ์๋ ์ฌ์ฉ์์ธ์ง๋ฅผ ํ์ธํ๋ ๋ณธ์ธ ์ธ์ฆ์ด ๋งค์ฐ ์ค์ํ๋ค.Recently, with the development of wired and wireless communication networks and the spread of computers and the Internet in each home, various online services such as online commerce and internet banking have been provided. These services, by their very nature, are very important for identity verification to ensure that the user is a legitimate user.
๋ณธ์ธ ์ธ์ฆ์ ํน์ ์๋น์ค(์๋ฅผ ๋ค๋ฉด, ์จ๋ผ์ธ ๊ฒฐ์ ๋ฑ)๋ฅผ ์์ฒญํ๋ ์ฃผ์ฒด๊ฐ ์ ๋นํ ์ฌ์ฉ์์์ ํ์ธํ๋ ์ ์ฐจ๋ฅผ ๋งํ๋ค. ๋ณธ์ธ ์ธ์ฆ์ ์ํด์๋ ํต์์ ์ผ๋ก ๋ฏธ๋ฆฌ ๋ฑ๋ก๋ ๋น๋ฐ๋ฒํธ๋ ๋ณด์ํค๋ฅผ ์ด์ฉํ์ฌ ์ ๋นํ ์ฌ์ฉ์๋ฅผ ์ธ์ฆํ๋ ๋ฐฉ๋ฒ์ด ์ฃผ๋ก ์ฌ์ฉ๋๋๋ฐ, ์ด๋ฌํ ๋ฐฉ๋ฒ์ ๋ถ์ ํ ๊ฒฝ๋ก๋ฅผ ํตํด ์ป์ ์ฌ์ฉ์์ ๊ฐ์ธ์ ๋ณด๋ฅผ ์ด์ฉํ์ฌ ํ์๊ฐ์ ์ ํ๊ฑฐ๋ ์ด๋ฅผ ์ด์ฉํ์ฌ ID๋ ๋น๋ฐ๋ฒํธ๋ฅผ ๋ถ์ ํ๋ํ ์ ์๋ ๋ฌธ์ ์ ์ด ์๋ค.Identity verification refers to the process of verifying that the person requesting a particular service (eg, online payment) is a legitimate user. In order to authenticate a user, a method of authenticating a legitimate user by using a pre-registered password or security key is commonly used. Such a method uses a user's personal information obtained through an illegal channel to register as a member or uses an ID. There is a problem that can be obtained illegally password.
์ด์, ํด๋์ ํ์ ์ธ์ฆ ๋ฒํธ๋ฅผ ์ ์กํ์ฌ, ์ถํ ์ด๋ฅผ ์ ๋ ฅํ๋๋ก ํจ์ผ๋ก์จ ์๋น์ค๋ฅผ ์์ฒญํ๋ ์์ ํด๋์ ํ์ ์ ์ ์๊ฐ ๋์ผ์ธ์์ ํ์ธํ๋ ๋ณธ์ธ ์ธ์ฆ ๋ฐฉ๋ฒ ๋ฑ์ด ๋ฑ์ฅํ๊ณ ์๋๋ฐ, ์ด๋ฌํ ๋ฐฉ๋ฒ๋ค ์ญ์ ์ ์ก๋๋ ๋ฐ์ดํฐ๋ฅผ ์ค๊ฐ์ ๊ฐ๋ก์ฑ๊ฑฐ๋ ๋ฐ์ดํฐ๋ฅผ ๋ถ๋ฒ์ ์ผ๋ก ์์ , ์์ฑํจ์ผ๋ก์จ ์ด๋ฃจ์ด์ง๋ ์ค๊ฐ์ ๊ณต๊ฒฉ(man-in-the-middle attack)์ด๋ ๋ถ์ ํ ๋ฐฉ๋ฒ์ ์ํด ํจ์ค์๋ ๋ฑ์ ๋ณด์ ์ ๋ณด๋ฅผ ์ทจ๋ํ๊ณ ํ์ ์ด๋ฅผ ์ฌ์ ์กํจ์ผ๋ก์จ ์ ๋นํ ์ฌ์ฉ์๋ก ๊ฐ์ฅํ๋ ์ฌ์ ์ก ๊ณต๊ฒฉ(reply attack) ๋ฑ์ ๋งค์ฐ ์ทจ์ฝํ ์ธก๋ฉด์ ๋ณด์ฌ์ค๋ค. ๊ทธ๋ฆฌ๊ณ ์ด๋ฌํ ์ค๊ฐ์ ๊ณต๊ฒฉ ๋๋ ์ฌ์ ์ก ๊ณต๊ฒฉ์ด ๊ฐ๋ฅํ ๊ฒฝ์ฐ์๋ ์ธ์ฆ์์ฒญ์ ์ํํ๋ ์๊ฐ ์ธ์ฆ์์ฒญ์ด ์์ ์ ์ํ ๊ฒ์ด ์๋๋ผ๊ณ ๋ถ์ธํ ์ ์์ด์ ์์คํ ์ ์ ๋ขฐ์ฑ์ ์ฌ๊ฐํ ์ํฅ์ ๋ผ์น๊ฒ ๋๋ค.Therefore, a user authentication method for confirming that the person requesting the service and the occupant of the mobile phone is the same person by transmitting an authentication number to the mobile phone and inputting it later appears, and these methods also include data transmitted in the middle. Man-in-the-middle attack by intercepting or illegally modifying or generating data, or by relying on security information such as passwords by illegal methods, and retransmitting it later to replicate It is very vulnerable to attack. If such a man-in-the-middle attack or a retransmission attack is possible, the person performing the authentication request can deny that the authentication request is not by itself, which seriously affects the reliability of the system.
ํํธ, ์ต๊ทผ์๋ ํผ์ฑ(Phishing) ๊ธฐ๋ฒ๋ ๋ ๋ก ๊ต๋ฌํด์ง๊ณ ์์ผ๋ฉฐ, SMS๋ฅผ ์ด์ฉํ ์ค๋ฏธ์ฑ(Smishing)๊ณผ ๊ฐ์ ํผ์ฑ ๊ธฐ๋ฒ์ด ๋ํ๋๊ณ ์๋ค. ์ค๋ฏธ์ฑ์ ๋ถ๋ฒ ์ฌ์ดํธ๋ก ์ด๋๋๋๋ก ํ๋ ๋ฌธ์ ๋ฉ์์ง๋ฅผ ๋ณด๋ด ํด๋ํฐ ์ฌ์ฉ์๊ฐ ์น์ฌ์ดํธ์ ์ ์ํ๋ฉด ๊ฐ์ธ ์ ๋ณด๋ฅผ ๋นผ๋ด๊ฑฐ๋ ํธ๋ก์ด๋ชฉ๋ง๋ฅผ ์ฃผ์ ํด ์ธํฐ๋ท ์ฌ์ฉ์ด ๊ฐ๋ฅํ ํด๋์ ํ๋ฅผ ํต์ ํ ์ ์๊ฒ ๋ง๋๋ ๊ฒ์ผ๋ก์, ์๋ฅผ ๋ค์ด ์ธ๋ถ์์ ๋ฐ์ ์ด๋ฒคํธ๋ก ๊ฐ์ฅํ ๋ฌธ์๋ฅผ ํด๋ฆญํ๊ฒ ๋๋ฉด ์๋์ผ๋ก ๋ฉ์จ์ด(malware)์ ์ค์นํ๊ฒ ๋๊ฑฐ๋ ์ฌ์ฉ์๋ ๋ชจ๋ฅด๊ฒ ์ฌ์ฉ์์ ๋ณด์์ ๋ณด๋ฅผ ๊ฐ๋ก์ฑ์ด ์์ก๊ฒฐ์ ๋ฅผ ์น์ธํ๋ ๋ฑ์ ํผํด๋ฅผ ์ ๋ฐํ๊ฒ ๋๋ ํผ์ฑ ๋ฐฉ๋ฒ์ธ๋ฐ, ์ต๊ทผ์๋ ๋ถ๋ฒ์ ์ธ ๋ฐฉ๋ฒ์ผ๋ก ์ฌ์ฉ์์ ์ธ์ฆ ์ ๋ณด๋ฅผ ์ทจ๋ํ๊ธฐ ์ํ์ฌ ์ด๋ฌํ ์ค๋ฏธ์ฑ ๊ธฐ๋ฒ์ด ์ ๊ทน์ ์ผ๋ก ์ด์ฉ๋๊ณ ์๋ ์ถ์ธ์ด๋ค. ์ด๋ฌํ ๊ฒฝ์ฐ๋ ๊ฒฐ๊ตญ์๋ ์ค๊ฐ์ ๊ณต๊ฒฉ์ด ๊ฐ๋ฅํ์ฌ ๋ถ์ธ๋ฐฉ์ง๊ฐ ์ด๋ ต๋ค๋ ๋ฌธ์ ์ ์ด ์๋ค.On the other hand, in recent years, phishing schemes have also been increasingly sophisticated, and phishing schemes such as smishing using SMS have emerged. Smishing sends text messages that lead to illegal sites, allowing cell phone users to access a website to steal personal information or inject Trojans to control Internet-enabled mobile phones. Clicking on the masqueraded event as a received event automatically installs malware (malware) or steals your security information without your knowledge and causes damage such as approving a small payment. In order to obtain the authentication information of the user as a method, such a smishing technique is actively used. Even in such a case, there is a problem in that the man-in-the-middle attack is possible, thus preventing repudiation.
์จ๋ผ์ธ ๊ฒฐ์ ๋ ๊ธ์ต๊ฑฐ๋ ๋ฑ์ ๊ฒฝ์ฐ์๋ ์ด๋ฌํ ๊ณต๊ฒฉ์ ์ํด ๋์ดํฌ ์ ์๋ ํผํด๊ฐ ๋ฐ์ํ ์ ์์ผ๋ฏ๋ก, ์ด๋ฌํ ์ธํฐ๋ท ์๋น์ค์์๋ ์์ ํ ์ค๊ฐ์ ๊ณต๊ฒฉ์ด๋ ์ฌ์ ์ก ๊ณต๊ฒฉ, ๊ทธ๋ฆฌ๊ณ ์ค๋ฏธ์ฑ ๋ฑ์ ์ํ ๊ณต๊ฒฉ ๋ฑ์ ํจ๊ณผ์ ์ผ๋ก ๋ฐฉ์งํ์ฌ ๋ถ์ธ๋ฐฉ์ง๊ฐ ๊ฐ๋ฅํ ๋์ ์์ค์ ๋ณด์์ฑ์ ๊ตฌ๋นํ ๋ณธ์ธ ์ธ์ฆ ๋ฐฉ๋ฒ์ด ์ ์คํ ์๊ตฌ๋๋ค.In the case of online payment or financial transactions, such an attack may cause irreversible damage. Therefore, such an Internet service effectively prevents the above-mentioned man-in-the-middle attack, retransmission attack, and attack by smishing and the like, and has high reproducibility. There is an urgent need for an authentication method with a high level of security.
๋ฐ๋ผ์, ๋ณธ ๋ฐ๋ช ์ ์์ ํ ์ ๋ฌธ์ ์ ์ ํด๊ฒฐํ๊ธฐ ์ํด ์์ถ๋ ๋ฐ๋ช ์ผ๋ก์จ, ๋ณธ ๋ฐ๋ช ์ด ์ด๋ฃจ๊ณ ์ ํ๋ ๊ธฐ์ ์ ์ธ ๊ณผ์ ๋ ๋ถ์ธ๋ฐฉ์ง๊ฐ ๊ฐ๋ฅํ ๋์ ๋ณด์์ฑ์ ํ๋ณดํจ์ผ๋ก์จ ์ค๊ฐ์ ๊ณต๊ฒฉ์ด๋ ์ฌ์ ์ก ๊ณต๊ฒฉ ๋ฑ์๋ ์ทจ์ฝํ์ง ์์ ๋ณธ์ธ ์ธ์ฆ ์์คํ ๋ฐ ๊ทธ ์ ๊ณต๋ฐฉ๋ฒ์ ์ ๊ณตํ๋ ๊ฒ์ด๋ค.Therefore, the present invention has been made to solve the above-mentioned problems, the technical problem to be achieved by the present invention is to secure a high security that can be prevented by the identity authentication system that is not vulnerable to man-in-the-middle attack or retransmission attack And it provides a method of providing the same.
๋ณธ ๋ฐ๋ช ์ ์ผ ์ธก๋ฉด์ ๋ฐ๋ฅด๋ฉด, ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๊ณต๋ฐฉ๋ฒ์ผ๋ก์, (a) ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์ ์ ์ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ์ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ํฌํจํ๋ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์๊ธฐ ์ ์ ์ ์ ์ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์ ๋ฌด์ ๋ฐ์ดํฐ ํต์ ๋ง์ ํตํด ์์ ํ๋ ๋จ๊ณ, (b) ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์์ํ๋ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๊ฐ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ๋ก ์ ์ก๋๋๋ก ํ๋ ๋จ๊ณ, (c) ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์์ ํ ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ํฌํจ๋ ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ์ด์ฉํ์ฌ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ์ ์ ํ ํธ๋ฅผ ์ฐ๊ฒฐํ๋ ๋จ๊ณ, (d) ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์๊ธฐ ์ ํ ํธ๋ฅผ ํตํด ์ 1ํจ์ค์๋ ๋ฐ ์ 2ํจ์ค์๋๋ฅผ ์์ ํ๋ ๋จ๊ณ ๋ฐ (e) ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์์ ํ ์๊ธฐ ์ 1ํจ์ค์๋๊ฐ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ์ ๋ณด์ ์ผ์นํ๊ณ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์์ ํ ์๊ธฐ ์ 2ํจ์ค์๋๊ฐ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ๋ก ์ ์ก๋ ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ์ผ์นํ๋ ๊ฒฝ์ฐ, ๋ณธ์ธ ์ธ์ฆ์ด ์ฑ๊ณตํ์๋ค๊ณ ํ๋จํ๋ ๋จ๊ณ๋ฅผ ํฌํจํ๋ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๊ณต๋ฐฉ๋ฒ์ด ์ ๊ณต๋๋ค.According to an aspect of the present invention, as a method for providing an identity authentication system, (a) the identity authentication system sends an identity authentication request including a mobile telephone number of a user's mobile terminal from a user's user terminal through a wired or wireless data communication network; Receiving, (b) the identity authentication system, the one-time authentication information corresponding to the identity authentication request to be transmitted to the user terminal, (c) the identity verification system, included in the received identity authentication request Connecting a telephone call with the mobile terminal using the mobile telephone number, (d) the first authentication system receiving a first password and a second password through the telephone call from the mobile terminal; and e) the first password received from the mobile terminal and the authentication information previously stored in the identity authentication system; Value and if a second password received from the mobile terminal matches the authentication information, the one-time transmission to the user terminal, there is provided a method for providing identity authentication system comprising: I determined that authentication is successful.
์ผ ์ค์์์์, ์๊ธฐ (d) ๋จ๊ณ๋, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์๊ธฐ ์ ํ ํธ๋ฅผ ํตํด ์๊ธฐ ์ 2ํจ์ค์๋์ ์์ํ๋ ์์ฑ์ ํธ๋ฅผ ์์ ํ๋ ๋จ๊ณ ๋ฐ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์์ฑ์ธ์์ ํตํ์ฌ ์๊ธฐ ์์ฑ์ ํธ๋ก๋ถํฐ ์๊ธฐ ์ 2ํจ์ค์๋๋ฅผ ์ธ์ํ๋ ๋จ๊ณ๋ฅผ ํฌํจํ ์ ์๋ค.In an embodiment, the step (d) may include: receiving, by the identity authentication system, a voice signal corresponding to the second password through the telephone call, and by the identity authentication system, the voice signal through voice recognition. Recognizing the second password from may include.
์ผ ์ค์์์์, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๊ณต๋ฐฉ๋ฒ์, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์๊ธฐ ์์ฑ์ ํธ๋ฅผ ์ฑ๋ฌธ๋ถ์ํ์ฌ ์๊ธฐ ์์ฑ์ ํธ๊ฐ ์๊ธฐ ์ ์ ์ ์ํด ๋ฐํ๋์๋์ง ์ฌ๋ถ๋ฅผ ํ๋จํ๋ ๋จ๊ณ๋ฅผ ๋ ํฌํจํ๋ฉฐ, ์๊ธฐ (e) ๋จ๊ณ๋, ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์์ ํ ์๊ธฐ ์ 1ํจ์ค์๋๊ฐ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ์ ๋ณด์ ์ผ์นํ๊ณ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์์ ํ ์๊ธฐ ์ 2ํจ์ค์๋๊ฐ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ๋ก ์ ์ก๋ ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ์ผ์นํ๊ณ ์๊ธฐ ์ 2ํจ์ค์๋์ ์์ํ๋ ์์ฑ์ ํธ๊ฐ ์๊ธฐ ์ ์ ์ ์ํด ๋ฐํ๋ ๊ฒ์ผ๋ก ํ๋จ๋๋ ๊ฒฝ์ฐ, ๋ณธ์ธ ์ธ์ฆ์ด ์ฑ๊ณตํ์๋ค๊ณ ํ๋จํ๋ ๋จ๊ณ๋ฅผ ํฌํจํ ์ ์๋ค.In one embodiment, the method of providing a personal authentication system further includes the step of the user authentication system analyzing the voice signal to determine whether the voice signal is uttered by the user, and (e) The first password received from the mobile terminal matches the authentication information previously stored in the identity authentication system, and the second password received from the mobile terminal matches the one-time authentication information transmitted to the user terminal. If it is determined that the voice signal corresponding to the second password is uttered by the user, it may include determining that the identity authentication is successful.
์ผ ์ค์์์์, ์๊ธฐ (d) ๋จ๊ณ๋, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์๊ธฐ ์ ํ ํธ๋ฅผ ํตํด ์๊ธฐ ์ 1ํจ์ค์๋์ ์์ํ๋ DTMF์ ํธ๋ฅผ ์์ ํ๋ ๋จ๊ณ๋ฅผ ๋ ํฌํจํ ์ ์๋ค.In an embodiment, the step (d) may further include receiving, by the identity verification system, a DTMF signal corresponding to the first password through the telephone call.
์ผ ์ค์์์์, ์๊ธฐ (c) ๋จ๊ณ๋, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ก ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด ํตํ์ฐ๊ฒฐ์ ์๋ํ ๊ฒฝ์ฐ์ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง์ ์ถ๋ ฅ๋ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๋ฐ์ ๋ฒํธ๊ฐ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ์ ์ถ๋ ฅ๋๋๋ก ํ๋ ๋จ๊ณ ๋ฐ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์์ ํ ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ํฌํจ๋ ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ์ด์ฉํ์ฌ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ์ ์ ํ ํธ๋ฅผ ์ฐ๊ฒฐํ๋ ๋จ๊ณ๋ฅผ ํฌํจํ ์ ์๋ค.In one embodiment, the step (c), the identity authentication system, when the identity authentication system attempts a call connection to the mobile telephone number is the source number of the identity authentication system to be output to the mobile terminal is Outputting to a user terminal and connecting the telephone call with the mobile terminal using the mobile telephone number included in the received personal authentication request.
์ผ ์ค์์์์, ์๊ธฐ (c) ๋จ๊ณ๋, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ก ํตํ์ฐ๊ฒฐ์ ์๋ํ๋ ๋จ๊ณ, ์๊ธฐ ํตํ์ฐ๊ฒฐ์ด ์ฑ๊ณตํ์ง ๋ชปํ๋ฉด, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ก ์ฝ๋ฐฑ ๋ฉ์์ง๋ฅผ ์ ์กํ๋ ๋จ๊ณ ๋ฐ ์ ์ก๋ ์๊ธฐ ์ฝ๋ฐฑ ๋ฉ์์ง๋ฅผ ์ด์ฉํ์ฌ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์๊ธฐ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ผ๋ก ์ ํ ํธ๊ฐ ์ฐ๊ฒฐ๋๋ ๋จ๊ณ๋ฅผ ํฌํจํ ์ ์๋ค.In one embodiment, the step (c), the identity authentication system, attempting a call connection to the mobile phone number, if the call connection is not successful, the identity authentication system, callback to the mobile phone number The method may include transmitting a message and connecting a telephone call from the mobile terminal to the identity authentication system using the transmitted callback message.
์ผ ์ค์์์์, ์๊ธฐ (b) ๋จ๊ณ๋, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์์ ์ ๋ฐ๊ธ์๋ฒ๋ก ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์์ํ๋ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ๋ฐ๊ธ์์ฒญ์ ์ ์กํ๋ ๋จ๊ณ๋ฅผ ํฌํจํ๋, ์๊ธฐ ๋ฐ๊ธ์๋ฒ๋, ์๊ธฐ ๋ฐ๊ธ์์ฒญ์ ์๋ตํ์ฌ, ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ๋ฐ๊ธํ๊ณ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ๋ก ์ ์กํ ์ ์๋ค.In an embodiment, the step (b) may include the step of transmitting, by the identity authentication system, an issuance request of one-time authentication information corresponding to the identity authentication request to a predetermined issuing server, wherein the issuing server is configured as: In response to the issuance request, the one-time authentication information may be issued and transmitted to the user terminal.
์ผ ์ค์์์์, ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์, ์์ ์ ์ฒดํฌ์ ๋ณด๋ฅผ ๋ ํฌํจํ๋ฉฐ, ์๊ธฐ (b) ๋จ๊ณ๋, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์๊ธฐ ์ฒดํฌ์ ๋ณด๊ฐ ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ์ ์์ํ๋์ง ํ๋จํ๋ ๋จ๊ณ ๋ฐ ํ๋จ๊ฒฐ๊ณผ ์์ํ๋ ๊ฒฝ์ฐ, ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์์ํ๋ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๊ฐ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ๋ก ์ ์ก๋๋๋ก ํ๋ ๋จ๊ณ๋ฅผ ํฌํจํ ์ ์๋ค.In one embodiment, the identity authentication request further includes a predetermined check information, and the step (b), the identity verification system, the step of determining whether the check information corresponds to the mobile phone number and the determination result If it corresponds, the method may include transmitting one-time authentication information corresponding to the identity authentication request to the user terminal.
๋ณธ ๋ฐ๋ช ์ ๋ค๋ฅธ ์ผ ์ธก๋ฉด์ ๋ฐ๋ฅด๋ฉด, ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๊ณต๋ฐฉ๋ฒ์ผ๋ก์, (a) ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์ ์ ์ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ์ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ํฌํจํ๋ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์๊ธฐ ์ ์ ์ ์ ์ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์ ๋ฌด์ ๋ฐ์ดํฐ ํต์ ๋ง์ ํตํด ์์ ํ๋ ๋จ๊ณ, (b) ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์์ํ๋ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๊ฐ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ๋ก ์ ์ก๋๋๋ก ํ๋ ๋จ๊ณ, (c) ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ก ์ฝ๋ฐฑ ๋ฉ์์ง๋ฅผ ์ ์กํ๊ณ , ์ ์ก๋ ์๊ธฐ ์ฝ๋ฐฑ ๋ฉ์์ง์ ์ํ์ฌ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ผ๋ก ์ ํ ํธ๊ฐ ์ฐ๊ฒฐ๋๋ ๋จ๊ณ, (d) ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์๊ธฐ ์ ํ ํธ๋ฅผ ํตํด ์ 1ํจ์ค์๋ ๋ฐ ์ 2ํจ์ค์๋๋ฅผ ์์ ํ๋ ๋จ๊ณ ๋ฐ (e) ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์์ ํ ์๊ธฐ ์ 1ํจ์ค์๋๊ฐ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ์ ๋ณด์ ์ผ์นํ๊ณ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์์ ํ ์๊ธฐ ์ 2ํจ์ค์๋๊ฐ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ๋ก ์ ์ก๋ ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ์ผ์นํ๋ ๊ฒฝ์ฐ, ๋ณธ์ธ ์ธ์ฆ์ด ์ฑ๊ณตํ์๋ค๊ณ ํ๋จํ๋ ๋จ๊ณ๋ฅผ ํฌํจํ๋ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๊ณต๋ฐฉ๋ฒ์ด ์ ๊ณต๋๋ค.According to another aspect of the present invention, there is provided a method for providing an identity authentication system, wherein (a) the identity authentication system requests a user authentication request including a mobile phone number of a mobile terminal of a user from a user terminal of a wired / wireless data communication network. Receiving through, (b) the identity authentication system, the one-time authentication information corresponding to the identity authentication request is transmitted to the user terminal, (c) the identity authentication system, the call back message to the mobile phone number Transmitting a telephone call from the mobile terminal to the identity authentication system according to the transmitted callback message, and (d) the identity authentication system using a first password and a second call from the mobile terminal through the telephone call. Receiving a password and (e) the first password received from the mobile terminal Determining that the user authentication is successful when the second password received from the mobile terminal matches the one-time authentication information transmitted from the mobile terminal and matches the authentication information previously stored in the user authentication system. A method for providing an authentication system is provided.
๋ณธ ๋ฐ๋ช ์ ๋ค๋ฅธ ์ผ ์ธก๋ฉด์ ๋ฐ๋ฅด๋ฉด, ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๊ณต๋ฐฉ๋ฒ์ผ๋ก์, (a) ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์ ์ ์ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ์ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ํฌํจํ๋ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์๊ธฐ ์ ์ ์ ์ ์ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์ ๋ฌด์ ๋ฐ์ดํฐ ํต์ ๋ง์ ํตํด ์์ ํ๋ ๋จ๊ณ, (b) ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์์ํ๋ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๊ฐ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ๋ก ์ ์ก๋๋๋ก ํ๋ ๋จ๊ณ, (c) ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์์ ํ ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ํฌํจ๋ ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ์ด์ฉํ์ฌ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก ์ ํ ํธ๋ฅผ ์ฐ๊ฒฐํ๋ ๋จ๊ณ ๋ฐ (d) ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์๊ธฐ ์ ํ ํธ๋ฅผ ํตํด ์์ฑ์ ํธ๋ฅผ ์์ ํ๋ ๋จ๊ณ, (e) ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด, ์๊ธฐ ์์ฑ์ ํธ์ ๋ํ ์์ฑ์ธ์์ ์ํํ๋ ๋จ๊ณ ๋ฐ (f) ์๊ธฐ ์์ฑ์ ํธ์ ๋ํ ์์ฑ์ธ์ ๊ฒฐ๊ณผ๊ฐ ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ์ผ์นํ๋ ๊ฒฝ์ฐ, ๋ณธ์ธ ์ธ์ฆ์ด ์ฑ๊ณตํ์๋ค๊ณ ํ๋จํ๋ ๋จ๊ณ๋ฅผ ํฌํจํ๋ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๊ณต๋ฐฉ๋ฒ์ด ์ ๊ณต๋๋ค.According to another aspect of the present invention, there is provided a method for providing an identity authentication system, wherein (a) the identity authentication system requests a user authentication request including a mobile phone number of a mobile terminal of a user from a user terminal of a wired / wireless data communication network. (B) allowing the identity verification system to transmit one-time authentication information corresponding to the identity verification request to the user terminal, and (c) the identity verification system to the received identity verification request. Connecting a telephone call to the mobile terminal using the included mobile telephone number; and (d) receiving, by the identity verification system, a voice signal from the mobile terminal through the telephone call; An authentication system performing voice recognition on the voice signal; and (f) voice recognition result on the voice signal. When matched with the one-time authentication information, there is provided a method for providing identity authentication system comprising: I determined that authentication is successful.
์ผ ์ค์์์์, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๊ณต๋ฐฉ๋ฒ์ ์๊ธฐ ์์ฑ์ ํธ๋ฅผ ์ฑ๋ฌธ๋ถ์ํ์ฌ, ์๊ธฐ ์์ฑ์ ํธ๊ฐ ์๊ธฐ ์ ์ ์ ์ํด ๋ฐํ๋์๋์ง ์ฌ๋ถ๋ฅผ ํ๋จํ๋ ๋จ๊ณ๋ฅผ ๋ ํฌํจํ๋ฉฐ, ์๊ธฐ (f) ๋จ๊ณ๋, ์๊ธฐ ์์ฑ์ ํธ์ ๋ํ ์์ฑ์ธ์ ๊ฒฐ๊ณผ๊ฐ ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ์ผ์นํ๊ณ ์๊ธฐ ์์ฑ์ ํธ๊ฐ ์๊ธฐ ์ ์ ์ ์ํด ๋ฐํ๋ ๊ฒ์ผ๋ก ํ๋จ๋๋ ๊ฒฝ์ฐ, ๋ณธ์ธ ์ธ์ฆ์ด ์ฑ๊ณตํ์๋ค๊ณ ํ๋จํ๋ ๋จ๊ณ๋ฅผ ํฌํจํ ์ ์๋ค.In one embodiment, the method for providing the identity authentication system further includes a step of analyzing the voice signal to determine whether the voice signal is uttered by the user, and the step (f) includes: If it is determined that the voice recognition result with respect to the one-time authentication information and the voice signal is uttered by the user, it may include the step of determining that the identity authentication is successful.
๋ณธ ๋ฐ๋ช ์ ๋ค๋ฅธ ์ผ ์ธก๋ฉด์ ๋ฐ๋ฅด๋ฉด, ์์ ํ ๋ฐฉ๋ฒ์ ์ํํ๊ธฐ ์ํ ํ๋ก๊ทธ๋จ์ ๊ธฐ๋กํ ์ปดํจํฐ ํ๋ ๊ฐ๋ฅํ ๊ธฐ๋ก๋งค์ฒด๊ฐ ์ ๊ณต๋๋ค.According to another aspect of the present invention, there is provided a computer-readable recording medium having recorded thereon a program for performing the above method.
๋ณธ ๋ฐ๋ช ์ ๋ค๋ฅธ ์ผ ์ธก๋ฉด์ ๋ฐ๋ฅด๋ฉด, ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ผ๋ก์, ํ๋ก์ธ์, ํ๋ก๊ทธ๋จ์ ์ ์ฅํ๊ณ ์๋ ๋ฉ๋ชจ๋ฆฌ๋ฅผ ํฌํจํ๋ฉฐ, ์๊ธฐ ํ๋ก๊ทธ๋จ์, ์๊ธฐ ํ๋ก์ธ์์ ์ํด ์คํ๋๋ ๊ฒฝ์ฐ, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด ์์ ํ ๋ฐฉ๋ฒ์ ์ํํ๋๋ก ํ๋ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด ์ ๊ณต๋๋ค.According to another aspect of the present invention, an identity authentication system includes a processor and a memory storing a program, wherein the program, when executed by the processor, causes the identity authentication system to perform the above-described method. An identity authentication system is provided.
๋ณธ ๋ฐ๋ช ์ ๋ค๋ฅธ ์ผ ์ธก๋ฉด์ ๋ฐ๋ฅด๋ฉด, ์ ์ ์ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ์ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ํฌํจํ๋ฉฐ ์์ ์ ์๋น์ค์ ์์ํ๋ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์๊ธฐ ์ ์ ์ ์ ์ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์ ๋ฌด์ ๋ฐ์ดํฐ ํต์ ๋ง์ ํตํด ์์ ํ๋ ์์ฒญ์์ ๋ชจ๋, ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์์ํ๋ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๊ฐ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ๋ก ์ ์ก๋๋๋ก ํ๋ ์ผํ์ฑ์ธ์ฆ์ ๋ณด๋ชจ๋, ์์ ํ ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ํฌํจ๋ ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ์ด์ฉํ์ฌ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ์ ์ ํ ํธ๋ฅผ ์ฐ๊ฒฐํ๋ ์ ํํธ๋ชจ๋, ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์๊ธฐ ์ ํ ํธ๋ฅผ ํตํด ์ 1ํจ์ค์๋ ๋ฐ ์ 2ํจ์ค์๋๋ฅผ ์์ ํ๋ ํจ์ค์๋์์ ๋ชจ๋ ๋ฐ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์์ ํ ์๊ธฐ ์ 1ํจ์ค์๋๊ฐ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ์ ๋ณด์ ์ผ์นํ๊ณ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์์ ํ ์๊ธฐ ์ 2ํจ์ค์๋๊ฐ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ๋ก ์ ์ก๋ ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ์ผ์นํ๋ ๊ฒฝ์ฐ, ๋ณธ์ธ ์ธ์ฆ์ด ์ฑ๊ณตํ์๋ค๊ณ ํ๋จํ๋ ์ ์ด๋ชจ๋์ ํฌํจํ๋ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด ์ ๊ณต๋๋ค.According to another aspect of the present invention, a request receiving module including a mobile phone number of the user's mobile terminal and receives a user authentication request corresponding to a predetermined service from the user's user terminal through a wired or wireless data communication network, the user authentication A one-time authentication information module for transmitting one-time authentication information corresponding to the request to the user terminal, a phone call module for connecting a phone call with the mobile terminal by using the mobile phone number included in the received identity authentication request; A password receiving module for receiving a first password and a second password through the telephone call from a mobile terminal and the first password received from the mobile terminal correspond to authentication information previously stored in the identity authentication system and received from the mobile terminal. The second password is the user end When a match the one time authentication information transmission group, is provided with a person authentication system including a control module that determines that identity authentication is successful.
์ผ ์ค์์์์, ์๊ธฐ ํจ์ค์๋์์ ๋ชจ๋์, ์๊ธฐ ์ ํ ํธ๋ฅผ ํตํด ์๊ธฐ ์ 2ํจ์ค์๋์ ์์ํ๋ ์์ฑ์ ํธ๋ฅผ ์์ ํ๊ณ , ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์, ์์ฑ์ธ์์ ํตํ์ฌ ์๊ธฐ ์์ฑ์ ํธ๋ก๋ถํฐ ์๊ธฐ ์ 2ํจ์ค์๋๋ฅผ ์ธ์ํ๋ ์์ฑ์ธ์๋ชจ๋์ ๋ ํฌํจํ ์ ์๋ค.In one embodiment, the password receiving module receives a voice signal corresponding to the second password through the telephone call, and the identity authentication system recognizes the second password from the voice signal through voice recognition. It may further include a voice recognition module.
์ผ ์ค์์์์, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์, ์๊ธฐ ์์ฑ์ ํธ๋ฅผ ์ฑ๋ฌธ๋ถ์ํ์ฌ ์๊ธฐ ์์ฑ์ ํธ๊ฐ ์๊ธฐ ์ ์ ์ ์ํด ๋ฐํ๋์๋์ง ์ฌ๋ถ๋ฅผ ํ๋จํ๋ ์ฑ๋ฌธ๋ถ์๋ชจ๋์ ๋ ํฌํจํ๋ฉฐ, ์๊ธฐ ์ ์ด๋ชจ๋์, ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์์ ํ ์๊ธฐ ์ 1ํจ์ค์๋๊ฐ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ ํจ์ค์๋์ ์ผ์นํ๊ณ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์์ ํ ์๊ธฐ ์ 2ํจ์ค์๋๊ฐ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ๋ก ์ ์ก๋ ์๊ธฐ ์ผํ์ฑ ํจ์ค์๋ ์ค ์ ์ด๋ ์ผ๋ถ์ ์ผ์นํ๊ณ ์๊ธฐ ์ 2ํจ์ค์๋์ ์์ํ๋ ์์ฑ์ ํธ๊ฐ ์๊ธฐ ์ ์ ์ ์ํด ๋ฐํ๋ ๊ฒ์ผ๋ก ํ๋จ๋๋ ๊ฒฝ์ฐ, ๋ณธ์ธ ์ธ์ฆ์ด ์ฑ๊ณตํ์๋ค๊ณ ํ๋จํ ์ ์๋ค.In one embodiment, the identity authentication system further comprises a voiceprint analysis module for determining whether the voice signal is uttered by the user by voice analysis of the voice signal, the control module is received from the mobile terminal The first password matches an authentication password previously stored in the identity authentication system, and the second password received from the mobile terminal matches at least a portion of the one-time password sent to the user terminal and corresponds to the second password. If it is determined that the voice signal is uttered by the user, it can be determined that the authentication of the person is successful.
๋ณธ ๋ฐ๋ช ์ ๋ค๋ฅธ ์ผ ์ธก๋ฉด์ ๋ฐ๋ฅด๋ฉด, ์ ์ ์ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ์ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ํฌํจํ๋ฉฐ ์์ ์ ์๋น์ค์ ์์ํ๋ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์๊ธฐ ์ ์ ์ ์ ์ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์ ๋ฌด์ ๋ฐ์ดํฐ ํต์ ๋ง์ ํตํด ์์ ํ๋ ์์ฒญ์์ ๋ชจ๋, ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์์ํ๋ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๊ฐ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ๋ก ์ ์ก๋๋๋ก ํ๋ ์ผํ์ฑ์ธ์ฆ์ ๋ณด๋ชจ๋, ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ก ์ฝ๋ฐฑ ๋ฉ์์ง๋ฅผ ์ ์กํ๊ณ , ์ ์ก๋ ์๊ธฐ ์ฝ๋ฐฑ ๋ฉ์์ง์ ์ํ์ฌ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ผ๋ก ์ ํ ํธ๊ฐ ์ฐ๊ฒฐ๋๋๋ก ํ๋ ์ ํํธ๋ชจ๋, ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์๊ธฐ ์ ํ ํธ๋ฅผ ํตํด ์ 1ํจ์ค์๋ ๋ฐ ์ 2ํจ์ค์๋๋ฅผ ์์ ํ๋ ํจ์ค์๋์์ ๋ชจ๋ ๋ฐ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์์ ํ ์๊ธฐ ์ 1ํจ์ค์๋๊ฐ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ์ ๋ณด์ ์ผ์นํ๊ณ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์์ ํ ์๊ธฐ ์ 2ํจ์ค์๋๊ฐ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ๋ก ์ ์ก๋ ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ์ผ์นํ๋ ๊ฒฝ์ฐ ๋ณธ์ธ ์ธ์ฆ์ด ์ฑ๊ณตํ์๋ค๊ณ ํ๋จํ๋ ์ ์ด๋ชจ๋์ ํฌํจํ๋ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด ์ ๊ณต๋๋ค.According to another aspect of the present invention, a request receiving module including a mobile phone number of the user's mobile terminal and receives a user authentication request corresponding to a predetermined service from the user's user terminal through a wired or wireless data communication network, the user authentication A one-time authentication information module for transmitting one-time authentication information corresponding to the request to the user terminal, transmitting a callback message to the mobile phone number, and connecting a telephone call from the mobile terminal to the identity authentication system by the transmitted callback message. A telephone call module configured to receive a first password and a second password through the telephone call from the mobile terminal, the first password received from the mobile terminal, and the authentication information previously stored in the identity authentication system. Match and said mobile stage When the second password received from the terminal is matched with the one-time authentication information transmitted to the user terminal, a personal authentication system is provided that includes a control module that determines that the user authentication is successful.
๋ณธ ๋ฐ๋ช ์ ๋ค๋ฅธ ์ผ ์ธก๋ฉด์ ๋ฐ๋ฅด๋ฉด, ์ ์ ์ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ์ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ํฌํจํ๋ฉฐ ์์ ์ ์๋น์ค์ ์์ํ๋ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์๊ธฐ ์ ์ ์ ์ ์ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์ ๋ฌด์ ๋ฐ์ดํฐ ํต์ ๋ง์ ํตํด ์์ ํ๋ ์์ฒญ์์ ๋ชจ๋, ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์์ํ๋ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๊ฐ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ๋ก ์ ์ก๋๋๋ก ํ๋ ์ผํ์ฑ์ธ์ฆ์ ๋ณด๋ชจ๋, ์์ ํ ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ํฌํจ๋ ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ์ด์ฉํ์ฌ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก ์ ํ ํธ๋ฅผ ์ฐ๊ฒฐํ๋ ์ ํํธ๋ชจ๋ ๋ฐ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ๋ก๋ถํฐ ์๊ธฐ ์ ํ ํธ๋ฅผ ํตํด ํจ์ค์๋์ ์์ํ๋ ์์ฑ์ ํธ๋ฅผ ์์ ํ๋ ํจ์ค์๋์์ ๋ชจ๋, ์๊ธฐ ์์ฑ์ ํธ์ ๋ํ ์์ฑ์ธ์์ ์ํํ์ฌ ์๊ธฐ ํจ์ค์๋๋ฅผ ์ธ์ํ๋ ์์ฑ์ธ์๋ชจ๋ ๋ฐ ์ธ์๋ ์๊ธฐ ํจ์ค์๋๊ฐ ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ์ผ์นํ๋ ๊ฒฝ์ฐ, ๋ณธ์ธ ์ธ์ฆ์ด ์ฑ๊ณตํ์๋ค๊ณ ํ๋จํ๋ ์ ์ด๋ชจ๋์ ํฌํจํ๋ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด ์ ๊ณต๋๋ค.According to another aspect of the present invention, a request receiving module including a mobile phone number of the user's mobile terminal and receives a user authentication request corresponding to a predetermined service from the user's user terminal through a wired or wireless data communication network, the user authentication A one-time authentication information module for transmitting one-time authentication information corresponding to the request to the user terminal, a telephone call module for connecting a telephone call to the mobile terminal by using the mobile phone number included in the received authentication request; A password receiving module for receiving a voice signal corresponding to a password from the mobile terminal through the telephone call, a voice recognition module for recognizing the password by performing voice recognition on the voice signal, and the recognized password and the one-time authentication information. If there is a match, the identity verification was successful An identity authentication system including a control module for determining is provided.
๋ํ, ๋ณธ ๋ฐ๋ช ์ ์ผ ์ค์์์ ๋ฐ๋ฅด๋ฉด, ๋ณธ์ธ์ธ์ฆ์ด ์์ฒญ๋๋ ์ฑ๋(์ฆ, ์ ๋ฌด์ ์ธํฐ๋ท ๋ฑ์ ๋ฐ์ดํฐ ํต์ ๋ง)๊ณผ ํจ์ค์๋๋ฅผ ํ์ธํ๋ ์ฑ๋(์ฆ, ์ ํ๋ง)์ด ์๋ก ๊ตฌ๋ถ๋๋ฏ๋ก, ์ด๋ ํ ํ ์ฑ๋์์์ ์ ๋ณด ์ ์ถ์ด ์ผ์ด๋๋๋ผ๋ ๋ณด์์ฑ์ ์ ์งํ ์ ์๋ค.In addition, according to an embodiment of the present invention, since a channel (i.e. data communication network such as wired or wireless internet) for which authentication is requested and a channel (i.e., telephone network) for confirming a password are distinguished from each other, information leakage from any one channel Even if this happens, security can be maintained.
๋ํ, ๋ณธ ๋ฐ๋ช ์ ์ผ ์ค์์์์๋ ํ ๋ฒ ์ฌ์ฉ๋ ์ดํ์๋ ํ๊ธฐ๋๋ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ๋ณธ์ธ ์ธ์ฆ์ ์ด์ฉํ๋ฏ๋ก ์ฌ์ ์ก ๊ณต๊ฒฉ์ ๋ํ ์ทจ์ฝ์ ์ ๋ฐฉ์งํ ์ ์๋ค.In addition, in one embodiment of the present invention, since the one-time authentication information that is discarded after being used once is used for authentication, a vulnerability to retransmission attack can be prevented.
๋ํ, ARS ์ฝ์ ํตํด ํจ์ค์๋๋ฅผ ์์ ํจ์ผ๋ก์จ ๋ฐ์ดํฐ ํต์ ๋ง์์์ ๊ณต๊ฒฉ ์์ปจ๋, ๋ฐ์ด๋ฌ์ค, ์, ๋๋ ์ ์ฑ์ฝ๋๋ฅผ ํตํด ์ ๋ณด๊ฐ ์ ์ถ๋์ง ์์ ๊ฐ๋ฅ์ฑ์ด ๋์ ํจ๊ณผ๋ ์๋ค.In addition, by receiving a password through an ARS call, there is a high possibility that information is not leaked through an attack in a data communication network, for example, a virus, a worm, or a malicious code.
๋ํ, ๋์ฒญ์ด๋ ๊ฐ์ฒญ์ด ๋งค์ฐ ์ด๋ ต๋ค๋ ํน์ฑ์ ๊ฐ์ง๋ ์ ํ ํธ๋ฅผ ํตํด ๋ณธ์ธ ์ธ์ฆ์ ํ์ํ ๊ฐ์ข ์ ๋ณด๋ฅผ ์์ ํ๋ฏ๋ก ์ค๊ฐ์ ๊ณต๊ฒฉ์ ๋ํ ์ทจ์ฝ์ ์ ํจ๊ณผ์ ์ผ๋ก ๋ฐฉ์งํ ์ ์๋ค.In addition, it is possible to effectively prevent the vulnerability to the man-in-the-middle attack because it receives a variety of information necessary for identity authentication through a telephone call that has the characteristic that eavesdropping or eavesdropping is very difficult.
๋ํ ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ์ ๋ณด์ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ํ๊บผ๋ฒ์ ์ ๋ ฅํ๋๋ก ํจ์ผ๋ก์จ, ๋ณด๋ค ๋์ ๋ณด์์ฑ์ ํ๋ณดํ ์ ์๋ค.In addition, by inputting the pre-stored authentication information and one-time authentication information at once, it is possible to ensure a higher security.
๋ํ, ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ ๋ค์ ๋ฒ ์ธ์ฆ์๋ ์ด์ฉ๋์ง ๋ชปํ๋๋ก ์ธ์ฆ๊ณผ์ ์ด ๋๋ ์งํ ํ๊ธฐ๋๋ฏ๋ก ํ์ธ์ด ์ฟ๋ฃ๊ฒ ๋๋๋ผ๋ ๋ฌด๋ฐฉํ ์ ์๋ค. ๋ฐ๋ผ์, ์ด๋ฌํ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ์์ํ๋ ํจ์ค์๋ ์ ๋ณด๋ฅผ ์์ฑ์ผ๋ก ์ ๋ ฅํ๋๋ก ํจ์ผ๋ก์จ ๋ณด์์ฑ์ ์ ์งํ๋ฉด์ ์ ์ ์๊ฒ ์ ๋ ฅ ํธ์์ฑ์ ์ ๊ณตํ ์ ์๋ค.In addition, the one-time authentication information is discarded immediately after the end of the authentication process so that it cannot be used for the next authentication, so that another person may overhear it. Therefore, by inputting password information corresponding to the one-time authentication information by voice, it is possible to provide input convenience to the user while maintaining security.
๋ํ, ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ์ด์ฉํ์ฌ ๋ณธ์ธ ์ธ์ฆ์ ์ํํ๋ ๊ธฐ๋ฒ๊ณผ ์ฑ๋ฌธ๋ถ์ ๊ธฐ๋ฒ์ ๋์์ ์ด์ฉํจ์ผ๋ก์จ ๋ณด์ ์์ค์ ์๋ฑํ ๋์ผ ์ ์๋ ํจ๊ณผ๊ฐ ์๋ค. ์ฆ, ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๊ฐ ์์ฑ์ ํธ๋ก ์ ๋ ฅ๋๋ ๊ฒฝ์ฐ, ๋ฐํ๋๋ ์์ฑ์ ๋ณด๊ฐ ์ด์ ์ ๋ น์๋ ๊ฒ์ด ์๋์ด ๋ณด์ฅ๋ ์ ์๋ค. ๋ฐ๋ผ์, ์ฑ๋ฌธ๋ถ์์ ํตํด ์๊ธฐ ์์ฑ์ ํธ๊ฐ ์ ๋นํ ์ ์ ์ ์ํด ๋ฐํ๋ ๊ฒ์์ ํ์ธํจ์ผ๋ก์จ, ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ํ์ธํ ์(์ฆ, ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ํ ์)๊ฐ ์ ๋นํ ์ฌ์ฉ์ ๋ณธ์ธ์์ ๋ช ๋ฐฑํ ๋ณด์ฅํ ์ ์๋ค.In addition, by using the one-time authentication information and the method of analyzing the voiceprint at the same time there is an effect that can significantly increase the security level. That is, when the one-time authentication information is input as the voice signal, it may be guaranteed that the voice information to be uttered is not previously recorded. Therefore, by confirming that the voice signal is uttered by a legitimate user through voiceprint analysis, it is possible to clearly ensure that the person who has confirmed the one-time authentication information (that is, the person who has made the authentication request) is the legitimate user.
๊ฒฐ๊ตญ ๋ณธ ๋ฐ๋ช ์ ๊ธฐ์ ์ ์ฌ์์ ์ํ๋ฉด ์ค๊ฐ์ ๊ณต๊ฒฉ์ ๊ฐ์ธํ ํน์ฑ(์ ํ ํธ๋ฅผ ํตํ ์ธ์ฆ์ํ์ผ๋ก ์ธํด) ๋ฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ์ด์ฉํ ์ฌ์ ์ก ๊ณต๊ฒฉ์ ๊ฐ์ธํ ํน์ฑ์ ๋ชจ๋ ๊ตฌ๋นํ ์ ์์ด์ ๋ถ์ธ๋ฐฉ์ง๊ฐ ๊ฐ๋ฅํ ๋์ ๋ณด์์ฑ์ ์ธ์ฆ์ด ์ํ๋ ์ ์๋ ํจ๊ณผ๊ฐ ์๋ค. After all, according to the technical idea of the present invention can be equipped with both characteristics that are robust against man-in-the-middle attack (due to authentication through telephone call) and characteristics that are robust to retransmission attack using one-time authentication information. There is an effect that can be.
๋ณธ ๋ฐ๋ช ์ ์์ธํ ์ค๋ช ์์ ์ธ์ฉ๋๋ ๋๋ฉด์ ๋ณด๋ค ์ถฉ๋ถํ ์ดํดํ๊ธฐ ์ํ์ฌ ๊ฐ ๋๋ฉด์ ๊ฐ๋จํ ์ค๋ช ์ด ์ ๊ณต๋๋ค.BRIEF DESCRIPTION OF THE DRAWINGS In order to better understand the drawings cited in the detailed description of the invention, a brief description of each drawing is provided.
๋ 1์ ๋ณธ ๋ฐ๋ช ์ ์ผ ์ค์์์ ๋ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๊ฐ๋ ์ ์ผ๋ก ์ค๋ช ํ๊ธฐ ์ํ ๋๋ฉด์ด๋ค.1 is a view for conceptually explaining a user authentication system according to an embodiment of the present invention.
๋ 2๋ ๋ณธ ๋ฐ๋ช ์ ์ผ ์ค์์์ ๋ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๊ฐ๋ต์ ์ธ ๊ตฌ์ฑ์ ์ค๋ช ํ๊ธฐ ์ํ ๋ธ๋ก๋์ด๋ค.2 is a block diagram illustrating a schematic configuration of a user authentication system according to an embodiment of the present invention.
๋ 3์ ๋ณธ ๋ฐ๋ช ์ ์ค์ ์์ ๋ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ์ ์ง๋ ์ ์๋ ์ ๋ณด๋ค์ ์ผ ์๋ฅผ ๋ํ๋ด๋ ๋๋ฉด์ด๋ค.3 is a view showing an example of information that can be maintained in the identity authentication system according to an embodiment of the present invention.
๋ 4๋ ๋ณธ ๋ฐ๋ช ์ ์ผ ์ค์์์ ๋ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๊ณต๋ฐฉ๋ฒ์ ํ๋ก์ฐ๋ฅผ ์ค๋ช ํ๊ธฐ ์ํ ๋๋ฉด์ด๋ค.4 is a view for explaining the flow of a method for providing a user authentication system according to an embodiment of the present invention.
๋ 5๋ ๋ณธ ๋ฐ๋ช ์ ์ผ ์ค์์์ ๋ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๊ณต๋ฐฉ๋ฒ์ ๊ตฌํํ๊ธฐ ์ํด ์ ์ ๋จ๋ง๊ธฐ์๊ฒ ์ ๊ณต๋๋ ๋ณธ์ธ์ธ์ฆ์์ฒญ UI์ ์ผ ์๋ฅผ ๋ํ๋ด๋ ๋๋ฉด์ด๋ค.5 is a diagram illustrating an example of a user authentication request UI provided to a user terminal to implement a method for providing a user authentication system according to an embodiment of the present invention.
๋ 6์ ๋ณธ ๋ฐ๋ช ์ ์ผ ์ค์์์ ๋ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๊ณต๋ฐฉ๋ฒ์ ๊ตฌํํ๊ธฐ ์ํด ์ ์ ๋จ๋ง๊ธฐ์ ์ ๊ณต๋๋ ์๋ด UI์ ์ผ ์๋ฅผ ๋ํ๋ด๋ ๋๋ฉด์ด๋ค.6 is a diagram illustrating an example of a guide UI provided to a user terminal to implement a method for providing a user authentication system according to an embodiment of the present invention.
๋ 7์ ๋ณธ ๋ฐ๋ช ์ ์ผ ์ค์์์ ๋ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๊ณต๋ฐฉ๋ฒ์์ ์ ์ ์ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ์ ์ถ๋ ฅ๋๋ ํ๋ฉด์ ์ผ ์๋ฅผ ๋ํ๋ด๋ ๋๋ฉด์ด๋ค.7 is a diagram illustrating an example of a screen output to a mobile terminal of a user in a method for providing a user authentication system according to an embodiment of the present invention.
๋ณธ ๋ฐ๋ช ์ ๋ค์ํ ๋ณํ์ ๊ฐํ ์ ์๊ณ ์ฌ๋ฌ ๊ฐ์ง ์ค์์๋ฅผ ๊ฐ์ง ์ ์๋ ๋ฐ, ํน์ ์ค์์๋ค์ ๋๋ฉด์ ์์ํ๊ณ ์์ธํ ์ค๋ช ์ ์์ธํ๊ฒ ์ค๋ช ํ๊ณ ์ ํ๋ค. ๊ทธ๋ฌ๋, ์ด๋ ๋ณธ ๋ฐ๋ช ์ ํน์ ํ ์ค์ ํํ์ ๋ํด ํ์ ํ๋ ค๋ ๊ฒ์ด ์๋๋ฉฐ, ๋ณธ ๋ฐ๋ช ์ ์ฌ์ ๋ฐ ๊ธฐ์ ๋ฒ์์ ํฌํจ๋๋ ๋ชจ๋ ๋ณํ, ๊ท ๋ฑ๋ฌผ ๋ด์ง ๋์ฒด๋ฌผ์ ํฌํจํ๋ ๊ฒ์ผ๋ก ์ดํด๋์ด์ผ ํ๋ค. ๋ณธ ๋ฐ๋ช ์ ์ค๋ช ํจ์ ์์ด์ ๊ด๋ จ๋ ๊ณต์ง ๊ธฐ์ ์ ๋ํ ๊ตฌ์ฒด์ ์ธ ์ค๋ช ์ด ๋ณธ ๋ฐ๋ช ์ ์์ง๋ฅผ ํ๋ฆด ์ ์๋ค๊ณ ํ๋จ๋๋ ๊ฒฝ์ฐ ๊ทธ ์์ธํ ์ค๋ช ์ ์๋ตํ๋ค.As the invention allows for various changes and numerous embodiments, particular embodiments will be illustrated in the drawings and described in detail in the written description. However, this is not intended to limit the present invention to specific embodiments, it should be understood to include all transformations, equivalents, and substitutes included in the spirit and scope of the present invention. In the following description of the present invention, if it is determined that the detailed description of the related known technology may obscure the gist of the present invention, the detailed description thereof will be omitted.
์ 1, ์ 2 ๋ฑ์ ์ฉ์ด๋ ๋ค์ํ ๊ตฌ์ฑ์์๋ค์ ์ค๋ช ํ๋๋ฐ ์ฌ์ฉ๋ ์ ์์ง๋ง, ์๊ธฐ ๊ตฌ์ฑ์์๋ค์ ์๊ธฐ ์ฉ์ด๋ค์ ์ํด ํ์ ๋์ด์๋ ์ ๋๋ค. ์๊ธฐ ์ฉ์ด๋ค์ ํ๋์ ๊ตฌ์ฑ์์๋ฅผ ๋ค๋ฅธ ๊ตฌ์ฑ์์๋ก๋ถํฐ ๊ตฌ๋ณํ๋ ๋ชฉ์ ์ผ๋ก๋ง ์ฌ์ฉ๋๋ค.Terms such as first and second may be used to describe various components, but the components should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.
๋ณธ ์ถ์์์ ์ฌ์ฉํ ์ฉ์ด๋ ๋จ์ง ํน์ ํ ์ค์์๋ฅผ ์ค๋ช ํ๊ธฐ ์ํด ์ฌ์ฉ๋ ๊ฒ์ผ๋ก, ๋ณธ ๋ฐ๋ช ์ ํ์ ํ๋ ค๋ ์๋๊ฐ ์๋๋ค. ๋จ์์ ํํ์ ๋ฌธ๋งฅ์ ๋ช ๋ฐฑํ๊ฒ ๋ค๋ฅด๊ฒ ๋ปํ์ง ์๋ ํ, ๋ณต์์ ํํ์ ํฌํจํ๋ค. The terminology used herein is for the purpose of describing particular example embodiments only and is not intended to be limiting of the present invention. Singular expressions include plural expressions unless the context clearly indicates otherwise.
๋ณธ ๋ช ์ธ์์ ์์ด์, "ํฌํจํ๋ค" ๋๋ "๊ฐ์ง๋ค" ๋ฑ์ ์ฉ์ด๋ ๋ช ์ธ์์์ ๊ธฐ์ฌ๋ ํน์ง, ์ซ์, ๋จ๊ณ, ๋์, ๊ตฌ์ฑ์์, ๋ถํ ๋๋ ์ด๋ค์ ์กฐํฉํ ๊ฒ์ด ์กด์ฌํจ์ ์ง์ ํ๋ ค๋ ๊ฒ์ด์ง, ํ๋ ๋๋ ๊ทธ ์ด์์ ๋ค๋ฅธ ํน์ง๋ค์ด๋ ์ซ์, ๋จ๊ณ, ๋์, ๊ตฌ์ฑ์์, ๋ถํ ๋๋ ์ด๋ค์ ์กฐํฉํ ๊ฒ๋ค์ ์กด์ฌ ๋๋ ๋ถ๊ฐ ๊ฐ๋ฅ์ฑ์ ๋ฏธ๋ฆฌ ๋ฐฐ์ ํ์ง ์๋ ๊ฒ์ผ๋ก ์ดํด๋์ด์ผ ํ๋ค.In this specification, terms such as "comprise" or "have" are intended to indicate that there is a feature, number, step, action, component, part, or combination thereof described in the specification, one or more other It is to be understood that the present invention does not exclude the possibility of the presence or the addition of features, numbers, steps, operations, components, parts, or a combination thereof.
๋ํ, ๋ณธ ๋ช ์ธ์์ ์์ด์๋ ์ด๋ ํ๋์ ๊ตฌ์ฑ์์๊ฐ ๋ค๋ฅธ ๊ตฌ์ฑ์์๋ก ๋ฐ์ดํฐ๋ฅผ '์ ์ก'ํ๋ ๊ฒฝ์ฐ์๋ ์๊ธฐ ๊ตฌ์ฑ์์๋ ์๊ธฐ ๋ค๋ฅธ ๊ตฌ์ฑ์์๋ก ์ง์ ์๊ธฐ ๋ฐ์ดํฐ๋ฅผ ์ ์กํ ์๋ ์๊ณ , ์ ์ด๋ ํ๋์ ๋ ๋ค๋ฅธ ๊ตฌ์ฑ์์๋ฅผ ํตํ์ฌ ์๊ธฐ ๋ฐ์ดํฐ๋ฅผ ์๊ธฐ ๋ค๋ฅธ ๊ตฌ์ฑ์์๋ก ์ ์กํ ์๋ ์๋ ๊ฒ์ ์๋ฏธํ๋ค. ๋ฐ๋๋ก ์ด๋ ํ๋์ ๊ตฌ์ฑ์์๊ฐ ๋ค๋ฅธ ๊ตฌ์ฑ์์๋ก ๋ฐ์ดํฐ๋ฅผ '์ง์ ์ ์ก'ํ๋ ๊ฒฝ์ฐ์๋ ์๊ธฐ ๊ตฌ์ฑ์์์์ ๋ค๋ฅธ ๊ตฌ์ฑ์์๋ฅผ ํตํ์ง ์๊ณ ์๊ธฐ ๋ค๋ฅธ ๊ตฌ์ฑ์์๋ก ์๊ธฐ ๋ฐ์ดํฐ๊ฐ ์ ์ก๋๋ ๊ฒ์ ์๋ฏธํ๋ค.In addition, in the present specification, when one component 'transmits' data to another component, the component may directly transmit the data to the other component, or through at least one other component. Means that the data may be transmitted to the other component. On the contrary, when one component 'directly transmits' data to another component, it means that the data is transmitted from the component to the other component without passing through the other component.
์ดํ, ์ฒจ๋ถ๋ ๋๋ฉด๋ค์ ์ฐธ์กฐํ์ฌ ๋ณธ ๋ฐ๋ช ์ ์ค์์๋ค์ ์ค์ฌ์ผ๋ก ๋ณธ ๋ฐ๋ช ์ ์์ธํ ์ค๋ช ํ๋ค. ๊ฐ ๋๋ฉด์ ์ ์๋ ๋์ผํ ์ฐธ์กฐ๋ถํธ๋ ๋์ผํ ๋ถ์ฌ๋ฅผ ๋ํ๋ธ๋ค.Hereinafter, the present invention will be described in detail with reference to the accompanying drawings. Like reference numerals in the drawings denote like elements.
๋ 1์ ๋ณธ ๋ฐ๋ช ์ ์ผ ์ค์์์ ๋ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๊ฐ๋ ์ ์ผ๋ก ์ค๋ช ํ๊ธฐ ์ํ ๋๋ฉด์ด๋ค.1 is a view for conceptually explaining a user authentication system according to an embodiment of the present invention.
๋ 1์ ์ฐธ์กฐํ๋ฉด, ๋ณธ ๋ฐ๋ช
์ ์ผ ์ค์์์ ๋ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ ์์คํ
์ ๊ณต๋ฐฉ๋ฒ์ ๊ตฌํํ๊ธฐ ์ํด์๋ ์์ ์ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ด ๊ตฌ๋น๋ ์ ์๋ค.Referring to FIG. 1, in order to implement a method for providing a user authentication system according to an embodiment of the present invention, a predetermined
์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)๋ก๋ถํฐ ์์ ์ ์๋น์ค์ ์์ํ๋ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์์ ํ ์ ์๋ค. ์๋ฅผ ๋ค์ด, ์๊ธฐ ์๋น์ค๋ ์จ๋ผ์ธ ๊ฒฐ์ ์์ฒญ์ผ ์ ์๋ค. ์ด ๊ฒฝ์ฐ, ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)๋ ์จ๋ผ์ธ ๊ฒฐ์ ์์ฒญ๊ณผ ํจ๊ป, ํน์ ์จ๋ผ์ธ ๊ฒฐ์ ์์ฒญ์ ์ ์ ๋ก ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)๋ฅผ ์ฌ์ฉํ๋ ์ ์ ์ ๋ํ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ผ๋ก ์ ์กํ ์ ์๋ค.The
์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)๋ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ผ๋ก ๋ณธ์ธ ์ธ์ฆ์ ์์ฒญํ ์ ์๋ ๋ชจ๋ ํํ์ ๋ฐ์ดํฐ ํ๋ก์ธ์ฑ ์ฅ์น(์๋ฅผ ๋ค๋ฉด, ๋ฉํ, ๋ฐ์คํฌํ, ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ, ์
ํ๋ฐ์ค ๋ฑ)๋ฅผ ํฌํจํ๋ ์๋ฏธ๋ก ์ฌ์ฉ๋ ์ ์๋ค.The
์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)๊ฐ ์ ๊ทผ ๊ฐ๋ฅํ๊ณ , ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์์ ํ ์ ์๋ ๋ชจ๋ ํํ์ ๋ฐ์ดํฐ ์ฒ๋ฆฌ ์์คํ
(์๋ฅผ ๋ค๋ฉด, ์์ ์ ์น ์ฌ์ดํธ, ํ์ด์ง, ์๋ฐฉํฅ ๋ฐฉ์ก ์๋ฒ ๋ฑ)์ ์ ๊ณตํ ์ ์๋ค.The
์ผ ์ค์์์์, ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100) ์ฌ์ด์๋ ์์ ์ ๊ฐ๋งน์ ์์คํ
(๋ฏธ๋์)์ด ์กด์ฌํ ์ ์์ผ๋ฉฐ, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์๊ธฐ ๊ฐ๋งน์ ์์คํ
์ผ๋ก๋ถํฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์์ ํ ์ ์๋ค. ์ฆ, ์๊ธฐ ๊ฐ๋งน์ ์์คํ
์ ์ ์ ์ ๋จ๋ง๊ธฐ(210)๋ฅผ ํตํด ๊ฒฐ์ ์์ฒญ๊ณผ ํจ๊ป ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์์ ํ๊ณ , ์ด๋ฅผ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)๋ก ์ ๋ฌํ ์ ์๋ค.In one embodiment, a predetermined merchant system (not shown) may exist between the
์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์์ ์ ์ ๋ฌด์ ๋ฐ์ดํฐ ํต์ ๋ง ์ฆ, ์ 1ํต์ ์ฑ๋(์๋ฅผ ๋ค์ด ๋ 1์ ๋์๋ ๋ฐ์ ๊ฐ์ด, ์ธํฐ๋ท)์ ํตํด ์ํ๋ ์ ์๋ค. ๊ทธ๋ฆฌ๊ณ , ์๊ธฐ ์ ์ ๋ ์์ ์ ์ ์ ๋จ๋ง๊ธฐ(210)๋ฅผ ํตํด ์์ ์ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ(์๋ฅผ ๋ค๋ฉด, ํธ๋ํฐ ๋ฒํธ, USIM ๋ฒํธ ๋ฑ)๋ฅผ ์
๋ ฅํ ์ ์๋ค. ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ ๋ณธ์ธ ์ธ์ฆ์ ์์ฒญํ๋ ์๊ธฐ ์ ์ ๊ฐ ์์งํ๊ณ ์๋ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)์ ์ ํ๋ฒํธ์ผ ์ ์๋ค.The identity authentication request may be performed through a predetermined wired or wireless data communication network, that is, a first communication channel (for example, the Internet, as shown in FIG. 1). In addition, the user may input his mobile phone number (eg, a mobile phone number, USIM number, etc.) through his
์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์ ์ ๋จ๋ง๊ธฐ(210)์ ์ํด ์
๋ ฅ๋ ์ ์ ์ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)์ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ํฌํจํ ์ ์๋ค. ์ฆ, ์๊ธฐ ์ ์ ๋ ์์ ์ ๋จ๋ง๊ธฐ(210)๋ฅผ ํตํด ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ํ๋ฉด์, ์์ ์ ๋ชจ๋ฐ์ผ ์ ํ ๋ฒํธ(ํธ๋ํฐ ๋ฒํธ, USIM ๋ฒํธ ๋ฑ)๋ฅผ ์
๋ ฅํ ์ ์๋ค. ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ ๋ณธ์ธ ์ธ์ฆ์ ์์ฒญํ๋ ์๊ธฐ ์ ์ ๊ฐ ์ฌ์ฉํ๋ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)์ ์ ํ๋ฒํธ์ผ ์ ์๋ค.The identity authentication request may include the mobile phone number of the
๊ตฌํ ์์ ๋ฐ๋ผ์๋ ์๊ธฐ ์ ์ ๋ ์๊ธฐ ๋จ๋ง๊ธฐ(210)๋ฅผ ํตํด ์ ์ ์๋ณ์ ๋ณด(์๋ฅผ ๋ค๋ฉด, ๋ฏธ๋ฆฌ ๋ฑ๋กํ ID๋ ์ด๋ฆ, ์๋ ์์ผ, ๋ก๊ทธ์ธ ํจ์ค์๋ ๋ฑ)๋ฅผ ๋ ์ ๋ ฅํ ์๋ ์๋ค.In some embodiments, the user may further input user identification information (for example, an ID or name, a date of birth, a login password, etc.) registered through the terminal 210.
์๊ธฐ ์ ์ ์๋ณ์ ๋ณด๋ ์์ ์ ์ฒดํฌ์ ๋ณด๋ก์จ ์ด์ฉ๋ ์ ์๋ค. ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ ์ด๋ฏธ ๋ง์ ์ฌ๋๋ค์๊ฒ ๊ณต๊ฐ๋ ์ ๋ณด์ผ ์ ์์ผ๋ฏ๋ก ํด๋น ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ์ด์ฉํ์ฌ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ํ ํ ๋ณธ์ธ ์ธ์ฆ์ ํ์ํ ์ ๋ณด(์๋ฅผ ๋ค๋ฉด, ๋ก๊ทธ์ธ ํจ์ค์๋)๋ฅผ ์ถ๊ฐ์ ์ผ๋ก ์
๋ ฅํ๋ ๊ฒฝ์ฐ๊ฐ ์์ ์ ์๋ค. ๋ฐ๋ผ์, ์ด์ฒ๋ผ ๊ณต๊ฐ๋ ์ ๋ณด์ธ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ก ์์ฒญ์๋ฅผ ์๋ณํ๊ณ ์ ํ๋ ๊ฒฝ์ฐ์๋, ์์ ์ ์ฒดํฌ์ ๋ณด๋ฅผ ๋ ์ด์ฉํ์ฌ ์์ ์ฑ์ ๋์ผ ์ ์๋ค. ๋ฐ๋ผ์, ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์๋ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ ๋ฐ ์ฒดํฌ์ ๋ณด๊ฐ ํฌํจ๋ ์ ์๋ค. ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ด ์์ ๋๋ฉด, ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ์ ์๊ธฐ ์ฒดํฌ์ ๋ณด๊ฐ ์์ํ๋์ง๋ฅผ ํ๋จํ ์ ์๋ค. ๊ทธ๋ฆฌ๊ณ ์๋ก ์์ํ๋ค๊ณ ํ๋จ๋ ๊ฒฝ์ฐ์๋ง ํ์ ํ ๋ฐ์ ๊ฐ์ด ๋๋จธ์ง ๋ณธ์ธ์ธ์ฆ์ ์ฐจ๋ฅผ ์ํํ ์ ์๋ค. ์ด๋ฅผ ์ํด ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์๋ ๋ฏธ๋ฆฌ ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ ๋ฐ ์ด์ ์์ํ๋ ์ฒดํฌ์ ๋ณด๊ฐ ์ ์ฅ๋์ด ์์ ์ ์๋ค. ๊ฒฐ๊ตญ, ๋ณธ ์ค์์์ ์ํ๋ฉด, ์ด๋ฌํ ์ฒดํฌ์ ๋ณด๋ฅผ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ์ ํจ๊ป ์์ ํ๊ณ , ์ด๋ฅผ 1์ฐจ ์ธ์ฆ์ ์ํ ์ ๋ณด๋ก ์ด์ฉํ ์ ์๋ค. ์ด๋ฌํ ์ฒดํฌ์ ๋ณด๋ฅผ ์ด์ฉํ 1์ฐจ ์ธ์ฆ ํ 2์ฐจ ์ธ์ฆ์ผ๋ก์จ ํ์ ํ๋ ๋ฐ์ ๊ฐ์ ๋ณธ์ธ ์ธ์ฆ์ ์ํํจ์ผ๋ก์จ ์๋น์ค์ ์์ ์ฑ์ด ํ์ ํ ๋์์ง ์ ์๋ ํจ๊ณผ๊ฐ ์๋ค. ๋ํ, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์ผ์ ์๊ฐ ๋ด์ ๋์ผํ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ์ ๋ํด ์๊ธฐ ์ฒดํฌ์ ๋ณด๋ฅผ ๋ณ๊ฒฝํด๊ฐ๋ฉด์ ์์ ๋๋ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ด ๋ฏธ๋ฆฌ ์ค์ ๋ ํ์ ์ด์์ธ ๊ฒฝ์ฐ์๋ ์์ฒญ์ ๊ฑฐ๋ถํ๊ฑฐ๋ ๋ณ๋์ ์ถ๊ฐ์ ์ธ ์ธ์ฆ์ ์ฐจ๋ฅผ ์ํํ์ฌ ์์ ์ฑ์ ๋์ผ ์ ์๋ค.The user identification information may be used as predetermined check information. Since the mobile phone number may be information that has already been disclosed to many people, there may be a case where additional information (for example, a login password) required for identity verification is requested after the identity verification request using the corresponding mobile phone number. Therefore, if the requester is to be identified by the mobile phone number, which is the publicly disclosed information, the predetermined check information may be further used to increase stability. Therefore, the identity verification request may include a mobile phone number and check information. When the identity authentication request is received, the
ํํธ, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์ ์กํ ์ ์ ๋จ๋ง๊ธฐ(210)๊ฐ ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์์ํ๋ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด(์๋ฅผ ๋ค๋ฉด, OTP(One Time Password))๋ฅผ ์์ ํ๋๋ก ํ ์ ์๋ค. ๊ทธ๋ฌ๋ฉด, ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)๋ ์์ ํ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ์ ์ ๊ฐ ์ธ์ํ ์ ์๋๋ก ๋์คํ๋ ์ด ํ ์ ์๋ค. On the other hand, the
์ผ ์ค์์์์, ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์ํด ๋ฐ๊ธ๋ ์ ์๋ค. ์ด ๊ฒฝ์ฐ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)๋ก๋ถํฐ ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์์ ํ๋ฉด ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ๋ฐ๊ธํ์ฌ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์ ์ ์กํ ์ ์๋ค. In one embodiment, one-time authentication information may be issued by the
ํํธ, ๋ค๋ฅธ ์ผ ์ค์์์์, ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์์ฒญ์ ์ํด ๋ค๋ฅธ ์๋ฒ(์๋ฅผ ๋ค๋ฉด, ์นด๋์ฌ ์์คํ
(300))์ ์ํด ๋ฐ๊ธ๋ ์ ์๋ค, ์ด ๊ฒฝ์ฐ, ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ๋ฐ๊ธํ ์๋ฒ(์๋ฅผ ๋ค๋ฉด, ์นด๋์ฌ ์์คํ
(300))๋ ๋ฐ๊ธํ ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ์ ์ ๋จ๋ง๊ธฐ(210)์ ์ ์กํ ์ ์๋ค. ๊ทธ๋ฌ๋ฉด, ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)๋ ์์ ํ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ์ ์ ๊ฐ ์ธ์ํ ์ ์๋๋ก ๋์คํ๋ ์ด ํ ์ ์๋ค.On the other hand, in another embodiment, the one-time authentication information may be issued by another server (for example, the card company system 300) by the request of the
๋ ๋ค๋ฅธ ์ผ ์ค์์์์๋, ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์์ฒญ์ ์ํด ๋ค๋ฅธ ์๋ฒ(์๋ฅผ ๋ค๋ฉด, ์นด๋์ฌ ์์คํ
(300))์ ์ํด ๋ฐ๊ธ๋์ง๋ง ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ๋ฐ๊ธํ ์๋ฒ(์๋ฅผ ๋ค๋ฉด, ์นด๋์ฌ ์์คํ
(300))๋ ๋ฐ๊ธํ ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ผ๋ก ์ ์กํ ์๋ ์๋ค. ์ด ๊ฒฝ์ฐ ๋ฐ๊ธ๋ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)๋ก ์ ์กํ๋ ์ฃผ์ฒด๋ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ผ ์ ์๋ค.In another embodiment, the one-time authentication information is issued by another server (for example, the card company system 300) at the request of the
์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ ํ ๋ฒ ์ฐ๊ณ ํ๊ธฐ๋๋ ๊ฐ์ผ ์ ์๋ค. ์ฆ, ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋, ์ถํ ์ค๋ช
ํ๋ ๋ฐ์ ๊ฐ์ด ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์ ์์ํ๋ ์ ์ ์ ๋ํ ๋ณธ์ธ ์ธ์ฆ์ ์ด์ฉ๋ ์ ์์ผ๋ฉฐ, ํ ๋ฒ ์ผํ์ฑ ์ธ์ฆ ์ ๋ณด๊ฐ ๋ณธ์ธ์ธ์ฆ์ ์ด์ฉ๋๊ณ ๋๋ฉด ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ ํ๊ธฐ๋์ด ๋ค์ ์ฌ์ฉ๋์ง ๋ชปํ ์ ์๋ค.The one-time authentication information may be a value written once and discarded. That is, the one-time authentication information, as will be described later can be used for identity authentication for the user corresponding to the
ํํธ, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋ณธ ๋ฐ๋ช
์ ๊ธฐ์ ์ ์ฌ์์ ๋ฐ๋ผ ์์ ๋ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)์ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ์ด์ฉํด ๋ณธ์ธ ์ธ์ฆ์ ์ํ ์์ ์ ํ๋ก์ธ์ค๋ฅผ ์ํํ ์ ์๋ค. ์ด๋ฅผ ์ํด ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ์ด์ฉํ์ฌ, ์๊ธฐ ์ ์ ์ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)๋ก ๋ณธ์ธ ์ธ์ฆ์ ์ด์ฉ๋ ์์ ์ ๋ณธ์ธํ์ธ์ ๋ณด(์๋ฅผ ๋ค๋ฉด, ๊ฐ์ธ์ ๋ณด ๋ฐ/๋๋ ํจ์ค์๋ ๋ฑ)๋ฅผ ์์ฒญํ ์ ์๋ค. ๊ทธ๋ฆฌ๊ณ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)๋ก๋ถํฐ ์๊ธฐ ๋ณธ์ธํ์ธ์ ๋ณด๋ฅผ ์์ ํ ์ ์๋ค. ์ด๋, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์๊ธฐ ์ 1ํต์ ์ฑ๋๊ณผ๋ ๋ค๋ฅธ ์ข
๋ฅ์ ์ 2ํต์ ์ฑ๋(์๋ฅผ ๋ค์ด ๋ 1์ ๋์๋ ๋ฐ์ ๊ฐ์ด ์ด๋ํต์ ๋ง)์ ํตํด ์ธ์ฆ์ ํ์ํ ์๊ธฐ ๋ณธ์ธํ์ธ์ ๋ณด๋ฅผ ์์ฒญํ ์ ์๋ค.On the other hand, the
์ผ ์ค์์์์, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)์ ์ ํ ํธ๋ฅผ ์ฐ๊ฒฐํ๊ธฐ ์ํด ์์ ์ ARS(Auto Response System)์ ํฌํจํ ์ ์์ผ๋ฉฐ, ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)์ ์ ํ ํธ๋ฅผ ์ฐ๊ฒฐํ๊ณ ARS๋ฅผ ํตํด ์๊ธฐ ๋ณธ์ธํ์ธ์ ๋ณด๋ฅผ ์์ ํ ์ ์๋ค. ๊ตฌํ ์์ ๋ฐ๋ผ์๋, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์์ ์ ARS์ ์ฐ๊ฒฐ๋์ด ์๊ธฐ ARS๋ฅผ ์ ์ดํจ์ผ๋ก์จ ๋ณธ ๋ฐ๋ช
์ ๊ธฐ์ ์ ์ฌ์์ ๊ตฌํํ ์๋ ์๋ค.In one embodiment, the
์ฆ, ์ผ ์ค์์์์, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ์ ์์ํ๋ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)๋ก ARS ์ฝ์ ์ํํ ์ ์๊ณ , ARS ์ฝ ์ฆ, ์ ํ ํธ๊ฐ ์ฐ๊ฒฐ๋๋ฉด ๋ณธ์ธ ์ธ์ฆ์ ์ํ ์ ๋ณด์ ์
๋ ฅ์ ์์ฒญํ ์ ์๋ค. ์๋ฅผ ๋ค๋ฉด, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์์ ๋ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ํฌํจ๋ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ์ถ์ถํ๊ณ , ์ถ์ถ๋ ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ์์ ์ ARS๋ก ์ถ๋ ฅํ ์ ์๋ค. ๊ทธ๋ฌ๋ฉด, ์๊ธฐ ARS๋ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)๋ก ๋ฌด์ ํธ๋ฅผ ์ฐ๊ฒฐํ ์ ์๋ค. ์ฆ, ์ ํ๋ฅผ ๊ฑธ ์ ์๋ค. ๊ทธ๋ฌ๋ฉด, ์๊ธฐ ARS๋ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)๋ก๋ถํฐ ๋ณธ์ธ ์ธ์ฆ์ ํ์ํ ๋ณธ์ธํ์ธ์ ๋ณด๋ฅผ ์์ฒญํ ์ ์๋ค. ์ ์ ๊ฐ ์์ฒญ์ ์๋ตํ์ฌ ๋ณธ์ธํ์ธ์ ๋ณด๋ฅผ ์
๋ ฅํ๋ฉด, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์๊ธฐ ARS ์์คํ
์ผ๋ก๋ถํฐ ์
๋ ฅ๋ ์ ๋ณด๋ฅผ ์์ ํ๊ณ ๋ณธ์ธ ์ธ์ฆ์ ์ํํ ์ ์๋ค.That is, in one embodiment, the
์ผ ์ค์์์์, ๋ณธ์ธํ์ธ์ ๋ณด๋ ์ถํ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)๋ก ์ ์กํ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์์ ์ผ์น ์ฌ๋ถ๊ฐ ๋น๊ต๋ ํ๋์ ํจ์ค์๋๋ง์ ํฌํจํ ์ ์๋ค. ํ์ง๋ง ๋ณด๋ค ๋์ ๋ณด์์ฑ์ ์ํ์ฌ ๋ค๋ฅธ ์ผ ์ค์์์์๋ ๋ ๊ฐ์ ํจ์ค์๋(์ 1ํจ์ค์๋ ๋ฐ ์ 2ํจ์ค์๋)๋ฅผ ํฌํจํ ์ ์๋ค. ์ด ๊ฒฝ์ฐ, ์ 1ํจ์ค์๋๋ ์ถํ ์๊ธฐ ์ ์ ์ ์ํด ์ค์ ๋์ด ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ์ ๋ณด์ ์ผ์นํ๋ ์ง ์ฌ๋ถ๊ฐ ๋น๊ต๋ ๊ฒ์ด๋ฉฐ, ์ 2ํจ์ค์๋๋ ์ถํ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)๋ก ์ ์กํ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์์ ์ผ์น ์ฌ๋ถ๊ฐ ๋น๊ต๋ ์ ์๋ค.In one embodiment, the identity verification information may include only one password to be compared with the one-time authentication information transmitted to the
๋ณธ์ธํ์ธ์ ๋ณด๊ฐ ๋ ๊ฐ์ ํจ์ค์๋๋ฅผ ํฌํจํ๋ ์ค์์์ ๊ฒฝ์ฐ, ์ ์ ๋ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)๊ณผ ํ์ฑ๋ ์ ํ ํธ(์ฆ, ARS ์ฝ)๋ฅผ ํตํด ์๊ธฐ ์ 1ํจ์ค์๋ ๋ฐ ์ 2ํจ์ค์๋๋ฅผ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ผ๋ก ์ ์กํ ์ ์๋ค. ์ฆ, ๋ ๊ฐ์ ํจ์ค์๋๊ฐ ๊ฐ๊ฐ ๋ค๋ฅธ ์ ํ ํธ๋ฅผ ํตํด ์ ์ก๋๋ ๊ฒ์ด ์๋๋ผ ํ๋์ ์ ํ ํธ๋ฅผ ํตํด ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ผ๋ก ์ ์ก๋ ์ ์๋ค. ํจ์ค์๋์ ๊ธธ์ด๊ฐ ์ฆ๊ฐํ๋ฉด ํ ์๋ก ํจ์ค์๋๋ฅผ ์์๋ด๊ธฐ๊ฐ ํ๋ค์ด์ง๋ฏ๋ก ๊ทธ๋งํผ ๋ณด์์ฑ์ด ๊ฐํ๋ ์ ์๋ค. ๋ฐ๋ผ์, ์๋ฅผ ๋ค์ด, 4์๋ฆฌ์ ์ 1 ํจ์ค์๋์ 4์๋ฆฌ์ ์ 2ํจ์ค์๋ ๊ฐ๊ฐ์ ์ ์กํ๋ ๊ฒฝ์ฐ ๋ณด๋ค, ์ 1ํจ์ค์๋ ๋ฐ ์ 2ํจ์ค์๋๋ฅผ ๊ฒฐํฉํ 8์๋ฆฌ์ ํจ์ค์๋๋ฅผ ํ ๋ฒ์ ์ ์กํจ์ผ๋ก์จ ๋ณด๋ค ๋์ ๋ณด์์ฑ์ ํ๋ณดํ ์ ์๋ค.In an embodiment in which the identity information includes two passwords, the user may enter the first password and the second password through the telephone authentication (ie, ARS call) formed with the
ํํธ, ์๊ธฐ ์ 1ํจ์ค์๋ ๋๋ ์๊ธฐ ์ 2ํจ์ค์๋๊ฐ ์ซ์๋ก ๊ตฌ์ฑ๋๋ ๊ฒฝ์ฐ์๋ ์ ํ ํธ(์๋ฅผ ๋ค์ด, ARS ์ฝ) ์์์ DTMF ํค์ผ๋ก ์ ๋ ฅ๋ ์ ์๋ค.On the other hand, when the first password or the second password is composed of numbers may be input as a DTMF tone on a telephone call (for example, ARS call).
ํํธ, ์ผ ์ค์์์์, ํ ๋ฒ๋ง ์ฌ์ฉ๋๋ฉฐ ์ฌ์ฉ ํ ํ๊ธฐ๋๋ ์ผํ์ฑ ๋ณด์์ ๋ณด์ ์์ํ๋ ์ 2ํจ์ค์๋์ ๊ฒฝ์ฐ์๋, ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์๊ธฐ ์ ์ ์ ๋ํ ์ธ์ฆ์ ๋ณด์ ์์ํ๋ ์ 1ํจ์ค์๋์๋ ๋ฌ๋ฆฌ, ์์ฑ์ ํธ๋ก ์ ์ก๋ ์ ์๋ค. ํ์ธ์ด ์ 2ํจ์ค์๋์ ์์ํ๋ ์์ฑ์ ํธ๋ฅผ ์ฟ๋ฃ๋ ๊ฒฝ์ฐ์๋ ๋ฌธ์ ๊ฐ ์๊ธฐ ๋๋ฌธ์ด๋ค. ์ด ๊ฒฝ์ฐ, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์๊ธฐ ์์ฑ์ ํธ๋ฅผ ์์ฑ์ธ์ํ๊ธฐ ์ํ ์์ฑ์ธ์๋ชจ๋์ ํฌํจํ ์ ์๋ค.On the other hand, in one embodiment, in the case of the second password corresponding to the one-time security information that is used only once and discarded after use, unlike the first password corresponding to the previously stored authentication information for the user, it is transmitted as a voice signal. Can be. This is because there is no problem even if another person overhears the voice signal corresponding to the second password. In this case, the
๋ํ, ์๊ธฐ ์ 2ํจ์ค์๋๊ฐ ์์ฑ์ ํธ๋ก ์ ์ก๋๋ ๊ฒฝ์ฐ์๋ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์์ ํ ์์ฑ์ ํธ๋ฅผ ์ฑ๋ฌธ๋ถ์ํ์ฌ ์๊ธฐ ์ ์ ์ ์ํด ๋ฐํ๋ ๊ฒ์ธ์ง ์ฌ๋ถ๋ฅผ ๊ฒ์ฆํ ์ ์๋ค. ์ด๋ฅผ ์ํ์ฌ, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์๊ธฐ ์ ์ ์ ์ฑ๋ฌธ(่ฒ็ด, voiceprint) ์ ๋ณด๋ฅผ ๋ฏธ๋ฆฌ ์ ์ฅํ ์ ์์ผ๋ฉฐ, ์ฑ๋ฌธ๋ถ์๋ชจ๋์ ํฌํจํ ์๋ ์๋ค.In addition, when the second password is transmitted as a voice signal, the
์ฑ๋ฌธ๋ถ์์ ์ฌ๋์ ์์ฑ์ ๊ฐ์ธ์ฑ์ ์๋ณํ๊ธฐ ์ํ ๋ฐฉ๋ฒ์ผ ์ ์๋ค. ๊ฐ๊ฐ์ธ์ ์ฑ๋ฌธ์ ์์ฑ๊ธฐ๊ด์ ํด๋ถํ์ ํ์, ์ฆ ์ฑ๋, ์ฑ๋, ๋น๊ฐ, ์น์, ๋ฑ์ ํฌ๊ธฐ, ๋ชจ์, ๋ฐ ๋ฌผ๋ฆฌ์ ์ธ ํน์ฑ ๋ฐ/๋๋ ์ธ์ด๋ฅผ ์ต๋ํ ๋์ ์ฌํ ์ธ์ด์ ํ๊ฒฝ๊ณผ ๊ฐ์ธ์ ๋ฐ์ฑ ์ต๊ด์ ๋ฐ๋ฅธ ๋ฐ์, ์ดํ, ์ต์ ๋ฑ์ ์ํด ๊ฒฐ์ ๋ ์ ์๋๋ฐ, ์๊ธฐ ์ฑ๋ฌธ๋ถ์๋ชจ๋์ ์ด๋ฌํ ํน์ง์ ๋น๊ตํ์ฌ, ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์๊ธฐ ์ ์ ์ ์์ฑ๊ณผ ์ ํ ํธ๋ฅผ ํตํด ์์ ํ ์ ์ ์ ์์ฑ๊ฐ์ ๋์ผ์ฑ์ ์๋ณํ ์ ์๋ค.Voice analysis may be a method for identifying the personality of a person's voice. Individual vocal tracts are based on the anatomical shape of the voice organs, ie the size, shape, and physical characteristics of the vocal tract, vocal cords, nasal cavity, teeth, etc. It may be determined by pronunciation, vocabulary, intonation, and the like. The voice analysis module may compare the features and identify the sameness between the user's voice stored in advance and the user's voice received through a telephone call.
์์ ํ ๋ณธ ๋ฐ๋ช
์ ์ผ ์ค์์์์์ ๊ฐ์ด ์ ํ ํธ๋ฅผ ํตํด ๋ณธ์ธ ์ธ์ฆ์ ํ์ํ ์ ๋ณด๋ฅผ ์
๋ ฅ ๋ฐ๊ฒ ๋๋ฉด, ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)์ ๋ณธ์ธ ์ธ์ฆ์ ์ํ ์์ ์ IC ์นฉ์ด๋ ๋ณ๋์ ์ํํธ์จ์ด๋ฅผ ์ค์นํ ํ์๊ฐ ์๊ฒ ๋๋ ํจ๊ณผ๊ฐ ์๋ค. ๋ฐ๋ผ์, ์ข
๋์ 2G ํฐ ๋ฑ์์๋ ์ผ๋ง๋ ์ง ๋ณธ ๋ฐ๋ช
์ ์ค์ ์์ ๋ฐ๋ฅธ ์๋น์ค๊ฐ ํ์ฉ๋ ์ ์๋ค.As in the above-described embodiment of the present invention, when information necessary for identity authentication is received through a telephone call, the
ํํธ, ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง(220)์ ํด๋์ ํ, ์ค๋งํธํฐ, ํ๋ธ๋ PC, PDA(Personal Digital Assistant)๋ฅผ ํฌํจํ๋ ์ปดํจํ
์ฅ์น์ผ ์ ์์ผ๋ฉฐ, ๊ธฐํ ๋ฌด์ ์ ์ ๊ธฐ๋ฅ์ ๊ฐ๋ ํธ๋ํฌ๋ ์ฅ์น๋ฅผ ํฌํจํ๋ ๋ฌด์ ์ปดํจํ
์ฅ์น ๋๋ ๋ค๋ฅธ ๋ฌด์ ๋ชจ๋์ ์ฐ๊ฒฐ๋ ํ๋ก์ธ์ฑ ์ฅ์น์ผ ์๋ ์๋ค.Meanwhile, the
๋ณธ ๋ฐ๋ช
์ ์ผ ์ค์์์ ๋ฐ๋ฅด๋ฉด, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)๋ฅผ ํตํด ์ธ์ฆ์ ํ์ํ ๋ณธ์ธํ์ธ์ ๋ณด๋ฅผ ์
๋ ฅ๋ฐ๊ธฐ ์ ์ ์ฌ์ฉ์๊ฐ ์์ ์ ํ์ธํ ์ ์๋๋ก ํ๋ ๊ธฐ์ ์ ์ฌ์์ ์ ๊ณตํ ์ ์๋ค. ์ฆ, ๋ณธ ๋ฐ๋ช
์ ์ผ ์ค์์์ ๋ฐ๋ฅด๋ฉด, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์์ ์ด ์ ๋นํ ๋ณธ์ธ ์ธ์ฆ ๊ธฐ๊ด์์ ์ ์ ์๊ฒ ํ์ธ์ํฌ ์ ์๋ค.According to an embodiment of the present invention, the
์ด๋ฅผ ์ํ์ฌ, ์ผ ์ค์์์์, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋จผ์ ์์ ์ ์์คํ
ํ์ธ์ ๋ณด๊ฐ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์ ์ถ๋ ฅ๋๋๋ก ํ๊ณ , ์ดํ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)๋ฅผ ํตํด ์ธ์ฆ์ ํ์ํ ๋ณธ์ธํ์ธ์ ๋ณด๋ฅผ ์
๋ ฅ๋ฐ๊ณ ์ ํ ๋ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)์ ๋์ผํ ์์คํ
ํ์ธ์ ๋ณด๊ฐ ์ถ๋ ฅ๋๋๋ก ํ ์ ์๋ค. ์๋ฅผ ๋ค๋ฉด, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์ ARS ์ฝ์ ๋ฐ์ ๋ฒํธ๊ฐ ์ถ๋ ฅ๋๋๋ก ํ ์ ์๋ค. ์ดํ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ด ์๊ธฐ ์ ์ ์ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)์ ARS ์ฝ์ ์ฐ๊ฒฐํ๋ฉด ์๊ธฐ ์ ์ ์ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)์ ARS ์ฝ์ ๋ฐ์ ๋ฒํธ๊ฐ ์ถ๋ ฅ๋ ์ ์๋ค. ๋ฐ๋ผ์, ์ ์ ๋ ์์ ์ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)๋ก ARS ์ฝ์ ์ฐ๊ฒฐํ๊ณ ์ ํ๋ ์ฃผ์ฒด๊ฐ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์์ ํ์ธํ ์ ์๋ค.To this end, in one embodiment, the
์๊ธฐ ์์คํ
ํ์ธ์ ๋ณด๊ฐ ๋ฐ๋์ ๋ฐ์ ๋ฒํธ์ผ ํ์๋ ์๋ค. ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)๋ฅผ ํตํด ARS ์ฝ์ ์ฐ๊ฒฐํ ๋ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)์ ์ถ๋ ฅ๋ ์์ ์ ์๋ด ๋ฌธ๊ตฌ(์๋ฅผ ๋ค๋ฉด, ์ด๋ํต์ ์ฌ์ ๋ ํฐ๋ง ์๋น์ค์ ์๋ด๋ฌธ๊ตฌ)๋ฅผ ๋ฏธ๋ฆฌ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์ ๋์คํ๋ ์ด ํ ์๋ ์๋ค. ์ด ๊ฒฝ์ฐ ์๊ธฐ ์๋ด๋ฌธ๊ตฌ๋ ๋งค๋ฒ ๋ฌ๋ผ์ง ์ ์๋ค.The system identification information is not necessarily the calling number. When the
๋ฐ๋ผ์, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์ ์ ๋จ๋ง๊ธฐ(210)๋ฅผ ํตํด ๋ณธ์ธ ์ธ์ฆ์ ์์ฒญ ๋ฐ๊ณ ์๋ ์์คํ
๊ณผ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)๋ฅผ ํตํด ๋ณธ์ธํ์ธ์ ๋ณด๋ฅผ ์์ฒญํ๊ณ ์๋ ์์คํ
์ด ์๋ก ๋์ผํ๋ค๋ ๊ฒ์ ์ ์ ๊ฐ ํ์ธํ ์ ์๋๋ก ํ ์ ์๋ค.Therefore, the
์๊ธฐ ๋ณธ์ธํ์ธ์ ๋ณด ๋ฐ/๋๋ ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ๋ณธ์ธ ์ธ์ฆ์ ์ฌ์ฉ๋ ์ถ๊ฐ์ ์ธ ๊ฐ์ธ์ ๋ณด๊ฐ ๋ ํฌํจ๋ ์ ์๋ค. ์๋ฅผ ๋ค์ด, ๊ฐ์ธ์ ๋ณด๋ ์ ์ ์ ์ฃผ๋ฏผ๋ฒํธ, ์์ ํ๊ณ ์๋ ์นด๋ ๋ฒํธ, ๋น๋ฐ๋ฒํธ, ์๋ ์์ผ ๋ฑ์ ํฌํจํ ์ ์์ผ๋ ์ด์ ํ์ ๋๋ ๊ฒ์ ์๋๋ค.The identity verification information and / or the identity verification request may further include additional personal information to be used for identity verification. For example, the personal information may include, but is not limited to, a user's social security number, owned card number, password, date of birth, and the like.
ํํธ, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ํ์ํ ๊ฒฝ์ฐ, ์์ ์ ์ธ์ฆ์๋ฒ(300)์ ์์ ์ ๋ณธ์ธ ์ธ์ฆ ํ๋ก์ธ์ค๋ฅผ ์ํด ํ์ํ ๋ฐ์ดํฐ๋ฅผ ์ก์์ ํ ์๋ ์๋ค. ์๊ธฐ ์ธ์ฆ์๋ฒ(300)๋ ์๋ฅผ ๋ค๋ฉด, ์ด๋ํต์ ์ฌ์ ์๋ฒ ๋๋ ์ ์ฉ์นด๋์ฌ์ ์๋ฒ์ผ ์ ์๋ค.Meanwhile, if necessary, the
์ผ ์ค์์์์, ์๊ธฐ ์ธ์ฆ์๋ฒ(300)๊ฐ ์์ ํ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ๋ฐ๊ธํ ๊ฒฝ์ฐ, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง(220)๋ก๋ถํฐ ์์ ํ ํจ์ค์๋์ ๋ณด๋ฅผ ์๊ธฐ ์ธ์ฆ์๋ฒ(300)๋ก ์ ์กํ์ฌ ์์ ํ ํจ์ค์๋๊ฐ ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ๋์ผํ์ง ์ฌ๋ถ๋ฅผ ๋น๊ตํ๋๋ก ํ ์ ์๋ค.In one embodiment, when the
๋ํ, ์ผ ์ค์์์์, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์ ์ ๋ก๋ถํฐ ์
๋ ฅ ๋ฐ์ ๊ฐ์ธ์ ๋ณด ๋ฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ์ด๋ํต์ ์ฌ์ ์ธ์ฆ์๋ฒ์ ์ ์กํ์ฌ, ์๊ธฐ ์ ์ ๊ฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ์ ๋ช
์์์ธ์ง๋ฅผ ํ์ธํจ์ผ๋ก์จ ๋ณธ์ธ ์ธ์ฆ(์ฆ, ํด๋์ ํ์ ์์ ์ฃผ ์ธ์ฆ)์ ์ํํ๊ฑฐ๋, ์ ์ ๋ก๋ถํฐ ์
๋ ฅ ๋ฐ์ ์นด๋ ์ ๋ณด๋ฅผ ์ ์ฉ์นด๋์ฌ์ ์ธ์ฆ ์๋ฒ์ ์ ์กํ์ฌ, ์๊ธฐ ์ ์ ๊ฐ ์ ์ฉ์นด๋์ ๋ช
์์์ธ์ง๋ฅผ ํ์ธํจ์ผ๋ก์จ ๋ณธ์ธ ์ธ์ฆ(์ฆ, ์ ์ฉ์นด๋์ ์์ ์ฃผ ์ธ์ฆ)์ ์ํํ ์๋ ์๋ค.In addition, in one embodiment, the
๋ 2๋ ๋ณธ ๋ฐ๋ช
์ ์ผ ์ค์์์ ๋ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ ์์คํ
์ ๊ฐ๋ต์ ์ธ ๊ตฌ์ฑ์ ์ค๋ช
ํ๊ธฐ ์ํ ๋ธ๋ก๋์ด๋ค. ๋ 2์ ๋์๋ ๋ฐ์ ๊ฐ์ด, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์์ฒญ์์ ๋ชจ๋(110), ์ผํ์ฑ์ธ์ฆ์ ๋ณด๋ชจ๋(120), ์ ํํธ๋ชจ๋(130), ํจ์ค์๋์์ ๋ชจ๋(140), ์ ์ด๋ชจ๋(150), ์์ฑ์ธ์๋ชจ๋(160), ์ฑ๋ฌธ๋ถ์๋ชจ๋(170) ๋ฐ DB(Database; 180)๋ฅผ ํฌํจํ ์ ์๋ค. ๋ณธ ๋ฐ๋ช
์ ์ค์์์ ๋ฐ๋ผ์๋, ์์ ํ ๊ตฌ์ฑ์์๋ค ์ค ์ผ๋ถ ๊ตฌ์ฑ์์๋ ๋ฐ๋์ ๋ณธ ๋ฐ๋ช
์ ๊ตฌํ์ ํ์์ ์ผ๋ก ํ์ํ ๊ตฌ์ฑ์์์ ํด๋นํ์ง ์์ ์๋ ์์ผ๋ฉฐ, ๋ํ ์ค์์์ ๋ฐ๋ผ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์ด๋ณด๋ค ๋ ๋ง์ ๊ตฌ์ฑ์์๋ฅผ ํฌํจํ ์๋ ์์์ ๋ฌผ๋ก ์ด๋ค.2 is a block diagram illustrating a schematic configuration of a user authentication system according to an embodiment of the present invention. As shown in FIG. 2, the
์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋ณธ ๋ฐ๋ช
์ ๊ธฐ์ ์ ์ฌ์์ ๊ตฌํํ๊ธฐ ์ํด ํ์ํ ํ๋์จ์ด ๋ฆฌ์์ค(resource) ๋ฐ/๋๋ ์ํํธ์จ์ด๋ฅผ ๊ตฌ๋นํ ์ ์์ผ๋ฉฐ, ๋ฐ๋์ ํ๋์ ๋ฌผ๋ฆฌ์ ์ธ ๊ตฌ์ฑ์์๋ฅผ ์๋ฏธํ๊ฑฐ๋ ํ๋์ ์ฅ์น๋ฅผ ์๋ฏธํ๋ ๊ฒ์ ์๋๋ค. ์ฆ, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋ณธ ๋ฐ๋ช
์ ๊ธฐ์ ์ ์ฌ์์ ๊ตฌํํ๊ธฐ ์ํด ๊ตฌ๋น๋๋ ํ๋์จ์ด ๋ฐ/๋๋ ์ํํธ์จ์ด์ ๋
ผ๋ฆฌ์ ์ธ ๊ฒฐํฉ์ ์๋ฏธํ ์ ์์ผ๋ฉฐ, ํ์ํ ๊ฒฝ์ฐ์๋ ์๋ก ์ด๊ฒฉ๋ ์ฅ์น์ ์ค์น๋์ด ๊ฐ๊ฐ์ ๊ธฐ๋ฅ์ ์ํํจ์ผ๋ก์จ ๋ณธ ๋ฐ๋ช
์ ๊ธฐ์ ์ ์ฌ์์ ๊ตฌํํ๊ธฐ ์ํ ๋
ผ๋ฆฌ์ ์ธ ๊ตฌ์ฑ๋ค์ ์งํฉ์ผ๋ก ๊ตฌํ๋ ์๋ ์๋ค. ๋ํ, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋ณธ ๋ฐ๋ช
์ ๊ธฐ์ ์ ์ฌ์์ ๊ตฌํํ๊ธฐ ์ํ ๊ฐ๊ฐ์ ๊ธฐ๋ฅ ๋๋ ์ญํ ๋ณ๋ก ๋ณ๋๋ก ๊ตฌํ๋๋ ๊ตฌ์ฑ๋ค์ ์งํฉ์ ์๋ฏธํ ์๋ ์๋ค. ์๋ฅผ ๋ค๋ฉด, ์๊ธฐ ์์ฒญ์์ ๋ชจ๋(110), ์ผํ์ฑ์ธ์ฆ์ ๋ณด๋ชจ๋(120), ์ ํํธ๋ชจ๋(130), ํจ์ค์๋์์ ๋ชจ๋(140), ์ ์ด๋ชจ๋(150), ์์ฑ์ธ์๋ชจ๋(160) ๋ฐ/๋๋ ์ฑ๋ฌธ๋ถ์๋ชจ๋(170)์ ์๋ก ๋ค๋ฅธ ๋ฌผ๋ฆฌ์ ์ฅ์น์ ์์นํ ์๋ ์๊ณ , ๋์ผํ ๋ฌผ๋ฆฌ์ ์ฅ์น์ ์์นํ ์๋ ์๋ค. ๋ํ, ๊ตฌํ ์์ ๋ฐ๋ผ์๋ ์๊ธฐ ์์ฒญ์์ ๋ชจ๋(110), ์ผํ์ฑ์ธ์ฆ์ ๋ณด๋ชจ๋(120), ์ ํํธ๋ชจ๋(130), ํจ์ค์๋์์ ๋ชจ๋(140), ์ ์ด๋ชจ๋(150), ์์ฑ์ธ์๋ชจ๋(160) ๋ฐ/๋๋ ์ฑ๋ฌธ๋ถ์๋ชจ๋(170) ๊ฐ๊ฐ์ ๊ตฌ์ฑํ๋ ์ํํธ์จ์ด ๋ฐ/๋๋ ํ๋์จ์ด์ ๊ฒฐํฉ ์ญ์ ์๋ก ๋ค๋ฅธ ๋ฌผ๋ฆฌ์ ์ฅ์น์ ์์นํ๊ณ , ์๋ก ๋ค๋ฅธ ๋ฌผ๋ฆฌ์ ์ฅ์น์ ์์นํ ๊ตฌ์ฑ๋ค์ด ์๋ก ์ ๊ธฐ์ ์ผ๋ก ๊ฒฐํฉ๋์ด ๊ฐ๊ฐ์ ์๊ธฐ ๋ชจ๋๋ค์ ๊ตฌํํ ์๋ ์๋ค.The
๋ํ, ๋ณธ ๋ช ์ธ์์์ ๋ชจ๋์ด๋ผ ํจ์, ๋ณธ ๋ฐ๋ช ์ ๊ธฐ์ ์ ์ฌ์์ ์ํํ๊ธฐ ์ํ ํ๋์จ์ด ๋ฐ ์๊ธฐ ํ๋์จ์ด๋ฅผ ๊ตฌ๋ํ๊ธฐ ์ํ ์ํํธ์จ์ด์ ๊ธฐ๋ฅ์ , ๊ตฌ์กฐ์ ๊ฒฐํฉ์ ์๋ฏธํ ์ ์๋ค. ์๋ฅผ ๋ค๋ฉด, ์๊ธฐ ๋ชจ๋์ ์์ ์ ์ฝ๋์ ์๊ธฐ ์์ ์ ์ฝ๋๊ฐ ์ํ๋๊ธฐ ์ํ ํ๋์จ์ด ๋ฆฌ์์ค์ ๋ ผ๋ฆฌ์ ์ธ ๋จ์๋ฅผ ์๋ฏธํ ์ ์์ผ๋ฉฐ, ๋ฐ๋์ ๋ฌผ๋ฆฌ์ ์ผ๋ก ์ฐ๊ฒฐ๋ ์ฝ๋๋ฅผ ์๋ฏธํ๊ฑฐ๋, ํ ์ข ๋ฅ์ ํ๋์จ์ด๋ฅผ ์๋ฏธํ๋ ๊ฒ์ ์๋์ ๋ณธ ๋ฐ๋ช ์ ๊ธฐ์ ๋ถ์ผ์ ํ๊ท ์ ์ ๋ฌธ๊ฐ์๊ฒ๋ ์ฉ์ดํ๊ฒ ์ถ๋ก ๋ ์ ์๋ค.In addition, the term "module" in the present specification may mean a functional and structural combination of hardware for performing the technical idea of the present invention and software for driving the hardware. For example, the module may mean a logical unit of a predetermined code and a hardware resource for performing the predetermined code, and does not necessarily mean a physically connected code or a kind of hardware. It can be easily inferred by the average expert in the technical field of the present invention.
์๊ธฐ ์ ์ด๋ชจ๋(150)์ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ํฌํจ๋ ๋ค๋ฅธ ๊ตฌ์ฑ๋ค(์๋ฅผ ๋ค๋ฉด, ์์ฒญ์์ ๋ชจ๋(110), ์ผํ์ฑ์ธ์ฆ์ ๋ณด๋ชจ๋(120), ์ ํํธ๋ชจ๋(130), ํจ์ค์๋์์ ๋ชจ๋(140), ์์ฑ์ธ์๋ชจ๋(160) ๋ฐ/๋๋ ์ฑ๋ฌธ๋ถ์๋ชจ๋(170) ๋ฑ)์ ๊ธฐ๋ฅ ๋ฐ/๋๋ ๋ฆฌ์์ค๋ฅผ ์ ์ดํ ์ ์๋ค.The
DB(180)๋ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋ฏธ๋ฆฌ ์ ์ฅ๋๊ฑฐ๋ ์ ์ง๋ ์ ์๋ ๊ฐ์ข
์ ๋ณด๋ฅผ ์ ์ฅํ ์ ์๋ค. ๋ 3์ DB(180)์ ์ ์ฅ๋๋ ์ ๋ณด์ ์ผ ์๋ฅผ ๋ํ๋ด๋ ๋๋ฉด์ด๋ค. ๋ 6์ ์ฐธ์กฐํ๋ฉด, DB(180)์๋ ๊ฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ์ ์์ํ๋ ์ธ์ฆ์ ๋ณด(ํจ์ค์๋)๊ฐ ์ ์ฅ๋ ์ ์๋ค. ๋ํ, ๊ตฌํ ์์ ๋ฐ๋ผ, ๊ฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ์ ์์ํ๋ ์ ์ ์ ์๋ณ์ ๋ณด, ์ฒดํฌ์ ๋ณด ๋ฑ์ด ๋ ์ ์ฅ๋ ์ ์๋ค.The
์๊ธฐ ์ธ์ฆ์ ๋ณด๋ ์์ ํ ๋ฐ์ ๊ฐ์ด, ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ํจ๊ป ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ์ ์์ํ๋ ๋ชจ๋ฐ์ผ ๋จ๋ง์ ์ ์ ํ ์๊ฐ ์ ๋นํ ์ฌ์ฉ์์ธ์ง ์ฌ๋ถ๋ฅผ ๊ฒ์ฆํ๋ ๋ฐ ์ด์ฉ๋ ์ ์๋ค. ๋ํ, ์๊ธฐ ์ฒดํฌ์ ๋ณด๋ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)๋ฅผ ํตํด ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ํ ์ ์ ๊ฐ ์ ๋นํ ์ฌ์ฉ์์ธ์ง์ ๊ดํ ์ผ์ฐจ์ ์ธ ์ธ์ฆ์ ํ๋๋ฐ ์ด์ฉ๋ ์ ์๋ค. ๋ํ, ์๊ธฐ DB(180)์๋ ๊ฐ ์ ์ ์ ๋ํ ์ฑ๋ฌธ์ ๋ณด๊ฐ ์ ์ฅ๋ ์๋ ์๋ค.As described above, the authentication information may be used to verify whether the user occupying the mobile terminal corresponding to the mobile telephone number is a legitimate user together with the one-time authentication information. In addition, the check information may be used for primary authentication as to whether a user who has requested a user authentication through the
์๊ธฐ ์์ฒญ์์ ๋ชจ๋(110)์ ์์ ์ ์๋น์ค(์๋ฅผ ๋ค๋ฉด, ์จ๋ผ์ธ ์๊ฑฐ๋, ์ธํฐ๋ท ๋ฑ
ํน)์ ์์ํ๋ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์ ๋ฌด์ ๋ฐ์ดํฐ ํต์ ๋ง(์๋ฅผ ๋ค๋ฉด, ์ธํฐ๋ท, ๋ชจ๋ฐ์ผ ์ธํฐ๋ท)์ ํตํด ์์ ํ ์ ์๋ค. ์๊ธฐ ์์ฒญ์์ ๋ชจ๋(110)์ ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)๋ก๋ถํฐ ์ง์ ์์ ํ ์๋ ์์ผ๋ฉฐ, ์์ ์ ๊ฐ๋งน์ ์๋ฒ๋ฅผ ๊ฑฐ์ณ ์์ ํ ์๋ ์๋ค.The
์์ ํ ๋ฐ์ ๊ฐ์ด, ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์ ์ ์ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)์ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ํฌํจํ ์ ์์ผ๋ฉฐ, ์ค์์์ ๋ฐ๋ผ์๋ ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ์ ์์ํ๋ ์ฒดํฌ์ ๋ณด ๋ฐ/๋๋ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์ ์์ํ๋ ์ ์ ์ ๊ฐ์ธ์ ๋ณด๋ฅผ ๋ ํฌํจํ ์ ์๋ค.As described above, the identity authentication request may include a mobile phone number of the user's
์๊ธฐ ์ผํ์ฑ์ธ์ฆ์ ๋ณด๋ชจ๋(120)์ ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์์ํ๋ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๊ฐ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ๋ก ์ ์ก๋๋๋ก ํ ์ ์๋ค.The one-time
์ผ ์ค์์์์, ์๊ธฐ ์ผํ์ฑ์ธ์ฆ์ ๋ณด๋ชจ๋(120)์ ์์ ์ ์ธ์ฆ์๋ฒ(300)์ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ๋ฐ๊ธ์ ์์ฒญํ ์ ์๋ค. ์๊ธฐ ์ธ์ฆ์๋ฒ(300)๋ ์๋ฅผ ๋ค๋ฉด, ์นด๋์ฌ ์์คํ
ํน์ ์ด๋ํต์ ์์คํ
์ผ ์ ์๋ค. ์๊ธฐ ์ธ์ฆ์๋ฒ(300)๋ ์๊ธฐ ๋ฐ๊ธ์์ฒญ์ ์๋ตํ์ฌ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ๋ฐ๊ธํ ์ ์๋ค. ์๊ธฐ ์ธ์ฆ์๋ฒ(300)๋ ๋ฐ๊ธํ ์ธ์ฆ์ ๋ณด๋ฅผ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์ ์ง์ ์ ์กํ ์๋ ์๋ค. ๊ตฌํ ์์ ๋ฐ๋ผ์, ์๊ธฐ ์ธ์ฆ์๋ฒ(300)๋ ๋ฐ๊ธํ ์ธ์ฆ์ ๋ณด๋ฅผ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ผ๋ก ์ ์กํ์ฌ ์๊ธฐ ์ผํ์ฑ์ธ์ฆ์ ๋ณด๋ชจ๋(120)์ด ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์ ์ด๋ฅผ ์ ๋ฌํ๋๋ก ํ ์๋ ์๋ค. ํ์์ ๊ฒฝ์ฐ, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ์์์ ์ผ๋ก ๋ณด๊ดํ ์ ์์ผ๋ฉฐ, ์ด๋ฅผ ์ด์ฉํ์ฌ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)๋ก๋ถํฐ ์์ ํ๊ฒ ๋ ํจ์ค์๋๋ฅผ ๊ฒ์ฆํ ์ ์๋ค.In one embodiment, the one-time
์๊ธฐ ์ ํํธ๋ชจ๋(130)์ ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ํฌํจ๋ ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ์ด์ฉํ์ฌ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ์ ์ ํ ํธ๋ฅผ ์ฐ๊ฒฐํ ์ ์๋ค. ์ผ ์ค์์์์, ์๊ธฐ ์ ํํธ๋ชจ๋(130)์ ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ก ํตํ์ฐ๊ฒฐ์ ์๋ํ๊ณ , ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)์ด ํตํ์ฐ๊ฒฐ์ ์๋ฝํจ์ผ๋ก์จ ์ ํ ํธ๋ฅผ ์ฐ๊ฒฐํ ์ ์๋ค. The
ํํธ, ์ ์ ์ ์ํฉ์ ๋ฐ๋ผ ์ ํ ํธ๊ฐ ์ฐ๊ฒฐ๋์ง ๋ชปํ๋ ๊ฒฝ์ฐ๊ฐ ์กด์ฌํ ์ ์๋ค. ์๋ฅผ ๋ค์ด, ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)๊ฐ ๋ฏธ๋ฆฌ ์ค์ ๋ ํ์์์ ๊ธฐ๊ฐ ๋์ ์ ํ๋ฅผ ๋ฐ์ง ์๊ฑฐ๋ ํตํ์ฐ๊ฒฐ์ ๊ฑฐ์ ํ์ฌ ํตํ์ฐ๊ฒฐ์ด ์ฑ๊ณตํ์ง ๋ชปํ๋ ๊ฒฝ์ฐ์๋ ๋ฐ๋ณตํ์ฌ ์ ํ ํธ๋ฅผ ์ฐ๊ฒฐํ๋ ๊ฒ์ด ๋ถ์ ์ ํ ์๋ ์๋ค. ๋ฐ๋ผ์, ๋ณธ ๋ฐ๋ช
์ ๋ค๋ฅธ ์ผ ์ค์์์์๋ ์ ์ ๊ฐ ์ ํ๋ฅผ ๋ฐ์ง ๋ชปํ๋ ๊ฒฝ์ฐ์๋ ๋ณธ์ธ ํ์ธ์ ์ํํ ์ ์๋ ๋ ๋ค๋ฅธ ๊ธฐ์ ์ ์ฌ์์ ์ ๊ณตํ ์ ์๋ค. ์ด๋ฅผ ์ํด ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)๊ฐ ๋ฏธ๋ฆฌ ์ค์ ๋ ํ์์์ ๊ธฐ๊ฐ ๋์ ์ ํ๋ฅผ ๋ฐ์ง ์๊ฑฐ๋ ํตํ์ฐ๊ฒฐ์ ๊ฑฐ์ ํ์ฌ ํตํ์ฐ๊ฒฐ์ด ์ฑ๊ณตํ์ง ๋ชปํ๋ ๊ฒฝ์ฐ, ์๊ธฐ ์ ํํธ๋ชจ๋(130)์ ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ก ์ฝ๋ฐฑ ๋ฉ์์ง๋ฅผ ์ ์กํ ์ ์๋ค. ๊ทธ๋ฌ๋ฉด, ์ ์ ๋ ์์ ์ด ์ธ์ฆ์ ์ํํ ์ํฉ์ด ๋ ๊ฒฝ์ฐ, ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์ ์ ์ก๋ ์ฝ๋ฐฑ ๋ฉ์์ง๋ฅผ ์ ํํ ์ ์๋ค. ์๊ธฐ ์ฝ ๋ฐฑ ๋ฉ์์ง๋ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ํฌํจ๋ ๋๋ ์ฐ๊ฒฐ๋ ARS ์ ์ ํ๋ฒํธ(์ฆ ๋ฐ์ ๋ฒํธ)๊ฐ ํฌํจ๋ ์ ์๋ค. ๋ฐ๋ผ์, ์ ์ ๊ฐ ์๊ธฐ ์ฝ๋ฐฑ ๋ฉ์์ง๋ฅผ ์ ํํ ๊ฒฝ์ฐ, ์๊ธฐ ARS๋ก ์ ํ ํธ๊ฐ ์ฐ๊ฒฐ๋ ์ ์๋ค.On the other hand, there may be a case where the telephone call is not connected according to the user's situation. For example, if the
ํํธ, ์๊ธฐ ์ ํํธ๋ชจ๋(130)์ ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ก ์ ํ ํธ์ ์ฐ๊ฒฐ์ ์๋ํ ํ, ์ ํ ํธ๊ฐ ์ฐ๊ฒฐ๋์ง ์์ผ๋ฉด ์๊ธฐ ์ฝ ๋ฐฑ ๋ฉ์์ง๋ฅผ ์๊ธฐ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ก ์ ์กํ ์๋ ์์ง๋ง, ๋ค๋ฅธ ์ค์ ์์ ์ํ๋ฉด ์ฒ์๋ถํฐ ์๊ธฐ ์ฝ ๋ฐฑ ๋ฉ์์ง๋ฅผ ์ด์ฉํ์ฌ ์ธ์ฆ์ ์ํํ ์๋ ์๋ค.On the other hand, the
ํํธ, ์๊ธฐ ์ ํํธ๋ชจ๋(130)์ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)์์ ์ ํ ํธ๋ฅผ ์ฐ๊ฒฐํ๊ธฐ ์ ์ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)๋ก ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋ฐ์ ๋ฒํธ๋ฅผ ์ ์กํ ์ ์๋ค. ์ด ๊ฒฝ์ฐ, ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)๋ ์์ ํ ๋ฐ์ ๋ฒํธ๋ฅผ ๋์คํ๋ ์ดํ์ฌ, ์ถํ ARS ์ฝ์ ์ฐ๊ฒฐํ๊ณ ์ ํ๋ ์ฃผ์ฒด๊ฐ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์์ ์ธ์งํ๋๋ก ํ ์ ์๋ค.On the other hand, the
์๊ธฐ ํจ์ค์๋์์ ๋ชจ๋(140)์ ์ฐ๊ฒฐ๋ ์ ํ ํธ๋ฅผ ํตํ์ฌ ํจ์ค์๋์ ์
๋ ฅ์ ์์ฒญํ ์ ์์ผ๋ฉฐ, ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)๋ก๋ถํฐ ํจ์ค์๋๋ฅผ ์์ ํ ์ ์๋ค.The
์ค์์์ ๋ฐ๋ผ, ์๊ธฐ ํจ์ค์๋๋ ๋ฏธ๋ฆฌ ์ค์ ๋์ด ์๊ธฐ DB(180)์ ์ ์ฅ๋์ด ์๋ ์ธ์ฆ์ ๋ณด์ ์์ํ ์ ์๊ฑฐ๋, ์์ ํ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ์์ํ ์ ์๋ค.According to an embodiment, the password may be preset and correspond to authentication information stored in the
์ผ ์ค์์์์, ์๊ธฐ ํจ์ค์๋๋ ๋ ๋ถ๋ถ(์ 1ํจ์ค์๋ ๋ฐ ์ 2ํจ์ค์๋)์ผ๋ก ๋๋ ์ ์๋ค. ์ด ๊ฒฝ์ฐ, ์ 1ํจ์ค์๋๋ ๋ฏธ๋ฆฌ ์ค์ ๋์ด ์๊ธฐ DB(180)์ ์ ์ฅ๋์ด ์๋ ์ธ์ฆ์ ๋ณด์ ์์ํ๋ ๋ถ๋ถ์ผ ์ ์์ผ๋ฉฐ, ์ 2ํจ์ค์๋๋ ์์ ํ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ์์ํ๋ ๋ถ๋ถ์ผ ์ ์๋ค.In one embodiment, the password can be divided into two parts (a first password and a second password). In this case, the first password may be a portion corresponding to the authentication information stored in the
์๊ธฐ ํจ์ค์๋์์ ๋ชจ๋(140)์ด ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)๋ก๋ถํฐ ์์ ํ๋ ํจ์ค์๋ ์ ๋ณด ์ค ์ผ๋ถ๋ ์์ฑ์ ํธ์ผ ์ ์๋ค. ์ค์์์ ๋ฐ๋ผ์๋, ํนํ, ์๊ธฐ ํจ์ค์๋ ์ ๋ณด ์ค ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ์์ํ๋ ์ 2ํจ์ค์๋๊ฐ ์์ฑ์ ํธ์ผ ์ ์๋ค.Some of the password information received by the
์ด ๊ฒฝ์ฐ, ์๊ธฐ ์์ฑ์ธ์๋ชจ๋(160)์ ์์ฑ์ธ์์ ํตํ์ฌ, ์๊ธฐ ์์ฑ์ ํธ๋ก๋ถํฐ ์๊ธฐ ์ 2ํจ์ค์๋๋ฅผ ์ธ์ํ ์ ์์ผ๋ฉฐ, ์๊ธฐ ์ฑ๋ฌธ๋ถ์๋ชจ๋(170)์ ์๊ธฐ ์์ฑ์ ํธ๋ฅผ ์ฑ๋ฌธ๋ถ์ํ์ฌ ์๊ธฐ ์์ฑ์ ํธ๊ฐ ์๊ธฐ ์ ์ ์ ์ํด ๋ฐํ๋์๋์ง ์ฌ๋ถ๋ฅผ ํ๋จํ ์ ์๋ค.In this case, the
์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์๊ธฐ ์์ฑ์ธ์๋ชจ๋(160)์ด ์์ฑ์ธ์์ ์ํํ๋๋ฐ ํ์ํ ์ดํ๋ชจ๋ธ์ ๋ณด๋ ์ํฅ๋ชจ๋ธ์ ๋ณด๋ฅผ ์๊ธฐ DB(180)์ ๋ฏธ๋ฆฌ ์ ์ฅํ ์ ์๋ค. ์ค์์์ ๋ฐ๋ผ์๋ ๊ฐ๊ฐ์ ์ ์ ๋ณ ์ํฅ๋ชจ๋ธ์ ๋ณด๋ฅผ ๋ณ๋๋ก ๊ด๋ฆฌํจ์ผ๋ก์จ ์์ฑ์ธ์๋ฅ ์ ๋์ผ ์ ์๋ค. ๋ณธ ๋ฐ๋ช
์ ๊ตฌํํ๋ ๋ฐ์ ํ์ํ ์์ฑ์ธ์๊ธฐ์ ์๋ ์ ํ์ด ์์ผ๋ฉฐ, ์์ฑ์ธ์์ ๊ดํ ๊ณต์ง ๊ธฐ์ ์ ๋ํ ๊ตฌ์ฒด์ ์ธ ์ค๋ช
์ ์๋ตํ๊ธฐ๋ก ํ๋ค.The
๋ํ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์๊ธฐ ์ฑ๋ฌธ๋ถ์๋ชจ๋(170)์ด ์ฑ๋ฌธ๋ถ์์ ์ํํ๋๋ฐ ํ์ํ ์ ๋ณด, ์ฆ, ์ ์ ์ ์ฑ๋ฌธ์ ๋ณด๋ฅผ ์๊ธฐ DB(180)์ ๋ฏธ๋ฆฌ ์ ์ฅํ ์ ์๋ค. ์ฌ๋์ ์์ฑ์ ์ฌ๋ฌ ๊ฐ์ง ์ฃผํ์ ์ฑ๋ถ์ด ํผํฉ๋์ด ์๋ ๋ณตํฉํ์ด๋ฏ๋ก ์ ์ ์ ์์ฑ์ ์ฃผํ์ ๋ถ์ํจ์ผ๋ก์จ ์ ์ ์ ์ฑ๋ฌธ์ ๋ณด๋ฅผ ํ์
ํ ์ ์๋ค. ์ฑ๋ฌธ์ ๋ณด๋ ๊ณต๋ช
์ฃผํ์, ์ฃผํ์๋ณ ์ธ๊ธฐ, ์ฑ๋์ ์ง๋์ ์ํ ์ฑ๋ ์ง๋ ํํ ๋ฐ ์์ ๋์ด ๋ฑ ๊ฐ์ข
์ํฅ ํ๋ผ๋ฏธํฐ๋ฅผ ํฌํจํ ์ ์๋ค. ์ผ ์ค์์์์, ์๊ธฐ ์ฑ๋ฌธ๋ถ์๋ชจ๋(170)์ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)๋ก๋ถํฐ ์์ ๋๋ ์์ฑ์ ํธ๋ฅผ ๋ถ์ํ์ฌ ์ฑ๋ฌธ์ ๋ณด๋ฅผ ์ถ์ถํ๊ณ , ์ด๋ฅผ ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ ์ ์ ์ฑ๋ฌธ์ ๋ณด์ ๋น๊ตํ์ฌ ์ฑ๋ฌธ๋ถ์์ ์ํํ ์ ์๋ค.In addition, the
์๊ธฐ ์ ์ด๋ชจ๋(150)์ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)๋ก๋ถํฐ ์์ ํ ์ ๋ณด๋ฅผ ์ด์ฉํ์ฌ ๋ณธ์ธ ์ธ์ฆ์ ์ํํ ์ ์๋ค.The
์ผ ์ค์์์์, ์๊ธฐ ์ ์ด๋ชจ๋(150)์ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)๋ก๋ถํฐ ์์ ํ ์ ๋ณด ์ค ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ์์ํ๋ ๋ถ๋ถ(์ฆ, ์์ ํ ์ 2ํจ์ค์๋)์ ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๊ฐ ์๋ก ์ผ์นํ์ง ์ฌ๋ถ๋ฅผ ํ์ธํ ์ ์๋ค. ์ค์์์ ๋ฐ๋ผ, ์๊ธฐ ์ ์ด๋ชจ๋(150)์ ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ๋ฐ๊ธํ ์ธ์ฆ์๋ฒ(300)๋ก ์๊ธฐ ์ 2ํจ์ค์๋๋ฅผ ์ ์กํ์ฌ, ์๊ธฐ ์ธ์ฆ์๋ฒ(300)๊ฐ ์๊ธฐ ์ 2ํจ์ค์๋์ ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๊ฐ ์ผ์นํ๋์ง ์ฌ๋ถ๋ฅผ ํ๋จํ๋๋ก ํ ์ ์๋ค. ๋ง์ฝ, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ด ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ๋ณด๊ดํ๊ณ ์๋ ๊ฒฝ์ฐ์๋ ์๊ธฐ ์ ์ด๋ชจ๋(150)์ด ์๊ธฐ ์ 2ํจ์ค์๋์ ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๊ฐ ์ผ์นํ๋์ง ์ฌ๋ถ๋ฅผ ์ง์ ํ๋จํ ์๋ ์๋ค.According to an embodiment, the
์ค์์์ ๋ฐ๋ผ, ์๊ธฐ ์ ์ด๋ชจ๋(150)์ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)๋ก๋ถํฐ ์์ ํ ์ ๋ณด ์ค ์๊ธฐ DB(180)์ ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ์ ๋ณด์ ์์ํ๋ ๋ถ๋ถ(์ฆ, ์์ ํ ์ 1ํจ์ค์๋)์ ์๊ธฐ ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ์ ๋ณด๊ฐ ์ผ์นํ๋์ง ์ฌ๋ถ๋ฅผ ํ๋จํ ์ ์๋ค.According to an embodiment, the
ํํธ, ์๊ธฐ ์ ์ด๋ชจ๋(150)์, ์๊ธฐ ์ 2ํจ์ค์๋์ ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๊ฐ์ ๋น๊ต ๊ฒฐ๊ณผ์ ๊ธฐ์ดํ์ฌ ์๊ธฐ ์ ์ ์ ๋ํ ๋ณธ์ธ์ธ์ฆ์ ํ ์ ์๋ค. ๋ํ ์ค์์์ ๋ฐ๋ผ, ์๊ธฐ ์ ์ด๋ชจ๋(150)์ ์๊ธฐ ์ 1ํจ์ค์๋ ๋ฐ ์๊ธฐ ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ์ ๋ณด๊ฐ์ ๋น๊ต ๊ฒฐ๊ณผ ๋ฐ/๋๋ ์๊ธฐ ์ฑ๋ฌธ๋ถ์๋ชจ๋(170)์ ๋น๊ต๊ฒฐ๊ณผ๋ฅผ ๋ ๊ณ ๋ คํจ์ผ๋ก์จ ๋ณด์ ์์ค์ ํฅ์์ํฌ ์ ์๋ค.The
ํํธ, ์๊ธฐ ์ ์ด๋ชจ๋(150)์ ์์ ์ ๊ฐ์ธ์ ๋ณด๋ฅผ ์ด์ฉํ์ฌ ์๊ธฐ ์ ์ ์ ๋ํ ์ถ๊ฐ์ ์ธ ๋ณธ์ธ ์ธ์ฆ์ ์ํ ํ ์๋ ์๋ค. ์๊ธฐ ์ ์ ์ ๋ํ ๊ฐ์ธ์ ๋ณด๋ ์๊ธฐ ์ ์ ์ ๋ํ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ, ์ฃผ๋ฏผ๋ฒํธ, ์๋
์์ผ, ์ ์ฉ์นด๋๋ฒํธ, ์ฃผ์ ๋ฑ์ ํฌํจํ ์ ์์ผ๋ฉฐ, ์ด๋ฌํ ๊ฐ์ธ์ ๋ณด๋ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์ ์ํด ์ ์ก๋๋ ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ ๋ฐ/๋๋ ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)์ ์ํด ์ ์ก๋๋ ๋ณธ์ธํ์ธ์ ๋ณด์ ํฌํจ๋ ์ ์๋ค. ์๊ธฐ ์ ์ด๋ชจ๋(150)์ ์์ ํ ๊ฐ์ธ์ ๋ณด๋ฅผ ์์ ์ ์ธ์ฆ์๋ฒ(์๋ฅผ ๋ค๋ฉด, 300)์ ์ ์กํ์ฌ ์๊ธฐ ์ ์ ์ ๋ํ ๋ณธ์ธ ์ธ์ฆ์ ์์ฒญํจ์ผ๋ก์จ, ์ถ๊ฐ์ ์ธ ๋ณธ์ธ ์ธ์ฆ์ ์ํํ ์ ์๋ค.On the other hand, the
์์ ํ ๋ฐฉ์์ ์ํด ๋ณธ์ธ ์ธ์ฆ์ด ๋ ๊ฒฝ์ฐ, ์๊ธฐ ์ ์ด๋ชจ๋(150)์ ์๊ธฐ ๊ฐ ์์ฒญํ ์๋น์ค๊ฐ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)๋ฅผ ํตํด ์ ๊ณต๋ ์ ์๋๋ก ํ ์ ์๋ค. ์๋ฅผ ๋ค์ด, ์๊ธฐ ์ ์ ๊ฐ ์ธํฐ๋ท ๋ฑ
ํน์ ์ด์ฉํ๊ธฐ ์ํด ๋ณธ์ธ ์ธ์ฆ์ ์์ฒญํ ๊ฒฝ์ฐ, ์๊ธฐ ์ ์ด๋ชจ๋(150)์ ์ธํฐ๋ท ๋ฑ
ํน์ ์์ํ๊ธฐ ์ํ ์ด๊ธฐ ์ ์ฐจ๊ฐ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์ ์ ๊ณต๋๋๋ก ํ ์ ์๋ค. ๋ฌผ๋ก , ์๊ธฐ ์ ์ด๋ชจ๋(150)์ ๋ณธ์ธ ์ธ์ฆ์ด ์คํจํ ๊ฒฝ์ฐ, ์์ ์ ์๋ด ๋ฉ์์ง๋ฅผ ์ ์กํ ์ ์์ผ๋ฉฐ, ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์ ์๋น์ค๊ฐ ์ ๊ณต๋๋ ๊ฒ์ด ํ์ฉ๋์ง ๋ชปํ๋๋ก ํ ์ ์๋ค.When the identity is authenticated by the above-described method, the
์ดํ์์๋ ๋ 4๋ฅผ ์ค์ฌ์ผ๋ก ๋ 5 ๋ด์ง ๋ 7์ ์ฐธ์กฐํ์ฌ, ๋ณธ ๋ฐ๋ช ์ ์ผ ์ค์์์ ๋ฐ๋ฅธ ๋ณธ์ธ์ธ์ฆ ์์คํ ์ ๊ณต๋ฐฉ๋ฒ์ ์ค๋ช ํ๋ค.Hereinafter, a method of providing a user authentication system according to an embodiment of the present invention will be described with reference to FIGS. 5 to 7 with reference to FIG. 4.
๋ 4๋ ๋ณธ ๋ฐ๋ช ์ ์ผ ์ค์์์ ๋ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๊ณต๋ฐฉ๋ฒ์ ํ๋ก์ฐ๋ฅผ ์ค๋ช ํ๊ธฐ ์ํ ๋๋ฉด์ด๋ค.4 is a view for explaining the flow of a method for providing a user authentication system according to an embodiment of the present invention.
๋ 4๋ฅผ ์ฐธ์กฐํ๋ฉด, ์ ์ ๋ ์์ ์ ์ ์ ๋จ๋ง๊ธฐ(210)๋ฅผ ์ด์ฉํ์ฌ, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ผ๋ก ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์ ์กํ ์ ์๋ค(S100). ์ด๋ฌํ ๋ณธ์ธ์ธ์ฆ์์ฒญ์๋ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๊ฐ ํฌํจ๋ ์ ์์ผ๋ฉฐ, ์ค์์์ ๋ฐ๋ผ, ์๊ธฐ ์ ์ ์ ๊ฐ์ธ์ ๋ณด ์ค ์ ์ด๋ ์ผ๋ถ๊ฐ ํฌํจ๋ ์ ์๋ค.Referring to FIG. 4, a user may transmit a user authentication request to the
ํํธ, ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)๋ก๋ถํฐ ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์
๋ ฅ๋ฐ๊ธฐ ์ํ์ฌ, ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์๋ ๋ 5์ ๋์๋ ๋ฐ์ ๊ฐ์ UI ๊ฐ ๋์คํ๋ ์ด ๋ ์ ์๋ค. ๋ 5๋ ๋ณธ ๋ฐ๋ช
์ ์ผ ์ค์์์ ๋ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ ์์คํ
์ ๊ณต๋ฐฉ๋ฒ์ ๊ตฌํํ๊ธฐ ์ํด ์ ์ ๋จ๋ง๊ธฐ์๊ฒ ์ ๊ณต๋๋ ๋ณธ์ธ์ธ์ฆ์์ฒญ UI์ ์ผ ์๋ฅผ ๋ํ๋ด๋ ๋๋ฉด์ด๋ฉฐ, ๋ 5๋ฅผ ์ฐธ์กฐํ๋ฉด, ์ ์ ๊ฐ ์์ ์ ์๋น์ค(์๋ฅผ ๋ค๋ฉด, ์จ๋ผ์ธ ๊ฒฐ์ )๋ฅผ ์ด์ฉํ๊ธฐ ์ํ ์์ฒญ์ ํ๋ ๊ฒฝ์ฐ, ๋ 5์ ๋์๋ ๋ฐ์ ๊ฐ์ UI(10)๊ฐ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์ ์ ๊ณต๋ ์ ์๋ค. ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ํ๋ฉด, ์ ์ ๋ ์๊ธฐ UI(10)์ ํฌํจ๋ ์์ ์ ์
๋ ฅ UI(11)๋ฅผ ํตํด, ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ(์๋ฅผ ๋ค๋ฉด, ํธ๋ํฐ ๋ฒํธ)๋ฅผ ์
๋ ฅํ ์ ์๋ค. ๊ตฌํ ์์ ๋ฐ๋ผ, ๊ฒฐ์ ์ ๋ณด๋ฅผ ์
๋ ฅํ๊ธฐ ์ํ ๊ฒฐ์ ์ ๋ณด์
๋ ฅ UI(13)๋ฅผ ์ด์ฉํ์ฌ ๊ฒฐ์ ์ ๋ณด(์๋ฅผ ๋ค๋ฉด, ์ ์ฉ์นด๋ ์ ๋ณด, ๊ฒฐ์ ๊ธ์ก ๋ฑ)๋ฅผ ์
๋ ฅํ ์ ์์ผ๋ฉฐ, ์
๋ ฅ๋ ์ ๋ณด๋ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ํฌํจ๋์ด ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ผ๋ก ์ ์ก๋ ์ ์๋ค.Meanwhile, in order to receive the identity authentication request from the
๋ค์ ๋ 4๋ฅผ ์ฐธ์กฐํ๋ฉด, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์๊ธฐ ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ์์ํ๋ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๊ฐ ๋ฐ๊ธ๋ ์ ์๋๋ก ์์ ์ ์ธ์ฆ์๋ฒ(๋ 4์ ์์์์๋ ์นด๋์ฌ ์์คํ
(300))์ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ๋ฐ๊ธ์ ์์ฒญํ ์ ์๋ค(S110). ๊ทธ๋ฌ๋ฉด, ์๊ธฐ ์นด๋์ฌ ์์คํ
(300)์ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด(OTP)๋ฅผ ๋ฐ๊ธํ ์ ์๋ค(S120). ์ผํ์ฑ ์ธ์ฆ์ ๋ณด(OTP)๋, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ์ ๋ณด์ ํจ๊ป, ์ถํ ์๊ธฐ ์ ์ ์ ๋ํ ๋ณธ์ธ์ธ์ฆ์ ์ํํ๋๋ฐ ์ด์ฉ๋ ์ ์๋ค.Referring back to Figure 4, the
์ผ ์ค์์์์, ์๊ธฐ ์นด๋์ฌ ์์คํ
(300)์ ๋ฐ๊ธํ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด(OTP)๋ฅผ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์ ์ ์กํ์ฌ(S130), ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)๊ฐ ์์ ํ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด(OTP)๋ฅผ ์ถ๋ ฅํ๋๋ก ํ ์ ์๋ค(S140). ๋ํ ์๊ธฐ ์นด๋์ฌ ์์คํ
(300)์ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ผ๋ก ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๊ฐ ๋ฐ๊ธ๋์์์ ํต๋ณดํ ์ ์๋ค. ์ค์์์ ๋ฐ๋ผ์๋, ๋ 4์ ๋จ๊ณ(S130, S150)์ ๋ฌ๋ฆฌ, ์๊ธฐ ์นด๋์ฌ ์์คํ
(300)์ ๋ฐ๊ธํ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด(OTP)๋ฅผ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ผ๋ก ์ ์กํ์ฌ, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ด ์ผํ์ฑ ์ธ์ฆ์ ๋ณด(OTP)๋ฅผ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์ ์ ์กํ๋๋ก ํ ์๋ ์๋ค.In one embodiment, the
ํํธ, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋ฐ์ ๋ฒํธ(์๋ฅผ ๋ค๋ฉด, ARS ์ฝ์ ๋ฐ์ ๋ฒํธ)๋ฅผ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์ ์ ์กํ์ฌ(S160), ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋ฐ์ ๋ฒํธ๊ฐ ์ถ๋ ฅ๋๋๋ก ํ ์ ์๋ค(S170).On the other hand, the
ํํธ, ์ค์์์ ๋ฐ๋ผ์๋, ๋ 4์ ๋จ๊ณ(S140, S170)๊ณผ ๋ฌ๋ฆฌ, ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)๋ ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋ฐ์ ๋ฒํธ๋ฅผ ๋ 6์ ๋์๋ ๋ฐ์ ๊ฐ์ ํ๋์ ์๋ด UI ์์์ ์ถ๋ ฅํ ์ ์๋ค. ๋ 6์ ๋ณธ ๋ฐ๋ช
์ ์ผ ์ค์์์ ๋ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ ์์คํ
์ ๊ณต๋ฐฉ๋ฒ์ ๊ตฌํํ๊ธฐ ์ํด ์ ์ ๋จ๋ง๊ธฐ์ ์ ๊ณต๋๋ ์๋ด UI์ ์ผ ์๋ฅผ ๋ํ๋ด๋ ๋๋ฉด์ด๋ค. ๋ 6์ ๋์๋ ๋ฐ์ ๊ฐ์ด, ์๊ธฐ ์๋ด UI(20) ๋ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋ฐ์ ๋ฒํธ๋ฅผ ์๋ดํ๊ธฐ ์ํ UI(21)์ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด(OTP)๋ฅผ ์๋ดํ๊ธฐ ์ํ UI(22)๋ฅผ ํฌํจํ ์ ์๋ค. On the other hand, according to an embodiment, unlike the step (S140, S170) of Figure 4, the
์๊ธฐ UI(21)๋ ABC ์ธ์ฆ์ผํฐ(๋ฐ์ ๋ฒํธ: 070-1010-1234)๋ก๋ถํฐ ARS ๋ณธ์ธ์ธ์ฆ ์ ํ๊ฐ ์ฌ ๊ฒ์์ ์๋ดํ๋ ๋ฉ์์ง๋ฅผ ํฌํจํ ์ ์๋ค. ์๊ธฐ UI(21)์ ํฌํจ๋ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋ช
์นญ(ABC ์ธ์ฆ์ผํฐ)๊ณผ ๋ฐ์ ๋ฒํธ(21)๋ ์ถํ ์ ์ ์ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)์ ๋ค์ ์ถ๋ ฅ๋์ด, ์ ์ ๊ฐ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๊ฒ์ฆํ ์ ์๋๋ก ํ๋ ์ญํ ์ ํ ์ ์๋ค.The UI 21 may include a message informing that an ARS identity verification call is coming from an ABC authentication center (call number: 070-1010-1234). The name (ABC authentication center) and the calling number 21 of the
ํํธ, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ์ ๋ณด์ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ๋ชจ๋ ์ด์ฉํ๋ ์ค์์ ์ค ์ผ๋ถ์์๋, ์ ์ ๊ฐ ๊ฐ ์ธ์ฆ์ ๋ณด๋ฅผ ๊ตฌ์ฑํ๋ ๋ฌธ์์ ๋ฐฐ์น๋ฅผ ๋ค์์ด ์
๋ ฅํ๋๋ก ํ ์ ์๋ค. ์ด๋ฅผ ์ํ์ฌ, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ์ ๋ณด๋ฅผ ๊ตฌ์ฑํ๋ ๋ฌธ์๋ค์ด ๋ฐฐ์น๋ ์์น์ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ๊ตฌ์ฑํ๋ ๋ฌธ์๋ค์ด ๋ฐฐ์น๋ ์์น์ ๊ดํ ๋ฐฐ์น์ ๋ณด๋ฅผ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์ ๊ณต์ ํ ์ ์๋ค. ์๋ฅผ ๋ค๋ฉด, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ด ์๊ธฐ ๋ฐฐ์น์ ๋ณด๋ฅผ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)์ ์ ์กํ ์ ์๋ค.On the other hand, in some of the embodiments using both the authentication information and the one-time authentication information stored in advance in the
์๋ฅผ ๋ค์ด, ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๊ฐ 452178์ด๋ฉฐ ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ์ ๋ณด๋ ๋ค ์๋ฆฌ์ ์ซ์(****)๋ผ๊ณ ํ๋ฉด, ๋ 6์ ๋์๋ ๋ฐ์ ๊ฐ์ด, ์ ์ ๋จ๋ง๊ธฐ(210)์๋ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ์ ๋ณด๊ฐ ์ด๋ค ์์๋ก ์
๋ ฅ๋์ด์ผ ํ๋์ง๋ฅผ ์๋ดํ๋ UI(22)๊ฐ ๋์คํ๋ ์ด๋ ์ ์๋ค. ์ดํ, ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)๋ฅผ ํตํ์ฌ, ์ ์ ๊ฐ ํจ์ค์๋๋ฅผ ์
๋ ฅํ๋ฉด, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์๊ธฐ ๋ฐฐ์น์ ๋ณด์ ๊ธฐ์ดํ์ฌ ์
๋ ฅ๋ ํจ์ค์๋๋ฅผ ๋ ๋ถ๋ถ(์ 1ํจ์ค์๋ ๋ฐ ์ 2ํจ์ค์๋)์ผ๋ก ๊ตฌ๋ถํ ์ ์๋ค. ๋งค ๋ณธ์ธ์ธ์ฆ์์ฒญ๋ง๋ค ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ๋ฒํธ์ ์ผํ์ฑ ์ธ์ฆ๋ฒํธ์ ๋ฐฐ์ด์ ๋ฌ๋ฆฌํ์ฌ ์
๋ ฅํ๋๋ก ํจ์ผ๋ก์จ, ์
๋ ฅ์ ๊ฐ๋ก์ฑ๋ ๊ณต๊ฒฉ์ ํจ๊ณผ์ ์ผ๋ก ์ฐจ๋จํ ์ ์๋ค.ย For example, if the one-time authentication information is 452178 and the pre-stored authentication information is a four-digit number ****, as shown in FIG. 6, the
๋ค์ ๋ 4๋ฅผ ์ฐธ์กฐํ๋ฉด, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ํฌํจ๋์ด ์๋ ๋ชจ๋ฐ์ผ ์ ํ๋ฒํธ๋ฅผ ์ด์ฉํ์ฌ, ์๊ธฐ ์ ์ ์ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)์ ์ ํ ํธ๋ฅผ ์ฐ๊ฒฐํ ์ ์๋ค. ์ด๋, ์๊ธฐ ์ ์ ์ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)์๋ ๋ฐ์ ๋ฒํธ ๋ฐ/๋๋ ๋ฐ์ ์ ์ ๋ณด๊ฐ ๋ 7์ ๋์๋ ๋ฐ์ ๊ฐ์ด, ์ถ๋ ฅ๋ ์ ์๋ค. ๋ 7์ ๋ณธ ๋ฐ๋ช
์ ์ผ ์ค์์์ ๋ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ ์์คํ
์ ๊ณต๋ฐฉ๋ฒ์์ ์ ์ ์ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)์ ์ถ๋ ฅ๋๋ ํ๋ฉด์ ์ผ ์๋ฅผ ๋ํ๋ด๋ ๋๋ฉด์ด๋ค. ๋ 7์ ๋์๋ ๋ฐ์ ๊ฐ์ด, ์๊ธฐ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220)์๋ ์๊ธฐ ์ ์ ๋จ๋ง๊ธฐ(210)๋ฅผ ํตํด ์๋ดํ ๋ฐ์ ์ ์ ๋ณด ๋ฐ ๋ฐ์ ์ ํ๋ฒํธ ์ ๋ณด(๋ 6 ์ฐธ์กฐ)์ ๋์ผํ ์ ๋ณด๊ฐ ์ถ๋ ฅ๋ ์ ์๋ค. ์ด์ ๊ฐ์ ๋ฐฉ๋ฒ์ ํตํด, ์ ์ ๋ ์์ ์ด ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ํ ์ฃผ์ฒด์ ARS ์ฝ์ ์ฐ๊ฒฐํ๊ณ ์ ํ๋ ์ฃผ์ฒด๊ฐ์ ๋์ผ์ฑ์ ํ์ธํ ์ ์๋ค.Referring back to FIG. 4, the
์ด์ ๊ฐ์ด, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ๋ณธ์ธ์ธ์ฆ์ด ์์ฒญ๋๋ ์ฑ๋(์ฆ, ์ ๋ฌด์ ์ธํฐ๋ท ๋ฑ์ ๋ฐ์ดํฐ ํต์ ๋ง)๊ณผ ํจ์ค์๋๋ฅผ ํ์ธํ๋ ์ฑ๋(์ฆ, ์ ํ๋ง)์ ๊ตฌ๋ถํจ์ผ๋ก์จ, ์ด๋ ํ ํ ์ฑ๋์์์ ์ ๋ณด ์ ์ถ์ด ์ผ์ด๋๋๋ผ๋ ๋ณด์์ฑ์ ์ ์งํ ์ ์๋ ์์คํ
๊ตฌ์กฐ๋ฅผ ์ ๊ณตํ ์ ์๋ค. ๋ํ, ARS๋ฅผ ํตํด ํจ์ค์๋๋ฅผ ์์ ํ๋ ๊ฒฝ์ฐ, ๋ฐ์ดํฐ ํต์ ๋ง์์์ ๊ณต๊ฒฉ ์์ปจ๋, ๋ฐ์ด๋ฌ์ค, ์, ๋๋ ์
์ฑ์ฝ๋๋ฅผ ํตํด ์ ๋ณด๊ฐ ์ ์ถ๋์ง ์์ ๊ฐ๋ฅ์ฑ์ด ๋์ ํจ๊ณผ๋ ์๋ค. ๋ํ, ์ ํ ํธ์ ๊ฒฝ์ฐ์๋ ํจํท ํต์ ๋ง๊ณผ ๋ฌ๋ฆฌ ๋์ฒญ/๊ฐ์ฒญํ๊ธฐ๊ฐ ๋งค์ฐ ์ด๋ ต๋ค. ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์ด์ ๊ฐ์ ํน์ง์ ๊ฐ์ง๋ ์ ํ ํธ๋ฅผ ํตํด ๋ณธ์ธ ์ธ์ฆ์ ํ์ํ ๊ฐ์ข
์ ๋ณด๋ฅผ ์์ ํ๋ฏ๋ก ์ค๊ฐ์ ๊ณต๊ฒฉ์ ๋ํ ์ทจ์ฝ์ ์ ํจ๊ณผ์ ์ผ๋ก ๋ฐฉ์งํ ์ ์๋ค.As such, the
๋ค์ ๋ 4๋ฅผ ์ฐธ์กฐํ๋ฉด, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์ฐ๊ฒฐ๋ ์ ํ ํธ๋ฅผ ํตํ์ฌ, ์๊ธฐ DB(180)์ ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ์ ๋ณด์ ์์ํ๋ ์ 1ํจ์ค์๋(pw1) ๋ฐ ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ์์ํ๋ ์ 2ํจ์ค์๋(pw2)๋ฅผ ํฌํจํ๋ ํจ์ค์๋ ์ ๋ณด๋ฅผ ์
๋ ฅํ ์ ์๋ค(S190). ์๋ฅผ ๋ค์ด, ์ ์ ๊ฐ ๋ 6์ ๋์๋ ๋ฐ์ ๊ฐ์ ์๋ด๋ฅผ ๋ฐ์ ๊ฒฝ์ฐ, ์ ์ ๋ ์ 1ํจ์ค์๋์ ์์ํ๋ ๋ค ์๋ฆฌ์ ๋ฌธ์๋ฅผ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด(452178)์ ๋์งธ ์๋ฆฌ ๋ค, ์
์งธ ์๋ฆฌ ๋ค, ๋ท์งธ ์๋ฆฌ ๋ค, ์ฌ์ฏ์งธ ์๋ฆฌ ๋ค์ ๊ฐ๊ฐ ๋ผ์ ๋ฃ์ด ํจ์ค์๋ ์ ๋ณด๋ฅผ ์
๋ ฅํ ์ ์๋ค.Referring back to FIG. 4, the
์ด์ ๊ฐ์ด, ๋ณธ ๋ฐ๋ช ์ ์ผ ์ค์์์์๋, ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ์ ๋ณด์ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ํ๊บผ๋ฒ์ ์ ๋ ฅํ๋๋ก ํจ์ผ๋ก์จ, ๋ณด๋ค ๋์ ๋ณด์์ฑ์ ํ๋ณดํ ์ ์๋ค. ์๋์ ์ผ๋ก ์งง์ ์๋ฆฌ์๋ฅผ ๊ฐ์ง๋ ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ์ ๋ณด์ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ๊ฐ๋ณ์ ์ผ๋ก ์ ๋ ฅํ๋ ๊ฒ๋ณด๋ค ๋์ ํฉ์ณ ๋ง๋ ๊ธด ์๋ฆฌ์์ ํจ์ค์๋๋ฅผ ์์๋ด๊ธฐ๊ฐ ํจ์ฌ ์ด๋ ต๊ธฐ ๋๋ฌธ์ด๋ค.As described above, in one embodiment of the present invention, by inputting previously stored authentication information and one-time authentication information at once, it is possible to ensure higher security. This is because it is much harder to find a long-digit password that is made up of two pieces rather than inputting pre-stored authentication information and one-time authentication information having relatively short digits individually.
ํํธ, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์
๋ ฅ๋ ํจ์ค์๋ ์ ๋ณด๋ก ๋ณธ์ธ ์ธ์ฆ์ ์ํํ ์ ์๋ค.On the other hand, the
์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์ 1ํจ์ค์๋๊ฐ ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ์ ๋ณด์ ๋์ผํ์ง ์ฌ๋ถ๋ฅผ ํ๋จํ ์ ์๋ค(S200).The
๋ํ, ์๊ธฐ ํจ์ค์๋ ์ ๋ณด ์ค ์ 2ํจ์ค์๋๊ฐ ์์ฑ์ ํธ๋ก ์
๋ ฅ๋ ๊ฒฝ์ฐ์๋, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์ฑ๋ฌธ๋ถ์์ ํตํด ์๊ธฐ ์์ฑ์ ํธ๊ฐ ์ ์ ์ ์ํด ๋ฐํ๋์๋์ง ์ฌ๋ถ๋ฅผ ํ๋จํ ์ ์์ผ๋ฉฐ(S210), ์์ฑ์ ํธ์ ๋ํ ์์ฑ์ธ์์ ์ํํ์ฌ ์๊ธฐ ์ 2ํจ์ค์๋๋ฅผ ์ธ์ํ ์ ์๋ค(S220).In addition, when the second password of the password information is input as a voice signal, the
์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ ๋ค์ ๋ฒ ์ธ์ฆ์๋ ์ด์ฉ๋์ง ๋ชปํ๋๋ก ์ธ์ฆ๊ณผ์ ์ด ๋๋ ์งํ ํ๊ธฐ๋๋ฏ๋ก ํ์ธ์ด ์ฟ๋ฃ๊ฒ ๋๋๋ผ๋ ๋ฌด๋ฐฉํ๋ค. ๋ฐ๋ผ์, ์์ ํ ๋ฐ์ ๊ฐ์ด, ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์ ์์ํ๋ ํจ์ค์๋ ์ ๋ณด๋ฅผ ์์ฑ์ผ๋ก ์ ๋ ฅํ๋๋ก ํ๋ ์ค์์์ ๊ฒฝ์ฐ, ๋ณด์์ฑ์ ์ ์งํ๋ฉด์ ์ ์ ์๊ฒ ์ ๋ ฅ ํธ์์ฑ์ ์ ๊ณตํ ์ ์๋ค.The one-time authentication information is discarded immediately after the authentication process so that it cannot be used for the next authentication, so that other people may overhear it. Therefore, as described above, in the case of the embodiment in which the password information corresponding to the one-time authentication information is input by voice, input convenience can be provided to the user while maintaining security.
๋ํ, ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ์ด์ฉํ์ฌ ๋ณธ์ธ ์ธ์ฆ์ ์ํํ๋ ๊ธฐ๋ฒ๊ณผ ์ฑ๋ฌธ๋ถ์ ๊ธฐ๋ฒ์ ๋์์ ์ด์ฉํจ์ผ๋ก์จ ๋ณด์ ์์ค์ ์๋ฑํ ๋์ผ ์ ์๋ ํจ๊ณผ๊ฐ ์๋ค. ์ฆ, ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๊ฐ ์์ฑ์ ํธ๋ก ์ ๋ ฅ๋๋ ๊ฒฝ์ฐ, ๋ฐํ๋๋ ์์ฑ์ ๋ณด๊ฐ ์ด์ ์ ๋ น์๋ ๊ฒ์ด ์๋์ด ๋ณด์ฅ๋ ์ ์๋ค. ๋ฐ๋ผ์, ์ฑ๋ฌธ๋ถ์์ ํตํด ์๊ธฐ ์์ฑ์ ํธ๊ฐ ์ ๋นํ ์ ์ ์ ์ํด ๋ฐํ๋ ๊ฒ์์ ํ์ธํจ์ผ๋ก์จ, ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ํ์ธํ ์(์ฆ, ๋ณธ์ธ์ธ์ฆ์์ฒญ์ ํ ์)๊ฐ ์ ๋นํ ์ฌ์ฉ์ ๋ณธ์ธ์์ ๋ช ๋ฐฑํ ๋ณด์ฅํ ์ ์๋ค.In addition, by using the one-time authentication information and the method of analyzing the voiceprint at the same time there is an effect that can significantly increase the security level. That is, when the one-time authentication information is input as the voice signal, it may be guaranteed that the voice information to be uttered is not previously recorded. Therefore, by confirming that the voice signal is uttered by a legitimate user through voiceprint analysis, it is possible to clearly ensure that the person who has confirmed the one-time authentication information (that is, the person who has made the authentication request) is the legitimate user.
๋ค์ ๋ 4๋ฅผ ์ฐธ์กฐํ๋ฉด, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์๊ธฐ ์ 2ํจ์ค์๋๋ฅผ ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ๋ฐ๊ธํ๋ ์นด๋์ฌ ์์คํ
(300)์ผ๋ก ์ ์กํ๊ณ (S230), ์นด๋์ฌ ์์คํ
(300)์ ์๊ธฐ ์ 2ํจ์ค์๋์ ์๊ธฐ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๊ฐ ๋์ผํ์ง ์ฌ๋ถ๋ฅผ ํ๋จํ๊ณ ํ๋จ ๊ฒฐ๊ณผ๋ฅผ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ผ๋ก ์ ์กํ ์ ์๋ค(S240).Referring back to FIG. 4, the
์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ์ฑ๋ฌธ๋ถ์๊ฒฐ๊ณผ, ๋ฏธ๋ฆฌ ์ ์ฅ๋ ์ธ์ฆ์ ๋ณด์์ ๋น๊ต ๊ฒฐ๊ณผ, ๊ทธ๋ฆฌ๊ณ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด์์ ๋น๊ต ๊ฒฐ๊ณผ์ ๊ธฐ์ดํ์ฌ, ์ธ์ฆ์ ์์ฒญํ ์ ์ ๊ฐ ์ ๋นํ ์ฌ์ฉ์์ธ์ง ์ฌ๋ถ๋ฅผ ํ๋จํ ์ ์์ผ๋ฉฐ, ์ ๋น ์ฌ์ฉ์๋ผ๊ณ ํ๋จ๋ ๊ฒฝ์ฐ ์๊ธฐ ์ ์ ์๊ฒ ์๋น์ค๊ฐ ์ ๊ณต๋๋๋ก ํ ์ ์๋ค(S260).The
์ด์ ๊ฐ์ด, ๋ณธ ๋ฐ๋ช
์ ์ผ ์ค์์์์๋ ํ ๋ฒ ์ฌ์ฉ๋ ์ดํ์๋ ํ๊ธฐ๋๋ ์ผํ์ฑ ์ธ์ฆ์ ๋ณด๋ฅผ ๋ณธ์ธ ์ธ์ฆ์ ์ด์ฉํ๋ฏ๋ก ์ฌ์ ์ก ๊ณต๊ฒฉ์ ๋ํ ์ทจ์ฝ์ ์ ๋ฐฉ์งํ ์ ์๋ค. ๋ํ ์ ์ ํ ๋ฐ์ ๊ฐ์ด ์ ํ ํธ๋ฅผ ํตํด ์ธ์ฆ์ ์ํํ๋ฏ๋ก ์ค๊ฐ์ ๊ณต๊ฒฉ์ ๋ํ ์ทจ์ฝ์ ์ ๋ฐฉ์งํ ์ ์๋ ํจ๊ณผ๊ฐ ์๋ค. ๊ฒฐ๊ตญ, ๋ณธ ๋ฐ๋ช
์ ๊ธฐ์ ์ ์ฌ์์ ์ํ๋ฉด ๋ถ์ธ๋ฐฉ์ง๊ฐ ๊ฐ๋ฅํ ํจ๊ณผ๊ฐ ์๋ค. ๋ํ, ์ 1ํจ์ค์๋ ๋ฐ ์ 2ํจ์ค์๋๊ฐ ํ๋์ ์ ์ฐจ(๋ณธ์ธ์ธ์ฆ ์์คํ
(100)๊ณผ ๋ชจ๋ฐ์ผ ๋จ๋ง๊ธฐ(220) ๊ฐ์ ์ฐ๊ฒฐ๋ ์ ํ ํธ)๋ฅผ ํตํด ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ผ๋ก ์ ์ก๋์ด, ํ ๋ฒ์ ์ ์ฐจ๋ก ๋ ๊ฐ์ง ์๋ก ๋ค๋ฅธ ๋ฐฉ์์ ์ธ์ฆ์ ์ฐจ๊ฐ ๋์์ ์ํ๋๋ ํจ๊ณผ๊ฐ ์๋ค. ๋ฐ๋ผ์ ์ค๊ฐ์ ๊ณต๊ฒฉ ๋๋ ์ฌ์ ์ก ๊ณต๊ฒฉ์ ์ทจ์ฝ์ ์ ๊ฐ๋ ๋ ๊ฐ์ง ์๋ก ๋ค๋ฅธ ๋ฐฉ์์ ์ธ์ฆ์ ์ฐจ๊ฐ ๊ฐ๊ฐ ์์ฐจ์ ์ผ๋ก ์ํ๋๋ ๊ฒ์ ๋นํด ๋ณด๋ค ๋์ ๋ณด์์ฑ์ ์ป์ ์ ์๋ ํจ๊ณผ๋ ์๋ค.As such, in one embodiment of the present invention, the one-time authentication information discarded after being used once can be used for authentication, thereby preventing a vulnerability to a retransmission attack. In addition, since authentication is performed through a telephone call as described above, there is an effect that can prevent the vulnerability to the man-in-the-middle attack. After all, according to the technical idea of the present invention there is an effect that can be prevented. In addition, the first password and the second password are transmitted to the
ํํธ, ๊ตฌํ ์์ ๋ฐ๋ผ์, ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ ํ๋ก์ธ์ ๋ฐ ์๊ธฐ ํ๋ก์ธ์์ ์ํด ์คํ๋๋ ํ๋ก๊ทธ๋จ์ ์ ์ฅํ๋ ๋ฉ๋ชจ๋ฆฌ๋ฅผ ํฌํจํ ์ ์๋ค. ์๊ธฐ ํ๋ก์ธ์๋ ์ฑ๊ธ ์ฝ์ด CPUํน์ ๋ฉํฐ ์ฝ์ด CPU๋ฅผ ํฌํจํ ์ ์๋ค. ๋ฉ๋ชจ๋ฆฌ๋ ๊ณ ์ ๋๋ค ์ก์ธ์ค ๋ฉ๋ชจ๋ฆฌ๋ฅผ ํฌํจํ ์ ์๊ณ ํ๋ ์ด์์ ์๊ธฐ ๋์คํฌ ์ ์ฅ ์ฅ์น, ํ๋์ ๋ฉ๋ชจ๋ฆฌ ์ฅ์น, ๋๋ ๊ธฐํ ๋นํ๋ฐ์ฑ ๊ณ ์ฒด์ํ ๋ฉ๋ชจ๋ฆฌ ์ฅ์น์ ๊ฐ์ ๋นํ๋ฐ์ฑ ๋ฉ๋ชจ๋ฆฌ๋ฅผ ํฌํจํ ์๋ ์๋ค. ํ๋ก์ธ์ ๋ฐ ๊ธฐํ ๊ตฌ์ฑ ์์์ ์ํ ๋ฉ๋ชจ๋ฆฌ๋ก์ ์ก์ธ์ค๋ ๋ฉ๋ชจ๋ฆฌ ์ปจํธ๋กค๋ฌ์ ์ํด ์ ์ด๋ ์ ์๋ค. ์ฌ๊ธฐ์, ์๊ธฐ ํ๋ก๊ทธ๋จ์, ํ๋ก์ธ์์ ์ํด ์คํ๋๋ ๊ฒฝ์ฐ, ๋ณธ ์ค์์์ ๋ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(100)์ผ๋ก ํ์ฌ๊ธ, ์์ ํ ๋ณธ์ธ ์ธ์ฆ ์์คํ
์ ๊ณต๋ฐฉ๋ฒ์ ์ํํ๋๋ก ํ ์ ์๋ค.On the other hand, according to the embodiment, the
ํํธ, ๋ณธ ๋ฐ๋ช ์ ์ค์์์ ๋ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๊ณต๋ฐฉ๋ฒ์ ์ปดํจํฐ๊ฐ ์ฝ์ ์ ์๋ ํ๋ก๊ทธ๋จ ๋ช ๋ น ํํ๋ก ๊ตฌํ๋์ด ์ปดํจํฐ๋ก ์ฝ์ ์ ์๋ ๊ธฐ๋ก ๋งค์ฒด์ ์ ์ฅ๋ ์ ์์ผ๋ฉฐ, ๋ณธ ๋ฐ๋ช ์ ์ค์์์ ๋ฐ๋ฅธ ์ ์ด ํ๋ก๊ทธ๋จ ๋ฐ ๋์ ํ๋ก๊ทธ๋จ๋ ์ปดํจํฐ๋ก ํ๋ ๊ฐ๋ฅํ ๊ธฐ๋ก ๋งค์ฒด์ ์ ์ฅ๋ ์ ์๋ค. ์ปดํจํฐ๊ฐ ์ฝ์ ์ ์๋ ๊ธฐ๋ก ๋งค์ฒด๋ ์ปดํจํฐ ์์คํ ์ ์ํ์ฌ ์ฝํ์ง ์ ์๋ ๋ฐ์ดํฐ๊ฐ ์ ์ฅ๋๋ ๋ชจ๋ ์ข ๋ฅ์ ๊ธฐ๋ก ์ฅ์น๋ฅผ ํฌํจํ๋ค.Meanwhile, the method for providing a user authentication system according to an embodiment of the present invention may be implemented in a computer-readable program command form and stored in a computer-readable recording medium. The program may also be stored in a computer-readable recording medium. The computer-readable recording medium includes all kinds of recording devices in which data that can be read by a computer system is stored.
๊ธฐ๋ก ๋งค์ฒด์ ๊ธฐ๋ก๋๋ ํ๋ก๊ทธ๋จ ๋ช ๋ น์ ๋ณธ ๋ฐ๋ช ์ ์ํ์ฌ ํน๋ณํ ์ค๊ณ๋๊ณ ๊ตฌ์ฑ๋ ๊ฒ๋ค์ด๊ฑฐ๋ ์ํํธ์จ์ด ๋ถ์ผ ๋น์ ์์๊ฒ ๊ณต์ง๋์ด ์ฌ์ฉ ๊ฐ๋ฅํ ๊ฒ์ผ ์๋ ์๋ค.The program instructions recorded on the recording medium may be those specially designed and constructed for the present invention, or may be known and available to those skilled in the software art.
์ปดํจํฐ๋ก ์ฝ์ ์ ์๋ ๊ธฐ๋ก ๋งค์ฒด์ ์์๋ ํ๋ ๋์คํฌ, ํ๋กํผ ๋์คํฌ ๋ฐ ์๊ธฐ ํ ์ดํ์ ๊ฐ์ ์๊ธฐ ๋งค์ฒด(magnetic media), CD-ROM, DVD์ ๊ฐ์ ๊ด๊ธฐ๋ก ๋งค์ฒด(optical media), ํ๋กญํฐ์ปฌ ๋์คํฌ(floptical disk)์ ๊ฐ์ ์๊ธฐ-๊ด ๋งค์ฒด(magneto-optical media) ๋ฐ ๋กฌ(ROM), ๋จ(RAM), ํ๋์ ๋ฉ๋ชจ๋ฆฌ ๋ฑ๊ณผ ๊ฐ์ ํ๋ก๊ทธ๋จ ๋ช ๋ น์ ์ ์ฅํ๊ณ ์ํํ๋๋ก ํน๋ณํ ๊ตฌ์ฑ๋ ํ๋์จ์ด ์ฅ์น๊ฐ ํฌํจ๋๋ค. ๋ํ ์์ ํ ๋งค์ฒด๋ ํ๋ก๊ทธ๋จ ๋ช ๋ น, ๋ฐ์ดํฐ ๊ตฌ์กฐ ๋ฑ์ ์ง์ ํ๋ ์ ํธ๋ฅผ ์ ์กํ๋ ๋ฐ์กํ๋ฅผ ํฌํจํ๋ ๊ด ๋๋ ๊ธ์์ , ๋ํ๊ด ๋ฑ์ ์ ์ก ๋งค์ฒด์ผ ์๋ ์๋ค. ๋ํ ์ปดํจํฐ๊ฐ ์ฝ์ ์ ์๋ ๊ธฐ๋ก๋งค์ฒด๋ ๋คํธ์ํฌ๋ก ์ฐ๊ฒฐ๋ ์ปดํจํฐ ์์คํ ์ ๋ถ์ฐ๋์ด, ๋ถ์ฐ๋ฐฉ์์ผ๋ก ์ปดํจํฐ๊ฐ ์ฝ์ ์ ์๋ ์ฝ๋๊ฐ ์ ์ฅ๋๊ณ ์คํ๋ ์ ์๋ค.Examples of computer-readable recording media include magnetic media such as hard disks, floppy disks, and magnetic tape, optical media such as CD-ROMs, DVDs, floppy disks, and the like. Included are hardware devices specifically configured to store and execute the same magneto-optical media and program instructions such as ROM, RAM, flash memory, and the like. In addition, the above-described medium may be a transmission medium such as an optical or metal wire, a waveguide, or the like including a carrier wave for transmitting a signal specifying a program command, a data structure, and the like. The computer readable recording medium can also be distributed over network coupled computer systems so that the computer readable code is stored and executed in a distributed fashion.
ํ๋ก๊ทธ๋จ ๋ช ๋ น์ ์์๋ ์ปดํ์ผ๋ฌ์ ์ํด ๋ง๋ค์ด์ง๋ ๊ฒ๊ณผ ๊ฐ์ ๊ธฐ๊ณ์ด ์ฝ๋๋ฟ๋ง ์๋๋ผ ์ธํฐํ๋ฆฌํฐ ๋ฑ์ ์ฌ์ฉํด์ ์ ์์ ์ผ๋ก ์ ๋ณด๋ฅผ ์ฒ๋ฆฌํ๋ ์ฅ์น, ์๋ฅผ ๋ค์ด, ์ปดํจํฐ์ ์ํด์ ์คํ๋ ์ ์๋ ๊ณ ๊ธ ์ธ์ด ์ฝ๋๋ฅผ ํฌํจํ๋ค.Examples of program instructions include not only machine code generated by a compiler, but also devices that process information electronically using an interpreter, for example, high-level language code that can be executed by a computer.
์์ ํ ํ๋์จ์ด ์ฅ์น๋ ๋ณธ ๋ฐ๋ช ์ ๋์์ ์ํํ๊ธฐ ์ํด ํ๋ ์ด์์ ์ํํธ์จ์ด ๋ชจ๋๋ก์ ์๋ํ๋๋ก ๊ตฌ์ฑ๋ ์ ์์ผ๋ฉฐ, ๊ทธ ์ญ๋ ๋ง์ฐฌ๊ฐ์ง์ด๋ค.The hardware device described above may be configured to operate as one or more software modules to perform the operations of the present invention, and vice versa.
์ ์ ํ ๋ณธ ๋ฐ๋ช ์ ์ค๋ช ์ ์์๋ฅผ ์ํ ๊ฒ์ด๋ฉฐ, ๋ณธ ๋ฐ๋ช ์ด ์ํ๋ ๊ธฐ์ ๋ถ์ผ์ ํต์์ ์ง์์ ๊ฐ์ง ์๋ ๋ณธ ๋ฐ๋ช ์ ๊ธฐ์ ์ ์ฌ์์ด๋ ํ์์ ์ธ ํน์ง์ ๋ณ๊ฒฝํ์ง ์๊ณ ์ ๋ค๋ฅธ ๊ตฌ์ฒด์ ์ธ ํํ๋ก ์ฝ๊ฒ ๋ณํ์ด ๊ฐ๋ฅํ๋ค๋ ๊ฒ์ ์ดํดํ ์ ์์ ๊ฒ์ด๋ค. ๊ทธ๋ฌ๋ฏ๋ก ์ด์์์ ๊ธฐ์ ํ ์ค์ ์๋ค์ ๋ชจ๋ ๋ฉด์์ ์์์ ์ธ ๊ฒ์ด๋ฉฐ ํ์ ์ ์ด ์๋ ๊ฒ์ผ๋ก ์ดํดํด์ผ๋ง ํ๋ค. ์๋ฅผ ๋ค์ด, ๋จ์ผํ์ผ๋ก ์ค๋ช ๋์ด ์๋ ๊ฐ ๊ตฌ์ฑ ์์๋ ๋ถ์ฐ๋์ด ์ค์๋ ์๋ ์์ผ๋ฉฐ, ๋ง์ฐฌ๊ฐ์ง๋ก ๋ถ์ฐ๋ ๊ฒ์ผ๋ก ์ค๋ช ๋์ด ์๋ ๊ตฌ์ฑ์์๋ค๋ ๊ฒฐํฉ๋ ํํ๋ก ์ค์๋ ์ ์๋ค.The foregoing description of the present invention is intended for illustration, and it will be understood by those skilled in the art that the present invention may be easily modified in other specific forms without changing the technical spirit or essential features of the present invention. will be. Therefore, it should be understood that the embodiments described above are exemplary in all respects and not restrictive. For example, each component described as a single type may be implemented in a distributed manner, and similarly, components described as distributed may be implemented in a combined form.
๋ณธ ๋ฐ๋ช ์ ๋ฒ์๋ ์๊ธฐ ์์ธํ ์ค๋ช ๋ณด๋ค๋ ํ์ ํ๋ ํนํ์ฒญ๊ตฌ๋ฒ์์ ์ํ์ฌ ๋ํ๋๋ฉฐ, ํนํ์ฒญ๊ตฌ๋ฒ์์ ์๋ฏธ ๋ฐ ๋ฒ์ ๊ทธ๋ฆฌ๊ณ ๊ทธ ๊ท ๋ฑ ๊ฐ๋ ์ผ๋ก๋ถํฐ ๋์ถ๋๋ ๋ชจ๋ ๋ณ๊ฒฝ ๋๋ ๋ณํ๋ ํํ๊ฐ ๋ณธ ๋ฐ๋ช ์ ๋ฒ์์ ํฌํจ๋๋ ๊ฒ์ผ๋ก ํด์๋์ด์ผ ํ๋ค.The scope of the present invention is shown by the following claims rather than the detailed description, and all changes or modifications derived from the meaning and scope of the claims and their equivalents should be construed as being included in the scope of the present invention. .
๋ณธ ๋ฐ๋ช ์ ์ฌ์ฉ์๋ฅผ ์ธ์ฆํ๋ ์์คํ ์ ์ ์ฉ๋ ์ ์๋ค.The present invention can be applied to a system for authenticating a user.
Claims (18)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR1020130046521A KR101460977B1 (en) | 2013-04-26 | 2013-04-26 | User authentication system for non-repudiation and providing method thereof |
| KR10-2013-0046521 | 2013-04-26 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2014175642A1 true WO2014175642A1 (en) | 2014-10-30 |
Family
ID=51792129
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/KR2014/003520 Ceased WO2014175642A1 (en) | 2013-04-26 | 2014-04-22 | Identity authentication system capable of non-repudiation and method for providing same |
Country Status (2)
| Country | Link |
|---|---|
| KR (1) | KR101460977B1 (en) |
| WO (1) | WO2014175642A1 (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105337977A (en) * | 2015-11-16 | 2016-02-17 | ่ๅท้ไป็พไฟกๆฏๆๆฏๆ้ๅ ฌๅธ | Secure mobile communication architecture with dynamic two-way authentication and implementation method thereof |
| CN105744078A (en) * | 2016-03-31 | 2016-07-06 | ๆทๅผ้่ฎฏ(ๆทฑๅณ)ๆ้ๅ ฌๅธ | Calling method and system based on mobile terminal |
| CN110298672A (en) * | 2019-05-22 | 2019-10-01 | ๆทฑๅณๅฃน่ดฆ้ๆบ่ฝ็งๆๆ้ๅ ฌๅธ | User identity checking method, device, computer equipment and storage medium |
| CN112154634A (en) * | 2018-05-18 | 2020-12-29 | ็ๅ ธ็ฑ็ซไฟกๆ้ๅ ฌๅธ | Application Access Control |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR101603476B1 (en) * | 2015-04-06 | 2016-03-14 | ๊น์ํ | Method for Dual Certification by using Dual Channel |
| KR101696400B1 (en) * | 2015-09-04 | 2017-01-16 | ์ฃผ์ํ์ฌ ์ธํฌ์๋ | Method and system for providing mobile authentication service using sonic signal |
| KR102145766B1 (en) * | 2018-09-17 | 2020-08-19 | ์ธ๋น์ฆ๋ท ์ฃผ์ํ์ฌ | User authentication system and method |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20060012704A (en) * | 2004-08-04 | 2006-02-09 | ์ฃผ์ํ์ฌ ํจ์ณ์์ฆ | User authentication system through second access path and voice |
| KR20070105072A (en) * | 2006-04-25 | 2007-10-30 | (์ฃผ) ์ฝ์๋ณด์ด์ค | Disposable Password Authentication System and Method Using Voice Signal in Internet Electronic Payment Service System |
| JP2009193326A (en) * | 2008-02-14 | 2009-08-27 | Oki Electric Ind Co Ltd | Authentication system, authentication method and server |
| KR20110047580A (en) * | 2009-10-30 | 2011-05-09 | ์ฃผ์ํ์ฌ ๊ฐ์ฐ์์ด์ค์จ | Authentication apparatus and method for remote network management system |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR101028882B1 (en) | 2010-09-14 | 2011-04-12 | ๊น์ข ์น | OTP user authentication system and method using a mobile terminal |
-
2013
- 2013-04-26 KR KR1020130046521A patent/KR101460977B1/en active Active
-
2014
- 2014-04-22 WO PCT/KR2014/003520 patent/WO2014175642A1/en not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20060012704A (en) * | 2004-08-04 | 2006-02-09 | ์ฃผ์ํ์ฌ ํจ์ณ์์ฆ | User authentication system through second access path and voice |
| KR20070105072A (en) * | 2006-04-25 | 2007-10-30 | (์ฃผ) ์ฝ์๋ณด์ด์ค | Disposable Password Authentication System and Method Using Voice Signal in Internet Electronic Payment Service System |
| JP2009193326A (en) * | 2008-02-14 | 2009-08-27 | Oki Electric Ind Co Ltd | Authentication system, authentication method and server |
| KR20110047580A (en) * | 2009-10-30 | 2011-05-09 | ์ฃผ์ํ์ฌ ๊ฐ์ฐ์์ด์ค์จ | Authentication apparatus and method for remote network management system |
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105337977A (en) * | 2015-11-16 | 2016-02-17 | ่ๅท้ไป็พไฟกๆฏๆๆฏๆ้ๅ ฌๅธ | Secure mobile communication architecture with dynamic two-way authentication and implementation method thereof |
| CN105337977B (en) * | 2015-11-16 | 2019-01-25 | ๆฑ่้ไป็พ็งๆๆ้ๅ ฌๅธ | A kind of the safety moving communication system and its implementation of dynamic bidirectional certification |
| CN105744078A (en) * | 2016-03-31 | 2016-07-06 | ๆทๅผ้่ฎฏ(ๆทฑๅณ)ๆ้ๅ ฌๅธ | Calling method and system based on mobile terminal |
| CN112154634A (en) * | 2018-05-18 | 2020-12-29 | ็ๅ ธ็ฑ็ซไฟกๆ้ๅ ฌๅธ | Application Access Control |
| US11785013B2 (en) | 2018-05-18 | 2023-10-10 | Telefonaktiebolaget Lm Ericsson (Publ) | Application program access control |
| CN110298672A (en) * | 2019-05-22 | 2019-10-01 | ๆทฑๅณๅฃน่ดฆ้ๆบ่ฝ็งๆๆ้ๅ ฌๅธ | User identity checking method, device, computer equipment and storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| KR101460977B1 (en) | 2014-11-12 |
| KR20140127990A (en) | 2014-11-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2014175642A1 (en) | Identity authentication system capable of non-repudiation and method for providing same | |
| US10367797B2 (en) | Methods, systems, and media for authenticating users using multiple services | |
| CN111414599A (en) | Identity authentication method, device, terminal, server and readable storage medium | |
| CN103098452B (en) | Mobile terminal, remote operating system, the data sending control method of mobile terminal and non-emporary computer-readable medium | |
| WO2018012747A1 (en) | Two-channel authentication proxy system capable of detecting application tampering, and method therefor | |
| WO2017188610A1 (en) | Authentication method and system | |
| WO2013141602A1 (en) | Authentication method and system for same | |
| US10425407B2 (en) | Secure transaction and access using insecure device | |
| WO2015069018A1 (en) | System for secure login, and method and apparatus for same | |
| WO2018151480A1 (en) | Authentication management method and system | |
| WO2018026109A1 (en) | Method, server and computer-readable recording medium for deciding on gate access permission by means of network | |
| EP3635490B1 (en) | Methods, systems, and media for authenticating users using biometric signatures | |
| WO2022114290A1 (en) | Non-contact personal authentication system and method therefor | |
| CN111327752B (en) | Call processing method, device, communication system and storage medium | |
| US8635454B2 (en) | Authentication systems and methods using a packet telephony device | |
| WO2020159328A1 (en) | Authentication information processing method and apparatus and user terminal including authentication information processing method apparatus | |
| WO2018169150A1 (en) | Locked screen-based user authentication system and method | |
| WO2017217808A1 (en) | Mobile authentication method and system therefor | |
| WO2017078358A1 (en) | Security communication system and method using biometrics | |
| WO2012074275A2 (en) | User authentication apparatus for internet security, user authentication method for internet security, and recorded medium recording same | |
| WO2014163420A1 (en) | Identity certification system and method for providing same | |
| US20110022844A1 (en) | Authentication systems and methods using a packet telephony device | |
| WO2018151392A1 (en) | Smart login method using messenger service and apparatus therefor | |
| WO2018026108A1 (en) | Method, authorized terminal and computer-readable recording medium for deciding on gate access permission by means of network | |
| JP2004185454A (en) | User authentication method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14788124 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC DATED 02.03.16 |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 14788124 Country of ref document: EP Kind code of ref document: A1 |