Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication terminal, authentication device and authentication method and system using authentication terminal and authentication device

A technology of authentication system and authentication method, which is applied in the direction of transmission system, digital transmission system, digital data authentication, etc., can solve the problems of account theft, time-consuming and cumbersome, leakage of authentication-related information responsibility, etc., to achieve high stability and authentication The process is quick and the possibility of customer information leakage is low

Pending Publication Date: 2020-04-10
尹泰植
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the above-mentioned known authentication process is to verify the identity by entering the password of the electronic certificate. Since the certificate can be copied from the medium storing the electronic certificate, as long as the password is leaked, the account may be stolen
[0006] In view of the above, for important services such as money transfers, financial institutions provide customers with the following method that can reduce the risk of theft. After the user enters the account password from the money transfer screen, and then performs additional authentication, for example, prepare a double authentication device (insert a security card, or Enter the number through a one-time password generator (OTP, One Time Password), or phone authentication), but this authentication method has the risk of passing the responsibility of leaking authentication-related information to the user
In addition, once the OTP device is lost, it is foreseeable that an accident will occur, and the risk of authentication-related information such as electronic certificates stored in the user's portable storage device or computer hard disk will be stolen.
[0007] On the other hand, from the standpoint of the user, there are the following problems, due to the failure to obtain quick authentication, it is time-consuming and cumbersome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication terminal, authentication device and authentication method and system using authentication terminal and authentication device
  • Authentication terminal, authentication device and authentication method and system using authentication terminal and authentication device
  • Authentication terminal, authentication device and authentication method and system using authentication terminal and authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The authentication terminal, the authentication server, and the authentication method using them in the embodiments of the present invention will be described in detail below with reference to the accompanying drawings. The advantages, features and methods for realizing the present invention can be clarified by referring to the accompanying drawings in combination with the embodiments described in detail below.

[0055] However, the present invention is not limited to the embodiments disclosed below, and various implementation forms are possible. The embodiments of the present invention are only to make the disclosure of the present invention complete, and to inform those skilled in the art that the present invention belongs to the scope of the present invention , the present invention is limited only by the scope of the claims.

[0056] figure 1 is a conceptual diagram schematically showing the overall structure of the authentication system according to the embodiment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to an authentication terminal, an authentication device and an authentication method using the authentication terminal and the authentication device, and relates to a device and a method for authenticating a user and allowing a transaction by means of the transfer of information among a user terminal, an authentication terminal and an authentication device.

Description

technical field [0001] The present invention relates to authentication terminals, authentication devices, and authentication methods and systems using these, and more particularly, to devices and methods for authenticating users and authorizing transactions by transmitting information between user terminals, authentication terminals, and authentication devices. Background technique [0002] Recently, a financial transaction service method using a portable personal wireless communication device including an authentication method using the portable personal wireless communication device has been developed, and due to the development of wireless Internet technology, the usage of the portable personal wireless communication device is showing a significant increase trend. Therefore, it can be said that the importance of confidentiality and authentication of portable personal wireless communication devices is much more important than when they were only used for communication in t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/44G06F21/45G06K9/00H04L12/58H04L29/06
CPCG06F21/32H04L9/0869H04L9/3231G06F21/35H04L9/0841G06Q40/02G06Q20/40145H04L9/0861H04L9/3271H04L2209/56H04L2209/80H04L63/0861H04W12/06H04L63/0853G06Q20/401G06Q30/06G06V40/12G06F21/445G06F21/45H04L51/02H04L9/30
Inventor 尹泰植
Owner 尹泰植