Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User authentication method having strengthened integrity and security

A user authentication and user technology, which is applied in the field of user authentication with enhanced integrity and security, and can solve the problems of inconvenient management, inconvenience, and the inability of users to arbitrarily replace OTP devices.

Active Publication Date: 2018-01-05
SSENSTONE INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when a user trades with multiple financial institutions, it is necessary to have multiple OTP authentication devices provided by each financial institution. Therefore, consumers need to separately purchase OTP authentication devices from each financial institution, and there is a need to hold multiple OTP authentication devices. Inconvenience of the authentication device, and the inconvenience of having to search for an authentication device for a specific financial institution one by one among multiple OTP authentication devices
[0005] In addition, since the user cannot change the inherent key of the OTP device at will, when the OTP device is lost, it is necessary to directly visit the financial institution and obtain the issuance again, which is more inconvenient
In addition, when the unique key of the customer's OTP device is leaked, there is a problem that financial institutions need to spend a lot of money and time to reissue OTP devices to all customers.
[0006] On the other hand, when the user authenticates or logs in with a specified password, the relevant server needs to log in, store and manage the user's password. From the user's perspective, it is necessary to recognize the password and require regular changes to prevent leakage. Therefore, there is a problem of inconvenient management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method having strengthened integrity and security
  • User authentication method having strengthened integrity and security
  • User authentication method having strengthened integrity and security

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0098] In the case of the first embodiment of the present invention, in the same manner as the first common authentication key is generated, the personal password input by the user may be added as a constituent element required for generating the second common authentication key.

[0099] That is, the personal password and the mechanical unique key of the user terminal 100 are combined, and the first transformation using the one-way function 110 is performed to generate a second common authentication key S112.

[0100] The one-way function 110 can use the same function as the one-way function for generating the first common authentication key, can be applied in the same way.

[0101] The second common authentication key may be generated in the same way as the first common authentication key, and by using the personal password and the mechanical inherent key of the user terminal 100 as constituent elements, according to a predetermined The calculation key generated based on the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a user authentication method having strengthened integrity and security, the user authentication method according to the present invention comprising: a first step for, when a user registration process begins, a user terminal generating a first common authentication key by executing a primary transformation, and providing the first common authentication key, encrypted by executing a secondary transformation, to an authentication server, and the authentication server registering the encrypted first common authentication key; a second step for the authenticationserver generating a first server authentication key, and generating a first server authentication data by means of an OTP arithmetic operation on the first server authentication key; a third step for,when an authentication process begins, the user terminal generating a second common authentication key by executing a primary transformation, and then generating an encrypted second common authentication key by executing a secondary transformation, and generating a first user authentication key and generating a first user authentication data by means of an OTP arithmetic operation on the first user authentication key; and a fourth step for authenticating a user in accordance with whether the first server authentication data and first user authentication data match, or for authenticating the authentication server by determining the authenticity of the authentication server.

Description

technical field [0001] The present invention relates to a user authentication method that strengthens integrity and security, and more specifically, relates to a method that cuts off personal information leakage from the source on an open network, avoids the danger of hacker attacks, strengthens security, and can verify transmitted data Integrity, user authentication method with enhanced integrity and security User authentication method. Background technique [0002] In modern society, compared with face-to-face contact, financial transactions through an online environment or businesses requiring various user authentications are becoming common. Compared with face-to-face contact, online user authentication needs to be accessed more carefully. In most cases, various security programs or control programs including ActiveX and keyboard security programs are required to be installed in user terminals, and electronic certificates or security cards, OTP devices and other securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32G06F21/31H04L9/08
CPCG06F21/31H04L9/08H04L9/32H04L9/0822H04L9/0872H04L9/3228
Inventor 刘昌训许云宁金珉奎徐佑蓉
Owner SSENSTONE INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products