WO2017078358A1 - Security communication system and method using biometrics - Google Patents
Security communication system and method using biometrics Download PDFInfo
- Publication number
- WO2017078358A1 WO2017078358A1 PCT/KR2016/012423 KR2016012423W WO2017078358A1 WO 2017078358 A1 WO2017078358 A1 WO 2017078358A1 KR 2016012423 W KR2016012423 W KR 2016012423W WO 2017078358 A1 WO2017078358 A1 WO 2017078358A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- secure communication
- terminal
- receiver
- caller
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Definitions
- the present invention relates to a secure communication system and method through biometrics, and more particularly, the present invention provides a procedure for authenticating a sender and a receiver through a biometric means in using a voice call transmission / reception service or a text message transmission / reception service. Thereby protecting the sender's personal information primarily through the sender's identity verification process, protecting the recipient's personal information secondly through the receiver's identity verification process, and allowing the caller and third party to automatically delete the communication records.
- the present invention relates to a secure communication system and method through biometrics that can effectively protect a receiver's personal information.
- OTP one time password
- security card verification service security card verification service
- fingerprint identification service fingerprint identification service
- authentication certificate verification service ipin verification service
- a password or a fingerprint is recognized while the communication program is executed.
- Smartphone's own privacy procedures can be implemented.
- the smartphone's own privacy procedure protects the user's privacy only at the stage before the communication program is executed, and protects the contents of the voice call itself, or the contents of the text message sent and received between each other. Privacy procedures that can be protected by law have not been applied.
- the operation of the communication program can be protected by the smart phone itself, but there is a high possibility that the contents of the voice call and the text message are leaked after the communication program is executed.
- the present inventor provides the caller himself / herself by providing an authentication procedure of the caller and the receiver through a biometric means in using a voice call transmission / reception service or a text message transmission / reception service.
- a biometric means in using a voice call transmission / reception service or a text message transmission / reception service.
- the sender's personal information is primarily protected
- the recipient's identity authentication process the recipient's personal information is protected secondly, and the communication record is automatically deleted.
- the present invention has been made to solve the above-described problems, the present invention provides a caller identity authentication procedure by providing a caller and receiver through the biometric means in the use of voice call transmission service or text message transmission service Through the process of protecting the sender's personal information first, the receiver's personal information secondly through the receiver's identity authentication process, and the communication record is automatically deleted, the sender's and receiver's personal information is effectively
- the present invention provides a secure communication system and method through biometrics that can be protected.
- the secure communication system using biometrics includes a sender identity authentication data receiver for receiving sender identity data transmitted from a caller terminal, a secure communication request signal transmitter for transmitting a secure communication request signal to a receiver terminal, Secure communication notification display unit for displaying a notification corresponding to the secure communication request signal on the screen of the receiver terminal, a receiver identity authentication data receiver for receiving the identity authentication data of the receiver transmitted from the receiver terminal and the sender identity authentication It may include a secure communication mediation unit for mediating secure communication between the sender terminal and the receiver terminal based on the data and the receiver identity data.
- the sender identity authentication data receiving unit may be any one or more of the sender identity authentication data generated from the identity verification through the biometric means or the identity verification data generated from the identity verification through the password input means. It can be received from the caller terminal.
- the secure communication request signal transmitting unit may generate a caller identification ID based on the transmitted caller identity authentication data, and include the generated caller identification ID in the secure communication request signal.
- the secure communication intermediary may display a notification that the secure communication request is not possible on the screen of the caller terminal.
- the recipient identity authentication data receiving unit may be any one or more of the recipient identity authentication data generated as a result of identity verification through a biometric means or the identity verification data generated as a result of identity verification through a password input means. It can be received from the receiver terminal.
- the secure communication notification display unit may display a notification corresponding to the secure communication request signal and a caller identification ID included in the secure communication request signal on a screen of the receiver terminal.
- the secure communication intermediary unit may cause the secure communication impossible notification to be displayed on the screen of the receiver terminal and the sender terminal when the receiver identity data transmitted from the receiver terminal is different from the stored receiver identity data. have.
- the secure communication system through biometrics, after the secure communication between the sender terminal and the receiver terminal is terminated, by transmitting a secure communication record delete signal to each of the sender terminal and the receiver terminal, the sender terminal and the receiver terminal, respectively
- the apparatus may further include a secure communication record deleting signal transmission unit configured to delete the secure communication record on the communication recording application executed in the.
- the sender identity authentication data receiving unit receiving the identity authentication data of the sender transmitted from the sender terminal, the secure communication request signal transmitting unit to the receiver terminal secure communication request Transmitting a signal, causing the secure communication notification display unit to display a notification corresponding to the secure communication request signal on the screen of the receiver terminal, and receiving the receiver authentication data of the receiver transmitted from the receiver terminal at the receiver identity authentication data receiver;
- the method may include relaying secure communication between the sender terminal and the receiver terminal based on the sender identity data and the receiver identity data at the secure communication broker.
- the step of receiving the sender's identity authentication data may include at least one of a sender's identity authentication data generated as a result of identity verification through a biometric means or a sender identity verification data generated as a result of identity verification through a password input means. Receiving the identity authentication data from the caller terminal.
- the step of transmitting the secure communication request signal may include generating a caller identification ID based on the transmitted caller identity data and including the generated caller identification ID in the secure communication request signal. It may include.
- the step of mediating the secure communication may include displaying a notification that a secure communication request is not possible on the screen of the caller terminal when the caller identity data transmitted from the caller terminal is different from previously stored caller identity data. It may include a step.
- the step of receiving the identity authentication data of the recipient is any one or more of the recipient identity authentication data generated as a result of identity verification through biometric means or recipient identity authentication data generated as a result of identity verification through password input means Receiving the identity authentication data from the receiver terminal.
- the step of displaying a notification corresponding to the secure communication request signal may include displaying a notification corresponding to the secure communication request signal on a screen of the receiver terminal and included in the secure communication request signal.
- the caller identification ID may be displayed.
- the step of mediating the secure communication may include displaying a notification of the inability to secure communication on the screen of the receiver terminal and the sender terminal when the receiver identity data transmitted from the receiver terminal is different from the stored receiver identity data. May be included.
- the secure communication method through biometrics, after the secure communication between the sender terminal and the receiver terminal is terminated, the secure communication record delete signal transmission unit transmits a secure communication record delete signal to each of the sender terminal and the receiver terminal. And deleting the secure communication record on the communication recording application executed in each of the sender terminal and the receiver terminal.
- a secure communication system and method through biometrics can be performed through a plurality of stages of identity verification of both a sender and a receiver through a biometric means or a password input means, thereby providing the sender's personal authentication process. It protects the information and has the effect of secondarily protecting the recipient's personal information through the recipient authentication process.
- the present invention is to ensure that the secure communication record is automatically deleted on the communication recording application running in each of the sender terminal and the receiver terminal after the secure communication is terminated, thereby preventing the original exposure of the communication record to others
- the present invention has the advantage that since only the caller identification ID that has undergone security authentication is displayed on the screen of the receiver terminal, even if the security communication notification screen is exposed to the other party, only the receiver can know who the caller is.
- FIG. 1 is a diagram schematically illustrating a configuration of a secure communication system 100 through biometrics according to an embodiment of the present invention.
- FIG. 2 is a diagram schematically illustrating a configuration of a secure communication system 100 β² through biometrics according to another embodiment of the present invention.
- FIG 3 is a diagram illustrating an operation of the secure communication system 100 through biometrics according to an embodiment of the present invention.
- FIG. 1 is a diagram schematically illustrating a configuration of a secure communication system 100 through biometrics according to an embodiment of the present invention
- FIG. 2 is a secure communication system through biometrics according to another embodiment of the present invention.
- 100 ' is a diagram schematically showing the configuration.
- the secure communication system 100 through biometrics includes a caller ID data receiving unit 110, a secure communication request signal transmitting unit 120, a secure communication notification display unit 130, It may be a form including a receiver identity authentication data receiving unit 140 and a secure communication intermediary 150, and furthermore, according to another embodiment of the present invention, the secure communication system 100 'through biometrics is the sender terminal 1 And it may correspond to a secure communication server that serves to mediate secure communication between the receiver terminal (2).
- the caller ID data receiving unit 110 may serve to receive the caller ID data transmitted from the caller terminal 1.
- the caller terminal 1 and the receiver terminal 2 refers to a communication terminal that can be used when the caller or receiver transmits a voice call request signal or a text message transmission / reception request signal to the other party through a wired or wireless communication network. It can be interpreted to mean, a representative example may be a smartphone.
- the sender terminal 1 and the receiver terminal 2 may include a variety of personal authentication means, for example, biometric technology such as fingerprint recognition, voice recognition, iris recognition, blood vessel recognition, facial recognition or electronic signature recognition ( biometrics) and an authentication means based on a password input technology such as a touch pad or a dial pad.
- biometric technology such as fingerprint recognition, voice recognition, iris recognition, blood vessel recognition, facial recognition or electronic signature recognition ( biometrics)
- biometrics biometrics
- an authentication means based on a password input technology such as a touch pad or a dial pad.
- the caller identity data generated as a result of the identity verification through the identity verification means of the caller terminal 1 may be transmitted to the caller identity authentication data receiver 110, and the caller identity authentication data thus transmitted may be described later.
- the request signal transmitter 120 may be transferred to the request signal transmitter 120, and may be checked by the secure communication broker 150 to be described later to match the stored caller identity data.
- a method of transmitting a voice call request signal or a text message transmission signal without using the personal identification means of (1) may be included.
- the sender identity authentication data receiving unit 110 may be an application executable in the caller terminal 1, in this case generated through the caller's identity authentication process through the caller terminal (1)
- the sender ID data may be transmitted to the sender ID data receiving unit 110, not transmitted to a separate server.
- the secure communication request signal transmitter 120 may perform a role of transmitting a secure communication request signal to the receiver terminal 2.
- the secure communication request signal transmission unit 120 generates a caller identification ID based on the caller identity authentication data received from the caller identity authentication data receiver 110, and uses the generated caller identification ID as a secure communication request signal.
- the caller identification ID described above may be displayed together.
- the caller identification ID generated through the secure communication request signal transmission unit 120 may be generated so as not to include the telephone number of the caller terminal 1 and the caller's personal information, which may be generated within the caller identification ID. This is to prevent the personal information and privacy of the sender side from being disclosed by not including the personal information of the sender.
- the caller identification ID displayed on the screen of the receiver terminal 2 may be interpreted as a kind of password meaning between the caller and the receiver, and the caller identification ID displayed on the screen of the receiver terminal 2 is exposed to others. In addition, since no personal information about the caller is displayed other than the caller identification ID, others cannot determine who the caller is through.
- the security communication notification display unit 130 is a notification corresponding to the security communication request signal on the screen of the receiver terminal 2 that has received the security communication request signal transmitted through the security communication request signal transmitter 120 described above. It can play a role in making this visible.
- the caller identification ID may be displayed on the screen of the receiver terminal 2 that has received the secure communication request signal, and a specific sound is output through the sound output module provided in the receiver terminal 2, or the vibration module may be displayed. Through the receiver terminal 2 itself may vibrate or the outside of the receiver terminal 2 through the light emitting device module may flash. Accordingly, the receiver using the receiver terminal 2 can confirm that the current secure communication request signal has been received and at the same time check the caller identification ID to determine who the caller is.
- the receiver identity authentication data receiver 140 may serve to receive identity authentication data of the receiver transmitted from the receiver terminal 2.
- the recipient identity authentication data receiving unit 140 performing such a role plays a role corresponding to the sender identity authentication data receiving unit 110 described above, and is a receiver generated as a result of identity authentication through the identity authentication means of the receiver terminal 2.
- the identity authentication data may be transmitted to the receiver identity authentication data receiving unit 140, and the receiver identity authentication data transmitted in this way may be checked whether or not the receiver identity authentication data matched with the receiver identity authentication data previously stored. Can be.
- the secure communication intermediary unit 150 is based on the sender identity data and the receiver identity data received through the sender identity data receiving unit 110 and the receiver identity data receiving unit 140, respectively, the sender terminal (1). ) And the secure communication between the receiver terminal 2.
- the secure communication intermediary 150 may serve to determine whether the caller identity data transmitted from the caller terminal 1 matches the stored caller identity data previously stored. When the authentication data and the stored sender identity data are different from each other, the secure communication intermediary unit 150 determines that the caller who is currently trying to transmit the secure communication request signal is not the identity of the caller terminal 1, and thus displays the screen of the caller terminal 1. The security communication request impossible notification may be displayed on the screen.
- a user named 'B' has a user named 'A' and a user named 'B' has attempted to transmit a secure communication request signal through 'A terminal'
- the user authentication data of the user 'B' generated through the biometric means or the password input means provided in the 'terminal A' is transmitted to the sender identity authentication data receiver 110, and the secure communication intermediary 150 transmits the sender identity
- the authentication data and the previously stored authentication data of the 'A' user are compared and judged to be different from each other. As a result, "A person's authentication is not possible and a secure communication request is impossible".
- a security communication failure notification such as the like may be displayed.
- the secure communication intermediary unit 150 may serve to determine whether the recipient identity authentication data transmitted from the receiver terminal 2 matches the previously stored recipient identity authentication data. And when the stored recipient identity data is different, the secure communication intermediary unit 150 determines that the receiver currently receiving the secure communication request signal is not the identity of the receiver terminal 2, and thus secures it on the screen of the receiver terminal 2. A notification of no communication can be displayed.
- the terminal A is secured on the screen of the terminal A.
- the caller identification ID is displayed along with a secure communication notification corresponding to the communication request signal.
- the user authentication data of the 'B' user generated by the biometric means or the password input means provided in the 'terminal A' Is transmitted to the receiver identity authentication data receiver 140, and the secure communication broker 150 compares the transmitted receiver identity data with previously stored identity data of the 'A' user to determine whether they are different from each other. As a result, a notification of no secure communication can be displayed on the screen of the 'terminal A' such that "secure communication is not possible because the person is not authenticated".
- the secure communication system 100 through biometrics according to the present invention may further include a secure communication record delete signal transmission unit 160.
- the secure communication record delete signal transmitter 160 transmits a secure communication record delete signal to each of the sender terminal 1 and the receiver terminal 2.
- the recording of the secure communication on the communication recording application for example, call history, etc. executed in each of the sender terminal 1 and the receiver terminal 2 may be automatically deleted.
- FIG 3 is a diagram illustrating an operation of the secure communication system 100 through biometrics according to an embodiment of the present invention.
- a receiver is selected by a sender on a contact application that can be executed on the sender terminal 1, and as the secure communication request area displayed on the profile screen of the receiver is selected by the sender, a secure communication request is made.
- the sender's identity authentication for signal transmission is performed (S301).
- the caller ID data generated through the biometric means or the password input means provided in the caller terminal 1 may be transmitted to the caller ID data receiving unit 110.
- the caller identity verification is confirmed by checking whether the caller identity authentication data received through the caller identity data receiving unit 110 in the secure communication broker 150 matches with the stored caller identity authentication data. S302).
- the security communication request signal transmitter 120 identifies the caller based on the caller identity data.
- the ID is generated, and the generated caller identification ID is included in the secure communication request signal and transmitted to the receiver terminal 2 (S303).
- a security communication notification and a caller identification ID corresponding to the security communication request signal are displayed on the screen of the receiver terminal 2 (S304), and when the receiver checks this, the receiver terminal 2 is to start secure communication.
- the receiver identity authentication data generated through the biometric recognition means or the password input means provided therein may be transmitted to the receiver identity authentication data receiver 140.
- the receiver communication authentication unit 150 confirms the receiver identity authentication by checking whether the receiver identity authentication data received through the receiver identity authentication data receiver 140 matches the previously stored receiver identity authentication data (S306). ).
- receiver identity data received through the receiver identity data receiver 140 matches the previously stored receiver identity data, secure communication between the sender terminal 1 and the receiver terminal 2 starts and ends normally. (S307).
- the secure communication record deleting signal transmission unit 160 records the secure communication in each of the sender terminal 1 and the receiver terminal 2.
- the secure communication record is automatically deleted on the communication recording application executed in each of the sender terminal 1 and the receiver terminal 2 (S308).
- step S302 If, in step S302, the caller ID data received through the caller ID data receiving unit 110 does not match the previously stored caller ID data, the secure communication intermediary 150 on the screen of the caller terminal 1 The secure communication request impossible notification is displayed on (S309), and as a result, secure communication between the sender terminal 1 and the receiver terminal 2 is terminated (S310).
- step S306 the recipient ID data received through the recipient ID data receiving unit 140 does not match the previously stored recipient ID data
- the secure communication intermediary 150 displays the screen of the receiver terminal 2.
- the secure communication impossible notification is displayed on (S311), and as a result, secure communication between the sender terminal 1 and the receiver terminal 2 is terminated (S312).
- the security of the sender terminal 1 and the receiver terminal 2 is secured only when both of the sender and the receiver have been authenticated through the biometric means or the password input means.
- the sender's identity can be primarily protected by the sender's identity and the receiver's personality can be protected by the receiver's identity.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
Description
λ³Έ λ°λͺ μ μ체 μΈμμ ν΅ν 보μ ν΅μ μμ€ν λ° λ°©λ²μ κ΄ν κ²μΌλ‘μ, λ³΄λ€ κ΅¬μ²΄μ μΌλ‘, λ³Έ λ°λͺ μ μμ± ν΅ν μ‘μμ μλΉμ€ λλ λ¬Έμ λ©μμ§ μ‘μμ μλΉμ€λ₯Ό μ΄μ©ν¨μ μμ΄ μ체 μΈμ μλ¨μ ν΅ν λ°μ μ λ° μμ μμ λ³ΈμΈ μΈμ¦ μ μ°¨λ₯Ό μ 곡ν¨μΌλ‘μ¨, λ°μ μ λ³ΈμΈ μΈμ¦ μ μ°¨λ₯Ό ν΅ν΄ 1μ°¨μ μΌλ‘ λ°μ μμ κ°μΈμ 보λ₯Ό 보νΈνκ³ μμ μ λ³ΈμΈ μΈμ¦ μ μ°¨λ₯Ό ν΅ν΄ 2μ°¨μ μΌλ‘ μμ μμ κ°μΈμ 보λ₯Ό 보νΈνλ©° λν ν΅μ κΈ°λ‘μ΄ μλ μμ λλλ‘ νλ μ μ°¨λ₯Ό ν΅ν΄ 3μ°¨μ μΌλ‘ λ°μ μ λ° μμ μμ κ°μΈμ 보λ₯Ό ν¨κ³Όμ μΌλ‘ 보νΈν μ μλ μ체 μΈμμ ν΅ν 보μ ν΅μ μμ€ν λ° λ°©λ²μ κ΄ν κ²μ΄λ€.The present invention relates to a secure communication system and method through biometrics, and more particularly, the present invention provides a procedure for authenticating a sender and a receiver through a biometric means in using a voice call transmission / reception service or a text message transmission / reception service. Thereby protecting the sender's personal information primarily through the sender's identity verification process, protecting the recipient's personal information secondly through the receiver's identity verification process, and allowing the caller and third party to automatically delete the communication records. The present invention relates to a secure communication system and method through biometrics that can effectively protect a receiver's personal information.
μ΅κ·Ό, κ°μΈ ν΄λν°μ ν΅ν κΈμ΅ μλΉμ€λ₯Ό μ΄μ©ν¨μ μμ΄ κ°μΈμ λ³΄κ° μ μΆλ¨μ λ°λΌ κ°μ’ κΈμ΅ μ¬κ³ λ€μ΄ λΉλ²νκ² μΌμ΄λκ³ μμΌλ©°, νΉν μμ± ν΅ν μ‘μμ μλΉμ€λ₯Ό μ΄μ©νκ±°λ λλ λ¬Έμ λ©μμ§ μ‘μμ μλΉμ€λ₯Ό μ΄μ©ν¨μ μμ΄ κ°μΈμ λ³΄κ° μ μΆλ¨μ λ°λΌ κ°μΈμ μ¬μν μΉ¨ν΄κ° μ¬κ°ν΄ μ§λ λ±, νμ¬ μ¬νμμ μ΄λ¬ν κ°μΈμ 보 μ μΆ λ° κ°μΈ μ¬μν μΉ¨ν΄μ λν μ°λ €μ λͺ©μλ¦¬κ° λμμ§κ³ μλ μ€μ μ΄λ€.Recently, various financial accidents occur frequently as personal information is leaked when using financial services through personal mobile phones. Especially, when personal information is leaked when using voice call transmission / reception service or text message transmission / reception service. There is a growing voice of concern about the leakage of personal information and the invasion of personal privacy in society.
κ·Έμ λ°λΌ, μ’ λμλ μΌνμ© λΉλ°λ²νΈ(One Time Password; OTP) μλΉμ€, 보μμΉ΄λ νμΈ μλΉμ€, μ§λ¬Έ μΈμ μλΉμ€, 곡μΈμΈμ¦μ νμΈ μλΉμ€ λ° μμ΄ν(ipin) νμΈ μλΉμ€ λ±κ³Ό κ°μ λ€μν κ°μΈμ λ³΄λ³΄νΈ κΈ°μ λ€μ κΈμ΅ μλΉμ€μ μ μ©νμ¬ μ΄μ©νκ³ μλ€.Accordingly, in the related art, various personal information protection technologies such as one time password (OTP) service, security card verification service, fingerprint identification service, authentication certificate verification service, and ipin verification service are applied to financial services. Doing.
λ°λ©΄μ, κ°μΈ ν΄λν°μ μ΄μ©ν ν΅μ μλΉμ€μ κ²½μ°, μ΄λ¬ν κ°μΈμ λ³΄λ³΄νΈ κΈ°μ λ° μ¬μνλ³΄νΈ κΈ°μ λ€μ μ μ©μ΄ λ―ΈλΉν μ€μ μ΄λ€.On the other hand, in the case of a communication service using a personal mobile phone, the application of such personal information protection technology and privacy protection technology is insufficient.
μλ₯Ό λ€μ΄, μ€λ§νΈν°μμ μ€νλλ κ°μ’ μ¬ν κ΄κ³λ§ μλΉμ€(Social Network Service; SNS) λλ ν΅μ μ¬μμ μ 곡νλ ν΅μ λ§μ μ΄μ©ν ν΅μ μλΉμ€μ κ²½μ°, ν΅μ νλ‘κ·Έλ¨μ΄ μ€νλλ κ³Όμ μμ λΉλ°λ²νΈλ₯Ό νμΈνκ±°λ λλ μ§λ¬Έμ μΈμνλ λ±μ μ€λ§νΈν° μ체μ μΈ μ¬μνλ³΄νΈ μ μ°¨κ° μνλ μλ μλ€.For example, in the case of a communication service using various social network services (SNS) or a communication network provided by a telecommunication company, which is executed in a smartphone, a password or a fingerprint is recognized while the communication program is executed. Smartphone's own privacy procedures can be implemented.
νμ§λ§, μ΄λ¬ν μ€λ§νΈν° μ체μ μΈ μ¬μνλ³΄νΈ μ μ°¨λ ν΅μ νλ‘κ·Έλ¨μ΄ μ€νλκΈ° μ΄μ μ λ¨κ³μμλ§ μ¬μ©μμ μ¬μνμ 보νΈν λΏ, μμ± ν΅ν λ΄μ© μ체λ₯Ό μμ²μ μΌλ‘ 보νΈνκ±°λ, λλ μνΈκ°μ μ‘μμ λλ λ¬Έμ λ©μμ§μ λ΄μ© μ체λ₯Ό μμ²μ μΌλ‘ 보νΈν μ μλ μ¬μνλ³΄νΈ μ μ°¨λ μ μ©λμ§ μκ³ μλ μ€μ μ΄λ€.However, the smartphone's own privacy procedure protects the user's privacy only at the stage before the communication program is executed, and protects the contents of the voice call itself, or the contents of the text message sent and received between each other. Privacy procedures that can be protected by law have not been applied.
μ¦, μ’ λμ ν΅μ μλΉμ€μ κ²½μ°, ν΅μ νλ‘κ·Έλ¨μ μ€ν λμμ μ€λ§νΈν° μ체μ μΌλ‘ 보νΈν μ μμ§λ§ λ§μ ν΅μ νλ‘κ·Έλ¨μ΄ μ€νλ μ΄νμλ μμ± ν΅ν λ΄μ© λ° λ¬Έμ λ©μμ§ λ΄μ©μ΄ μ μΆλ μ°λ €κ° λ§€μ° λλ€λ λ¬Έμ μ μ κ°μ§λ€.That is, in the case of the conventional communication service, the operation of the communication program can be protected by the smart phone itself, but there is a high possibility that the contents of the voice call and the text message are leaked after the communication program is executed.
νΉν, μ§μ ν λ° ν΄λμ νλ₯Ό ν¬ν¨νλ ν΅μ λ¨λ§μ κ²½μ° μμ± ν΅ν μλΉμ€ λλ λ¬Έμ λ©μμ§ μλΉμ€λ₯Ό μ΄μ©νκ³ λλ©΄ λ°λμ μμ± ν΅ν λ΄μ λλ λ¬Έμ λ©μμ§ μ‘μμ λ΄μμ΄ λ¨κ² λλ©°, ν΅μ λ¨λ§μ ν΅ν λ΄μ μμ© νλ‘κ·Έλ¨ λ΄μμ μ¬μ©μκ° μ΄λ₯Ό μμ νμλ€ νλλΌλ λκ΅°κ°μ μν΄ ν΅μ λ¨λ§μ΄ ν΄νΉλλ κ²½μ°μλ κ°μΈμ μ¬μνμ΄ μ μΆλ μ λ°μ μλ€λ λ¬Έμ μ μ κ°μ§λ€.In particular, in case of a communication terminal including a home phone and a mobile phone, after using a voice call service or a text message service, a voice call history or a text message transmission / reception history is always left, and the user in the call history application of the communication terminal Even if it is deleted, when a communication terminal is hacked by someone, personal privacy is inevitably leaked.
μ΄μ, λ³Έ λ°λͺ μλ μμ λ μ’ λμ ν΅μ μλΉμ€κ° κ°μ§λ λ¬Έμ μ μ ν΄κ²°νκΈ° μν΄, μμ± ν΅ν μ‘μμ μλΉμ€ λλ λ¬Έμ λ©μμ§ μ‘μμ μλΉμ€λ₯Ό μ΄μ©ν¨μ μμ΄ μ체 μΈμ μλ¨μ ν΅ν λ°μ μ λ° μμ μμ λ³ΈμΈ μΈμ¦ μ μ°¨λ₯Ό μ 곡ν¨μΌλ‘μ¨, λ°μ μ λ³ΈμΈ μΈμ¦ μ μ°¨λ₯Ό ν΅ν΄ 1μ°¨μ μΌλ‘ λ°μ μμ κ°μΈμ 보λ₯Ό 보νΈνκ³ μμ μ λ³ΈμΈ μΈμ¦ μ μ°¨λ₯Ό ν΅ν΄ 2μ°¨μ μΌλ‘ μμ μμ κ°μΈμ 보λ₯Ό 보νΈνλ©° λν ν΅μ κΈ°λ‘μ΄ μλ μμ λλλ‘ νλ μ μ°¨λ₯Ό ν΅ν΄ 3μ°¨μ μΌλ‘ λ°μ μ λ° μμ μμ κ°μΈμ 보λ₯Ό ν¨κ³Όμ μΌλ‘ 보νΈν μ μλ μ체 μΈμμ ν΅ν 보μ ν΅μ μμ€ν λ° λ°©λ²μ λ°λͺ νκΈ°μ μ΄λ₯΄λ λ€.In order to solve the problems of the conventional communication service described above, the present inventor provides the caller himself / herself by providing an authentication procedure of the caller and the receiver through a biometric means in using a voice call transmission / reception service or a text message transmission / reception service. Through the authentication process, the sender's personal information is primarily protected, the recipient's identity authentication process, the recipient's personal information is protected secondly, and the communication record is automatically deleted. Invented a secure communication system and method through biometrics that can effectively protect the system.
λ³Έ λ°λͺ μ μμ λ λ¬Έμ μ μ ν΄κ²°νκΈ° μν΄ λμΆλ κ²μΌλ‘μ, λ³Έ λ°λͺ μ μμ± ν΅ν μ‘μμ μλΉμ€ λλ λ¬Έμ λ©μμ§ μ‘μμ μλΉμ€λ₯Ό μ΄μ©ν¨μ μμ΄ μ체 μΈμ μλ¨μ ν΅ν λ°μ μ λ° μμ μμ λ³ΈμΈ μΈμ¦ μ μ°¨λ₯Ό μ 곡ν¨μΌλ‘μ¨, λ°μ μ λ³ΈμΈ μΈμ¦ μ μ°¨λ₯Ό ν΅ν΄ 1μ°¨μ μΌλ‘ λ°μ μμ κ°μΈμ 보λ₯Ό 보νΈνκ³ μμ μ λ³ΈμΈ μΈμ¦ μ μ°¨λ₯Ό ν΅ν΄ 2μ°¨μ μΌλ‘ μμ μμ κ°μΈμ 보λ₯Ό 보νΈνλ©° λν ν΅μ κΈ°λ‘μ΄ μλ μμ λλλ‘ νλ μ μ°¨λ₯Ό ν΅ν΄ 3μ°¨μ μΌλ‘ λ°μ μ λ° μμ μμ κ°μΈμ 보λ₯Ό ν¨κ³Όμ μΌλ‘ 보νΈν μ μλ μ체 μΈμμ ν΅ν 보μ ν΅μ μμ€ν λ° λ°©λ²μ μ 곡νκ³ μ νλ€.The present invention has been made to solve the above-described problems, the present invention provides a caller identity authentication procedure by providing a caller and receiver through the biometric means in the use of voice call transmission service or text message transmission service Through the process of protecting the sender's personal information first, the receiver's personal information secondly through the receiver's identity authentication process, and the communication record is automatically deleted, the sender's and receiver's personal information is effectively The present invention provides a secure communication system and method through biometrics that can be protected.
μ€μμλ€ μ€μμ, μ체 μΈμμ ν΅ν 보μ ν΅μ μμ€ν μ λ°μ μ λ¨λ§λ‘λΆν° μ μ‘λλ λ°μ μμ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ₯Ό μμ νλ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ, μμ μ λ¨λ§μ 보μ ν΅μ μμ² μ νΈλ₯Ό μ μ‘νλ 보μ ν΅μ μμ² μ νΈ μ μ‘λΆ, μκΈ° μμ μ λ¨λ§μ νλ©΄ μμ μκΈ° 보μ ν΅μ μμ² μ νΈμ λμνλ μλ¦Όμ΄ νμλλλ‘ νλ 보μ ν΅μ μλ¦Ό νμλΆ, μκΈ° μμ μ λ¨λ§λ‘λΆν° μ μ‘λλ μμ μμ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ₯Ό μμ νλ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ λ° μκΈ° μ μ‘λλ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° λ° μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ₯Ό κΈ°λ°μΌλ‘ νμ¬ μκΈ° λ°μ μ λ¨λ§ λ° μμ μ λ¨λ§ κ°μ 보μ ν΅μ μ μ€κ°νλ 보μ ν΅μ μ€κ°λΆλ₯Ό ν¬ν¨ν μ μλ€.Among the embodiments, the secure communication system using biometrics includes a sender identity authentication data receiver for receiving sender identity data transmitted from a caller terminal, a secure communication request signal transmitter for transmitting a secure communication request signal to a receiver terminal, Secure communication notification display unit for displaying a notification corresponding to the secure communication request signal on the screen of the receiver terminal, a receiver identity authentication data receiver for receiving the identity authentication data of the receiver transmitted from the receiver terminal and the sender identity authentication It may include a secure communication mediation unit for mediating secure communication between the sender terminal and the receiver terminal based on the data and the receiver identity data.
μΌ μ€μμμμ, μκΈ° λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆλ μ체 μΈμ μλ¨μ ν΅ν λ³ΈμΈ μΈμ¦ κ²°κ³Ό μμ±λλ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° λλ ν¨μ€μλ μ λ ₯ μλ¨μ ν΅ν λ³ΈμΈ μΈμ¦ κ²°κ³Ό μμ±λλ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μ€ μ΄λ νλ μ΄μμ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ₯Ό μκΈ° λ°μ μ λ¨λ§λ‘λΆν° μμ ν μ μλ€.In one embodiment, the sender identity authentication data receiving unit may be any one or more of the sender identity authentication data generated from the identity verification through the biometric means or the identity verification data generated from the identity verification through the password input means. It can be received from the caller terminal.
μΌ μ€μμμμ, μκΈ° 보μ ν΅μ μμ² μ νΈ μ μ‘λΆλ μκΈ° μ μ‘λλ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ₯Ό κΈ°λ°μΌλ‘ νμ¬ λ°μ μ μλ³ μμ΄λλ₯Ό μμ±νκ³ κ·Έλ¦¬κ³ μκΈ° μμ±λ λ°μ μ μλ³ μμ΄λλ₯Ό μκΈ° 보μ ν΅μ μμ² μ νΈ λ΄μ ν¬ν¨μν¬ μ μλ€.In one embodiment, the secure communication request signal transmitting unit may generate a caller identification ID based on the transmitted caller identity authentication data, and include the generated caller identification ID in the secure communication request signal.
μΌ μ€μμμμ, μκΈ° 보μ ν΅μ μ€κ°λΆλ μκΈ° λ°μ μ λ¨λ§λ‘λΆν° μ μ‘λλ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°κ° κΈ° μ μ₯λ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°μ μμ΄ν κ²½μ°, μκΈ° λ°μ μ λ¨λ§μ νλ©΄ μμ 보μ ν΅μ μμ² λΆκ° μλ¦Όμ΄ νμλλλ‘ ν μ μλ€.In one embodiment, if the caller identity data transmitted from the caller terminal is different from the pre-stored caller identity authentication data, the secure communication intermediary may display a notification that the secure communication request is not possible on the screen of the caller terminal.
μΌ μ€μμμμ, μκΈ° μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆλ μ체 μΈμ μλ¨μ ν΅ν λ³ΈμΈ μΈμ¦ κ²°κ³Ό μμ±λλ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° λλ ν¨μ€μλ μ λ ₯ μλ¨μ ν΅ν λ³ΈμΈ μΈμ¦ κ²°κ³Ό μμ±λλ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μ€ μ΄λ νλ μ΄μμ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ₯Ό μκΈ° μμ μ λ¨λ§λ‘λΆν° μμ ν μ μλ€.In one embodiment, the recipient identity authentication data receiving unit may be any one or more of the recipient identity authentication data generated as a result of identity verification through a biometric means or the identity verification data generated as a result of identity verification through a password input means. It can be received from the receiver terminal.
μΌ μ€μμμμ, μκΈ° 보μ ν΅μ μλ¦Ό νμλΆλ μκΈ° μμ μ λ¨λ§μ νλ©΄ μμ μκΈ° 보μ ν΅μ μμ² μ νΈμ λμνλ μλ¦Ό λ° μκΈ° 보μ ν΅μ μμ² μ νΈ λ΄μ ν¬ν¨λ λ°μ μ μλ³ μμ΄λκ° νμλλλ‘ ν μ μλ€.In an embodiment, the secure communication notification display unit may display a notification corresponding to the secure communication request signal and a caller identification ID included in the secure communication request signal on a screen of the receiver terminal.
μΌ μ€μμμμ, μκΈ° 보μ ν΅μ μ€κ°λΆλ μκΈ° μμ μ λ¨λ§λ‘λΆν° μ μ‘λλ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°κ° κΈ° μ μ₯λ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°μ μμ΄ν κ²½μ°, μκΈ° μμ μ λ¨λ§ λ° λ°μ μ λ¨λ§μ νλ©΄ μμ 보μ ν΅μ λΆκ° μλ¦Όμ΄ νμλλλ‘ ν μ μλ€.In one embodiment, the secure communication intermediary unit may cause the secure communication impossible notification to be displayed on the screen of the receiver terminal and the sender terminal when the receiver identity data transmitted from the receiver terminal is different from the stored receiver identity data. have.
μΌ μ€μμμμ, μ체 μΈμμ ν΅ν 보μ ν΅μ μμ€ν μ μκΈ° λ°μ μ λ¨λ§ λ° μμ μ λ¨λ§ κ°μ 보μ ν΅μ μ΄ μ’ λ£λ ν, μκΈ° λ°μ μ λ¨λ§ λ° μμ μ λ¨λ§ κ°κ°μ 보μ ν΅μ κΈ°λ‘ μμ μ νΈλ₯Ό μ μ‘νμ¬ μκΈ° λ°μ μ λ¨λ§ λ° μμ μ λ¨λ§ κ°κ°μμ μ€νλλ ν΅μ κΈ°λ‘ μ΄ν리μΌμ΄μ μμμ μκΈ° 보μ ν΅μ κΈ°λ‘μ΄ μμ λλλ‘ νλ 보μ ν΅μ κΈ°λ‘ μμ μ νΈ μ μ‘λΆλ₯Ό λ ν¬ν¨ν μ μλ€.In one embodiment, the secure communication system through biometrics, after the secure communication between the sender terminal and the receiver terminal is terminated, by transmitting a secure communication record delete signal to each of the sender terminal and the receiver terminal, the sender terminal and the receiver terminal, respectively The apparatus may further include a secure communication record deleting signal transmission unit configured to delete the secure communication record on the communication recording application executed in the.
λ³Έ λ°λͺ μ λ€λ₯Έ μ€μμμ λ°λ₯Έ μ체 μΈμμ ν΅ν 보μ ν΅μ λ°©λ²μ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆμμ λ°μ μ λ¨λ§λ‘λΆν° μ μ‘λλ λ°μ μμ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ₯Ό μμ νλ λ¨κ³, 보μ ν΅μ μμ² μ νΈ μ μ‘λΆμμ μμ μ λ¨λ§μ 보μ ν΅μ μμ² μ νΈλ₯Ό μ μ‘νλ λ¨κ³, 보μ ν΅μ μλ¦Ό νμλΆμμ μμ μ λ¨λ§μ νλ©΄ μμ 보μ ν΅μ μμ² μ νΈμ λμνλ μλ¦Όμ΄ νμλλλ‘ νλ λ¨κ³, μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆμμ μμ μ λ¨λ§λ‘λΆν° μ μ‘λλ μμ μμ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ₯Ό μμ νλ λ¨κ³ λ° λ³΄μ ν΅μ μ€κ°λΆμμ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° λ° μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ₯Ό κΈ°λ°μΌλ‘ νμ¬ λ°μ μ λ¨λ§ λ° μμ μ λ¨λ§ κ°μ 보μ ν΅μ μ μ€κ°νλ λ¨κ³λ₯Ό ν¬ν¨ν μ μλ€.In the secure communication method through biometrics according to another embodiment of the present invention, the sender identity authentication data receiving unit receiving the identity authentication data of the sender transmitted from the sender terminal, the secure communication request signal transmitting unit to the receiver terminal secure communication request Transmitting a signal, causing the secure communication notification display unit to display a notification corresponding to the secure communication request signal on the screen of the receiver terminal, and receiving the receiver authentication data of the receiver transmitted from the receiver terminal at the receiver identity authentication data receiver; The method may include relaying secure communication between the sender terminal and the receiver terminal based on the sender identity data and the receiver identity data at the secure communication broker.
μΌ μ€μμμμ, μκΈ° λ°μ μμ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ₯Ό μμ νλ λ¨κ³λ μ체 μΈμ μλ¨μ ν΅ν λ³ΈμΈ μΈμ¦ κ²°κ³Ό μμ±λλ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° λλ ν¨μ€μλ μ λ ₯ μλ¨μ ν΅ν λ³ΈμΈ μΈμ¦ κ²°κ³Ό μμ±λλ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μ€ μ΄λ νλ μ΄μμ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ₯Ό μκΈ° λ°μ μ λ¨λ§λ‘λΆν° μμ νλ λ¨κ³λ₯Ό ν¬ν¨ν μ μλ€.In one embodiment, the step of receiving the sender's identity authentication data may include at least one of a sender's identity authentication data generated as a result of identity verification through a biometric means or a sender identity verification data generated as a result of identity verification through a password input means. Receiving the identity authentication data from the caller terminal.
μΌ μ€μμμμ, μκΈ° 보μ ν΅μ μμ² μ νΈλ₯Ό μ μ‘νλ λ¨κ³λ μκΈ° μ μ‘λλ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ₯Ό κΈ°λ°μΌλ‘ νμ¬ λ°μ μ μλ³ μμ΄λλ₯Ό μμ±νλ λ¨κ³ λ° μκΈ° μμ±λ λ°μ μ μλ³ μμ΄λλ₯Ό μκΈ° 보μ ν΅μ μμ² μ νΈ λ΄μ ν¬ν¨μν€λ λ¨κ³λ₯Ό ν¬ν¨ν μ μλ€.In an embodiment, the step of transmitting the secure communication request signal may include generating a caller identification ID based on the transmitted caller identity data and including the generated caller identification ID in the secure communication request signal. It may include.
μΌ μ€μμμμ, μκΈ° 보μ ν΅μ μ μ€κ°νλ λ¨κ³λ μκΈ° λ°μ μ λ¨λ§λ‘λΆν° μ μ‘λλ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°κ° κΈ° μ μ₯λ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°μ μμ΄ν κ²½μ°, μκΈ° λ°μ μ λ¨λ§μ νλ©΄ μμ 보μ ν΅μ μμ² λΆκ° μλ¦Όμ΄ νμλλλ‘ νλ λ¨κ³λ₯Ό ν¬ν¨ν μ μλ€.In an embodiment, the step of mediating the secure communication may include displaying a notification that a secure communication request is not possible on the screen of the caller terminal when the caller identity data transmitted from the caller terminal is different from previously stored caller identity data. It may include a step.
μΌ μ€μμμμ, μκΈ° μμ μμ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ₯Ό μμ νλ λ¨κ³λ μ체 μΈμ μλ¨μ ν΅ν λ³ΈμΈ μΈμ¦ κ²°κ³Ό μμ±λλ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° λλ ν¨μ€μλ μ λ ₯ μλ¨μ ν΅ν λ³ΈμΈ μΈμ¦ κ²°κ³Ό μμ±λλ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μ€ μ΄λ νλ μ΄μμ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ₯Ό μκΈ° μμ μ λ¨λ§λ‘λΆν° μμ νλ λ¨κ³λ₯Ό ν¬ν¨ν μ μλ€.In one embodiment, the step of receiving the identity authentication data of the recipient is any one or more of the recipient identity authentication data generated as a result of identity verification through biometric means or recipient identity authentication data generated as a result of identity verification through password input means Receiving the identity authentication data from the receiver terminal.
μΌ μ€μμμμ, μκΈ° 보μ ν΅μ μμ² μ νΈμ λμνλ μλ¦Όμ΄ νμλλλ‘ νλ λ¨κ³λ μκΈ° μμ μ λ¨λ§μ νλ©΄ μμ μκΈ° 보μ ν΅μ μμ² μ νΈμ λμνλ μλ¦Όμ΄ νμλλλ‘ νλ λ¨κ³ λ° μκΈ° 보μ ν΅μ μμ² μ νΈ λ΄μ ν¬ν¨λ λ°μ μ μλ³ μμ΄λκ° νμλλλ‘ νλ λ¨κ³λ₯Ό ν¬ν¨ν μ μλ€.In an embodiment, the step of displaying a notification corresponding to the secure communication request signal may include displaying a notification corresponding to the secure communication request signal on a screen of the receiver terminal and included in the secure communication request signal. The caller identification ID may be displayed.
μΌ μ€μμμμ, μκΈ° 보μ ν΅μ μ μ€κ°νλ λ¨κ³λ μκΈ° μμ μ λ¨λ§λ‘λΆν° μ μ‘λλ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°κ° κΈ° μ μ₯λ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°μ μμ΄ν κ²½μ°, μκΈ° μμ μ λ¨λ§ λ° λ°μ μ λ¨λ§μ νλ©΄ μμ 보μ ν΅μ λΆκ° μλ¦Όμ΄ νμλλλ‘ νλ λ¨κ³λ₯Ό ν¬ν¨ν μ μλ€.In an embodiment, the step of mediating the secure communication may include displaying a notification of the inability to secure communication on the screen of the receiver terminal and the sender terminal when the receiver identity data transmitted from the receiver terminal is different from the stored receiver identity data. May be included.
μΌ μ€μμμμ, μ체 μΈμμ ν΅ν 보μ ν΅μ λ°©λ²μ μκΈ° λ°μ μ λ¨λ§ λ° μμ μ λ¨λ§ κ°μ 보μ ν΅μ μ΄ μ’ λ£λ ν, 보μ ν΅μ κΈ°λ‘ μμ μ νΈ μ μ‘λΆμμ μκΈ° λ°μ μ λ¨λ§ λ° μμ μ λ¨λ§ κ°κ°μ 보μ ν΅μ κΈ°λ‘ μμ μ νΈλ₯Ό μ μ‘νμ¬ μκΈ° λ°μ μ λ¨λ§ λ° μμ μ λ¨λ§ κ°κ°μμ μ€νλλ ν΅μ κΈ°λ‘ μ΄ν리μΌμ΄μ μμμ μκΈ° 보μ ν΅μ κΈ°λ‘μ΄ μμ λλλ‘ νλ λ¨κ³λ₯Ό λ ν¬ν¨ν μ μλ€.In one embodiment, the secure communication method through biometrics, after the secure communication between the sender terminal and the receiver terminal is terminated, the secure communication record delete signal transmission unit transmits a secure communication record delete signal to each of the sender terminal and the receiver terminal. And deleting the secure communication record on the communication recording application executed in each of the sender terminal and the receiver terminal.
λ³Έ λ°λͺ μ λ°λ₯Έ μ체 μΈμμ ν΅ν 보μ ν΅μ μμ€ν λ° λ°©λ²μ μ체 μΈμ μλ¨ λλ ν¨μ€μλ μ λ ₯ μλ¨μ ν΅ν΄ λ°μ μ λ° μμ μ μμΈ‘μ λ³ΈμΈ μΈμ¦μ μ¬λ¬ λ¨κ³μ κ±Έμ³ μνν¨μΌλ‘μ¨, λ°μ μ λ³ΈμΈ μΈμ¦ μ μ°¨λ₯Ό ν΅ν΄ 1μ°¨μ μΌλ‘ λ°μ μμ κ°μΈμ 보λ₯Ό 보νΈνκ³ μμ μ λ³ΈμΈ μΈμ¦ μ μ°¨λ₯Ό ν΅ν΄ 2μ°¨μ μΌλ‘ μμ μμ κ°μΈμ 보λ₯Ό 보νΈν μ μλ ν¨κ³Όλ₯Ό κ°μ§λ€.According to the present invention, a secure communication system and method through biometrics can be performed through a plurality of stages of identity verification of both a sender and a receiver through a biometric means or a password input means, thereby providing the sender's personal authentication process. It protects the information and has the effect of secondarily protecting the recipient's personal information through the recipient authentication process.
λν, λ³Έ λ°λͺ μ 보μ ν΅μ μ΄ μ’ λ£λ ν λ°μ μ λ¨λ§ λ° μμ μ λ¨λ§ κ°κ°μμ μ€νλλ ν΅μ κΈ°λ‘ μ΄ν리μΌμ΄μ μμμ 보μ ν΅μ κΈ°λ‘μ΄ μλμΌλ‘ μμ λλλ‘ ν¨μΌλ‘μ¨, νμΈμκ² ν΅μ κΈ°λ‘μ΄ λ ΈμΆλλ κ²μ μμ²μ μΌλ‘ λ°©μ§ν μ μλ ν¨κ³Όλ₯Ό κ°μ§λ€.In addition, the present invention is to ensure that the secure communication record is automatically deleted on the communication recording application running in each of the sender terminal and the receiver terminal after the secure communication is terminated, thereby preventing the original exposure of the communication record to others Have
λν, λ³Έ λ°λͺ μ μμ μ λ¨λ§μ νλ©΄ μμ 보μ μΈμ¦μ κ±°μΉ λ°μ μ μλ³ μμ΄λλ§μ΄ νμλκΈ° λλ¬Έμ νμΈμκ² λ³΄μ ν΅μ μλ¦Ό νλ©΄μ΄ λ ΈμΆλλλΌλ μμ μ μΈμλ ν΄λΉ λ°μ μκ° λꡬμΈμ§ μ μ μλ€λ μ₯μ μ κ°μ§λ€.In addition, the present invention has the advantage that since only the caller identification ID that has undergone security authentication is displayed on the screen of the receiver terminal, even if the security communication notification screen is exposed to the other party, only the receiver can know who the caller is.
λ 1μ λ³Έ λ°λͺ
μ μΌ μ€μμμ λ°λ₯Έ μ체 μΈμμ ν΅ν 보μ ν΅μ μμ€ν
(100)μ ꡬμ±μ κ°λ΅μ μΌλ‘ λμν λλ©΄μ΄λ€.1 is a diagram schematically illustrating a configuration of a
λ 2λ λ³Έ λ°λͺ
μ λ€λ₯Έ μ€μμμ λ°λ₯Έ μ체 μΈμμ ν΅ν 보μ ν΅μ μμ€ν
(100')μ ꡬμ±μ κ°λ΅μ μΌλ‘ λμν λλ©΄μ΄λ€.2 is a diagram schematically illustrating a configuration of a
λ 3μ λ³Έ λ°λͺ
μ μΌ μ€μμμ λ°λ₯Έ μ체 μΈμμ ν΅ν 보μ ν΅μ μμ€ν
(100)μ λμμ λ¨κ³μ μΌλ‘ λμν λλ©΄μ΄λ€.3 is a diagram illustrating an operation of the
μ΄ν, λ³Έ λ°λͺ μ μ΄ν΄λ₯Ό λκΈ° μνμ¬ λ°λμ§ν μ€μμλ₯Ό μ μνλ€. κ·Έλ¬λ νκΈ°μ μ€μμλ λ³Έ λ°λͺ μ λ³΄λ€ μ½κ² μ΄ν΄νκΈ° μνμ¬ μ 곡λλ κ²μΌ λΏ, μ€μμμ μν΄ λ³Έ λ°λͺ μ λ΄μ©μ΄ νμ λλ κ²μ μλλ€.Hereinafter, preferred examples are provided to aid in understanding the present invention. However, the following examples are merely provided to more easily understand the present invention, and the contents of the present invention are not limited by the examples.
λ 1μ λ³Έ λ°λͺ
μ μΌ μ€μμμ λ°λ₯Έ μ체 μΈμμ ν΅ν 보μ ν΅μ μμ€ν
(100)μ ꡬμ±μ κ°λ΅μ μΌλ‘ λμν λλ©΄μ΄κ³ , λ 2λ λ³Έ λ°λͺ
μ λ€λ₯Έ μ€μμμ λ°λ₯Έ μ체 μΈμμ ν΅ν 보μ ν΅μ μμ€ν
(100')μ ꡬμ±μ κ°λ΅μ μΌλ‘ λμν λλ©΄μ΄λ€.1 is a diagram schematically illustrating a configuration of a
λ 1 λ° λ 2λ₯Ό μ΄ν΄λ³΄λ©΄, λ³Έ λ°λͺ
μ λ°λ₯Έ μ체 μΈμμ ν΅ν 보μ ν΅μ μμ€ν
(100)μ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(110), 보μ ν΅μ μμ² μ νΈ μ μ‘λΆ(120), 보μ ν΅μ μλ¦Ό νμλΆ(130), μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(140) λ° λ³΄μ ν΅μ μ€κ°λΆ(150)λ₯Ό ν¬ν¨νλ ννμΌ μ μκ³ , λν λ³Έ λ°λͺ
μ λ€λ₯Έ μ€μμμ λ°λ₯Έ μ체 μΈμμ ν΅ν 보μ ν΅μ μμ€ν
(100')μ λ°μ μ λ¨λ§(1) λ° μμ μ λ¨λ§(2) κ°μ 보μ ν΅μ μ μ€κ°νλ μν μ μννλ 보μ ν΅μ μλ²μ ν΄λΉλ μ μλ€.1 and 2, the
λ¨Όμ , λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(110)λ λ°μ μ λ¨λ§(1)λ‘λΆν° μ μ‘λλ λ°μ μμ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ₯Ό μμ νλ μν μ μνν μ μλ€.First, the caller ID
μ¬κΈ°μμ, λ°μ μ λ¨λ§(1) λ° μμ μ λ¨λ§(2)μ΄λΌ ν¨μ λ°μ μ λλ μμ μκ° μ 무μ ν΅μ λ§μ ν΅ν΄ μλλ°© μΈ‘μ μμ± ν΅ν μμ² μ νΈ λλ λ¬Έμ λ©μμ§ μ‘μμ μμ² μ νΈ λ±μ μ μ‘ν¨μ μμ΄ μ¬μ©λ μ μλ ν΅μ λ¨λ§μ μ§μΉνλ μλ―Έλ‘ ν΄μλ μ μμΌλ©°, λνμ μΈ μλ‘ μ€λ§νΈν° λ±μ΄ ν΄λΉλ μ μλ€.Here, the caller terminal 1 and the receiver terminal 2 refers to a communication terminal that can be used when the caller or receiver transmits a voice call request signal or a text message transmission / reception request signal to the other party through a wired or wireless communication network. It can be interpreted to mean, a representative example may be a smartphone.
μ΄λ¬ν λ°μ μ λ¨λ§(1) λ° μμ μ λ¨λ§(2)μλ λ€μν λ³ΈμΈ μΈμ¦ μλ¨μ΄ ν¬ν¨λ μ μλλ°, μλ₯Ό λ€μ΄, μ§λ¬Έ μΈμ, μμ± μΈμ, νμ± μΈμ, νκ΄ μΈμ, μλ©΄ μΈμ λλ μ μ μλͺ μΈμ λ±κ³Ό κ°μ μ체μΈμκΈ°μ (biometrics)μ κΈ°λ°μΌλ‘ νλ λ³ΈμΈ μΈμ¦ μλ¨ λ° ν°μΉ ν¨λ, λ€μ΄μΌ ν¨λ λ±κ³Ό κ°μ΄ ν¨μ€μλ μ λ ₯ κΈ°μ μ κΈ°λ°μΌλ‘ νλ λ³ΈμΈ μΈμ¦ μλ¨ λ±μ΄ ν¬ν¨λ μ μλ€.The sender terminal 1 and the receiver terminal 2 may include a variety of personal authentication means, for example, biometric technology such as fingerprint recognition, voice recognition, iris recognition, blood vessel recognition, facial recognition or electronic signature recognition ( biometrics) and an authentication means based on a password input technology such as a touch pad or a dial pad.
λ°λΌμ, λ°μ μ λ¨λ§(1)μ λ³ΈμΈ μΈμ¦ μλ¨μ ν΅ν λ³ΈμΈ μΈμ¦ κ²°κ³Όλ‘ μμ±λλ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(110)λ‘ μ μ‘λ μ μμΌλ©°, μ΄λ κ² μ μ‘λ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ νμ λλ 보μ ν΅μ μμ² μ νΈ μ μ‘λΆ(120)λ‘ μ λ¬λ μ μμΌλ©°, λν νμ λλ 보μ ν΅μ μ€κ°λΆ(150)μ μν΄ κΈ° μ μ₯λ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°μ μΌμΉνλμ§ μ¬λΆκ° νμΈλ μ μλ€.Therefore, the caller identity data generated as a result of the identity verification through the identity verification means of the caller terminal 1 may be transmitted to the caller identity
μΌ μ€μμμμ, λ°μ μ λ¨λ§(1)μμ μμ μ λ¨λ§(2)μ μμ± ν΅ν μμ² μ νΈ λλ λ¬Έμ λ©μμ§ μ‘μ μ νΈλ₯Ό μ μ‘νλ λ°©μμ μμ ν λ°μ κ°μ΄ λ°μ μ λ¨λ§(1)μ λ³ΈμΈ μΈμ¦ μλ¨μ μ΄μ©νλ λ°©μ μ΄μΈμλ λ°μ μ λ¨λ§(1)μ λ³ΈμΈ μΈμ¦ μλ¨μ μ΄μ©νμ§ μκ³ μμ± ν΅ν μμ² μ νΈ λλ λ¬Έμ λ©μμ§ μ‘μ μ νΈλ₯Ό μ μ‘νλ λ°©μμ΄ ν¬ν¨λ μ μλ€.In one embodiment, the method of transmitting the voice call request signal or the text message transmission signal from the caller terminal 1 to the receiver terminal 2 in addition to the method of using the identity authentication means of the caller terminal 1 as described above. A method of transmitting a voice call request signal or a text message transmission signal without using the personal identification means of (1) may be included.
μΌ μ€μμμμ, λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(110)λ λ°μ μ λ¨λ§(1) λ΄μμ μ€ν κ°λ₯ν μμ© νλ‘κ·Έλ¨(application)μΌ μ μμΌλ©°, μ΄λ¬ν κ²½μ° λ°μ μ λ¨λ§(1)μ ν΅ν΄ λ°μ μμ λ³ΈμΈ μΈμ¦ κ³Όμ μ ν΅ν΄ μμ±λλ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ λ³λμ μλ²μ μ μ‘λλ κ²μ΄ μλ, λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(110)μ μ λ¬λ μ μλ€.In one embodiment, the sender identity authentication
λ€μμΌλ‘, 보μ ν΅μ μμ² μ νΈ μ μ‘λΆ(120)λ μμ μ λ¨λ§(2)μ 보μ ν΅μ μμ² μ νΈλ₯Ό μ μ‘νλ μν μ μνν μ μλ€.Next, the secure communication
λ³΄λ€ κ΅¬μ²΄μ μΌλ‘, 보μ ν΅μ μμ² μ νΈ μ μ‘λΆ(120)λ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(110)μμ μμ ν λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ₯Ό κΈ°λ°μΌλ‘ νμ¬ λ°μ μ μλ³ μμ΄λλ₯Ό μμ±νκ³ , μμ±λ λ°μ μ μλ³ μμ΄λλ₯Ό 보μ ν΅μ μμ² μ νΈ λ΄μ ν¬ν¨μν€λ μν μ μνν¨μΌλ‘μ¨, μΆν μμ μ λ¨λ§(2)μ νλ©΄ μμ 보μ ν΅μ μμ² μ νΈμ λ°λ₯Έ 보μ ν΅μ μλ¦Όμ΄ νμλλ κ²½μ° μμ ν λ°μ μ μλ³ μμ΄λκ° ν¨κ» νμλ μ μλ€.More specifically, the secure communication request
μΌ μ€μμμμ, 보μ ν΅μ μμ² μ νΈ μ μ‘λΆ(120)λ₯Ό ν΅ν΄ μμ±λλ λ°μ μ μλ³ μμ΄λλ λ°μ μ λ¨λ§(1)μ μ νλ²νΈ λ° λ°μ μμ κ°μΈμ 보λ₯Ό ν¬ν¨νμ§ μλλ‘ μμ±λ μ μλλ°, μ΄λ λ°μ μ μλ³ μμ΄λ λ΄μ λ°μ μμ κ°μΈμ 보λ₯Ό ν¬ν¨νμ§ μλλ‘ νμ¬ λ°μ μ μΈ‘μ κ°μΈμ 보 λ° μ¬μνμ΄ λ
ΈμΆλμ§ μλλ‘ νκΈ° μν¨μ΄λ€.In one embodiment, the caller identification ID generated through the secure communication request
μ¦, μμ μ λ¨λ§(2)μ νλ©΄ μμ νμλλ λ°μ μ μλ³ μμ΄λλ λ°μ μμ μμ μ κ°μ μΌμ’ μ μνΈ μλ―Έλ‘ ν΄μλ μ μμΌλ©°, μμ μ λ¨λ§(2)μ νλ©΄ μμ νμλλ λ°μ μ μλ³ μμ΄λκ° νμΈμκ² λ ΈμΆλλ κ²½μ°μλ λ°μ μ μλ³ μμ΄λ μ΄μΈμλ λ°μ μμ λν μ΄λ ν κ°μΈμ 보λ νμλμ§ μκΈ° λλ¬Έμ νμΈμ΄ μ΄λ₯Ό ν΅ν΄ λ°μ μκ° λꡬμΈμ§ νμ ν μ μκ² λλ€.That is, the caller identification ID displayed on the screen of the receiver terminal 2 may be interpreted as a kind of password meaning between the caller and the receiver, and the caller identification ID displayed on the screen of the receiver terminal 2 is exposed to others. In addition, since no personal information about the caller is displayed other than the caller identification ID, others cannot determine who the caller is through.
λ€μμΌλ‘, 보μ ν΅μ μλ¦Ό νμλΆ(130)λ μμ ν 보μ ν΅μ μμ² μ νΈ μ μ‘λΆ(120)λ₯Ό ν΅ν΄ μ μ‘λλ 보μ ν΅μ μμ² μ νΈλ₯Ό μμ ν μμ μ λ¨λ§(2)μ νλ©΄ μμ 보μ ν΅μ μμ² μ νΈμ λμνλ μλ¦Όμ΄ νμλλλ‘ νλ μν μ μνν μ μλ€.Next, the security communication
μλ₯Ό λ€μ΄, 보μ ν΅μ μμ² μ νΈλ₯Ό μμ ν μμ μ λ¨λ§(2)μ νλ©΄ μμλ λ°μ μ μλ³ μμ΄λκ° νμλ μ μμΌλ©°, λν μμ μ λ¨λ§(2) λ΄μ ꡬλΉλ μ리 μΆλ ₯ λͺ¨λμ ν΅ν΄ νΉμ μλ¦¬κ° μΆλ ₯ λκ±°λ, μ§λ λͺ¨λμ ν΅ν΄ μμ μ λ¨λ§(2) μμ²΄κ° μ§λνκ±°λ λλ λ°κ΄ μμ λͺ¨λμ ν΅ν΄ μμ μ λ¨λ§(2)μ μΈμΈ‘μ΄ μ λ©Έλ μ μλ€. κ·Έμ λ°λΌ, μμ μ λ¨λ§(2)μ μ΄μ©νλ μμ μλ νμ¬ λ³΄μ ν΅μ μμ² μ νΈκ° μμ λμμμ νμΈν μ μμΌλ©΄μ λμμ λ°μ μ μλ³ μμ΄λλ₯Ό νμΈνμ¬ λ°μ μκ° λꡬμΈμ§ νμ ν μ μλ€.For example, the caller identification ID may be displayed on the screen of the receiver terminal 2 that has received the secure communication request signal, and a specific sound is output through the sound output module provided in the receiver terminal 2, or the vibration module may be displayed. Through the receiver terminal 2 itself may vibrate or the outside of the receiver terminal 2 through the light emitting device module may flash. Accordingly, the receiver using the receiver terminal 2 can confirm that the current secure communication request signal has been received and at the same time check the caller identification ID to determine who the caller is.
λ€μμΌλ‘, μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(140)λ μμ μ λ¨λ§(2)λ‘λΆν° μ μ‘λλ μμ μμ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ₯Ό μμ νλ μν μ μνν μ μλ€.Next, the receiver identity
μ΄λ¬ν μν μ μννλ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(140)λ μμ ν λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(110)μ μμνλ μν μ μννλ©°, μμ μ λ¨λ§(2)μ λ³ΈμΈ μΈμ¦ μλ¨μ ν΅ν λ³ΈμΈ μΈμ¦ κ²°κ³Όλ‘ μμ±λλ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(140)λ‘ μ μ‘λ μ μμΌλ©°, μ΄λ κ² μ μ‘λ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ νμ λλ 보μ ν΅μ μ€κ°λΆ(150)μ μν΄ κΈ° μ μ₯λ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°μ μΌμΉνλμ§ μ¬λΆκ° νμΈλ μ μλ€.The recipient identity authentication
ννΈ, μμ ν λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(110)μ μμνλ μν μ νκΈ° λλ¬Έμ μμΈν μ€λͺ
μ μλ΅νκΈ°λ‘ νλ€.On the other hand, since it plays a role corresponding to the sender identity authentication
λ§μ§λ§μΌλ‘, 보μ ν΅μ μ€κ°λΆ(150)λ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(110) λ° μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(140)λ₯Ό ν΅ν΄ κ°κ° μμ λ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° λ° μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ₯Ό κΈ°λ°μΌλ‘ νμ¬ λ°μ μ λ¨λ§(1) λ° μμ μ λ¨λ§(2) κ°μ 보μ ν΅μ μ μ€κ°νλ μν μ μνν μ μλ€.Lastly, the secure communication
λ³΄λ€ κ΅¬μ²΄μ μΌλ‘, 보μ ν΅μ μ€κ°λΆ(150)λ λ°μ μ λ¨λ§(1)λ‘λΆν° μ μ‘λλ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°κ° κΈ° μ μ₯λ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°μ μΌμΉνλμ§ μ¬λΆλ₯Ό νλ¨νλ μν μ μνν μ μμΌλ©°, λ§μ½ μ μ‘λ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°μ κΈ° μ μ₯λ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°κ° μμ΄ν κ²½μ° λ³΄μ ν΅μ μ€κ°λΆ(150)λ νμ¬ λ³΄μ ν΅μ μμ² μ νΈλ₯Ό μ μ‘νκ³ μ νλ λ°μ μκ° λ°μ μ λ¨λ§(1)μ λ³ΈμΈμ΄ μλ κ²μΌλ‘ νλ¨νμ¬ λ°μ μ λ¨λ§(1)μ νλ©΄ μμ 보μ ν΅μ μμ² λΆκ° μλ¦Όμ΄ νμλλλ‘ ν μ μλ€.More specifically, the
μλ₯Ό λ€μ΄, 'A'λΌλ μ¬μ©μμ λ¨λ§μΈ 'A λ¨λ§κΈ°'λ₯Ό 'B'λΌλ μ¬μ©μκ° μμ§ν μνμμ 'B'λΌλ μ¬μ©μκ° 'A λ¨λ§κΈ°'λ₯Ό ν΅ν΄ 보μ ν΅μ μμ² μ νΈ μ μ‘μ μλνλ κ²½μ°, 'A λ¨λ§κΈ°' λ΄μ ꡬλΉλ μ체 μΈμ μλ¨ λλ ν¨μ€μλ μ
λ ₯ μλ¨μ ν΅ν΄ μμ±λλ 'B' μ¬μ©μμ λ³ΈμΈ μΈμ¦ λ°μ΄ν°κ° λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(110)μ μ μ‘λκ³ , 보μ ν΅μ μ€κ°λΆ(150)μμλ μ μ‘λ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°μ κΈ° μ μ₯λ 'A' μ¬μ©μμ λ³ΈμΈ μΈμ¦ λ°μ΄ν°μ μΌμΉ μ¬λΆλ₯Ό λΉκ΅νμ¬ μλ‘ μμ΄νλ€λ νλ¨μ νκ² λκ³ , κ²°κ³Όμ μΌλ‘ 'A λ¨λ§κΈ°'μ νλ©΄ μμ "λ³ΈμΈ μΈμ¦μ΄ λμ§ μμ 보μ ν΅μ μμ²μ΄ λΆκ°ν©λλ€" λ±κ³Ό κ°μ 보μ ν΅μ λΆκ° μλ¦Όμ΄ νμλ μ μλ€.For example, if a user named 'B' has a user named 'A' and a user named 'B' has attempted to transmit a secure communication request signal through 'A terminal', The user authentication data of the user 'B' generated through the biometric means or the password input means provided in the 'terminal A' is transmitted to the sender identity
λν, 보μ ν΅μ μ€κ°λΆ(150)λ μμ μ λ¨λ§(2)λ‘λΆν° μ μ‘λλ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°κ° κΈ° μ μ₯λ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°μ μΌμΉνλμ§ μ¬λΆλ₯Ό νλ¨νλ μν μ μνν μ μμΌλ©°, λ§μ½ μ μ‘λ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°μ κΈ° μ μ₯λ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°κ° μμ΄ν κ²½μ° λ³΄μ ν΅μ μ€κ°λΆ(150)λ νμ¬ λ³΄μ ν΅μ μμ² μ νΈλ₯Ό μμ ν μμ μκ° μμ μ λ¨λ§(2)μ λ³ΈμΈμ΄ μλ κ²μΌλ‘ νλ¨νμ¬ μμ μ λ¨λ§(2)μ νλ©΄ μμ 보μ ν΅μ λΆκ° μλ¦Όμ΄ νμλλλ‘ ν μ μλ€.In addition, the secure communication
μλ₯Ό λ€μ΄, 'A'λΌλ μ¬μ©μμ λ¨λ§μΈ 'A λ¨λ§κΈ°'λ₯Ό 'B'λΌλ μ¬μ©μκ° μμ§ν μνμμ 'A λ¨λ§κΈ°'μ 보μ ν΅μ μμ² μ νΈκ° μμ λμλ€κ³ κ°μ νλ©΄, 'A λ¨λ§κΈ°'μ νλ©΄ μμλ 보μ ν΅μ μμ² μ νΈμ λμνλ 보μ ν΅μ μλ¦Όκ³Ό ν¨κ» λ°μ μ μλ³ μμ΄λκ° νμλλ€.For example, assuming that a secure communication request signal is received at the 'terminal A' while the 'terminal A' is held by the user 'B', the terminal A is secured on the screen of the terminal A. The caller identification ID is displayed along with a secure communication notification corresponding to the communication request signal.
μ΄λ, 'B'λΌλ μ¬μ©μκ° μ΄λ₯Ό νμΈν ν 'A λ¨λ§κΈ°'λ₯Ό ν΅ν΄ 보μ ν΅μ μ μλνλ κ²½μ°, 'A λ¨λ§κΈ°' λ΄μ ꡬλΉλ μ체 μΈμ μλ¨ λλ ν¨μ€μλ μ
λ ₯ μλ¨μ ν΅ν΄ μμ±λλ 'B' μ¬μ©μμ λ³ΈμΈ μΈμ¦ λ°μ΄ν°κ° μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(140)μ μ μ‘λκ³ , 보μ ν΅μ μ€κ°λΆ(150)μμλ μ μ‘λ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°μ κΈ° μ μ₯λ 'A' μ¬μ©μμ λ³ΈμΈ μΈμ¦ λ°μ΄ν°μ μΌμΉ μ¬λΆλ₯Ό λΉκ΅νμ¬ μλ‘ μμ΄νλ€λ νλ¨μ νκ² λκ³ , κ²°κ³Όμ μΌλ‘ 'A λ¨λ§κΈ°'μ νλ©΄ μμ "λ³ΈμΈ μΈμ¦μ΄ λμ§ μμ 보μ ν΅μ μ΄ λΆκ°ν©λλ€" λ±κ³Ό κ°μ 보μ ν΅μ λΆκ° μλ¦Όμ΄ νμλ μ μλ€.At this time, when the user 'B' checks this and attempts secure communication through the 'terminal A', the user authentication data of the 'B' user generated by the biometric means or the password input means provided in the 'terminal A' Is transmitted to the receiver identity
μΌ μ€μμμμ, λ³Έ λ°λͺ
μ λ°λ₯Έ μ체 μΈμμ ν΅ν 보μ ν΅μ μμ€ν
(100)μ 보μ ν΅μ κΈ°λ‘ μμ μ νΈ μ μ‘λΆ(160)λ₯Ό λ ν¬ν¨ν μ μλ€.In one embodiment, the
보μ ν΅μ κΈ°λ‘ μμ μ νΈ μ μ‘λΆ(160)λ λ°μ μ λ¨λ§(1) λ° μμ μ λ¨λ§(2) κ°μ 보μ ν΅μ μ΄ μ’
λ£λ ν, λ°μ μ λ¨λ§(1) λ° μμ μ λ¨λ§(2) κ°κ°μ 보μ ν΅μ κΈ°λ‘ μμ μ νΈλ₯Ό μ μ‘ν¨μΌλ‘μ¨ λ°μ μ λ¨λ§(1) λ° μμ μ λ¨λ§(2) κ°κ°μμ μ€νλλ ν΅μ κΈ°λ‘ μ΄ν리μΌμ΄μ
(μλ₯Ό λ€μ΄, ν΅ν λ΄μ λ±) μμμ 보μ ν΅μ μ λν κΈ°λ‘μ΄ μλμΌλ‘ μμ λλλ‘ νλ μν μ μνν μ μλ€.After the secure communication between the sender terminal 1 and the receiver terminal 2 is terminated, the secure communication record delete
λ°λΌμ, λ°μ μ λ¨λ§(1) λ° μμ μ λ¨λ§(2) κ°μ 보μ ν΅μ μ΄ μ’ λ£λ ν, λ°μ μ λ° μμ μκ° ν΅μ κΈ°λ‘ μ΄ν리μΌμ΄μ μ μ€ννμ¬ λ³΄μ ν΅μ μ λν κΈ°λ‘μ μμ νλ λ²κ±°λ‘μμ΄ ν΄κ²°λ μ μλ€.Therefore, after the secure communication between the sender terminal 1 and the receiver terminal 2 is terminated, the trouble of the sender and the receiver executing the communication recording application to delete the record for the secure communication can be solved.
λ€μμΌλ‘λ λ 3μ ν΅ν΄ λ³Έ λ°λͺ μ λ°λ₯Έ μ체 μΈμμ ν΅ν 보μ ν΅μ λ°©λ²μ λ³΄λ€ κ΅¬μ²΄μ μΌλ‘ μ΄ν΄λ³΄κΈ°λ‘ νλ€.Next, the security communication method through biometrics according to the present invention will be described in more detail with reference to FIG. 3.
λ 3μ λ³Έ λ°λͺ
μ μΌ μ€μμμ λ°λ₯Έ μ체 μΈμμ ν΅ν 보μ ν΅μ μμ€ν
(100)μ λμμ λ¨κ³μ μΌλ‘ λμν λλ©΄μ΄λ€.3 is a diagram illustrating an operation of the
λ 3μ μ΄ν΄λ³΄λ©΄, λ¨Όμ λ°μ μ λ¨λ§(1) μμμ μ€νλ μ μλ μ°λ½μ² μμ© νλ‘κ·Έλ¨ μμμ λ°μ μμ μν΄ μμ μκ° μ νλκ³ , ν΄λΉ μμ μμ νλ‘ν νλ©΄ μμ νμλ 보μ ν΅μ μμ² μμμ΄ λ°μ μμ μν΄ μ νλ¨μ λ°λΌ, 보μ ν΅μ μμ² μ νΈ μ μ‘μ μν λ°μ μμ λ³ΈμΈ μΈμ¦μ΄ μ§νλλ€(S301). μ΄λ, λ°μ μ λ¨λ§(1) λ΄μ ꡬλΉλ μ체 μΈμ μλ¨ λλ ν¨μ€μλ μ
λ ₯ μλ¨μ ν΅ν΄ μμ±λλ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°κ° λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(110)μ μ μ‘λ μ μλ€.Referring to FIG. 3, first, a receiver is selected by a sender on a contact application that can be executed on the sender terminal 1, and as the secure communication request area displayed on the profile screen of the receiver is selected by the sender, a secure communication request is made. The sender's identity authentication for signal transmission is performed (S301). At this time, the caller ID data generated through the biometric means or the password input means provided in the caller terminal 1 may be transmitted to the caller ID
*κ·Έ λ€μ, 보μ ν΅μ μ€κ°λΆ(150)μμ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(110)λ₯Ό ν΅ν΄ μμ λ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°κ° κΈ° μ μ₯λ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°μ μΌμΉνλμ§ μ¬λΆλ₯Ό νμΈν¨μΌλ‘μ¨ λ°μ μ λ³ΈμΈ μΈμ¦μ νμΈνκ² λλ€(S302).* Then, the caller identity verification is confirmed by checking whether the caller identity authentication data received through the caller identity
λ§μ½, λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(110)λ₯Ό ν΅ν΄ μμ λ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°κ° κΈ° μ μ₯λ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°μ μΌμΉνλ κ²½μ°, 보μ ν΅μ μμ² μ νΈ μ μ‘λΆ(120)μμ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°λ₯Ό κΈ°λ°μΌλ‘ νμ¬ λ°μ μ μλ³ μμ΄λλ₯Ό μμ±νκ³ , μμ±λ λ°μ μ μλ³ μμ΄λλ₯Ό 보μ ν΅μ μμ² μ νΈ λ΄μ ν¬ν¨μμΌ μμ μ λ¨λ§(2)μ μ μ‘νκ² λλ€(S303).If the caller identity data received through the caller identity
κ·Έ λ€μ, μμ μ λ¨λ§(2)μ νλ©΄ μμ 보μ ν΅μ μμ² μ νΈμ λμνλ 보μ ν΅μ μλ¦Ό λ° λ°μ μ μλ³ μμ΄λκ° νμλκ³ (S304), μμ μκ° μ΄λ₯Ό νμΈν ν 보μ ν΅μ μ κ°μνκ³ μ νλ κ²½μ° μμ μ λ¨λ§(2) λ΄μ ꡬλΉλ μ체 μΈμ μλ¨ λλ ν¨μ€μλ μ
λ ₯ μλ¨μ ν΅ν΄ μμ±λλ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°κ° μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(140)μ μ μ‘λ μ μλ€.Next, a security communication notification and a caller identification ID corresponding to the security communication request signal are displayed on the screen of the receiver terminal 2 (S304), and when the receiver checks this, the receiver terminal 2 is to start secure communication. The receiver identity authentication data generated through the biometric recognition means or the password input means provided therein may be transmitted to the receiver identity
κ·Έ λ€μ, 보μ ν΅μ μ€κ°λΆ(150)μμ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(140)λ₯Ό ν΅ν΄ μμ λ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°κ° κΈ° μ μ₯λ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°μ μΌμΉνλμ§ μ¬λΆλ₯Ό νμΈν¨μΌλ‘μ¨ μμ μ λ³ΈμΈ μΈμ¦μ νμΈνκ² λλ€(S306).Next, the receiver
λ§μ½, μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(140)λ₯Ό ν΅ν΄ μμ λ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°κ° κΈ° μ μ₯λ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°μ μΌμΉνλ κ²½μ°, λ°μ μ λ¨λ§(1) λ° μμ μ λ¨λ§(2) κ°μ 보μ ν΅μ μ΄ μ μμ μΌλ‘ μμ λ° μ’
λ£λλ€(S307).If the receiver identity data received through the receiver
κ·Έ λ€μ, λ°μ μ λ¨λ§(1) λ° μμ μ λ¨λ§(2) κ°μ 보μ ν΅μ μ΄ μ μμ μΌλ‘ μ’
λ£λ ν, 보μ ν΅μ κΈ°λ‘ μμ μ νΈ μ μ‘λΆ(160)μμ λ°μ μ λ¨λ§(1) λ° μμ μ λ¨λ§(2) κ°κ°μ 보μ ν΅μ κΈ°λ‘ μμ μ νΈλ₯Ό μ μ‘νμ¬ λ°μ μ λ¨λ§(1) λ° μμ μ λ¨λ§(2) κ°κ°μμ μ€νλλ ν΅μ κΈ°λ‘ μ΄ν리μΌμ΄μ
μμμ 보μ ν΅μ κΈ°λ‘μ΄ μλμΌλ‘ μμ λλλ‘ νλ€(S308).Then, after the secure communication between the sender terminal 1 and the receiver terminal 2 is normally terminated, the secure communication record deleting
λ§μ½, λ¨κ³ S302μμ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(110)λ₯Ό ν΅ν΄ μμ λ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°κ° κΈ° μ μ₯λ λ°μ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°μ μΌμΉνμ§ μλ κ²½μ°, 보μ ν΅μ μ€κ°λΆ(150)μμ λ°μ μ λ¨λ§(1)μ νλ©΄ μμ 보μ ν΅μ μμ² λΆκ° μλ¦Όμ΄ νμλλλ‘ νκ³ (S309), κ²°κ³Όμ μΌλ‘ λ°μ μ λ¨λ§(1) λ° μμ μ λ¨λ§(2) κ°μ 보μ ν΅μ μ΄ μ’
λ£λλ€(S310).If, in step S302, the caller ID data received through the caller ID
λ§μ½, λ¨κ³ S306μμ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν° μμ λΆ(140)λ₯Ό ν΅ν΄ μμ λ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°κ° κΈ° μ μ₯λ μμ μ λ³ΈμΈ μΈμ¦ λ°μ΄ν°μ μΌμΉνμ§ μλ κ²½μ°, 보μ ν΅μ μ€κ°λΆ(150)μμ μμ μ λ¨λ§(2)μ νλ©΄ μμ 보μ ν΅μ λΆκ° μλ¦Όμ΄ νμλλλ‘ νκ³ (S311), κ²°κ³Όμ μΌλ‘ λ°μ μ λ¨λ§(1) λ° μμ μ λ¨λ§(2) κ°μ 보μ ν΅μ μ΄ μ’
λ£λλ€(S312).If, in step S306, the recipient ID data received through the recipient ID
μ΄ν΄λ³Έ λ°μ κ°μ΄, λ³Έ λ°λͺ μ λ°λ₯Έ μ체 μΈμμ ν΅ν 보μ ν΅μ μμ€ν μ μ체 μΈμ μλ¨ λλ ν¨μ€μλ μ λ ₯ μλ¨μ ν΅ν΄ λ°μ μ λ° μμ μ μμΈ‘μ λ³ΈμΈ μΈμ¦μ΄ λͺ¨λ μλ£λ μνμμλ§ λ°μ μ λ¨λ§(1) λ° μμ μ λ¨λ§(2)μ 보μ ν΅μ μ΄ κ°μλλλ‘ ν¨μΌλ‘μ¨, λ°μ μ λ³ΈμΈ μΈμ¦ μ μ°¨λ₯Ό ν΅ν΄ 1μ°¨μ μΌλ‘ λ°μ μμ κ°μΈμ 보λ₯Ό 보νΈνκ³ μμ μ λ³ΈμΈ μΈμ¦ μ μ°¨λ₯Ό ν΅ν΄ 2μ°¨μ μΌλ‘ μμ μμ κ°μΈμ 보λ₯Ό 보νΈν μ μκ³ , λν 보μ ν΅μ μ΄ μ’ λ£λ ν λ°μ μ λ¨λ§(1) λ° μμ μ λ¨λ§(2) κ°κ°μμ μ€νλλ ν΅μ κΈ°λ‘ μ΄ν리μΌμ΄μ μμμ 보μ ν΅μ κΈ°λ‘μ΄ μλμΌλ‘ μμ λλλ‘ ν¨μΌλ‘μ¨, νμΈμκ² ν΅μ κΈ°λ‘μ΄ λ ΈμΆλλ κ²μ λ°©μ§ν μ μμΌλ©°, νΉν μμ μ λ¨λ§(2)μ νλ©΄ μμ 보μ μΈμ¦μ κ±°μΉ λ°μ μ μλ³ μμ΄λλ§μ΄ νμλκΈ° λλ¬Έμ νμΈμκ² λ³΄μ ν΅μ μλ¦Ό νλ©΄μ΄ λ ΈμΆλλλΌλ μμ μ μΈμλ ν΄λΉ λ°μ μκ° λꡬμΈμ§ μ μ μλ€λ μ₯μ μ κ°μ§λ€.As described above, in the secure communication system through biometrics according to the present invention, the security of the sender terminal 1 and the receiver terminal 2 is secured only when both of the sender and the receiver have been authenticated through the biometric means or the password input means. By allowing the communication to be initiated, the sender's identity can be primarily protected by the sender's identity and the receiver's personality can be protected by the receiver's identity. By automatically deleting the secure communication record on the communication recording application executed in each of (1) and the receiver terminal 2, it is possible to prevent the communication record from being exposed to others, in particular on the screen of the receiver terminal 2 Secure communication notification screen to others because only the caller identification ID with security authentication is displayed. Even if this is exposed, it has the advantage of not knowing who the sender is except the recipient.
μκΈ°μμλ λ³Έ λ°λͺ μ λ°λμ§ν μ€μμλ₯Ό μ°Έμ‘°νμ¬ μ€λͺ νμμ§λ§, ν΄λΉ κΈ°μ λΆμΌμ μλ ¨λ λΉμ μλ νκΈ°μ νΉν μ²κ΅¬μ λ²μμ κΈ°μ¬λ λ³Έ λ°λͺ μ μ¬μ λ° μμμΌλ‘λΆν° λ²μ΄λμ§ μλ λ²μ λ΄μμ λ³Έ λ°λͺ μ λ€μνκ² μμ λ° λ³κ²½μν¬ μ μμμ μ΄ν΄ν μ μμ κ²μ΄λ€.Although described above with reference to a preferred embodiment of the present invention, those skilled in the art will be variously modified and changed within the scope of the invention without departing from the spirit and scope of the invention described in the claims below I can understand that you can.
Claims (16)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR10-2015-0154102 | 2015-11-03 | ||
| KR1020150154102A KR101718368B1 (en) | 2015-11-03 | 2015-11-03 | System and method of a security communication using biometrics |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2017078358A1 true WO2017078358A1 (en) | 2017-05-11 |
Family
ID=58502275
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/KR2016/012423 Ceased WO2017078358A1 (en) | 2015-11-03 | 2016-11-01 | Security communication system and method using biometrics |
Country Status (2)
| Country | Link |
|---|---|
| KR (1) | KR101718368B1 (en) |
| WO (1) | WO2017078358A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20210385098A1 (en) * | 2016-07-13 | 2021-12-09 | Vocal Power-House Systems, LLC | Responsive communication system |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR102335892B1 (en) * | 2019-10-28 | 2021-12-07 | λΈλ£¨μΉ©μ¨μ€μμ€ μ£Όμνμ¬ | Method for identifying user using sound and apparatus therefor |
| WO2024122678A1 (en) * | 2022-12-08 | 2024-06-13 | λ ΈνμΉ | Method for communicating by matching qr code |
| KR102798606B1 (en) * | 2023-11-21 | 2025-04-22 | μ£Όμνμ¬ λ루μμ΄ | Single sign-on service server |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20050032749A (en) * | 2003-10-02 | 2005-04-08 | μ£Όμνμ¬ ν¬ν | Sms security system and security method of mobile station |
| KR20060062916A (en) * | 2004-12-06 | 2006-06-12 | νκ΅μ μν΅μ μ°κ΅¬μ | Caller Identification, Billing Method, and Billing System in Internet Phones |
| KR100644206B1 (en) * | 2005-07-12 | 2006-11-10 | (μ£Ό) μμ§ν λ μ½€ | How to send and receive interactive short messages |
| KR20090014028A (en) * | 2007-08-03 | 2009-02-06 | κΉνλ΄ | Apparatus and method for providing secure communication and recording media recording the program |
| KR20100031162A (en) * | 2008-09-12 | 2010-03-22 | μ£Όμνμ¬ μΌμ΄ν° | Method for providing message service in mobile communication network and system thereof |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR101083462B1 (en) | 2009-11-24 | 2011-11-16 | μμΈμ | Receiving information management method, privacy setting method and privacy protection service method of mobile communication terminal |
-
2015
- 2015-11-03 KR KR1020150154102A patent/KR101718368B1/en not_active Expired - Fee Related
-
2016
- 2016-11-01 WO PCT/KR2016/012423 patent/WO2017078358A1/en not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20050032749A (en) * | 2003-10-02 | 2005-04-08 | μ£Όμνμ¬ ν¬ν | Sms security system and security method of mobile station |
| KR20060062916A (en) * | 2004-12-06 | 2006-06-12 | νκ΅μ μν΅μ μ°κ΅¬μ | Caller Identification, Billing Method, and Billing System in Internet Phones |
| KR100644206B1 (en) * | 2005-07-12 | 2006-11-10 | (μ£Ό) μμ§ν λ μ½€ | How to send and receive interactive short messages |
| KR20090014028A (en) * | 2007-08-03 | 2009-02-06 | κΉνλ΄ | Apparatus and method for providing secure communication and recording media recording the program |
| KR20100031162A (en) * | 2008-09-12 | 2010-03-22 | μ£Όμνμ¬ μΌμ΄ν° | Method for providing message service in mobile communication network and system thereof |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20210385098A1 (en) * | 2016-07-13 | 2021-12-09 | Vocal Power-House Systems, LLC | Responsive communication system |
Also Published As
| Publication number | Publication date |
|---|---|
| KR101718368B1 (en) | 2017-03-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN103098452B (en) | Mobile terminal, remote operating system, the data sending control method of mobile terminal and non-emporary computer-readable medium | |
| WO2018030707A1 (en) | Authentication system and method, and user equipment, authentication server, and service server for performing same method | |
| WO2013157864A1 (en) | Method for authenticating user using icon combined with input pattern, and password input device | |
| WO2013141602A1 (en) | Authentication method and system for same | |
| WO2017078358A1 (en) | Security communication system and method using biometrics | |
| WO2020096262A1 (en) | Electronic device, method for providing personal information using same, and computer-readable recording medium for recording same | |
| WO2013111992A1 (en) | System and method for preventing abuse of emergency calls placed using smartphone | |
| WO2016085062A1 (en) | Authentication method using nfc authentication card | |
| WO2014175642A1 (en) | Identity authentication system capable of non-repudiation and method for providing same | |
| CN106231115A (en) | A kind of information protecting method and terminal | |
| WO2017065576A1 (en) | User authentication method and system, which use variable keypad | |
| WO2019045540A1 (en) | Social media providing method and system using division function | |
| WO2014200163A1 (en) | Information encryption system and information encryption method using optical character recognition | |
| WO2018128237A1 (en) | Identity authentication system and user equipment utilizing user usage pattern analysis | |
| CN111327752B (en) | Call processing method, device, communication system and storage medium | |
| WO2018169150A1 (en) | Locked screen-based user authentication system and method | |
| WO2017052277A1 (en) | Method and system for authenticating identity using variable keypad | |
| WO2017217808A1 (en) | Mobile authentication method and system therefor | |
| WO2018151392A1 (en) | Smart login method using messenger service and apparatus therefor | |
| WO2012074275A2 (en) | User authentication apparatus for internet security, user authentication method for internet security, and recorded medium recording same | |
| WO2014163420A1 (en) | Identity certification system and method for providing same | |
| WO2013042891A1 (en) | Emergency call service and online/offline banking security system using smartphone authenticaltion and method for same | |
| JP7544145B2 (en) | Information processing device, information processing method, and program | |
| WO2011074878A2 (en) | Service security system and method for same | |
| WO2017195990A1 (en) | Method for providing two-channel otp authentication service by using sound wave signal, and authentication system for implementing same |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16862374 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 30.08.2018) |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 16862374 Country of ref document: EP Kind code of ref document: A1 |