System for preventing smudge and shoulder surfing attacks on mobile device and user pattern authentication method

An authentication method and pattern technology, which is applied in the field of system and user pattern authentication for preventing stain and peeping attacks on mobile devices, can solve problems such as attacks, and achieve the effect of defending against stains and peeping attacks

Pending Publication Date: 2020-04-21
意外而株式会社
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The commonly used authentication method using user input pattern on mobile devices has the advantages of simplicity, but it is easy to be attacked by shoulder-peeping hackers (over-the-shoulder peeping, surveillance video, CCTV video)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System for preventing smudge and shoulder surfing attacks on mobile device and user pattern authentication method
  • System for preventing smudge and shoulder surfing attacks on mobile device and user pattern authentication method
  • System for preventing smudge and shoulder surfing attacks on mobile device and user pattern authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The specific structural or functional descriptions of the embodiments according to the concept of the present invention disclosed in this specification are only examples for illustrating the embodiments according to the concept of the present invention, therefore, the embodiments according to the concept of the present invention can be various Embodiments are not limited to the examples described in this specification.

[0018] Embodiments according to the concept of the present invention can be variously modified and have various forms, and therefore, the embodiments are illustrated in the drawings and described in detail in this specification. However, it is not intended to limit the embodiment of the concept of the present invention to a specific disclosed form, and includes all changes, equivalents, and substitutes included in the concept and technical scope of the present invention.

[0019] The terms used in this specification are for describing specific embodimen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a pattern authentication method for preventing smudge and shoulder surfing attacks, the method comprising a pattern registration step and a pattern authentication step, wherein the pattern registration step comprises the steps of: by an input unit of a pattern authentication device, receiving a pattern from a user; by a matching unit, matching a code value corresponding to the pattern being received from the user and storing the code value in a storage unit; and by a key derivation ID (KDI) generator, generating a user key derivation ID (KDI) by matching the code value with a quantum random number table comprising quantum random numbers generated by a quantum random-number generator.

Description

technical field [0001] The present invention relates to a pattern authentication method for preventing stains and peeps of mobile devices. In particular, it relates to a user pattern authentication method that combines an event of touching a specific area of ​​a mobile device and a user pattern input to prevent smudge and peeping attacks. Background technique [0002] With the popularization of the use of mobile devices, attention to techniques for preventing leakage of personal information has also increased. Although the commonly used authentication method utilizing user input pattern on mobile devices has the advantage of simplicity, it is easily attacked by the shoulder-peeping hacker type (over-the-shoulder peeping, surveillance video, CCTV video recording). Registered Patent No. 10-1700799 (Method of User Terminal with Shoulder Peeking Prevention Function) discloses a method of judging the user's gaze area and non-gazing area and recombining the corresponding characte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36G06F3/041
CPCG06F21/36G06F3/04883G06F3/041G06F3/0488
Inventor 白政铉赵诚畯郑富硕南大铉徐康元
Owner 意外而株式会社
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products