WO2018128237A1 - Identity authentication system and user equipment utilizing user usage pattern analysis - Google Patents
Identity authentication system and user equipment utilizing user usage pattern analysis Download PDFInfo
- Publication number
- WO2018128237A1 WO2018128237A1 PCT/KR2017/007955 KR2017007955W WO2018128237A1 WO 2018128237 A1 WO2018128237 A1 WO 2018128237A1 KR 2017007955 W KR2017007955 W KR 2017007955W WO 2018128237 A1 WO2018128237 A1 WO 2018128237A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- authentication
- message
- user terminal
- usage pattern
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORYย PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/26—Speech to text systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/725—Cordless telephones
Definitions
- the present invention relates to a user authentication system and a user terminal using analysis of a usage pattern of a user.
- Korean Patent Laid-Open No. 10-2015-0096063 discloses an authentication apparatus and method based on a digital signature.
- the present invention is determined to be in possession of the person as usual, and lowers the level of authentication. It is to provide a user authentication system and a user terminal utilizing analysis of a user's usage pattern that can secure the improved accuracy with the ease of authentication.
- a usage pattern collecting unit for collecting a usage pattern for the user terminal of the user;
- a usage pattern analyzer for analyzing whether the usage pattern is normal or not;
- an authentication user terminal using an analysis of a usage pattern of a user including an authentication level adjustment unit for adjusting an authentication level, is provided.
- the usage pattern relates to the location of the user terminal, and at the specific time point, the usage pattern analysis unit according to a result of comparing at least one of GPS information of the user terminal and identification information of the Wi-Fi router connected to the user terminal. It is possible to determine whether it is normal.
- the usage pattern relates to the call history through the user terminal, and primarily determines whether the use pattern analysis unit is normal according to a result of analyzing the call counterpart and the call time, and if necessary, According to a result of whether or not the result of STT conversion of the voice includes the designated follow-up for the user, the use pattern analyzer may determine whether it is normal.
- the usage pattern relates to the details of SNS usage, and primarily determines whether the usage pattern analysis unit is normal according to a result of analyzing the SNS chat partner and the chat time, and if necessary, a specific emoticon designated for the user.
- the pattern analysis unit may determine whether the input pattern is normal by analyzing the input deleted by the backspace when the backspace is input or when the character is input. have.
- the usage pattern may include at least one of a location of the user terminal, a call history through the user terminal, an SNS usage history, and an application occupancy rate of the application, and the usage pattern analyzer may determine whether it is normal through an OR condition calculation. .
- the authentication level adjusting unit may set the authentication level relatively low when the usage pattern is analyzed as normal, and set the authentication level relatively high when the usage pattern is analyzed as abnormal.
- the authentication level adjustment unit may include a message transmission unit for transmitting the authentication level adjusted in the form of a message.
- the apparatus may further include a key registration unit that registers a private key paired with a public key to be registered in a message authentication server to the user terminal, wherein the message transmission unit encrypts the authentication level message with the private key and transmits the private key to the web server.
- a user terminal for collecting and analyzing a user's usage pattern and transmitting a user authentication level message encrypted with a private key of the authentication level adjusted according to whether the usage pattern is normal;
- a web server configured to receive the encrypted identity authentication level message and perform login for each level according to the identity authentication level included in the identity authentication level message only when message authentication of the identity authentication level message is successful;
- a public key corresponding to the private key is registered, decrypts the encrypted user authentication level message with the public key according to a message authentication request from the web server, performs message authentication, and transmits an authentication result to the web server.
- a user authentication system utilizing a user pattern analysis, including a message authentication server.
- the message authentication server may transmit a message authentication success as the authentication result when the decryption is successful with the public key, and transmit a message authentication failure as the authentication result when decryption with the public key fails.
- the message authentication server may transmit the decrypted identity authentication message to the web server in the case of successful message authentication.
- the web server may log in by checking only n items, such as handwritten signature, iris recognition, fingerprint authentication, and password input, corresponding to the user authentication level.
- a user terminal such as a smart phone
- a level of authentication of the person if it is the same as usual, it is determined as the possession state of the user and lowers the level of authentication of the person, and if it is different from the usual, Increasing the level of authentication has the effect of simplifying identity verification and ensuring improved accuracy.
- FIG. 1 is a schematic configuration block diagram of a user terminal for user authentication using analysis of a user's usage pattern according to an embodiment of the present invention
- FIG. 2 is a flow chart of a user authentication method performed in the user terminal of FIG.
- FIG. 3 is a schematic block diagram of a user authentication system using a user pattern analysis according to an embodiment of the present invention and a flow chart of a user authentication method;
- FIG. 4 is a schematic structural block diagram of a financial server included in a personal authentication system
- FIG. 5 is a schematic structural block diagram of a message authentication server included in a user authentication system.
- first and second may be used to describe various components, but the components should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.
- FIG. 1 is a schematic block diagram of a user terminal for user authentication using analysis of a usage pattern of a user according to an embodiment of the present invention
- FIG. 2 is a flowchart of a user authentication method performed in the user terminal of FIG. .
- the user terminal 100 for the user authentication using the analysis of the use pattern of the user collects and analyzes the use pattern of the user to determine whether the user possesses the user according to the degree similar to the pattern normally used by the user. It is characterized in that it is possible to adjust the level of identity authentication in the situation where the identity verification is required.
- the user terminal 100 for identity verification includes a usage pattern collector 110, a usage pattern analyzer 120, and an authentication level adjuster 130.
- the use pattern collector 110, the use pattern analyzer 120, and the authentication level adjuster 130 may be implemented as software in an application form installed in the user terminal 100 such as a smartphone.
- the usage pattern collecting unit 110 collects information on the usage pattern of the user using the user terminal 100 (step S10).
- the usage pattern collection may be limited to within a predetermined time (for example, 3 hours) from the present time. This is because there may be difficulty in grasping the latest state of the user terminal 100 by information collected in the past despite the change in the recent state of the user terminal 100 due to loss or the like.
- the collection time of the usage pattern may be variously set according to at least one of a user attribute such as an age, a place of residence, and the like of the usage pattern.
- the usage pattern to be collected may include at least one of location information of the user terminal, call information through the user terminal, social network service (SNS) usage information using the user terminal, and application usage share.
- SNS social network service
- the usage pattern analyzer 120 analyzes the usage patterns collected by the usage pattern collector 110 to determine whether they are normal (step S15).
- the normal usage pattern means that the usage pattern is expected to be performed by a user designated for the user terminal 100.
- the analysis when the usage pattern is location information of the user terminal is as follows.
- the designated user has the corresponding user terminal 100, it is determined whether the user terminal 100 is located at the location where the user is expected to be present.
- the main location of the user is a home and a company
- the location information collected by the user terminal 100 is a home or a company set for the user, it is determined to be normal. It may be determined that the usage pattern of the user terminal is abnormal.
- the location information of the user terminal may be used for analysis in association with time information. For example, if the location set for the user is a home or a company, the usage pattern is normal only when the user terminal is located at or near the company if the workday is a weekday (for example, 9:00 AM to 18:00 AM). If the location of the user terminal is at home despite the working hours on weekdays, it may be determined that the usage pattern is abnormal.
- the location information of the user terminal used to analyze the usage pattern may be a GPS value.
- the usage pattern collector 110 may obtain location information of the user terminal from a GPS module separately provided in the user terminal 100.
- the location information of the user terminal may be identification information of the Wi-Fi router connected to the corresponding user terminal 100.
- the GPS value described above indicates the correct location when the user terminal 100 is located outdoors, but cannot be utilized because the GPS signal is not received when the user terminal 100 is located outdoors. Therefore, it is possible to utilize the Wi-Fi (WiFi) communication that is used a lot in the user terminal 100, such as a smart phone.
- the user terminal In order to perform Wi-Fi communication, the user terminal needs to access a Wi-Fi router installed at an arbitrary location in the room, and the Wi-Fi router to be connected has identification information (eg, a Mac address) that can be distinguished from other Wi-Fi routers.
- identification information eg, a Mac address
- the identification information of the Wi-Fi router which is currently connected to the user terminal is one of the identification information of the Wi-Fi router having a previously accessed history registered in the database, it may be determined that the usage pattern of the user terminal is normal.
- the identification information of the currently connected Wi-Fi router is compared with the identification information of the previously-connected Wi-Fi router registered in the database, when there is no identical information, the place where the user terminal has not been previously located As seen from, it may be determined that the usage pattern of the user terminal is abnormal.
- the frequency of the call is designated by the user, or according to the result of analyzing the past history, the top few persons having a large number of calls may be set as a reference for determining the normal pattern when analyzing the usage pattern.
- STT speech to text
- Corresponding to a user is not only a keyword that is important for conversation through analysis of past call history registered in the database, but a distinctive feature that frequently appears more than a predetermined number of times for the user (e.g. ',' Ah ', etc.).
- the usage pattern of the user terminal is normal by analyzing who the SNS counterpart is and when the chat time is performed when chatting through the user terminal. . Based on the past history registered in the database, it may be determined whether the usage pattern is normal according to whether the person frequently chats at a predetermined threshold or more, or whether the chat time with the corresponding party is a normal chat time. .
- the deleted previous input is included in the typo data registered in the database corresponding to the user, it may be determined that the usage pattern of the user terminal is normal.
- the typo data may be a result of collecting a previous input deleted for a predetermined period of time according to the backspace input. This is based on the character input result that is frequently different for each user in the character input process.
- the usage pattern of the user terminal is normal when the user share has a similarity or more than a predetermined ratio. For example, applications that are frequently used for each user may be different, and even if the same applications are used, the usage time for each application may be different according to the user's inclination. Therefore, it is possible to estimate the propensity for the user of the user terminal from the type of applications used and the usage occupancy in recent years.
- the usage pattern analyzer 120 may be used as a usage pattern for analyzing at least one of the above-described location of the user terminal, call history through the user terminal, SNS usage history, and usage share of the application. It is possible to determine whether it is normal through OR condition operation. That is, if at least one of the usage patterns is determined to be a normal pattern, the current user terminal is considered to be possessed by a normal user. This is because even a true user cannot satisfy a normal condition (a threshold value for making a normal pattern) at every moment, and if any one of the usage patterns satisfies the normal condition, it is sufficient to be determined as a true user.
- a normal condition a threshold value for making a normal pattern
- the authentication level adjusting unit 130 may adjust the authentication level according to the result analyzed by the use pattern analyzer 120.
- the authentication level is set relatively low (step S20). If the usage pattern is analyzed to be abnormal, the authentication level is set relatively high (step S25).
- the low level of identity verification means that if identity verification is required when running a particular application or performing a specific action within an application, it means that the identity verification requirements have been relaxed. For example, when there is a handwritten signature, iris recognition, fingerprint authentication, password input, etc. as a requirement for identity verification for financial transactions, the identity verification may be performed by checking only n or less of them.
- a high level of identity means that the identity verification requirement has been strengthened to verify at least n of the multiple identity requirements described above.
- the identity level adjusted by the authentication level adjusting unit 130 may be provided as an API (application platform interface).
- the authentication level may be transmitted in the form of a message to a web server such as a financial server to be described later.
- the usage pattern collector 110 may process the collected usage patterns into a data format that is easy to analyze.
- the usage pattern collected by the usage pattern collector 110 may be stored in a database and used as a past history for future usage pattern analysis.
- the usage pattern collector 110 may be activated and operate from time to time whenever the usage pattern occurs.
- the use pattern analysis unit 120 and the authentication level adjusting unit 130 may be activated and operate only when identity authentication is required.
- Smartphone users usually listen to music using the music app from 8:00 to 9 o'clock, and analyze the patterns such as socializing with friends during lunchtime, and suddenly use an app that they do not use. Or, if you see an abnormal pattern such as not using the music app at work, if you need to verify your identity, such as mobile banking by the judgment that you may not be able to use a stronger authentication means, but the pattern of the user In this case, you can finish the authentication by simple login.
- FIG. 3 is a schematic block diagram of a user authentication system utilizing a user pattern analysis according to an embodiment of the present invention and a flow chart of a user authentication method
- FIG. 4 is a schematic diagram of a financial server included in a user authentication system
- 5 is a schematic block diagram of a message authentication server included in an identity authentication system.
- the user authentication system 1 utilizing the user pattern analysis uses the user authentication level required for login in a web server such as a financial server using the user authentication level message transmitted from the user terminal described above. It can apply differently according to a pattern. In this process, authentication of the authentication level message is additionally performed through message authentication through the message authentication server, thereby preventing errors in authentication due to possible problems such as hacking in the message transmission process.
- the identity authentication system 1 includes a user terminal 100, a message authentication server 300, and a web server 200.
- the user terminal 100 has been described with reference to FIG. 1 and may further include a key register 140 and a message transmitter 150 which are additional components for message transmission.
- the web server 200 includes a message receiver 210, an authentication requester 220, an authentication result receiver 230, and a login performer 240 for each level.
- the message authentication server 300 includes a public key register 310. , The request receiving unit 320, the message authenticating unit 330, and the authentication result transmitting unit 340.
- the key registration unit 140 generates and registers a paired private key and public key for security in the process of transmitting the authentication level adjusted by the authentication level adjusting unit 130 in the form of a message.
- the private key generated by the key registration unit 140 is registered in the security area of the user terminal 100, and the public key is transmitted to the message authentication server 300, and the public key registration unit 310 in the message authentication server 300. It is registered (step S50).
- the message transmitter 150 transmits the user authentication level adjusted by the authentication level adjusting unit 130 in the form of a message in order to deliver it to the web server 200 (step S55).
- the message transmission unit 150 may encrypt and transmit the authentication level message using the private key registered in the key registration unit 140.
- the message receiving unit 210 of the web server 200 receives the identity authentication level message. At this time, the received authentication level message is encrypted with the private key and cannot be decrypted. Therefore, the authentication request unit 220 of the web server 200 requests authentication while transmitting the authentication level message received from the message authentication server 300 (step S60).
- the message authentication request may include a content request for decryption when the message is from a legitimate user terminal.
- the request receiving unit 320 of the message authentication server 300 receives a message authentication request from the authentication requesting unit 220 of the web server 200, and in this case, the message authentication unit 330 performs message authentication (step S65). ).
- the message authentication may be performed by using the public key registered in the message authentication server 300 to determine whether the user authentication level message encrypted with the private key can be decrypted.
- the authentication result transmitter 340 may transmit the authentication result due to the message authentication failure (step S70).
- the authentication result transmitter 340 may transmit the authentication result with the successful message authentication.
- the decrypted identity authentication message can be sent along with the authentication result.
- the authentication result receiver 230 of the web server 200 receives the authentication result from the message authentication server 300. If the received authentication result is a message authentication failure, the authentication level message itself may be regarded as a problem, and the login itself may be impossible.
- If the received authentication result is a message authentication success level login performing unit 240 may be performed to log in by the level according to the decrypted identity authentication level message received with the authentication result (step S75).
- the authentication level is set relatively low, the user can log in through a simple authentication process. If the authentication level is set relatively high, the user can log in only through a stronger authentication process.
- the degree of identity verification procedure for login according to the identity verification level may be set as needed.
- the authentication method according to the present embodiment described above can be embodied as computer readable codes on a computer readable recording medium.
- Computer-readable recording media include all kinds of recording media having data stored thereon that can be decrypted by a computer system. For example, there may be a read only memory (ROM), a random access memory (RAM), a magnetic tape, a magnetic disk, a flash memory, an optical data storage device, and the like.
- the computer readable recording medium can also be distributed over computer systems connected over a computer network, stored and executed as readable code in a distributed fashion.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- Human Computer Interaction (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Multimedia (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- Acoustics & Sound (AREA)
- Software Systems (AREA)
- Telephonic Communication Services (AREA)
- Social Psychology (AREA)
- Computing Systems (AREA)
Abstract
Description
๋ณธ ๋ฐ๋ช ์ ์ฌ์ฉ์์ ์ด์ฉํจํด ๋ถ์์ ํ์ฉํ ๋ณธ์ธ ์ธ์ฆ ์์คํ ๋ฐ ์ฌ์ฉ์ ๋จ๋ง์ ๊ดํ ๊ฒ์ด๋ค.The present invention relates to a user authentication system and a user terminal using analysis of a usage pattern of a user.
์ ์๊ธฐ๊ธฐ ๋ฐ ํต์ ๋ฑ์ IT ๊ธฐ์ ์ ๋ฐ๋ฌ์ ๋ฐ๋ผ ๊ฐ์ข ์ ๋ฌด์ ์ฒ๋ฆฌ๊ฐ ์ ์์ ์ผ๋ก ์ด๋ฃจ์ด์ง๊ณ , ๊ตฌ๋งค, ํ๋งค์ ๊ฐ์ ์๊ฑฐ๋ ๋ฐ ๋ณดํ๊ณ์ฝ, ๊ณ์ข๊ฐ์ค๊ณผ ๊ฐ์ ๊ธ์ต๊ฑฐ๋ ์ญ์ ์ ์์ ์ผ๋ก ์ด๋ฃจ์ด์ง๊ณ ์๋ค. With the development of IT technology such as electronic devices and telecommunications, various business processes are made electronically, and financial transactions such as commerce and insurance contracts and account opening such as purchase and sale are also made electronically.
์ด์ ๋ฐ๋ผ ๋น๋๋ฉด ๋ณธ์ธ ์ธ์ฆ์ ์ํ ๊ฐ์ข ๋ฐฉ๋ฒ๋ค์ด ์ฐ๊ตฌ๋๊ณ ์๋ค. ๊ฐ์ฅ ์ผ๋ฐ์ ์ผ๋ก๋ ID์ ํจ์ค์๋๋ฅผ ์ ๋ ฅํ๋ ๋จ์ํ ๋ฐฉ๋ฒ๋ถํฐ ์ง๋ฌธ, ์ํ์๋ช , ์ผ๊ตด์ธ์ ๋ฑ ๋ค์ํ ์์ฒด ๋ฐ ํ์ ์ธ์ฆ์ ํ์ฉํ ๋ฐฉ๋ฒ๊น์ง ๋ง์ ๋ฐฉ๋ฒ์ด ๋๋๋๊ณ ์๋ค. Accordingly, various methods for non-face-to-face identity verification have been studied. Most commonly, a variety of methods are emerging from simple methods of inputting ID and password to methods utilizing various biometric and behavioral authentication such as fingerprint, handwritten signature, and face recognition.
์ด์ ๊ด๋ จํ์ฌ ํ๊ตญ๊ณต๊ฐํนํ ์ 10-2015-0096063ํธ(๊ณต๊ฐ์ผ 2015.08.24) ์๋ ๋์งํธ ์๋ช ์ ๊ธฐ์ดํ ์ธ์ฆ ์ฅ์น ๋ฐ ๋ฐฉ๋ฒ์ด ๊ฐ์๋์ด ์๋ค. In this regard, Korean Patent Laid-Open No. 10-2015-0096063 (published Aug. 24, 2015) discloses an authentication apparatus and method based on a digital signature.
๋ณธ ๋ฐ๋ช ์ ์ค๋งํธํฐ๊ณผ ๊ฐ์ ์ฌ์ฉ์ ๋จ๋ง์ ๋ํ ์ด์ฉํจํด์ ๋ถ์ํ ๊ฒฐ๊ณผ์ ๋ฐ๋ผ ํ์์์ ๊ฐ์ผ๋ฉด ๋ณธ์ธ ์์ง ์ํ๋ก ํ์ ํ์ฌ ๋ณธ์ธ ์ธ์ฆ ์์ค์ ๋ฎ์ถ๊ณ , ํ์์์ ๋ค๋ฅด๋ฉด ๋ณธ์ธ ๋ฏธ์์ง ์ํ๋ก ํ์ ํ์ฌ ๋ณธ์ธ ์ธ์ฆ ์์ค์ ๋์ฌ ๋ณธ์ธ ์ธ์ฆ์ ๊ฐํธํ์ ํจ๊ป ํฅ์๋ ์ ํ์ฑ์ ํ๋ณดํ ์ ์๋ ์ฌ์ฉ์์ ์ด์ฉํจํด ๋ถ์์ ํ์ฉํ ๋ณธ์ธ ์ธ์ฆ ์์คํ ๋ฐ ์ฌ์ฉ์ ๋จ๋ง์ ์ ๊ณตํ๊ธฐ ์ํ ๊ฒ์ด๋ค. According to the results of analyzing the usage pattern for the user terminal, such as a smart phone, the present invention is determined to be in possession of the person as usual, and lowers the level of authentication. It is to provide a user authentication system and a user terminal utilizing analysis of a user's usage pattern that can secure the improved accuracy with the ease of authentication.
๋ณธ ๋ฐ๋ช ์ ๋ค๋ฅธ ๋ชฉ์ ๋ค์ ์ดํ์ ์์ ๋๋ ๋ฐ๋์งํ ์ค์์๋ฅผ ํตํ์ฌ ๋ณด๋ค ๋ช ํํด์ง ๊ฒ์ด๋ค.Other objects of the present invention will become more apparent through the preferred embodiments described below.
๋ณธ ๋ฐ๋ช ์ ์ผ ์ธก๋ฉด์ ๋ฐ๋ฅด๋ฉด, ์ฌ์ฉ์์ ์ฌ์ฉ์ ๋จ๋ง์ ๋ํ ์ด์ฉํจํด์ ์์งํ๋ ์ด์ฉํจํด ์์ง๋ถ; ์๊ธฐ ์ด์ฉํจํด์ ๋ถ์ํ์ฌ ์ ์์ธ์ง ์ฌ๋ถ๋ฅผ ํ๋จํ๋ ์ด์ฉํจํด ๋ถ์๋ถ; ์๊ธฐ ํ๋จ ๊ฒฐ๊ณผ์ ๋ฐ๋ผ ๋ณธ์ธ ์ธ์ฆ ์์ค์ ์กฐ์ ํ๋ ์ธ์ฆ์์ค ์กฐ์ ๋ถ๋ฅผ ํฌํจํ๋, ์ฌ์ฉ์์ ์ด์ฉํจํด ๋ถ์์ ํ์ฉํ ๋ณธ์ธ ์ธ์ฆ ์ฌ์ฉ์ ๋จ๋ง์ด ์ ๊ณต๋๋ค. According to an aspect of the present invention, a usage pattern collecting unit for collecting a usage pattern for the user terminal of the user; A usage pattern analyzer for analyzing whether the usage pattern is normal or not; According to the determination result, an authentication user terminal using an analysis of a usage pattern of a user, including an authentication level adjustment unit for adjusting an authentication level, is provided.
์๊ธฐ ์ด์ฉํจํด์ ์๊ธฐ ์ฌ์ฉ์ ๋จ๋ง์ ์์น์ ๊ดํ ๊ฒ์ด๋, ํน์ ์์ ์ ์๊ธฐ ์ฌ์ฉ์ ๋จ๋ง์ GPS ์ ๋ณด ๋ฐ ์๊ธฐ ์ฌ์ฉ์ ๋จ๋ง์ด ์ ์ํ ์์ดํ์ด ๊ณต์ ๊ธฐ์ ์๋ณ ์ ๋ณด ์ค ์ ์ด๋ ํ๋๋ฅผ ๋น๊ตํ ๊ฒฐ๊ณผ์ ๋ฐ๋ผ ์๊ธฐ ์ด์ฉํจํด ๋ถ์๋ถ์์ ์ ์ ์ฌ๋ถ๋ฅผ ํ๋จํ ์ ์๋ค.The usage pattern relates to the location of the user terminal, and at the specific time point, the usage pattern analysis unit according to a result of comparing at least one of GPS information of the user terminal and identification information of the Wi-Fi router connected to the user terminal. It is possible to determine whether it is normal.
์๊ธฐ ์ด์ฉํจํด์ ์๊ธฐ ์ฌ์ฉ์ ๋จ๋ง์ ํตํ ํตํ ๋ด์ญ์ ๊ดํ ๊ฒ์ด๋, 1์ฐจ์ ์ผ๋ก ํตํ ์๋๋ฐฉ ๋ฐ ํตํ์๊ฐ์ ๋ถ์ํ ๊ฒฐ๊ณผ์ ๋ฐ๋ผ ์๊ธฐ ์ด์ฉํจํด ๋ถ์๋ถ์์ ์ ์ ์ฌ๋ถ๋ฅผ ํ๋จํ๋ฉฐ, ํ์์ ๋ฐ๋ผ ์๊ธฐ ํตํ ๋ด์ญ์ ๋ํ ์์ฑ์ STT ๋ณํํ ๊ฒฐ๊ณผ์ ๋ํด ์๊ธฐ ์ฌ์ฉ์์ ๋ํด ์ง์ ๋ ์ถ์์๋ฅผ ํฌํจํ๋์ง ์ฌ๋ถ์ ๋ํ ๊ฒฐ๊ณผ์ ๋ฐ๋ผ ์๊ธฐ ์ด์ฉํจํด ๋ถ์๋ถ์์ ์ ์ ์ฌ๋ถ๋ฅผ ํ๋จํ ์ ์๋ค.The usage pattern relates to the call history through the user terminal, and primarily determines whether the use pattern analysis unit is normal according to a result of analyzing the call counterpart and the call time, and if necessary, According to a result of whether or not the result of STT conversion of the voice includes the designated follow-up for the user, the use pattern analyzer may determine whether it is normal.
์๊ธฐ ์ด์ฉํจํด์ SNS ์ฌ์ฉ ๋ด์ญ์ ๊ดํ ๊ฒ์ด๋, 1์ฐจ์ ์ผ๋ก SNS ์ฑํ ์๋๋ฐฉ ๋ฐ ์ฑํ ์๊ฐ์ ๋ถ์ํ ๊ฒฐ๊ณผ์ ๋ฐ๋ผ ์๊ธฐ ์ด์ฉํจํด ๋ถ์๋ถ์์ ์ ์ ์ฌ๋ถ๋ฅผ ํ๋จํ๋ฉฐ, ํ์์ ๋ฐ๋ผ ์๊ธฐ ์ฌ์ฉ์์ ๋ํด ์ง์ ๋ ํน์ ์ ์ด๋ชจํฐ์ฝ์ ์ฌ์ฉํ๋์ง ์ฌ๋ถ ํน์ ๋ฌธ์ ์ ๋ ฅ ์ ๋ฐฑ์คํ์ด์ค๊ฐ ์ ๋ ฅ๋ ๋ ์๊ธฐ ๋ฐฑ์คํ์ด์ค์ ์ํด ์ญ์ ๋ ์ ๋ ฅ์ ๋ถ์ํ์ฌ ์๊ธฐ ์ฌ์ฉ์์ ๋ํด ์ง์ ๋ ์คํ ๋ฐ์ดํฐ์ ๋์๋๋์ง ์ฌ๋ถ์ ๋ฐ๋ผ ์๊ธฐ ์ด์ฉํจํด ๋ถ์๋ถ์์ ์ ์ ์ฌ๋ถ๋ฅผ ํ๋จํ ์ ์๋ค.The usage pattern relates to the details of SNS usage, and primarily determines whether the usage pattern analysis unit is normal according to a result of analyzing the SNS chat partner and the chat time, and if necessary, a specific emoticon designated for the user. The pattern analysis unit may determine whether the input pattern is normal by analyzing the input deleted by the backspace when the backspace is input or when the character is input. have.
์๊ธฐ ์ด์ฉํจํด์ ์๊ธฐ ์ฌ์ฉ์ ๋จ๋ง์ ์์น, ์๊ธฐ ์ฌ์ฉ์ ๋จ๋ง์ ํตํ ํตํ ๋ด์ญ, SNS ์ฌ์ฉ ๋ด์ญ, ์ดํ๋ฆฌ์ผ์ด์ ์ ์ฌ์ฉ ์ ์ ์จ ์ค ์ ์ด๋ ํ๋๋ฅผ ํฌํจํ๋, ์๊ธฐ ์ด์ฉํจํด ๋ถ์๋ถ๋ OR ์กฐ๊ฑด ์ฐ์ฐ์ ํตํด ์ ์ ์ฌ๋ถ๋ฅผ ํ๋จํ ์ ์๋ค.The usage pattern may include at least one of a location of the user terminal, a call history through the user terminal, an SNS usage history, and an application occupancy rate of the application, and the usage pattern analyzer may determine whether it is normal through an OR condition calculation. .
์ธ์ฆ์์ค ์กฐ์ ๋ถ๋ ์๊ธฐ ์ด์ฉํจํด์ด ์ ์์ ์ธ ๊ฒ์ผ๋ก ๋ถ์๋ ๊ฒฝ์ฐ ๋ณธ์ธ ์ธ์ฆ ์์ค์ ์๋์ ์ผ๋ก ๋ฎ๊ฒ ์ค์ ํ๊ณ , ์๊ธฐ ์ด์ฉํจํด์ด ๋น์ ์์ ์ธ ๊ฒ์ผ๋ก ๋ถ์๋ ๊ฒฝ์ฐ ๋ณธ์ธ ์ธ์ฆ ์์ค์ ์๋์ ์ผ๋ก ๋๊ฒ ์ค์ ํ ์ ์๋ค.The authentication level adjusting unit may set the authentication level relatively low when the usage pattern is analyzed as normal, and set the authentication level relatively high when the usage pattern is analyzed as abnormal.
์๊ธฐ ์ธ์ฆ์์ค ์กฐ์ ๋ถ์์ ์กฐ์ ๋ ๋ณธ์ธ ์ธ์ฆ ์์ค์ ๋ฉ์์ง ํํ๋ก ๋ง๋ค์ด ์ ์กํ๋ ๋ฉ์์ง ์ ์ก๋ถ๋ฅผ ํฌํจํ ์ ์๋ค.The authentication level adjustment unit may include a message transmission unit for transmitting the authentication level adjusted in the form of a message.
๋ฉ์์ง ์ธ์ฆ ์๋ฒ์ ๋ฑ๋กํ ๊ณต๊ฐํค์ ์์ ์ด๋ฃจ๋ ๊ฐ์ธํค๋ฅผ ์๊ธฐ ์ฌ์ฉ์ ๋จ๋ง์ ๋ฑ๋กํ๋ ํค ๋ฑ๋ก๋ถ๋ฅผ ๋ ํฌํจํ๋, ์๊ธฐ ๋ฉ์์ง ์ ์ก๋ถ๋ ๋ณธ์ธ ์ธ์ฆ ์์ค ๋ฉ์์ง๋ฅผ ์๊ธฐ ๊ฐ์ธํค๋ก ์ํธํํ์ฌ ์น ์๋ฒ๋ก ์ ์กํ ์ ์๋ค.The apparatus may further include a key registration unit that registers a private key paired with a public key to be registered in a message authentication server to the user terminal, wherein the message transmission unit encrypts the authentication level message with the private key and transmits the private key to the web server.
ํํธ ๋ณธ ๋ฐ๋ช ์ ๋ค๋ฅธ ์ธก๋ฉด์ ๋ฐ๋ฅด๋ฉด, ์ฌ์ฉ์์ ์ด์ฉํจํด์ ์์งํ๊ณ ๋ถ์ํ์ฌ ์๊ธฐ ์ด์ฉํจํด์ด ์ ์์ ์ธ์ง ์ฌ๋ถ์ ๋ฐ๋ผ ์กฐ์ ๋ ๋ณธ์ธ ์ธ์ฆ ์์ค์ ๊ฐ์ธํค๋ก ์ํธํํ ๋ณธ์ธ ์ธ์ฆ ์์ค ๋ฉ์์ง๋ฅผ ์ ์กํ๋ ์ฌ์ฉ์ ๋จ๋ง; ์ํธํ๋ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์ค ๋ฉ์์ง๋ฅผ ์์ ํ๊ณ , ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์ค ๋ฉ์์ง์ ๋ฉ์์ง ์ธ์ฆ์ด ์ฑ๊ณต๋ ๊ฒฝ์ฐ์ ํํด ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์ค ๋ฉ์์ง์ ํฌํจ๋ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์ค์ ๋ฐ๋ผ ์์ค๋ณ ๋ก๊ทธ์ธ์ ์ํํ๋ ์น ์๋ฒ; ๋ฐ ์๊ธฐ ๊ฐ์ธํค์ ๋์๋๋ ๊ณต๊ฐํค๊ฐ ๋ฑ๋ก๋๊ณ , ์๊ธฐ ์น ์๋ฒ๋ก๋ถํฐ์ ๋ฉ์์ง ์ธ์ฆ ์์ฒญ์ ๋ฐ๋ผ ์ํธํ๋ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์ค ๋ฉ์์ง๋ฅผ ์๊ธฐ ๊ณต๊ฐํค๋ก ๋ณตํธํํ์ฌ ๋ฉ์์ง ์ธ์ฆ์ ์ํํ์ฌ ์๊ธฐ ์น ์๋ฒ๋ก ์ธ์ฆ ๊ฒฐ๊ณผ๋ฅผ ์ ์กํ๋ ๋ฉ์์ง ์ธ์ฆ ์๋ฒ๋ฅผ ํฌํจํ๋, ์ฌ์ฉ์์ ์ด์ฉํจํด ๋ถ์์ ํ์ฉํ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ด ์ ๊ณต๋๋ค. On the other hand, according to another aspect of the present invention, a user terminal for collecting and analyzing a user's usage pattern and transmitting a user authentication level message encrypted with a private key of the authentication level adjusted according to whether the usage pattern is normal; A web server configured to receive the encrypted identity authentication level message and perform login for each level according to the identity authentication level included in the identity authentication level message only when message authentication of the identity authentication level message is successful; And a public key corresponding to the private key is registered, decrypts the encrypted user authentication level message with the public key according to a message authentication request from the web server, performs message authentication, and transmits an authentication result to the web server. Provided is a user authentication system utilizing a user pattern analysis, including a message authentication server.
์๊ธฐ ๋ฉ์์ง ์ธ์ฆ ์๋ฒ๋ ์๊ธฐ ๊ณต๊ฐํค๋ก ๋ณตํธํ๊ฐ ์ฑ๊ณตํ ๊ฒฝ์ฐ ๋ฉ์์ง ์ธ์ฆ ์ฑ๊ณต์ ์๊ธฐ ์ธ์ฆ ๊ฒฐ๊ณผ๋ก ์ ์กํ๊ณ , ์๊ธฐ ๊ณต๊ฐํค๋ก ๋ณตํธํ๊ฐ ์คํจํ ๊ฒฝ์ฐ ๋ฉ์์ง ์ธ์ฆ ์คํจ๋ฅผ ์๊ธฐ ์ธ์ฆ ๊ฒฐ๊ณผ๋ก ์ ์กํ ์ ์๋ค.The message authentication server may transmit a message authentication success as the authentication result when the decryption is successful with the public key, and transmit a message authentication failure as the authentication result when decryption with the public key fails.
์๊ธฐ ๋ฉ์์ง ์ธ์ฆ ์๋ฒ๋ ๋ฉ์์ง ์ธ์ฆ ์ฑ๊ณต์ ๊ฒฝ์ฐ ๋ณตํธํ๋ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ๋ฉ์์ง๋ฅผ ์๊ธฐ ์น ์๋ฒ๋ก ์ ์กํ ์ ์๋ค.The message authentication server may transmit the decrypted identity authentication message to the web server in the case of successful message authentication.
์๊ธฐ ์น ์๋ฒ๋ ์๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์์ค์ ์์ํ์ฌ ์ํ์๋ช , ํ์ฑ์ธ์, ์ง๋ฌธ์ธ์ฆ, ๋น๋ฐ๋ฒํธ ์ ๋ ฅ ์ค ์ง์ ๋ n๊ฐ์ ๋ํ ํ์ธ๋ง์ผ๋ก๋ ๋ก๊ทธ์ธ์ด ๋๊ฒ ํ ์ ์๋ค.The web server may log in by checking only n items, such as handwritten signature, iris recognition, fingerprint authentication, and password input, corresponding to the user authentication level.
์ ์ ํ ๊ฒ ์ธ์ ๋ค๋ฅธ ์ธก๋ฉด, ํน์ง, ์ด์ ์ด ์ดํ์ ๋๋ฉด, ํนํ์ฒญ๊ตฌ๋ฒ์ ๋ฐ ๋ฐ๋ช ์ ์์ธํ ์ค๋ช ์ผ๋ก๋ถํฐ ๋ช ํํด์ง ๊ฒ์ด๋ค.Other aspects, features, and advantages other than those described above will become apparent from the following drawings, claims, and detailed description of the invention.
๋ณธ ๋ฐ๋ช ์ ์ค์์์ ๋ฐ๋ฅด๋ฉด, ์ค๋งํธํฐ๊ณผ ๊ฐ์ ์ฌ์ฉ์ ๋จ๋ง์ ๋ํ ์ด์ฉํจํด์ ๋ถ์ํ ๊ฒฐ๊ณผ์ ๋ฐ๋ผ ํ์์์ ๊ฐ์ผ๋ฉด ๋ณธ์ธ ์์ง ์ํ๋ก ํ์ ํ์ฌ ๋ณธ์ธ ์ธ์ฆ ์์ค์ ๋ฎ์ถ๊ณ , ํ์์์ ๋ค๋ฅด๋ฉด ๋ณธ์ธ ๋ฏธ์์ง ์ํ๋ก ํ์ ํ์ฌ ๋ณธ์ธ ์ธ์ฆ ์์ค์ ๋์ฌ ๋ณธ์ธ ์ธ์ฆ์ ๊ฐํธํ์ ํจ๊ป ํฅ์๋ ์ ํ์ฑ์ ํ๋ณดํ ์ ์๋ ํจ๊ณผ๊ฐ ์๋ค.According to an embodiment of the present invention, according to a result of analyzing a usage pattern for a user terminal such as a smart phone, if it is the same as usual, it is determined as the possession state of the user and lowers the level of authentication of the person, and if it is different from the usual, Increasing the level of authentication has the effect of simplifying identity verification and ensuring improved accuracy.
๋ 1์ ๋ณธ ๋ฐ๋ช ์ ์ผ ์ค์์์ ๋ฐ๋ฅธ ์ฌ์ฉ์์ ์ด์ฉํจํด ๋ถ์์ ํ์ฉํ ๋ณธ์ธ ์ธ์ฆ์ ์ํ ์ฌ์ฉ์ ๋จ๋ง์ ๊ฐ๋ต์ ์ธ ๊ตฌ์ฑ ๋ธ๋ก๋, 1 is a schematic configuration block diagram of a user terminal for user authentication using analysis of a user's usage pattern according to an embodiment of the present invention;
๋ 2๋ ๋ 1์ ์ฌ์ฉ์ ๋จ๋ง์์ ์ํ๋๋ ๋ณธ์ธ ์ธ์ฆ ๋ฐฉ๋ฒ์ ์์๋,2 is a flow chart of a user authentication method performed in the user terminal of FIG.
๋ 3์ ๋ณธ ๋ฐ๋ช ์ ์ผ ์ค์์์ ๋ฐ๋ฅธ ์ฌ์ฉ์์ ์ด์ฉํจํด ๋ถ์์ ํ์ฉํ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๊ฐ๋ต์ ์ธ ๊ตฌ์ฑ ๋ธ๋ก๋ ๋ฐ ๋ณธ์ธ ์ธ์ฆ ๋ฐฉ๋ฒ์ ํ๋ฆ๋, 3 is a schematic block diagram of a user authentication system using a user pattern analysis according to an embodiment of the present invention and a flow chart of a user authentication method;
๋ 4๋ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ํฌํจ๋๋ ๊ธ์ต ์๋ฒ์ ๊ฐ๋ต์ ์ธ ๊ตฌ์ฑ ๋ธ๋ก๋, 4 is a schematic structural block diagram of a financial server included in a personal authentication system;
๋ 5๋ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ํฌํจ๋๋ ๋ฉ์์ง ์ธ์ฆ ์๋ฒ์ ๊ฐ๋ต์ ์ธ ๊ตฌ์ฑ ๋ธ๋ก๋. 5 is a schematic structural block diagram of a message authentication server included in a user authentication system.
๋ณธ ๋ฐ๋ช ์ ๋ค์ํ ๋ณ๊ฒฝ์ ๊ฐํ ์ ์๊ณ ์ฌ๋ฌ ๊ฐ์ง ์ค์์๋ฅผ ๊ฐ์ง ์ ์๋ ๋ฐ, ํน์ ์ค์์๋ค์ ๋๋ฉด์ ์์ํ๊ณ ์์ธํ๊ฒ ์ค๋ช ํ๊ณ ์ ํ๋ค. ๊ทธ๋ฌ๋ ์ด๋ ๋ณธ ๋ฐ๋ช ์ ํน์ ํ ์ค์ ํํ์ ๋ํด ํ์ ํ๋ ค๋ ๊ฒ์ด ์๋๋ฉฐ, ๋ณธ ๋ฐ๋ช ์ ์ฌ์ ๋ฐ ๊ธฐ์ ๋ฒ์์ ํฌํจ๋๋ ๋ชจ๋ ๋ณ๊ฒฝ, ๊ท ๋ฑ๋ฌผ ๋ด์ง ๋์ฒด๋ฌผ์ ํฌํจํ๋ ๊ฒ์ผ๋ก ์ดํด๋์ด์ผ ํ๋ค.As the present invention allows for various changes and numerous embodiments, particular embodiments will be illustrated in the drawings and described in detail in the written description. However, this is not intended to limit the present invention to specific embodiments, it should be understood to include all changes, equivalents, and substitutes included in the spirit and scope of the present invention.
์ด๋ค ๊ตฌ์ฑ์์๊ฐ ๋ค๋ฅธ ๊ตฌ์ฑ์์์ "์ฐ๊ฒฐ๋์ด" ์๋ค๊ฑฐ๋ "์ ์๋์ด" ์๋ค๊ณ ์ธ๊ธ๋ ๋์๋, ๊ทธ ๋ค๋ฅธ ๊ตฌ์ฑ์์์ ์ง์ ์ ์ผ๋ก ์ฐ๊ฒฐ๋์ด ์๊ฑฐ๋ ๋๋ ์ ์๋์ด ์์ ์๋ ์์ง๋ง, ์ค๊ฐ์ ๋ค๋ฅธ ๊ตฌ์ฑ์์๊ฐ ์กด์ฌํ ์๋ ์๋ค๊ณ ์ดํด๋์ด์ผ ํ ๊ฒ์ด๋ค. ๋ฐ๋ฉด์, ์ด๋ค ๊ตฌ์ฑ์์๊ฐ ๋ค๋ฅธ ๊ตฌ์ฑ์์์ "์ง์ ์ฐ๊ฒฐ๋์ด" ์๋ค๊ฑฐ๋ "์ง์ ์ ์๋์ด" ์๋ค๊ณ ์ธ๊ธ๋ ๋์๋, ์ค๊ฐ์ ๋ค๋ฅธ ๊ตฌ์ฑ์์๊ฐ ์กด์ฌํ์ง ์๋ ๊ฒ์ผ๋ก ์ดํด๋์ด์ผ ํ ๊ฒ์ด๋ค. When a component is referred to as being "connected" or "connected" to another component, it may be directly connected to or connected to that other component, but it may be understood that other components may be present in between. Should be. On the other hand, when a component is said to be "directly connected" or "directly connected" to another component, it should be understood that there is no other component in between.
์ 1, ์ 2 ๋ฑ์ ์ฉ์ด๋ ๋ค์ํ ๊ตฌ์ฑ์์๋ค์ ์ค๋ช ํ๋๋ฐ ์ฌ์ฉ๋ ์ ์์ง๋ง, ์๊ธฐ ๊ตฌ์ฑ์์๋ค์ ์๊ธฐ ์ฉ์ด๋ค์ ์ํด ํ์ ๋์ด์๋ ์ ๋๋ค. ์๊ธฐ ์ฉ์ด๋ค์ ํ๋์ ๊ตฌ์ฑ์์๋ฅผ ๋ค๋ฅธ ๊ตฌ์ฑ์์๋ก๋ถํฐ ๊ตฌ๋ณํ๋ ๋ชฉ์ ์ผ๋ก๋ง ์ฌ์ฉ๋๋ค. Terms such as first and second may be used to describe various components, but the components should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.
๋ณธ ๋ช ์ธ์์์ ์ฌ์ฉํ ์ฉ์ด๋ ๋จ์ง ํน์ ํ ์ค์์๋ฅผ ์ค๋ช ํ๊ธฐ ์ํด ์ฌ์ฉ๋ ๊ฒ์ผ๋ก, ๋ณธ ๋ฐ๋ช ์ ํ์ ํ๋ ค๋ ์๋๊ฐ ์๋๋ค. ๋จ์์ ํํ์ ๋ฌธ๋งฅ์ ๋ช ๋ฐฑํ๊ฒ ๋ค๋ฅด๊ฒ ๋ปํ์ง ์๋ ํ, ๋ณต์์ ํํ์ ํฌํจํ๋ค. ๋ณธ ๋ช ์ธ์์์, "ํฌํจํ๋ค" ๋๋ "๊ฐ์ง๋ค" ๋ฑ์ ์ฉ์ด๋ ๋ช ์ธ์์์ ๊ธฐ์ฌ๋ ํน์ง, ์ซ์, ๋จ๊ณ, ๋์, ๊ตฌ์ฑ์์, ๋ถํ ๋๋ ์ด๋ค์ ์กฐํฉํ ๊ฒ์ด ์กด์ฌํจ์ ์ง์ ํ๋ ค๋ ๊ฒ์ด์ง, ํ๋ ๋๋ ๊ทธ ์ด์์ ๋ค๋ฅธ ํน์ง๋ค์ด๋ ์ซ์, ๋จ๊ณ, ๋์, ๊ตฌ์ฑ์์, ๋ถํ ๋๋ ์ด๋ค์ ์กฐํฉํ ๊ฒ๋ค์ ์กด์ฌ ๋๋ ๋ถ๊ฐ ๊ฐ๋ฅ์ฑ์ ๋ฏธ๋ฆฌ ๋ฐฐ์ ํ์ง ์๋ ๊ฒ์ผ๋ก ์ดํด๋์ด์ผ ํ๋ค.The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. Singular expressions include plural expressions unless the context clearly indicates otherwise. As used herein, the terms "comprise" or "have" are intended to indicate that there is a feature, number, step, action, component, part, or combination thereof described on the specification, and one or more other features. It is to be understood that the present invention does not exclude the possibility of the presence or the addition of numbers, steps, operations, components, components, or a combination thereof.
๋ํ, ๊ฐ ๋๋ฉด์ ์ฐธ์กฐํ์ฌ ์ค๋ช ํ๋ ์ค์์์ ๊ตฌ์ฑ ์์๊ฐ ํด๋น ์ค์์์๋ง ์ ํ์ ์ผ๋ก ์ ์ฉ๋๋ ๊ฒ์ ์๋๋ฉฐ, ๋ณธ ๋ฐ๋ช ์ ๊ธฐ์ ์ ์ฌ์์ด ์ ์ง๋๋ ๋ฒ์ ๋ด์์ ๋ค๋ฅธ ์ค์์์ ํฌํจ๋๋๋ก ๊ตฌํ๋ ์ ์์ผ๋ฉฐ, ๋ํ ๋ณ๋์ ์ค๋ช ์ด ์๋ต๋ ์ง๋ผ๋ ๋ณต์์ ์ค์์๊ฐ ํตํฉ๋ ํ๋์ ์ค์์๋ก ๋ค์ ๊ตฌํ๋ ์๋ ์์์ ๋น์ฐํ๋ค.In addition, the components of the embodiments described with reference to the drawings are not limited to the corresponding embodiments, and may be implemented to be included in other embodiments within the scope of the technical spirit of the present invention. Even if the description is omitted, it is obvious that a plurality of embodiments may be reimplemented into one integrated embodiment.
๋ํ, ์ฒจ๋ถ ๋๋ฉด์ ์ฐธ์กฐํ์ฌ ์ค๋ช ํจ์ ์์ด, ๋๋ฉด ๋ถํธ์ ๊ด๊ณ์์ด ๋์ผํ ๊ตฌ์ฑ ์์๋ ๋์ผํ๊ฑฐ๋ ๊ด๋ จ๋ ์ฐธ์กฐ๋ถํธ๋ฅผ ๋ถ์ฌํ๊ณ ์ด์ ๋ํ ์ค๋ณต๋๋ ์ค๋ช ์ ์๋ตํ๊ธฐ๋ก ํ๋ค. ๋ณธ ๋ฐ๋ช ์ ์ค๋ช ํจ์ ์์ด์ ๊ด๋ จ๋ ๊ณต์ง ๊ธฐ์ ์ ๋ํ ๊ตฌ์ฒด์ ์ธ ์ค๋ช ์ด ๋ณธ ๋ฐ๋ช ์ ์์ง๋ฅผ ๋ถํ์ํ๊ฒ ํ๋ฆด ์ ์๋ค๊ณ ํ๋จ๋๋ ๊ฒฝ์ฐ ๊ทธ ์์ธํ ์ค๋ช ์ ์๋ตํ๋ค. In addition, in the description with reference to the accompanying drawings, the same components regardless of reference numerals will be given the same or related reference numerals and redundant description thereof will be omitted. In the following description of the present invention, if it is determined that the detailed description of the related known technology may unnecessarily obscure the subject matter of the present invention, the detailed description thereof will be omitted.
๋ 1์ ๋ณธ ๋ฐ๋ช ์ ์ผ ์ค์์์ ๋ฐ๋ฅธ ์ฌ์ฉ์์ ์ด์ฉํจํด ๋ถ์์ ํ์ฉํ ๋ณธ์ธ ์ธ์ฆ์ ์ํ ์ฌ์ฉ์ ๋จ๋ง์ ๊ฐ๋ต์ ์ธ ๊ตฌ์ฑ ๋ธ๋ก๋์ด๊ณ , ๋ 2๋ ๋ 1์ ์ฌ์ฉ์ ๋จ๋ง์์ ์ํ๋๋ ๋ณธ์ธ ์ธ์ฆ ๋ฐฉ๋ฒ์ ์์๋์ด๋ค. FIG. 1 is a schematic block diagram of a user terminal for user authentication using analysis of a usage pattern of a user according to an embodiment of the present invention, and FIG. 2 is a flowchart of a user authentication method performed in the user terminal of FIG. .
๋ณธ ๋ฐ๋ช
์ ์ผ ์ค์์์ ๋ฐ๋ฅธ ์ฌ์ฉ์์ ์ด์ฉํจํด ๋ถ์์ ํ์ฉํ ๋ณธ์ธ ์ธ์ฆ์ ์ํ ์ฌ์ฉ์ ๋จ๋ง(100)์ ์ฌ์ฉ์์ ์ด์ฉํจํด์ ์์งํ๊ณ ๋ถ์ํ์ฌ ์ฌ์ฉ์๊ฐ ํ์์ ์ด์ฉํ๋ ํจํด๊ณผ ์ ์ฌํ ์ ๋์ ๋ฐ๋ผ ๋ณธ์ธ ์์ง ์ฌ๋ถ๋ฅผ ํ์ ํ์ฌ ๋ณธ์ธ ์ธ์ฆ์ด ์๊ตฌ๋๋ ์ํฉ์์ ๋ณธ์ธ ์ธ์ฆ ์์ค์ ์กฐ์ ํ ์ ์๋๋ก ํ ๊ฒ์ ํน์ง์ผ๋ก ํ๋ค. The
๋ณธ ์ค์์์ ๋ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ์ ์ํ ์ฌ์ฉ์ ๋จ๋ง(100)์ ์ด์ฉํจํด ์์ง๋ถ(110), ์ด์ฉํจํด ๋ถ์๋ถ(120), ์ธ์ฆ์์ค ์กฐ์ ๋ถ(130)๋ฅผ ํฌํจํ๋ค. ์ด์ฉํจํด ์์ง๋ถ(110), ์ด์ฉํจํด ๋ถ์๋ถ(120), ์ธ์ฆ์์ค ์กฐ์ ๋ถ(130)๋ ์ค๋งํธํฐ๊ณผ ๊ฐ์ ์ฌ์ฉ์ ๋จ๋ง(100)์ ์ค์น๋๋ ์ดํ๋ฆฌ์ผ์ด์
ํํ์ ์ํํธ์จ์ด๋ก ๊ตฌํ๋ ์ ์๋ค. The
์ด์ฉํจํด ์์ง๋ถ(110)๋ ์ฌ์ฉ์ ๋จ๋ง(100)์ ์ด์ฉํ๋ ์ฌ์ฉ์์ ์ด์ฉํจํด์ ๊ดํ ์ ๋ณด๋ฅผ ์์งํ๋ค(๋จ๊ณ S10). ์ด์ฉํจํด ์์ง์ ํ ์์ ์ผ๋ก๋ถํฐ ๋ฏธ๋ฆฌ ์ง์ ๋ ์๊ฐ(์์ปจ๋, 3์๊ฐ) ์ด๋ด๋ก ํ์ ๋ ์ ์๋ค. ์ด๋ ๋ถ์ค ๋ฑ์ผ๋ก ์ธํด ์ฌ์ฉ์ ๋จ๋ง(100)์ ์ต๊ทผ ์ํ์ ๋ณ๊ฒฝ์ฌํญ์ด ๋ฐ์ํ์์๋ ๋ถ๊ตฌํ๊ณ ์์ ์ ์์ง๋ ์ ๋ณด์ ์ํด ์ฌ์ฉ์ ๋จ๋ง(100)์ ์ต๊ทผ ์ํ ํ์
์ ์ด๋ ค์์ด ์์ ์ ์๊ธฐ ๋๋ฌธ์ด๋ค. The usage
์ด์ฉํจํด์ ์์ง ์๊ฐ์ ์์ง๋์์ธ ์ฌ์ฉ์์ ์ฐ๋ น, ๊ฑฐ์ฃผ์ง ๋ฑ๊ณผ ๊ฐ์ ์ฌ์ฉ์ ์์ฑ, ์ด์ฉํจํด์ ์ข ๋ฅ ์ค ์ ์ด๋ ํ๋์ ๋ฐ๋ผ ๋ค์ํ๊ฒ ์ค์ ๋ ์ ์๋ค. The collection time of the usage pattern may be variously set according to at least one of a user attribute such as an age, a place of residence, and the like of the usage pattern.
์์ง๋์์ด ๋๋ ์ด์ฉํจํด์ ์ฌ์ฉ์ ๋จ๋ง์ ์์น ์ ๋ณด, ์ฌ์ฉ์ ๋จ๋ง์ ํตํ ํตํ ์ ๋ณด, ์ฌ์ฉ์ ๋จ๋ง์ ์ด์ฉํ SNS(์์ ๋คํธ์ํฌ ์๋น์ค) ์ด์ฉ ์ ๋ณด, ์ดํ๋ฆฌ์ผ์ด์ ์ฌ์ฉ ์ ์ ์จ ์ค ์ ์ด๋ ํ๋๋ฅผ ํฌํจํ ์ ์๋ค. The usage pattern to be collected may include at least one of location information of the user terminal, call information through the user terminal, social network service (SNS) usage information using the user terminal, and application usage share.
์ด์ฉํจํด ๋ถ์๋ถ(120)๋ ์ด์ฉํจํด ์์ง๋ถ(110)์ ์ํด ์์ง๋ ์ด์ฉํจํด์ ๋ถ์ํ์ฌ ์ ์์ ์ธ์ง ์ฌ๋ถ๋ฅผ ํ๋จํ๋ค(๋จ๊ณ S15). ์ด์ฉํจํด์ด ์ ์์ ์ด๋ผ๋ ๊ฒ์ ์ฌ์ฉ์ ๋จ๋ง(100)์ ๋ํด ์ง์ ๋ ์ฌ์ฉ์์ ์ํด ์ํ๋ ๊ฒ์ผ๋ก ์์๋๋ ์ด์ฉํจํด์ ๊ฐ์ง์ ์๋ฏธํ๋ค. The
์ด์ฉํจํด์ด ์ฌ์ฉ์ ๋จ๋ง์ ์์น ์ ๋ณด์ธ ๊ฒฝ์ฐ์ ๋ถ์์ ๋ค์๊ณผ ๊ฐ๋ค. The analysis when the usage pattern is location information of the user terminal is as follows.
์ง์ ๋ ์ฌ์ฉ์๊ฐ ํด๋น ์ฌ์ฉ์ ๋จ๋ง(100)์ ์์งํ๊ณ ์๋ค๋ฉด, ์ฌ์ฉ์๊ฐ ์์ ๊ฒ์ผ๋ก ์์๋๋ ์์น์ ์ฌ์ฉ์ ๋จ๋ง(100)์ด ์๋์ง ์ฌ๋ถ๋ฅผ ํ์
ํ๋ค. If the designated user has the
์์ปจ๋, ์ฌ์ฉ์์ ์ฃผ๋ ์์น๊ฐ ์ง๊ณผ ํ์ฌ์ธ ๊ฒฝ์ฐ, ์ฌ์ฉ์ ๋จ๋ง(100)์ ์ํด ์์ง๋ ์์น ์ ๋ณด๊ฐ ํด๋น ์ฌ์ฉ์์ ๋ํด ์ค์ ๋ ์ง ํน์ ํ์ฌ๋ผ๋ฉด ์ ์์ ์ธ ๊ฒ์ผ๋ก ํ๋จํ์ง๋ง, ์ง ํน์ ํ์ฌ๊ฐ ์๋ ์ 3์ ์ฅ์๋ผ๋ฉด ํ์ฌ ์ฌ์ฉ์ ๋จ๋ง์ ์ด์ฉํจํด์ด ๋น์ ์์ ์ธ ๊ฒ์ผ๋ก ํ๋จํ ์ ์์ ๊ฒ์ด๋ค. For example, if the main location of the user is a home and a company, if the location information collected by the
์ด๋ฌํ ์ฌ์ฉ์ ๋จ๋ง์ ์์น ์ ๋ณด๋ ์๊ฐ ์ ๋ณด์ ์ฐ๊ด๋์ด ๋ถ์์ ์ด์ฉ๋ ์๋ ์๋ค. ์์ปจ๋, ์ฌ์ฉ์์ ๋ํด ์ค์ ๋ ์์น๊ฐ ์ง๊ณผ ํ์ฌ์ธ ๊ฒฝ์ฐ, ํ์ผ ์ ๋ฌด ์๊ฐ(์. ์~๊ธ ์ค์ 9์~18์)์ด๋ผ๋ฉด ์ฌ์ฉ์ ๋จ๋ง์ ์์น๊ฐ ํ์ฌ ํน์ ๊ทธ ๊ทผ๋ฐฉ์ธ ๊ฒฝ์ฐ์ ํํด ์ด์ฉํจํด์ด ์ ์์ ์ด๊ณ , ํ์ผ ์ ๋ฌด ์๊ฐ์์๋ ๋ถ๊ตฌํ๊ณ ์ฌ์ฉ์ ๋จ๋ง์ ์์น๊ฐ ์ง์ด๋ผ๋ฉด ์ด์ฉํจํด์ด ๋น์ ์์ ์ธ ๊ฒ์ผ๋ก ํ๋จํ ์ ์์ ๊ฒ์ด๋ค. The location information of the user terminal may be used for analysis in association with time information. For example, if the location set for the user is a home or a company, the usage pattern is normal only when the user terminal is located at or near the company if the workday is a weekday (for example, 9:00 AM to 18:00 AM). If the location of the user terminal is at home despite the working hours on weekdays, it may be determined that the usage pattern is abnormal.
๋ณธ ์ค์์์์ ์ด์ฉํจํด์ ๋ถ์์ ์ด์ฉ๋๋ ์ฌ์ฉ์ ๋จ๋ง์ ์์น ์ ๋ณด๋ GPS ๊ฐ์ผ ์ ์๋ค. ์ด๋ฅผ ์ํด ์ด์ฉํจํด ์์ง๋ถ(110)๋ ์ฌ์ฉ์ ๋จ๋ง(100)์ ๋ณ๋ ๊ตฌ๋น๋ GPS ๋ชจ๋๋ก๋ถํฐ ์ฌ์ฉ์ ๋จ๋ง์ ์์น ์ ๋ณด๋ฅผ ํ๋ํ ์ ์๋ค. In the present embodiment, the location information of the user terminal used to analyze the usage pattern may be a GPS value. To this end, the
๋๋ ์ฌ์ฉ์ ๋จ๋ง์ ์์น ์ ๋ณด๋ ํด๋น ์ฌ์ฉ์ ๋จ๋ง(100)์ด ์ ์ํ ์์ดํ์ด ๊ณต์ ๊ธฐ์ ์๋ณ ์ ๋ณด์ผ ์ ์๋ค. ์์ ์ค๋ช
ํ GPS ๊ฐ์ ์ฌ์ฉ์ ๋จ๋ง(100)์ด ์ค์ธ์ ์์นํ๋ ๊ฒฝ์ฐ์๋ ์ ํํ ์์น๋ฅผ ์๋ ค์ฃผ์ง๋ง, ์ค๋ด์ ์์นํ๋ ๊ฒฝ์ฐ์๋ GPS ์ ํธ๊ฐ ์์ ๋์ง ์์ ํ์ฉ๋ ์ ์๊ฒ ๋๋ค. ๋ฐ๋ผ์, ์ต๊ทผ ์ค๋งํธํฐ๊ณผ ๊ฐ์ ์ฌ์ฉ์ ๋จ๋ง(100)์์ ๋ง์ด ์ฌ์ฉ๋๊ณ ์๋ ์์ดํ์ด(WiFi) ํต์ ์ ํ์ฉํ ์ ์๋ค. Alternatively, the location information of the user terminal may be identification information of the Wi-Fi router connected to the
์์ดํ์ด ํต์ ์ ์ํด์๋ ์ฌ์ฉ์ ๋จ๋ง์ด ์ค๋ด ์์์ ์์น์ ์ค์น๋ ์์ดํ์ด ๊ณต์ ๊ธฐ์ ์ ์ํด์ผ ํ๋ฉฐ, ์ด ๋ ์ ์๋๋ ์์ดํ์ด ๊ณต์ ๊ธฐ๋ ํ ์์ดํ์ด ๊ณต์ ๊ธฐ์๋ ์๋ณ ๊ฐ๋ฅํ ์๋ณ์ ๋ณด(์์ปจ๋, ๋งฅ ์ด๋๋ ์ค(Mac Address))๋ฅผ ๊ฐ์ง๊ณ ์๋ค. ์ด ๋ ์ฌ์ฉ์ ๋จ๋ง์ด ํ์ฌ ์ ์ ์ค์ธ ์์ดํ์ด ๊ณต์ ๊ธฐ์ ์๋ณ์ ๋ณด๊ฐ ๋ฐ์ดํฐ๋ฒ ์ด์ค์ ๋ฑ๋ก๋ ์ด์ ์ ์ ์ํ ์ด๋ ฅ์ด ์๋ ์์ดํ์ด ๊ณต์ ๊ธฐ์ ์๋ณ์ ๋ณด ์ค ํ๋์ธ ๊ฒฝ์ฐ์๋ ์ฌ์ฉ์ ๋จ๋ง์ ์ด์ฉํจํด์ด ์ ์์ ์ธ ๊ฒ์ผ๋ก ํ๋จํ ์ ์๋ค. ํ์ง๋ง, ์ฌ์ฉ์ ๋จ๋ง์ด ํ์ฌ ์ ์ ์ค์ธ ์์ดํ์ด ๊ณต์ ๊ธฐ์ ์๋ณ์ ๋ณด๋ฅผ ๋ฐ์ดํฐ๋ฒ ์ด์ค์ ๋ฑ๋ก๋ ์ด์ ์ ์ ์ํ ์ด๋ ฅ์ด ์๋ ์์ดํ์ด ๊ณต์ ๊ธฐ์ ์๋ณ์ ๋ณด๋ค๊ณผ ๋น๊ตํ์ ๋ ๋์ผํ ์ ๋ณด๊ฐ ์์ ๊ฒฝ์ฐ์๋ ์ฌ์ฉ์ ๋จ๋ง์ด ์ด์ ์ ์์นํ ์ ์ด ์๋ ์ฅ์์ ์๋ ๊ฒ์ผ๋ก ๋ณด๊ณ , ์ฌ์ฉ์ ๋จ๋ง์ ์ด์ฉํจํด์ด ๋น์ ์์ ์ธ ๊ฒ์ผ๋ก ํ๋จํ ์ ์์ ๊ฒ์ด๋ค. In order to perform Wi-Fi communication, the user terminal needs to access a Wi-Fi router installed at an arbitrary location in the room, and the Wi-Fi router to be connected has identification information (eg, a Mac address) that can be distinguished from other Wi-Fi routers. In this case, when the identification information of the Wi-Fi router which is currently connected to the user terminal is one of the identification information of the Wi-Fi router having a previously accessed history registered in the database, it may be determined that the usage pattern of the user terminal is normal. However, when the identification information of the currently connected Wi-Fi router is compared with the identification information of the previously-connected Wi-Fi router registered in the database, when there is no identical information, the place where the user terminal has not been previously located As seen from, it may be determined that the usage pattern of the user terminal is abnormal.
๋ค์์ผ๋ก ์ด์ฉํจํด์ด ์ฌ์ฉ์ ๋จ๋ง์ ํตํ ํตํ ์ ๋ณด์ธ ๊ฒฝ์ฐ์ ๋ถ์์ ๋ค์๊ณผ ๊ฐ๋ค. Next, the analysis when the usage pattern is call information through the user terminal is as follows.
์ฌ์ฉ์ ๋จ๋ง์ ์ต์ ํตํ ๋ด์ญ์ ํ์ธํ ๊ฒฐ๊ณผ, ๋ฐ์ดํฐ๋ฒ ์ด์ค์ ๋ฑ๋ก๋ ๊ณผ๊ฑฐ ์ด๋ ฅ๊ณผ ๋น๊ตํ ๋ ์ฌ์ฉ์๊ฐ ์์ฃผ ํตํ๋ฅผ ํ๋ ์๋๋ฐฉ๊ณผ ํตํํ ๊ฒ์ผ๋ก ๋ถ์๋ ๊ฒฝ์ฐ, ์ฌ์ฉ์ ๋จ๋ง์ ์ด์ฉํจํด์ด ์ ์์ ์ธ ๊ฒ์ผ๋ก ํ๋จํ ์ ์๋ค. ์ฌ๊ธฐ์, ์ฌ์ฉ์์ ์ํด ํตํ์ ๋น๋ฒํจ ์ ๋๊ฐ ์ง์ ๋๊ฑฐ๋ ๊ณผ๊ฑฐ ์ด๋ ฅ์ ๋ถ์ํ ๊ฒฐ๊ณผ์ ๋ฐ๋ผ ํตํ ํ์๊ฐ ๋ง์ ์์ ๋ช ๋ช ์ ์ด์ฉํจํด ๋ถ์ ์ ์ ์ํจํด ํ๋จ์ ์ํ ๊ธฐ์ค์ผ๋ก ์ค์ ๋ ์ ์๋ค. As a result of checking the latest call history of the user terminal, when it is analyzed that the user talks to the other party to which the user frequently talks, it may be determined that the usage pattern of the user terminal is normal. Here, the frequency of the call is designated by the user, or according to the result of analyzing the past history, the top few persons having a large number of calls may be set as a reference for determining the normal pattern when analyzing the usage pattern.
ํ์ง๋ง, ์ฌ์ฉ์ ๋จ๋ง์ ์ต์ ํตํ ๋ด์ญ์ ํ์ธํ ๊ฒฐ๊ณผ, ๋ฐ์ดํฐ๋ฒ ์ด์ค์ ๋ฑ๋ก๋ ๊ณผ๊ฑฐ ์ด๋ ฅ๊ณผ ๋น๊ตํ ๋ ์ฌ์ฉ์๊ฐ ์ฒ์ ํตํํ๊ฑฐ๋ ์์ฃผ ํตํํ๋ ์๋๋ฐฉ์ด ์๋ ๊ฒฝ์ฐ, ์ฌ์ฉ์ ๋จ๋ง์ ์ด์ฉํจํด์ด ๋น์ ์์ ์ธ ๊ฒ์ผ๋ก ํ๋จํ ์ ์๋ค. ๋ํ, ์ต์ ํตํ ๋ด์ญ์ ๋ถ์ํ ๊ฒฐ๊ณผ, ํน์ ์๋๋ฐฉ๊ณผ์ ํตํ์๊ฐ์ด ๋ฐ์ดํฐ๋ฒ ์ด์ค์ ๊ธฐ ๋ฑ๋ก๋ ๊ณผ๊ฑฐ ์ด๋ ฅ๊ณผ ๋น๊ตํ ๋ ๋น์ ์์ ์ผ๋ก ๊ธธ๊ฑฐ๋ ์งง์ ๊ฒฝ์ฐ์๋ ์ฌ์ฉ์ ๋จ๋ง์ ์ด์ฉํจํด์ด ๋น์ ์์ ์ธ ๊ฒ์ผ๋ก ํ๋จํ ์ ์๋ค. However, as a result of confirming the latest call history of the user terminal, when the user is not the first call or a frequent call partner compared with the past history registered in the database, it may be determined that the usage pattern of the user terminal is abnormal. In addition, as a result of analyzing the latest call history, even if the talk time with a specific counterpart is abnormally long or short compared to the past history registered in the database, it can be determined that the usage pattern of the user terminal is abnormal.
๋ํ, ์ฌ์ฉ์ ๋จ๋ง์ ์ต์ ํตํ ๋ด์ญ์ ๋ํ ์์ฑ์ STT(Speech to Text) ๋ณํํ ๊ฒฐ๊ณผ๋ฅผ ๋ถ์ํ์ฌ, ์ฌ์ฉ์์ ์์ํ๋ ๋งํฌ๋ฅผ ํฌํจํ๋์ง ์ฌ๋ถ์ ๋ฐ๋ผ ์ฌ์ฉ์ ๋จ๋ง์ ์ด์ฉํจํด์ด ์ ์์ ์ธ์ง ์ฌ๋ถ๋ฅผ ํ๋จํ ์๋ ์๋ค. In addition, by analyzing the results of speech to text (STT) conversion of the voice of the latest call history of the user terminal, it may be determined whether the usage pattern of the user terminal is normal according to whether or not the speech corresponding to the user is included. .
์ฌ์ฉ์์ ์์ํ๋ ๋งํฌ๋ ๋ฐ์ดํฐ๋ฒ ์ด์ค์ ๋ฑ๋ก๋ ๊ณผ๊ฑฐ์ ํตํ ๋ด์ญ์ ๋ํ ๋ถ์์ ํตํด ๋ํ์ ์ค์ํ๊ฒ ์ฌ์ฉ๋๋ ํค์๋ ์ด์ธ์ ๋ถํ์ํ์ง๋ง ํด๋น ์ฌ์ฉ์์ ๋ํด ๋ฏธ๋ฆฌ ์ง์ ๋ ํ์ ์ด์์ผ๋ก ์์ฃผ ๋ฑ์ฅํ๋ ํน์ ์ ์ถ์์(์. '์~', '์~' ๋ฑ)๋ฅผ ํฌํจํ ์ ์๋ค. Corresponding to a user is not only a keyword that is important for conversation through analysis of past call history registered in the database, but a distinctive feature that frequently appears more than a predetermined number of times for the user (e.g. ',' Ah ', etc.).
๋ค์์ผ๋ก ์ด์ฉํจํด์ด ์ฌ์ฉ์ ๋จ๋ง์ ์ด์ฉํ SNS ์ฌ์ฉ ๋ด์ญ์ธ ๊ฒฝ์ฐ์ ๋ถ์์ ๋ค์๊ณผ ๊ฐ๋ค. Next, the analysis when the usage pattern is the usage history of the SNS using the user terminal is as follows.
์ฌ์ฉ์ ๋จ๋ง์์ ์ต๊ทผ ์ฌ์ฉํ SNS์ ๋ด์ฉ์ ๋ถ์ํ ๊ฒฐ๊ณผ, ์ฌ์ฉ์ ๋จ๋ง์ ํตํด ์ฑํ ์ ์ํํ ๋ SNS ์๋๋ฐฉ์ด ๋๊ตฌ์ธ์ง ๊ทธ๋ฆฌ๊ณ ์ฑํ ์๊ฐ์ด ์ธ์ ์ธ์ง๋ฅผ ๋ถ์ํ์ฌ ์ฌ์ฉ์ ๋จ๋ง์ ์ด์ฉํจํด์ด ์ ์์ ์ธ์ง ์ฌ๋ถ๋ฅผ ํ๋จํ ์ ์๋ค. ๋ฐ์ดํฐ๋ฒ ์ด์ค์ ๊ธฐ ๋ฑ๋ก๋ ๊ณผ๊ฑฐ ์ด๋ ฅ์ ๊ธฐ์ดํ ๋ ๋ฏธ๋ฆฌ ์ง์ ๋ ์๊ณ์น ์ด์์ผ๋ก ์ฑํ ์ ์์ฃผ ํ๋ ์๋๋ฐฉ์ธ์ง, ํด๋น ์๋๋ฐฉ๊ณผ์ ์ฑํ ์๊ฐ์ด ํ์์ ์์ฃผ ์ฑํ ์ ํ๋ ์๊ฐ์ธ์ง ์ฌ๋ถ์ ๋ฐ๋ผ ์ด์ฉํจํด์ ์ ์ ์ฌ๋ถ๊ฐ ํ๋จ๋ ์ ์๋ค. As a result of analyzing the contents of the recently used SNS in the user terminal, it is possible to determine whether the usage pattern of the user terminal is normal by analyzing who the SNS counterpart is and when the chat time is performed when chatting through the user terminal. . Based on the past history registered in the database, it may be determined whether the usage pattern is normal according to whether the person frequently chats at a predetermined threshold or more, or whether the chat time with the corresponding party is a normal chat time. .
๋ํ, SNS์ ๊ฒ์๊ธ์ ๋ํด ๋ต๊ธ์ ๋ฌ ๋์ ํด๋น ์ฌ์ฉ์๊ฐ ์์ฃผ ์ฌ์ฉํ๋ ํน์ ์ ๋ฌธ๊ตฌ ํน์ ์ด๋ชจํฐ์ฝ์ด ์กด์ฌํ๋ ๊ฒฝ์ฐ ์ฌ์ฉ์ ๋จ๋ง์ ์ด์ฉํจํด์ด ์ ์์ ์ธ ๊ฒ์ผ๋ก ํ๋จํ ์ ์๋ค. In addition, when replying to the posts of the SNS, if there is a specific phrase or emoticon frequently used by the user, it may be determined that the usage pattern of the user terminal is normal.
ํน์ ์ฑํ ์ ์ํํ๊ฑฐ๋ ๋ต๊ธ์ ๋ฌ๊ธฐ ์ํด ๋ฌธ์๋ฅผ ์ ๋ ฅํ๋ ๊ณผ์ ์์ ์คํ๋ฅผ ์์ ํ๊ธฐ ์ํ ๋ฐฑ์คํ์ด์ค๊ฐ ์ ๋ ฅ๋ ๋ ๋ฐฑ์คํ์ด์ค์ ์ํด ์ญ์ ๋ ์ด์ ์ ๋ ฅ์ ๋ถ์ํ ์๋ ์๋ค. ์ญ์ ๋ ์ด์ ์ ๋ ฅ์ด ์ฌ์ฉ์์ ์์ํ์ฌ ๋ฐ์ดํฐ๋ฒ ์ด์ค์ ๋ฑ๋ก๋์ด ์๋ ์คํ ๋ฐ์ดํฐ์ ํฌํจ๋๋ ๊ฒฝ์ฐ ์ฌ์ฉ์ ๋จ๋ง์ ์ด์ฉํจํด์ด ์ ์์ ์ธ ๊ฒ์ผ๋ก ํ๋จํ ์ ์๋ค. ์คํ ๋ฐ์ดํฐ๋ ๋ฐฑ์คํ์ด์ค ์ ๋ ฅ์ ๋ฐ๋ผ ์ญ์ ๋ ์ด์ ์ ๋ ฅ์ ์ผ์ ๊ธฐ๊ฐ ์ด์ ์์งํ ๊ฒฐ๊ณผ์ผ ์ ์๋ค. ์ด๋ ๋ฌธ์ ์ ๋ ฅ ๊ณผ์ ์์ ์ฌ์ฉ์๋ง๋ค ์์ฃผ ํ๋ฆฌ๋ ๋ฌธ์ ์ ๋ ฅ ๊ฒฐ๊ณผ๋ฅผ ํ์ฉํ ๊ฒ์ด๋ค. Or, you can analyze previous input deleted by backspace when a backspace is entered to correct a typo while typing a character to chat or reply. If the deleted previous input is included in the typo data registered in the database corresponding to the user, it may be determined that the usage pattern of the user terminal is normal. The typo data may be a result of collecting a previous input deleted for a predetermined period of time according to the backspace input. This is based on the character input result that is frequently different for each user in the character input process.
๋ค์์ผ๋ก ์ด์ฉํจํด์ด ์ฌ์ฉ์ ๋จ๋ง์ ์ดํ๋ฆฌ์ผ์ด์ ์ฌ์ฉ ์ ์ ์จ์ธ ๊ฒฝ์ฐ์ ๋ถ์์ ๋ค์๊ณผ ๊ฐ๋ค. Next, the analysis when the usage pattern is the application usage share of the user terminal is as follows.
์ฌ์ฉ์ ๋จ๋ง์์ ์ต๊ทผ ์คํ๋ ์ดํ๋ฆฌ์ผ์ด์ ๋ค์ ๋ํด ๊ทธ ์ฌ์ฉ ์ ์ ์จ์ ๋ถ์ํ์ฌ, ํด๋น ์ฌ์ฉ์์ ๋ํด ๊ธฐ ์ค์ ๋ ์ฌ์ฉ ์ ์ ์จ๊ณผ ์ผ์ ๋น์จ ์ด์์ ์ ์ฌ์ฑ์ ๊ฐ์ง ๊ฒฝ์ฐ ์ฌ์ฉ์ ๋จ๋ง์ ์ด์ฉํจํด์ด ์ ์์ ์ธ ๊ฒ์ผ๋ก ํ๋จํ ์ ์๋ค. ์์ปจ๋, ์ฌ์ฉ์๋ง๋ค ์์ฃผ ์ฌ์ฉํ๊ฒ ๋๋ ์ดํ๋ฆฌ์ผ์ด์ ์ด ๋ค๋ฅผ ์ ์๊ณ , ๋์ผ ์ดํ๋ฆฌ์ผ์ด์ ๋ค์ ์ฌ์ฉํ๋๋ผ๋ ์ฌ์ฉ์ ์ฑํฅ์ ๋ฐ๋ผ ์ดํ๋ฆฌ์ผ์ด์ ๋ณ ์ฌ์ฉ์๊ฐ์ด ๋ค๋ฅผ ์ ์๋ค. ๋ฐ๋ผ์, ์ต๊ทผ ์ผ์ ์๊ฐ ๋์ ์ฌ์ฉ๋ ์ดํ๋ฆฌ์ผ์ด์ ๋ค์ ์ข ๋ฅ์ ๊ทธ ์ฌ์ฉ ์ ์ ์จ๋ก๋ถํฐ ์ฌ์ฉ์ ๋จ๋ง์ ์ฌ์ฉ์์ ๋ํ ์ฑํฅ์ ์ถ์ ํ ์ ์๊ฒ ๋๋ ๊ฒ์ด๋ค. By analyzing the usage share of recently executed applications in the user terminal, it may be determined that the usage pattern of the user terminal is normal when the user share has a similarity or more than a predetermined ratio. For example, applications that are frequently used for each user may be different, and even if the same applications are used, the usage time for each application may be different according to the user's inclination. Therefore, it is possible to estimate the propensity for the user of the user terminal from the type of applications used and the usage occupancy in recent years.
์ด์ฉํจํด ๋ถ์๋ถ(120)๋ ์ ์ ํ ์ฌ์ฉ์ ๋จ๋ง์ ์์น, ์ฌ์ฉ์ ๋จ๋ง์ ํตํ ํตํ ๋ด์ญ, SNS ์ฌ์ฉ ๋ด์ญ, ์ดํ๋ฆฌ์ผ์ด์
์ ์ฌ์ฉ ์ ์ ์จ ์ค ์ ์ด๋ ํ๋๋ฅผ ๋ถ์ํ๊ธฐ ์ํ ์ด์ฉํจํด์ผ๋ก ํ์ฉํ๋, ์ด์ฉํจํด์ด ๋ณต์ ๊ฐ์ธ ๊ฒฝ์ฐ์๋ OR ์กฐ๊ฑด ์ฐ์ฐ์ ํตํด ์ ์ ์ฌ๋ถ๋ฅผ ํ๋จํ ์ ์๋ค. ์ฆ, ์ด์ฉํจํด ์ค ํ๋๋ผ๋ ์ ์์ ์ธ ํจํด์ผ๋ก ํ๋จ๋๋ฉด ํ์ฌ ์ฌ์ฉ์ ๋จ๋ง์ ์ ์์ ์ธ ์ฌ์ฉ์๊ฐ ์์งํ ๊ฒ์ผ๋ก ๋ณด๋ ๊ฒ์ด๋ค. ์ด๋ ์ง์ ํ ์ฌ์ฉ์๋ผ ํ ์ง๋ผ๋ ๋งค์๊ฐ ๋ชจ๋ ์ด์ฉํจํด์ ์ ์ ์กฐ๊ฑด(์ ์ ํจํด์ด ๋๋๋ก ํ๋ ์๊ณ์น)์ ๋ง์กฑ์ํฌ ์ ์๊ธฐ ๋๋ฌธ์ด๋ฉฐ, ์ด๋ ํ๋์ ์ด์ฉํจํด์ด๋ผ๋ ์ ์ ์กฐ๊ฑด์ ๋ง์กฑํ๋ฉด ์ง์ ํ ์ฌ์ฉ์๋ก ํ๋จํ๊ธฐ์ ์ถฉ๋ถํ๊ธฐ ๋๋ฌธ์ด๋ค. The
์ธ์ฆ์์ค ์กฐ์ ๋ถ(130)๋ ์ด์ฉํจํด ๋ถ์๋ถ(120)์์ ๋ถ์ํ ๊ฒฐ๊ณผ์ ๋ฐ๋ผ ๋ณธ์ธ ์ธ์ฆ ์์ค์ ์กฐ์ ํ ์ ์๋ค. The authentication
๋ง์ฝ ์ด์ฉํจํด์ด ์ ์์ ์ธ ๊ฒ์ผ๋ก ๋ถ์๋ ๊ฒฝ์ฐ์๋ ๋ณธ์ธ ์ธ์ฆ ์์ค์ ์๋์ ์ผ๋ก ๋ฎ๊ฒ ์ค์ ํ๊ณ (๋จ๊ณ S20), ์ด์ฉํจํด์ด ๋น์ ์์ ์ธ ๊ฒ์ผ๋ก ๋ถ์๋ ๊ฒฝ์ฐ์๋ ๋ณธ์ธ ์ธ์ฆ ์์ค์ ์๋์ ์ผ๋ก ๋๊ฒ ์ค์ ํ๋ค(๋จ๊ณ S25). If the usage pattern is analyzed to be normal, the authentication level is set relatively low (step S20). If the usage pattern is analyzed to be abnormal, the authentication level is set relatively high (step S25).
๋ณธ์ธ ์ธ์ฆ ์์ค์ด ๋ฎ๋ค๋ ๊ฒ์ ํน์ ์ดํ๋ฆฌ์ผ์ด์ ์ ์คํ ํน์ ์ดํ๋ฆฌ์ผ์ด์ ๋ด์์ ํน์ ํ์๋ฅผ ์ํํ ๋ ๋ณธ์ธ ์ธ์ฆ์ด ์๊ตฌ๋๋ ๊ฒฝ์ฐ ๋ณธ์ธ ์ธ์ฆ ์๊ฑด์ ์ํ์์ผฐ์์ ์๋ฏธํ๋ค. ์์ปจ๋, ๊ธ์ต ๊ฑฐ๋๋ฅผ ์ํ ๋ณธ์ธ ์ธ์ฆ ์๊ฑด์ผ๋ก ์ํ์๋ช , ํ์ฑ์ธ์, ์ง๋ฌธ์ธ์ฆ, ๋น๋ฐ๋ฒํธ ์ ๋ ฅ ๋ฑ์ด ์์ ๋, ์ด๋ค ์ค n๊ฐ ์ดํ์ ๋ํ ํ์ธ๋ง์ผ๋ก๋ ๋ณธ์ธ ์ธ์ฆ์ด ๋๋๋ก ํ ์ ์๋ค. The low level of identity verification means that if identity verification is required when running a particular application or performing a specific action within an application, it means that the identity verification requirements have been relaxed. For example, when there is a handwritten signature, iris recognition, fingerprint authentication, password input, etc. as a requirement for identity verification for financial transactions, the identity verification may be performed by checking only n or less of them.
์ด์ ๋ฐ๋๋ก ๋ณธ์ธ ์ธ์ฆ ์์ค์ด ๋๋ค๋ ๊ฒ์ ์์ ์ค๋ช ํ ๋ค์์ ๋ณธ์ธ ์ธ์ฆ ์๊ฑด์ ๋ํด์ n๊ฐ ์ด์์ ๋ํ ํ์ธ์ ํ๋๋ก ๋ณธ์ธ ์ธ์ฆ ์๊ฑด์ ๊ฐํ์์ผฐ์์ ์๋ฏธํ๋ค. In contrast, a high level of identity means that the identity verification requirement has been strengthened to verify at least n of the multiple identity requirements described above.
๋ณธ์ธ ์ธ์ฆ์ ํ์๋ก ํ๋ ์ดํ๋ฆฌ์ผ์ด์
์ด ์คํ๋ ๋ ์ธ์ฆ์์ค ์กฐ์ ๋ถ(130)์ ์ํด ์กฐ์ ๋ ๋ณธ์ธ ์ธ์ฆ ์์ค์ด API(์ดํ๋ฆฌ์ผ์ด์
ํ๋ซํผ ์ธํฐํ์ด์ค)๋ก ์ ๊ณต๋ ์ ์๋ค. ๋๋ ํ์ ํ ๊ธ์ต ์๋ฒ์ ๊ฐ์ ์น ์๋ฒ์ ๋ฉ์์ง ํํ๋ก ๋ณธ์ธ ์ธ์ฆ ์์ค์ด ์ ์ก๋ ์๋ ์๋ค. When an application requiring identity authentication is executed, the identity level adjusted by the authentication
๋ณธ ์ค์์์์ ์ด์ฉํจํด ์์ง๋ถ(110)๋ ์์งํ ์ด์ฉํจํด์ ๋ถ์ํ๊ธฐ ์ข์ ๋ฐ์ดํฐ ํฌ๋งท์ผ๋ก ๊ฐ๊ณตํ ์ ์๋ค. ๋ํ, ์ด์ฉํจํด ์์ง๋ถ(110)์์ ์์งํ ์ด์ฉํจํด์ ๋ฐ์ดํฐ๋ฒ ์ด์ค์ ์ ์ฅ๋์ด, ๋ฏธ๋์ ์ด์ฉํจํด ๋ถ์์ ์ํ ๊ณผ๊ฑฐ ์ด๋ ฅ์ผ๋ก ์ด์ฉ๋ ์ ์๋ค. In the present embodiment, the
๋ํ, ์ด์ฉํจํด ์์ง๋ถ(110)๋ ์ด์ฉํจํด์ด ๋ฐ์ํ ๋๋ง๋ค ์์๋ก ํ์ฑํ๋์ด ์๋ํ ์ ์๋ค. ๊ทธ๋ฆฌ๊ณ ์ด์ฉํจํด ๋ถ์๋ถ(120) ๋ฐ ์ธ์ฆ์์ค ์กฐ์ ๋ถ(130)๋ ๋ณธ์ธ ์ธ์ฆ์ด ํ์ํ ๊ฒฝ์ฐ์๋ง ํ์ฑํ๋์ด ์๋ํ ์ ์๋ค. In addition, the
๋ณธ ์ค์์์ ๋ฐ๋ฅธ ์ฌ์ฉ์ ๋จ๋ง์์์ ๋ณธ์ธ ์ธ์ฆ ๊ณผ์ ์ ๋ํด ์๋ฅผ ๋ค์ด ์ค๋ช ํ๋ฉด ๋ค์๊ณผ ๊ฐ๋ค. Referring to the identity authentication process in the user terminal according to the embodiment as an example.
์ค๋งํธํฐ ์ฌ์ฉ์๊ฐ ํ์์ ์ถ๊ทผ์๊ฐ์ธ 8์๋ถํฐ 9์๊น์ง๋ ์ฃผ๋ก ์์ ์ฑ์ ์ด์ฉํ์ฌ ์์ ์ ๋ฃ๊ณ , ์ ์ฌ์๊ฐ์๋ ์น๊ตฌ๋ค๊ณผ SNS๋ฅผ ํ๋ ๋ฑ์ ํจํด์ ๋ถ์ํ์ฌ ๊ฐ์๊ธฐ ์ฌ์ฉํ์ง ์๋ ์ฑ์ ์ฌ์ฉ์ ํ๋ค๋ ๊ฐ, ์๋๋ฉด ์ถ๊ทผ์๊ฐ์ ์์ ์ฑ์ ์ฌ์ฉํ์ง ์๋ ๋ฑ์ ๋น์ ์์ ์ธ ํจํด์ด ๋ณด์ด๋ ๊ฒฝ์ฐ์๋ ๋ณธ์ธ์ด ์๋ ์ ์๋ค๋ ํ๋จ์ ์ํ์ฌ ๋ชจ๋ฐ์ผ๋ฑ ํน ๋ฑ ๋ณธ์ธ์ธ์ฆ์ด ํ์ํ ๊ฒฝ์ฐ ๋ ๊ฐํ๋ ๋ณธ์ธ์ธ์ฆ ์๋จ์ ์ฌ์ฉํ๊ฒ ํ์ง๋ง, ์ฌ์ฉ์์ ํจํด์ด ์ผ์ ํ ๊ฒฝ์ฐ๋ ๊ฐ๋จํ ๋ฐฉ์์ ๋ก๊ทธ์ธ์ผ๋ก ๋ณธ์ธ์ธ์ฆ์ ๋ง๋ฌด๋ฆฌ ํ ์ ์๋ค. Smartphone users usually listen to music using the music app from 8:00 to 9 o'clock, and analyze the patterns such as socializing with friends during lunchtime, and suddenly use an app that they do not use. Or, if you see an abnormal pattern such as not using the music app at work, if you need to verify your identity, such as mobile banking by the judgment that you may not be able to use a stronger authentication means, but the pattern of the user In this case, you can finish the authentication by simple login.
๋ณธ ๋ฐ๋ช ์ ๋ ๋ค๋ฅธ ์ผ๋ก๋ฅผ ๋ค๋ฉด. ๋ชจ๋ฐ์ผ ๋ฑ ํน์ ํ์์ ์์ฃผ ๊ฑฐ๋ํ๋ ์ฌ๋๊ณผ์ ์ก๊ธ์ ์ด์ฉํจํด์ด ์ผ์ ํ ๊ฒ์ผ๋ก ๋ณด๊ณ ๊ฐ๋จํ ๋ก๊ทธ์ธ์ผ๋ก ๊ฐ๋ฅํ๊ฒ ํ ์ ์์ง๋ง, ์๋ก์ด ์ฌ๋ ๋๋ ์๋ก์ด ๊ณ์ข๋ฒํธ์ธ ๊ฒฝ์ฐ๋ ์ด์ฉํจํด์ด ๋ณํ๋ ๊ฒ์ผ๋ก ๋ณด๊ณ ๋ ๊ฐํ๋ ๋ณด์์๋จ์ ๊ฑฐ์ณ์ผ๋ง ๋ณธ์ธ์ธ์ฆ์ด ๋๋๋ก ํ ์ ์๋ค.For another example of the present invention. In the case of mobile banking, remittances with people who frequently trade can be made by a simple log-in by seeing a certain usage pattern, but in the case of a new person or a new account number, the usage pattern has been changed and must go through stronger security measures. It can be authenticated.
๋ 3์ ๋ณธ ๋ฐ๋ช ์ ์ผ ์ค์์์ ๋ฐ๋ฅธ ์ฌ์ฉ์์ ์ด์ฉํจํด ๋ถ์์ ํ์ฉํ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ๊ฐ๋ต์ ์ธ ๊ตฌ์ฑ ๋ธ๋ก๋ ๋ฐ ๋ณธ์ธ ์ธ์ฆ ๋ฐฉ๋ฒ์ ํ๋ฆ๋์ด๊ณ , ๋ 4๋ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ํฌํจ๋๋ ๊ธ์ต ์๋ฒ์ ๊ฐ๋ต์ ์ธ ๊ตฌ์ฑ ๋ธ๋ก๋์ด๋ฉฐ, ๋ 5๋ ๋ณธ์ธ ์ธ์ฆ ์์คํ ์ ํฌํจ๋๋ ๋ฉ์์ง ์ธ์ฆ ์๋ฒ์ ๊ฐ๋ต์ ์ธ ๊ตฌ์ฑ ๋ธ๋ก๋์ด๋ค. 3 is a schematic block diagram of a user authentication system utilizing a user pattern analysis according to an embodiment of the present invention and a flow chart of a user authentication method, and FIG. 4 is a schematic diagram of a financial server included in a user authentication system. 5 is a schematic block diagram of a message authentication server included in an identity authentication system.
๋ณธ ์ค์์์ ๋ฐ๋ฅธ ์ฌ์ฉ์์ ์ด์ฉํจํด ๋ถ์์ ํ์ฉํ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(1)์ ์ ์ ํ ์ฌ์ฉ์ ๋จ๋ง์์ ์ ์ก๋๋ ๋ณธ์ธ ์ธ์ฆ ์์ค ๋ฉ์์ง๋ฅผ ์ด์ฉํ์ฌ ๊ธ์ต ์๋ฒ์ ๊ฐ์ ์น ์๋ฒ์์ ๋ก๊ทธ์ธ ๋ฑ์ ์๊ตฌ๋๋ ๋ณธ์ธ ์ธ์ฆ ์์ค์ ์ด์ฉํจํด์ ๋ฐ๋ผ ์์ดํ๊ฒ ์ ์ฉ์ํฌ ์ ์๋ค. ์ด ๊ณผ์ ์์ ๋ฉ์์ง ์ธ์ฆ ์๋ฒ๋ฅผ ํตํ ๋ฉ์์ง ์ธ์ฆ์ ํตํด ๋ณธ์ธ ์ธ์ฆ ์์ค ๋ฉ์์ง์ ๋ํ ์ธ์ฆ์ด ์ถ๊ฐ์ ์ผ๋ก ์ํ๋์ด, ๋ฉ์์ง ์ ์ก ๊ณผ์ ์์์ ํดํน๊ณผ ๊ฐ์ ๋ฐ์ ๊ฐ๋ฅํ ๋ฌธ์ ์ ๋ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ์ ์ค๋ฅ๋ฅผ ์ฐจ๋จํ ์ ์๋ค. The
๋ณธ ์ค์์์ ๋ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ ์์คํ
(1)์ ์ฌ์ฉ์ ๋จ๋ง(100), ๋ฉ์์ง ์ธ์ฆ ์๋ฒ(300), ์น ์๋ฒ(200)๋ฅผ ํฌํจํ๋ค. The
์ฌ์ฉ์ ๋จ๋ง(100)์ ๋ 1์ ์ฐธ์กฐํ์ฌ ์ค๋ช
ํ ๋ฐ ์์ผ๋ฉฐ, ๋ฉ์์ง ์ ์ก์ ์ํ ์ถ๊ฐ์ ์ธ ๊ตฌ์ฑ์์์ธ ํค ๋ฑ๋ก๋ถ(140) ๋ฐ ๋ฉ์์ง ์ ์ก๋ถ(150)๋ฅผ ๋ ํฌํจํ ์ ์๋ค. The
์น ์๋ฒ(200)๋ ๋ฉ์์ง ์์ ๋ถ(210), ์ธ์ฆ ์์ฒญ๋ถ(220), ์ธ์ฆ๊ฒฐ๊ณผ ์์ ๋ถ(230), ์์ค๋ณ ๋ก๊ทธ์ธ ์ํ๋ถ(240)๋ฅผ ํฌํจํ๊ณ , ๋ฉ์์ง ์ธ์ฆ ์๋ฒ(300)๋ ๊ณต๊ฐํค ๋ฑ๋ก๋ถ(310), ์์ฒญ ์์ ๋ถ(320), ๋ฉ์์ง ์ธ์ฆ๋ถ(330), ์ธ์ฆ๊ฒฐ๊ณผ ์ ์ก๋ถ(340)๋ฅผ ํฌํจํ๋ค. The
ํค ๋ฑ๋ก๋ถ(140)๋ ์ธ์ฆ์์ค ์กฐ์ ๋ถ(130)์์ ์กฐ์ ๋ ๋ณธ์ธ ์ธ์ฆ ์์ค์ ๋ฉ์์ง ํํ๋ก ์ ์กํ๋ ๊ณผ์ ์์ ๋ณด์์ ์ํด ์์ ์ด๋ฃจ๋ ๊ฐ์ธํค์ ๊ณต๊ฐํค๋ฅผ ์์ฑํ์ฌ ๋ฑ๋กํ๋ค. The
ํค ๋ฑ๋ก๋ถ(140)์์ ์์ฑ๋ ๊ฐ์ธํค๋ ์ฌ์ฉ์ ๋จ๋ง(100)์ ๋ณด์ ์์ญ์ ๋ฑ๋ก๋๋ฉฐ, ๊ณต๊ฐํค๋ ๋ฉ์์ง ์ธ์ฆ ์๋ฒ(300)๋ก ์ ์ก๋์ด ๊ณต๊ฐํค ๋ฑ๋ก๋ถ(310)์ ์ํด ๋ฉ์์ง ์ธ์ฆ ์๋ฒ(300) ๋ด์ ๋ฑ๋ก๋๋ค(๋จ๊ณ S50). The private key generated by the
๋ฉ์์ง ์ ์ก๋ถ(150)๋ ์ธ์ฆ์์ค ์กฐ์ ๋ถ(130)์์ ์กฐ์ ๋ ๋ณธ์ธ ์ธ์ฆ ์์ค์ ์น ์๋ฒ(200)๋ก ์ ๋ฌํ๊ธฐ ์ํด ๋ฉ์์ง ํํ๋ก ๋ง๋ค์ด ์ ์กํ๋ค(๋จ๊ณ S55). ๋ฉ์์ง ์ ์ก๋ถ(150)๋ ํค ๋ฑ๋ก๋ถ(140)์ ๋ฑ๋ก๋ ๊ฐ์ธํค๋ฅผ ์ด์ฉํ์ฌ ๋ณธ์ธ ์ธ์ฆ ์์ค ๋ฉ์์ง๋ฅผ ์ํธํํ์ฌ ์ ์กํ ์ ์๋ค. The
์น ์๋ฒ(200)์ ๋ฉ์์ง ์์ ๋ถ(210)๋ ๋ณธ์ธ ์ธ์ฆ ์์ค ๋ฉ์์ง๋ฅผ ์ ์ก๋ฐ๋๋ค. ์ด ๋ ์ ์ก๋ฐ์ ๋ณธ์ธ ์ธ์ฆ ์์ค ๋ฉ์์ง๋ ๊ฐ์ธํค๋ก ์ํธํ๋์ด ์์ด ๋ณตํธํ๊ฐ ๋ถ๊ฐ๋ฅํ๋ค. ๋ฐ๋ผ์, ์น ์๋ฒ(200)์ ์ธ์ฆ ์์ฒญ๋ถ(220)๋ ๋ฉ์์ง ์ธ์ฆ ์๋ฒ(300)๋ก ์ ์ก๋ฐ์ ๋ณธ์ธ ์ธ์ฆ ์์ค ๋ฉ์์ง๋ฅผ ์ ์กํ๋ฉด์ ์ธ์ฆ์ ์์ฒญํ๋ค(๋จ๊ณ S60). ๋ฉ์์ง ์ธ์ฆ ์์ฒญ์๋ ์ ๋นํ ์ฌ์ฉ์ ๋จ๋ง๋ก๋ถํฐ์ ๋ฉ์์ง์ธ ๊ฒฝ์ฐ ๋ณตํธํ๋ฅผ ์์ฒญํ๋ ๋ด์ฉ์ด ํฌํจ๋ ์ ์๋ค. The
๋ฉ์์ง ์ธ์ฆ ์๋ฒ(300)์ ์์ฒญ ์์ ๋ถ(320)๋ ์น ์๋ฒ(200)์ ์ธ์ฆ ์์ฒญ๋ถ(220)๋ก๋ถํฐ ๋ฉ์์ง ์ธ์ฆ ์์ฒญ์ ์์ ํ๋ฉฐ, ์ด ๊ฒฝ์ฐ ๋ฉ์์ง ์ธ์ฆ๋ถ(330)์์ ๋ฉ์์ง ์ธ์ฆ์ ์ํํ๋ค(๋จ๊ณ S65). The
๋ฉ์์ง ์ธ์ฆ์ ๋ฉ์์ง ์ธ์ฆ ์๋ฒ(300)์ ๋ฑ๋ก๋ ๊ณต๊ฐํค๋ฅผ ์ด์ฉํ์ฌ ๊ฐ์ธํค๋ก ์ํธํ๋ ๋ณธ์ธ ์ธ์ฆ ์์ค ๋ฉ์์ง์ ๋ณตํธํ๊ฐ ๊ฐ๋ฅํ์ง๋ฅผ ํ์
ํจ์ผ๋ก์จ ์ด๋ฃจ์ด์ง ์ ์๋ค. The message authentication may be performed by using the public key registered in the
๋ฉ์์ง ์ธ์ฆ ์๋ฒ(300)์ ๋ฑ๋ก๋ ๊ณต๊ฐํค๋ก ๋ณตํธํ๊ฐ ๋์ง ์๋ ๊ฒฝ์ฐ, ์ํธํ์ ์ด์ฉ๋ ๊ฐ์ธํค์ ๋ฉ์์ง ์ธ์ฆ ์๋ฒ(300)์ ๋ฑ๋ก๋ ๊ณต๊ฐํค๊ฐ ์๋ก ๋งค์นญ๋์ง ์๋ ๊ฒ์ผ๋ก ํด๋น ๋ฉ์์ง๊ฐ ์ ๋นํ ์ฌ์ฉ์ ๋จ๋ง๋ก๋ถํฐ ์ค์ง ์์ ๊ฒ์ผ๋ก ๋ณผ ์ ์๋ค. ์ด ๊ฒฝ์ฐ ์ธ์ฆ๊ฒฐ๊ณผ ์ ์ก๋ถ(340)๋ ๋ฉ์์ง ์ธ์ฆ ์คํจ๋ก ์ธ์ฆ๊ฒฐ๊ณผ๋ฅผ ์ ์กํ ์ ์๋ค(๋จ๊ณ S70). If the public key registered in the
๋ฉ์์ง ์ธ์ฆ ์๋ฒ(300)์ ๋ฑ๋ก๋ ๊ณต๊ฐํค๋ก ๋ณตํธํ๊ฐ ๋๋ ๊ฒฝ์ฐ, ์ํธํ์ ์ด์ฉ๋ ๊ฐ์ธํค์ ๋ฉ์์ง ์ธ์ฆ ์๋ฒ(300)์ ๋ฑ๋ก๋ ๊ณต๊ฐํค๊ฐ ์๋ก ๋งค์นญ๋๋ ๊ฒ์ผ๋ก ํด๋น ๋ฉ์์ง๊ฐ ์ ๋นํ ์ฌ์ฉ์ ๋จ๋ง๋ก๋ถํฐ ์จ ๊ฒ์ผ๋ก ๋ณผ ์ ์๋ค. ์ด ๊ฒฝ์ฐ ์ธ์ฆ๊ฒฐ๊ณผ ์ ์ก๋ถ(340)๋ ๋ฉ์์ง ์ธ์ฆ ์ฑ๊ณต์ผ๋ก ์ธ์ฆ๊ฒฐ๊ณผ๋ฅผ ์ ์กํ ์ ์๋ค. ์ธ์ฆ๊ฒฐ๊ณผ์ ํจ๊ป ๋ณตํธํ๋ ๋ณธ์ธ ์ธ์ฆ ์์ค ๋ฉ์์ง๋ฅผ ํจ๊ป ์ ์กํ ์ ์๋ค. When decrypted with the public key registered in the
์น ์๋ฒ(200)์ ์ธ์ฆ๊ฒฐ๊ณผ ์์ ๋ถ(230)์์๋ ๋ฉ์์ง ์ธ์ฆ ์๋ฒ(300)๋ก๋ถํฐ ์ธ์ฆ๊ฒฐ๊ณผ๋ฅผ ์์ ํ๋ค. ์์ ํ ์ธ์ฆ๊ฒฐ๊ณผ๊ฐ ๋ฉ์์ง ์ธ์ฆ ์คํจ์ธ ๊ฒฝ์ฐ์๋ ๋ณธ์ธ ์ธ์ฆ ์์ค ๋ฉ์์ง ์์ฒด์ ๋ฌธ์ ๊ฐ ์๋ ๊ฒ์ผ๋ก ๋ณด๊ณ , ๋ก๊ทธ์ธ ์์ฒด๊ฐ ๋ถ๊ฐ๋ฅํ๊ฒ ํ ์ ์๋ค. The
์์ ํ ์ธ์ฆ๊ฒฐ๊ณผ๊ฐ ๋ฉ์์ง ์ธ์ฆ ์ฑ๊ณต์ธ ๊ฒฝ์ฐ ์์ค๋ณ ๋ก๊ทธ์ธ ์ํ๋ถ(240)์์๋ ์ธ์ฆ๊ฒฐ๊ณผ์ ํจ๊ป ์์ ํ ๋ณตํธํ๋ ๋ณธ์ธ ์ธ์ฆ ์์ค ๋ฉ์์ง์ ๋ฐ๋ผ ์์ค๋ณ ๋ก๊ทธ์ธ์ด ์ํ๋๊ฒ ํ ์ ์๋ค(๋จ๊ณ S75). If the received authentication result is a message authentication success level
๋ณธ์ธ ์ธ์ฆ ์์ค์ด ์๋์ ์ผ๋ก ๋ฎ๊ฒ ์ค์ ๋ ๊ฒฝ์ฐ์๋ ๊ฐ๋จํ ๋ณธ์ธ ์ธ์ฆ ์ ์ฐจ๋ฅผ ํตํด ๋ก๊ทธ์ธ์ด ๊ฐ๋ฅํ๊ฒ ํ๊ณ , ๋ณธ์ธ ์ธ์ฆ ์์ค์ด ์๋์ ์ผ๋ก ๋๊ฒ ์ค์ ๋ ๊ฒฝ์ฐ์๋ ๋ณด๋ค ๊ฐํ๋ ๋ณธ์ธ ์ธ์ฆ ์ ์ฐจ๋ฅผ ํตํด์๋ง ๋ก๊ทธ์ธ์ด ๊ฐ๋ฅํ๊ฒ ํ ์ ์๋ค. If the authentication level is set relatively low, the user can log in through a simple authentication process. If the authentication level is set relatively high, the user can log in only through a stronger authentication process.
๋ณธ์ธ ์ธ์ฆ ์์ค์ ๋ฐ๋ฅธ ๋ก๊ทธ์ธ์ ์ํ ๋ณธ์ธ ์ธ์ฆ ์ ์ฐจ์ ์ ๋์ ๋ํด์๋ ํ์์ ๋ฐ๋ผ ๋ค์ํ๊ฒ ์ค์ ๋ ์ ์์ ๊ฒ์ด๋ค. The degree of identity verification procedure for login according to the identity verification level may be set as needed.
์์ ํ ๋ณธ ์ค์์์ ๋ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ ๋ฐฉ๋ฒ์ ์ปดํจํฐ๋ก ์ฝ์ ์ ์๋ ๊ธฐ๋ก ๋งค์ฒด์ ์ปดํจํฐ๊ฐ ์ฝ์ ์ ์๋ ์ฝ๋๋ก์ ๊ตฌํ๋๋ ๊ฒ์ด ๊ฐ๋ฅํ๋ค. ์ปดํจํฐ๊ฐ ์ฝ์ ์ ์๋ ๊ธฐ๋ก๋งค์ฒด๋ก๋ ์ปดํจํฐ ์์คํ ์ ์ํ์ฌ ํด๋ ๋ ์ ์๋ ๋ฐ์ดํฐ๊ฐ ์ ์ฅ๋ ๋ชจ๋ ์ข ๋ฅ์ ๊ธฐ๋ก ๋งค์ฒด๋ฅผ ํฌํจํ๋ค. ์๋ฅผ ๋ค์ด, ROM(Read Only Memory), RAM(Random Access Memory), ์๊ธฐ ํ ์ดํ, ์๊ธฐ ๋์คํฌ, ํ๋์ฌ ๋ฉ๋ชจ๋ฆฌ, ๊ด ๋ฐ์ดํฐ ์ ์ฅ์ฅ์น ๋ฑ์ด ์์ ์ ์๋ค. ๋ํ, ์ปดํจํฐ๊ฐ ์ฝ์ ์ ์๋ ๊ธฐ๋ก๋งค์ฒด๋ ์ปดํจํฐ ํต์ ๋ง์ผ๋ก ์ฐ๊ฒฐ๋ ์ปดํจํฐ ์์คํ ์ ๋ถ์ฐ๋์ด, ๋ถ์ฐ๋ฐฉ์์ผ๋ก ์ฝ์ ์ ์๋ ์ฝ๋๋ก์ ์ ์ฅ๋๊ณ ์คํ๋ ์ ์๋ค. The authentication method according to the present embodiment described above can be embodied as computer readable codes on a computer readable recording medium. Computer-readable recording media include all kinds of recording media having data stored thereon that can be decrypted by a computer system. For example, there may be a read only memory (ROM), a random access memory (RAM), a magnetic tape, a magnetic disk, a flash memory, an optical data storage device, and the like. The computer readable recording medium can also be distributed over computer systems connected over a computer network, stored and executed as readable code in a distributed fashion.
์๊ธฐ์์๋ ๋ณธ ๋ฐ๋ช ์ ๋ฐ๋์งํ ์ค์์๋ฅผ ์ฐธ์กฐํ์ฌ ์ค๋ช ํ์์ง๋ง, ํด๋น ๊ธฐ์ ๋ถ์ผ์์ ํต์์ ์ง์์ ๊ฐ์ง ์๋ผ๋ฉด ํ๊ธฐ์ ํนํ ์ฒญ๊ตฌ์ ๋ฒ์์ ๊ธฐ์ฌ๋ ๋ณธ ๋ฐ๋ช ์ ์ฌ์ ๋ฐ ์์ญ์ผ๋ก๋ถํฐ ๋ฒ์ด๋์ง ์๋ ๋ฒ์ ๋ด์์ ๋ณธ ๋ฐ๋ช ์ ๋ค์ํ๊ฒ ์์ ๋ฐ ๋ณ๊ฒฝ์ํฌ ์ ์์์ ์ดํดํ ์ ์์ ๊ฒ์ด๋ค.Although the above has been described with reference to a preferred embodiment of the present invention, those skilled in the art to which the present invention pertains without departing from the spirit and scope of the present invention as set forth in the claims below It will be appreciated that modifications and variations can be made.
Claims (12)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR1020170002560A KR101762615B1 (en) | 2017-01-06 | 2017-01-06 | Identification system and user terminal using usage pattern analysis |
| KR10-2017-0002560 | 2017-01-06 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2018128237A1 true WO2018128237A1 (en) | 2018-07-12 |
Family
ID=59419169
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/KR2017/007955 Ceased WO2018128237A1 (en) | 2017-01-06 | 2017-07-24 | Identity authentication system and user equipment utilizing user usage pattern analysis |
Country Status (2)
| Country | Link |
|---|---|
| KR (1) | KR101762615B1 (en) |
| WO (1) | WO2018128237A1 (en) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR102069689B1 (en) * | 2018-03-30 | 2020-01-23 | ์ฃผ์ํ์ฌ ํ๋ซํผ๋ฒ ์ด์ค | Method and system for authentication of electronic lock based on usage pattern |
| KR102143181B1 (en) * | 2018-08-29 | 2020-08-10 | (์ฃผ)ํ๋ฅด์๋์์ด์์ด | Identification method, apparatus and program for fraud detection |
| KR102259156B1 (en) * | 2020-09-28 | 2021-06-01 | ๋ฐ๋์ | Authentication system and method for network environment |
| KR102641501B1 (en) * | 2021-09-30 | 2024-02-27 | ์ฃผ์ํ์ฌ ์นด์นด์ค๋ฑ ํฌ | Method for detecting fraud using verification of Social Networking Service |
| KR102471998B1 (en) * | 2022-06-23 | 2022-12-02 | (์ฃผ)ํญํ | Computer device, method and computer program for providing fido biometric authentication security key based file management service |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20070013969A (en) * | 2005-07-27 | 2007-01-31 | ์์ธ์ ์ฉํ๊ฐ์ ๋ณด ์ฃผ์ํ์ฌ | Identification system and method for identifying subject using customer behavior analysis information |
| KR20130085544A (en) * | 2011-12-19 | 2013-07-30 | ์ฃผ์ํ์ฌ ์ผ์ดํฐ | Apparatus and method for control of applications using application sign authentication |
| KR20140065839A (en) * | 2012-11-22 | 2014-05-30 | ํ๊ตญ์ ์ํต์ ์ฐ๊ตฌ์ | Apparatus and system for upstreaming personal lifelog data and method thereof |
| KR20150102292A (en) * | 2014-02-28 | 2015-09-07 | ์ฃผ์ํ์ฌ ์ํ๋ธ | System and method for providing location authentication service using message |
| JP2016062189A (en) * | 2014-09-16 | 2016-04-25 | ๆ ชๅผไผ็คพใฝใใใดใฉใผใใง | Personal authentication system |
-
2017
- 2017-01-06 KR KR1020170002560A patent/KR101762615B1/en not_active Expired - Fee Related
- 2017-07-24 WO PCT/KR2017/007955 patent/WO2018128237A1/en not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20070013969A (en) * | 2005-07-27 | 2007-01-31 | ์์ธ์ ์ฉํ๊ฐ์ ๋ณด ์ฃผ์ํ์ฌ | Identification system and method for identifying subject using customer behavior analysis information |
| KR20130085544A (en) * | 2011-12-19 | 2013-07-30 | ์ฃผ์ํ์ฌ ์ผ์ดํฐ | Apparatus and method for control of applications using application sign authentication |
| KR20140065839A (en) * | 2012-11-22 | 2014-05-30 | ํ๊ตญ์ ์ํต์ ์ฐ๊ตฌ์ | Apparatus and system for upstreaming personal lifelog data and method thereof |
| KR20150102292A (en) * | 2014-02-28 | 2015-09-07 | ์ฃผ์ํ์ฌ ์ํ๋ธ | System and method for providing location authentication service using message |
| JP2016062189A (en) * | 2014-09-16 | 2016-04-25 | ๆ ชๅผไผ็คพใฝใใใดใฉใผใใง | Personal authentication system |
Also Published As
| Publication number | Publication date |
|---|---|
| KR101762615B1 (en) | 2017-07-31 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2018128237A1 (en) | Identity authentication system and user equipment utilizing user usage pattern analysis | |
| US8713701B2 (en) | Multichannel device utilizing a centralized out-of-band authentication system (COBAS) | |
| WO2011118871A1 (en) | Authentication method and system using portable terminal | |
| WO2019177298A1 (en) | Method and apparatus for managing user authentication in a blockchain network | |
| WO2018155920A1 (en) | Method and apparatus for authenticating users in internet of things environment | |
| BR0318596A (en) | method and system for authenticating a data processing terminal to a user, method by which a data processing terminal in a data processing system is authenticated, method by which an authentication data processing server authenticates a processing terminal user data, computer program, computer program product, and authentication set to authenticate a user's data processing terminal in a data processing system | |
| US20130305325A1 (en) | Methods for Thwarting Man-In-The-Middle Authentication Hacking | |
| WO2015069018A1 (en) | System for secure login, and method and apparatus for same | |
| WO2018216988A1 (en) | Security authentication system and security authentication method for creating security key by combining authentication factors of multiple users | |
| US7512967B2 (en) | User authentication in a conversion system | |
| WO2022045419A1 (en) | Blockchain-network-based driver license authentication service method using decentralized id, and user terminal for performing driver license authentication service | |
| WO2020117020A1 (en) | Method for generating pki key based on biometric information and device for generating key by using same method | |
| WO2021040283A1 (en) | Time and attendance management system server capable of performing time and attendance management on basis of wireless ap access information, and operation method thereof | |
| WO2018216991A1 (en) | Security authentication method for creating security key by combining authentication factors of multiple users | |
| WO2018043951A1 (en) | Pos device and system for performing payment authentication using biometric information, and control method therefor | |
| WO2018169150A1 (en) | Locked screen-based user authentication system and method | |
| JP2002229951A (en) | Person identification system | |
| WO2025192952A1 (en) | Apparatus for preventing phishing and operating method thereof | |
| Giura et al. | Is it really you? User identification via adaptive behavior fingerprinting | |
| US20110022841A1 (en) | Authentication systems and methods using a packet telephony device | |
| US20250047667A1 (en) | Collaboration application integration for user-identity verification | |
| WO2014163420A1 (en) | Identity certification system and method for providing same | |
| WO2017115965A1 (en) | User identification system and method using autograph in plurality of terminals | |
| WO2012169752A2 (en) | Authentication system and method for device attempting connection | |
| WO2025014013A1 (en) | Operation server for safe phone service using qr code, and operation method thereof |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17890130 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 17890130 Country of ref document: EP Kind code of ref document: A1 |