[go: up one dir, main page]

WO2018128237A1 - Identity authentication system and user equipment utilizing user usage pattern analysis - Google Patents

Identity authentication system and user equipment utilizing user usage pattern analysis Download PDF

Info

Publication number
WO2018128237A1
WO2018128237A1 PCT/KR2017/007955 KR2017007955W WO2018128237A1 WO 2018128237 A1 WO2018128237 A1 WO 2018128237A1 KR 2017007955 W KR2017007955 W KR 2017007955W WO 2018128237 A1 WO2018128237 A1 WO 2018128237A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
authentication
message
user terminal
usage pattern
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/KR2017/007955
Other languages
French (fr)
Korean (ko)
Inventor
๊น€์šฐ์„ญ
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Finotek
Original Assignee
Finotek
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Finotek filed Critical Finotek
Publication of WO2018128237A1 publication Critical patent/WO2018128237A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORYย PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/26Speech to text systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Definitions

  • the present invention relates to a user authentication system and a user terminal using analysis of a usage pattern of a user.
  • Korean Patent Laid-Open No. 10-2015-0096063 discloses an authentication apparatus and method based on a digital signature.
  • the present invention is determined to be in possession of the person as usual, and lowers the level of authentication. It is to provide a user authentication system and a user terminal utilizing analysis of a user's usage pattern that can secure the improved accuracy with the ease of authentication.
  • a usage pattern collecting unit for collecting a usage pattern for the user terminal of the user;
  • a usage pattern analyzer for analyzing whether the usage pattern is normal or not;
  • an authentication user terminal using an analysis of a usage pattern of a user including an authentication level adjustment unit for adjusting an authentication level, is provided.
  • the usage pattern relates to the location of the user terminal, and at the specific time point, the usage pattern analysis unit according to a result of comparing at least one of GPS information of the user terminal and identification information of the Wi-Fi router connected to the user terminal. It is possible to determine whether it is normal.
  • the usage pattern relates to the call history through the user terminal, and primarily determines whether the use pattern analysis unit is normal according to a result of analyzing the call counterpart and the call time, and if necessary, According to a result of whether or not the result of STT conversion of the voice includes the designated follow-up for the user, the use pattern analyzer may determine whether it is normal.
  • the usage pattern relates to the details of SNS usage, and primarily determines whether the usage pattern analysis unit is normal according to a result of analyzing the SNS chat partner and the chat time, and if necessary, a specific emoticon designated for the user.
  • the pattern analysis unit may determine whether the input pattern is normal by analyzing the input deleted by the backspace when the backspace is input or when the character is input. have.
  • the usage pattern may include at least one of a location of the user terminal, a call history through the user terminal, an SNS usage history, and an application occupancy rate of the application, and the usage pattern analyzer may determine whether it is normal through an OR condition calculation. .
  • the authentication level adjusting unit may set the authentication level relatively low when the usage pattern is analyzed as normal, and set the authentication level relatively high when the usage pattern is analyzed as abnormal.
  • the authentication level adjustment unit may include a message transmission unit for transmitting the authentication level adjusted in the form of a message.
  • the apparatus may further include a key registration unit that registers a private key paired with a public key to be registered in a message authentication server to the user terminal, wherein the message transmission unit encrypts the authentication level message with the private key and transmits the private key to the web server.
  • a user terminal for collecting and analyzing a user's usage pattern and transmitting a user authentication level message encrypted with a private key of the authentication level adjusted according to whether the usage pattern is normal;
  • a web server configured to receive the encrypted identity authentication level message and perform login for each level according to the identity authentication level included in the identity authentication level message only when message authentication of the identity authentication level message is successful;
  • a public key corresponding to the private key is registered, decrypts the encrypted user authentication level message with the public key according to a message authentication request from the web server, performs message authentication, and transmits an authentication result to the web server.
  • a user authentication system utilizing a user pattern analysis, including a message authentication server.
  • the message authentication server may transmit a message authentication success as the authentication result when the decryption is successful with the public key, and transmit a message authentication failure as the authentication result when decryption with the public key fails.
  • the message authentication server may transmit the decrypted identity authentication message to the web server in the case of successful message authentication.
  • the web server may log in by checking only n items, such as handwritten signature, iris recognition, fingerprint authentication, and password input, corresponding to the user authentication level.
  • a user terminal such as a smart phone
  • a level of authentication of the person if it is the same as usual, it is determined as the possession state of the user and lowers the level of authentication of the person, and if it is different from the usual, Increasing the level of authentication has the effect of simplifying identity verification and ensuring improved accuracy.
  • FIG. 1 is a schematic configuration block diagram of a user terminal for user authentication using analysis of a user's usage pattern according to an embodiment of the present invention
  • FIG. 2 is a flow chart of a user authentication method performed in the user terminal of FIG.
  • FIG. 3 is a schematic block diagram of a user authentication system using a user pattern analysis according to an embodiment of the present invention and a flow chart of a user authentication method;
  • FIG. 4 is a schematic structural block diagram of a financial server included in a personal authentication system
  • FIG. 5 is a schematic structural block diagram of a message authentication server included in a user authentication system.
  • first and second may be used to describe various components, but the components should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.
  • FIG. 1 is a schematic block diagram of a user terminal for user authentication using analysis of a usage pattern of a user according to an embodiment of the present invention
  • FIG. 2 is a flowchart of a user authentication method performed in the user terminal of FIG. .
  • the user terminal 100 for the user authentication using the analysis of the use pattern of the user collects and analyzes the use pattern of the user to determine whether the user possesses the user according to the degree similar to the pattern normally used by the user. It is characterized in that it is possible to adjust the level of identity authentication in the situation where the identity verification is required.
  • the user terminal 100 for identity verification includes a usage pattern collector 110, a usage pattern analyzer 120, and an authentication level adjuster 130.
  • the use pattern collector 110, the use pattern analyzer 120, and the authentication level adjuster 130 may be implemented as software in an application form installed in the user terminal 100 such as a smartphone.
  • the usage pattern collecting unit 110 collects information on the usage pattern of the user using the user terminal 100 (step S10).
  • the usage pattern collection may be limited to within a predetermined time (for example, 3 hours) from the present time. This is because there may be difficulty in grasping the latest state of the user terminal 100 by information collected in the past despite the change in the recent state of the user terminal 100 due to loss or the like.
  • the collection time of the usage pattern may be variously set according to at least one of a user attribute such as an age, a place of residence, and the like of the usage pattern.
  • the usage pattern to be collected may include at least one of location information of the user terminal, call information through the user terminal, social network service (SNS) usage information using the user terminal, and application usage share.
  • SNS social network service
  • the usage pattern analyzer 120 analyzes the usage patterns collected by the usage pattern collector 110 to determine whether they are normal (step S15).
  • the normal usage pattern means that the usage pattern is expected to be performed by a user designated for the user terminal 100.
  • the analysis when the usage pattern is location information of the user terminal is as follows.
  • the designated user has the corresponding user terminal 100, it is determined whether the user terminal 100 is located at the location where the user is expected to be present.
  • the main location of the user is a home and a company
  • the location information collected by the user terminal 100 is a home or a company set for the user, it is determined to be normal. It may be determined that the usage pattern of the user terminal is abnormal.
  • the location information of the user terminal may be used for analysis in association with time information. For example, if the location set for the user is a home or a company, the usage pattern is normal only when the user terminal is located at or near the company if the workday is a weekday (for example, 9:00 AM to 18:00 AM). If the location of the user terminal is at home despite the working hours on weekdays, it may be determined that the usage pattern is abnormal.
  • the location information of the user terminal used to analyze the usage pattern may be a GPS value.
  • the usage pattern collector 110 may obtain location information of the user terminal from a GPS module separately provided in the user terminal 100.
  • the location information of the user terminal may be identification information of the Wi-Fi router connected to the corresponding user terminal 100.
  • the GPS value described above indicates the correct location when the user terminal 100 is located outdoors, but cannot be utilized because the GPS signal is not received when the user terminal 100 is located outdoors. Therefore, it is possible to utilize the Wi-Fi (WiFi) communication that is used a lot in the user terminal 100, such as a smart phone.
  • the user terminal In order to perform Wi-Fi communication, the user terminal needs to access a Wi-Fi router installed at an arbitrary location in the room, and the Wi-Fi router to be connected has identification information (eg, a Mac address) that can be distinguished from other Wi-Fi routers.
  • identification information eg, a Mac address
  • the identification information of the Wi-Fi router which is currently connected to the user terminal is one of the identification information of the Wi-Fi router having a previously accessed history registered in the database, it may be determined that the usage pattern of the user terminal is normal.
  • the identification information of the currently connected Wi-Fi router is compared with the identification information of the previously-connected Wi-Fi router registered in the database, when there is no identical information, the place where the user terminal has not been previously located As seen from, it may be determined that the usage pattern of the user terminal is abnormal.
  • the frequency of the call is designated by the user, or according to the result of analyzing the past history, the top few persons having a large number of calls may be set as a reference for determining the normal pattern when analyzing the usage pattern.
  • STT speech to text
  • Corresponding to a user is not only a keyword that is important for conversation through analysis of past call history registered in the database, but a distinctive feature that frequently appears more than a predetermined number of times for the user (e.g. ',' Ah ', etc.).
  • the usage pattern of the user terminal is normal by analyzing who the SNS counterpart is and when the chat time is performed when chatting through the user terminal. . Based on the past history registered in the database, it may be determined whether the usage pattern is normal according to whether the person frequently chats at a predetermined threshold or more, or whether the chat time with the corresponding party is a normal chat time. .
  • the deleted previous input is included in the typo data registered in the database corresponding to the user, it may be determined that the usage pattern of the user terminal is normal.
  • the typo data may be a result of collecting a previous input deleted for a predetermined period of time according to the backspace input. This is based on the character input result that is frequently different for each user in the character input process.
  • the usage pattern of the user terminal is normal when the user share has a similarity or more than a predetermined ratio. For example, applications that are frequently used for each user may be different, and even if the same applications are used, the usage time for each application may be different according to the user's inclination. Therefore, it is possible to estimate the propensity for the user of the user terminal from the type of applications used and the usage occupancy in recent years.
  • the usage pattern analyzer 120 may be used as a usage pattern for analyzing at least one of the above-described location of the user terminal, call history through the user terminal, SNS usage history, and usage share of the application. It is possible to determine whether it is normal through OR condition operation. That is, if at least one of the usage patterns is determined to be a normal pattern, the current user terminal is considered to be possessed by a normal user. This is because even a true user cannot satisfy a normal condition (a threshold value for making a normal pattern) at every moment, and if any one of the usage patterns satisfies the normal condition, it is sufficient to be determined as a true user.
  • a normal condition a threshold value for making a normal pattern
  • the authentication level adjusting unit 130 may adjust the authentication level according to the result analyzed by the use pattern analyzer 120.
  • the authentication level is set relatively low (step S20). If the usage pattern is analyzed to be abnormal, the authentication level is set relatively high (step S25).
  • the low level of identity verification means that if identity verification is required when running a particular application or performing a specific action within an application, it means that the identity verification requirements have been relaxed. For example, when there is a handwritten signature, iris recognition, fingerprint authentication, password input, etc. as a requirement for identity verification for financial transactions, the identity verification may be performed by checking only n or less of them.
  • a high level of identity means that the identity verification requirement has been strengthened to verify at least n of the multiple identity requirements described above.
  • the identity level adjusted by the authentication level adjusting unit 130 may be provided as an API (application platform interface).
  • the authentication level may be transmitted in the form of a message to a web server such as a financial server to be described later.
  • the usage pattern collector 110 may process the collected usage patterns into a data format that is easy to analyze.
  • the usage pattern collected by the usage pattern collector 110 may be stored in a database and used as a past history for future usage pattern analysis.
  • the usage pattern collector 110 may be activated and operate from time to time whenever the usage pattern occurs.
  • the use pattern analysis unit 120 and the authentication level adjusting unit 130 may be activated and operate only when identity authentication is required.
  • Smartphone users usually listen to music using the music app from 8:00 to 9 o'clock, and analyze the patterns such as socializing with friends during lunchtime, and suddenly use an app that they do not use. Or, if you see an abnormal pattern such as not using the music app at work, if you need to verify your identity, such as mobile banking by the judgment that you may not be able to use a stronger authentication means, but the pattern of the user In this case, you can finish the authentication by simple login.
  • FIG. 3 is a schematic block diagram of a user authentication system utilizing a user pattern analysis according to an embodiment of the present invention and a flow chart of a user authentication method
  • FIG. 4 is a schematic diagram of a financial server included in a user authentication system
  • 5 is a schematic block diagram of a message authentication server included in an identity authentication system.
  • the user authentication system 1 utilizing the user pattern analysis uses the user authentication level required for login in a web server such as a financial server using the user authentication level message transmitted from the user terminal described above. It can apply differently according to a pattern. In this process, authentication of the authentication level message is additionally performed through message authentication through the message authentication server, thereby preventing errors in authentication due to possible problems such as hacking in the message transmission process.
  • the identity authentication system 1 includes a user terminal 100, a message authentication server 300, and a web server 200.
  • the user terminal 100 has been described with reference to FIG. 1 and may further include a key register 140 and a message transmitter 150 which are additional components for message transmission.
  • the web server 200 includes a message receiver 210, an authentication requester 220, an authentication result receiver 230, and a login performer 240 for each level.
  • the message authentication server 300 includes a public key register 310. , The request receiving unit 320, the message authenticating unit 330, and the authentication result transmitting unit 340.
  • the key registration unit 140 generates and registers a paired private key and public key for security in the process of transmitting the authentication level adjusted by the authentication level adjusting unit 130 in the form of a message.
  • the private key generated by the key registration unit 140 is registered in the security area of the user terminal 100, and the public key is transmitted to the message authentication server 300, and the public key registration unit 310 in the message authentication server 300. It is registered (step S50).
  • the message transmitter 150 transmits the user authentication level adjusted by the authentication level adjusting unit 130 in the form of a message in order to deliver it to the web server 200 (step S55).
  • the message transmission unit 150 may encrypt and transmit the authentication level message using the private key registered in the key registration unit 140.
  • the message receiving unit 210 of the web server 200 receives the identity authentication level message. At this time, the received authentication level message is encrypted with the private key and cannot be decrypted. Therefore, the authentication request unit 220 of the web server 200 requests authentication while transmitting the authentication level message received from the message authentication server 300 (step S60).
  • the message authentication request may include a content request for decryption when the message is from a legitimate user terminal.
  • the request receiving unit 320 of the message authentication server 300 receives a message authentication request from the authentication requesting unit 220 of the web server 200, and in this case, the message authentication unit 330 performs message authentication (step S65). ).
  • the message authentication may be performed by using the public key registered in the message authentication server 300 to determine whether the user authentication level message encrypted with the private key can be decrypted.
  • the authentication result transmitter 340 may transmit the authentication result due to the message authentication failure (step S70).
  • the authentication result transmitter 340 may transmit the authentication result with the successful message authentication.
  • the decrypted identity authentication message can be sent along with the authentication result.
  • the authentication result receiver 230 of the web server 200 receives the authentication result from the message authentication server 300. If the received authentication result is a message authentication failure, the authentication level message itself may be regarded as a problem, and the login itself may be impossible.
  • If the received authentication result is a message authentication success level login performing unit 240 may be performed to log in by the level according to the decrypted identity authentication level message received with the authentication result (step S75).
  • the authentication level is set relatively low, the user can log in through a simple authentication process. If the authentication level is set relatively high, the user can log in only through a stronger authentication process.
  • the degree of identity verification procedure for login according to the identity verification level may be set as needed.
  • the authentication method according to the present embodiment described above can be embodied as computer readable codes on a computer readable recording medium.
  • Computer-readable recording media include all kinds of recording media having data stored thereon that can be decrypted by a computer system. For example, there may be a read only memory (ROM), a random access memory (RAM), a magnetic tape, a magnetic disk, a flash memory, an optical data storage device, and the like.
  • the computer readable recording medium can also be distributed over computer systems connected over a computer network, stored and executed as readable code in a distributed fashion.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Human Computer Interaction (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Multimedia (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • Acoustics & Sound (AREA)
  • Software Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Social Psychology (AREA)
  • Computing Systems (AREA)

Abstract

An identity authentication system and user equipment utilizing user usage pattern analysis are disclosed. An identity authentication user equipment utilizing user usage pattern analysis according to an embodiment of the present invention can comprise: a usage pattern collection unit for collecting a user's usage pattern with respect to a user equipment; a usage pattern analysis unit for analyzing the usage pattern and determining whether or not the usage pattern is normal; and an authentication level adjustment unit for adjusting an identity authentication level in accordance with a determination result.

Description

์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ ์‹œ์Šคํ…œ ๋ฐ ์‚ฌ์šฉ์ž ๋‹จ๋งUser authentication system and user terminal using analysis of user usage pattern

๋ณธ ๋ฐœ๋ช…์€ ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ ์‹œ์Šคํ…œ ๋ฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์— ๊ด€ํ•œ ๊ฒƒ์ด๋‹ค.The present invention relates to a user authentication system and a user terminal using analysis of a usage pattern of a user.

์ „์ž๊ธฐ๊ธฐ ๋ฐ ํ†ต์‹  ๋“ฑ์˜ IT ๊ธฐ์ˆ ์˜ ๋ฐœ๋‹ฌ์— ๋”ฐ๋ผ ๊ฐ์ข… ์—…๋ฌด์˜ ์ฒ˜๋ฆฌ๊ฐ€ ์ „์ž์ ์œผ๋กœ ์ด๋ฃจ์–ด์ง€๊ณ , ๊ตฌ๋งค, ํŒ๋งค์™€ ๊ฐ™์€ ์ƒ๊ฑฐ๋ž˜ ๋ฐ ๋ณดํ—˜๊ณ„์•ฝ, ๊ณ„์ขŒ๊ฐœ์„ค๊ณผ ๊ฐ™์€ ๊ธˆ์œต๊ฑฐ๋ž˜ ์—ญ์‹œ ์ „์ž์ ์œผ๋กœ ์ด๋ฃจ์–ด์ง€๊ณ  ์žˆ๋‹ค. With the development of IT technology such as electronic devices and telecommunications, various business processes are made electronically, and financial transactions such as commerce and insurance contracts and account opening such as purchase and sale are also made electronically.

์ด์— ๋”ฐ๋ผ ๋น„๋Œ€๋ฉด ๋ณธ์ธ ์ธ์ฆ์„ ์œ„ํ•œ ๊ฐ์ข… ๋ฐฉ๋ฒ•๋“ค์ด ์—ฐ๊ตฌ๋˜๊ณ  ์žˆ๋‹ค. ๊ฐ€์žฅ ์ผ๋ฐ˜์ ์œผ๋กœ๋Š” ID์™€ ํŒจ์Šค์›Œ๋“œ๋ฅผ ์ž…๋ ฅํ•˜๋Š” ๋‹จ์ˆœํ•œ ๋ฐฉ๋ฒ•๋ถ€ํ„ฐ ์ง€๋ฌธ, ์žํ•„์„œ๋ช…, ์–ผ๊ตด์ธ์‹ ๋“ฑ ๋‹ค์–‘ํ•œ ์ƒ์ฒด ๋ฐ ํ–‰์œ„ ์ธ์ฆ์„ ํ™œ์šฉํ•œ ๋ฐฉ๋ฒ•๊นŒ์ง€ ๋งŽ์€ ๋ฐฉ๋ฒ•์ด ๋Œ€๋‘๋˜๊ณ  ์žˆ๋‹ค. Accordingly, various methods for non-face-to-face identity verification have been studied. Most commonly, a variety of methods are emerging from simple methods of inputting ID and password to methods utilizing various biometric and behavioral authentication such as fingerprint, handwritten signature, and face recognition.

์ด์™€ ๊ด€๋ จํ•˜์—ฌ ํ•œ๊ตญ๊ณต๊ฐœํŠนํ—ˆ ์ œ10-2015-0096063ํ˜ธ(๊ณต๊ฐœ์ผ 2015.08.24) ์—๋Š” ๋””์ง€ํ„ธ ์„œ๋ช…์— ๊ธฐ์ดˆํ•œ ์ธ์ฆ ์žฅ์น˜ ๋ฐ ๋ฐฉ๋ฒ•์ด ๊ฐœ์‹œ๋˜์–ด ์žˆ๋‹ค. In this regard, Korean Patent Laid-Open No. 10-2015-0096063 (published Aug. 24, 2015) discloses an authentication apparatus and method based on a digital signature.

๋ณธ ๋ฐœ๋ช…์€ ์Šค๋งˆํŠธํฐ๊ณผ ๊ฐ™์€ ์‚ฌ์šฉ์ž ๋‹จ๋ง์— ๋Œ€ํ•œ ์ด์šฉํŒจํ„ด์„ ๋ถ„์„ํ•œ ๊ฒฐ๊ณผ์— ๋”ฐ๋ผ ํ‰์ƒ์‹œ์™€ ๊ฐ™์œผ๋ฉด ๋ณธ์ธ ์†Œ์ง€ ์ƒํƒœ๋กœ ํŒ์ •ํ•˜์—ฌ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ๋‚ฎ์ถ”๊ณ , ํ‰์ƒ์‹œ์™€ ๋‹ค๋ฅด๋ฉด ๋ณธ์ธ ๋ฏธ์†Œ์ง€ ์ƒํƒœ๋กœ ํŒ์ •ํ•˜์—ฌ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ๋†’์—ฌ ๋ณธ์ธ ์ธ์ฆ์˜ ๊ฐ„ํŽธํ™”์™€ ํ•จ๊ป˜ ํ–ฅ์ƒ๋œ ์ •ํ™•์„ฑ์„ ํ™•๋ณดํ•  ์ˆ˜ ์žˆ๋Š” ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ ์‹œ์Šคํ…œ ๋ฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์„ ์ œ๊ณตํ•˜๊ธฐ ์œ„ํ•œ ๊ฒƒ์ด๋‹ค. According to the results of analyzing the usage pattern for the user terminal, such as a smart phone, the present invention is determined to be in possession of the person as usual, and lowers the level of authentication. It is to provide a user authentication system and a user terminal utilizing analysis of a user's usage pattern that can secure the improved accuracy with the ease of authentication.

๋ณธ ๋ฐœ๋ช…์˜ ๋‹ค๋ฅธ ๋ชฉ์ ๋“ค์€ ์ดํ•˜์— ์„œ์ˆ ๋˜๋Š” ๋ฐ”๋žŒ์งํ•œ ์‹ค์‹œ์˜ˆ๋ฅผ ํ†ตํ•˜์—ฌ ๋ณด๋‹ค ๋ช…ํ™•ํ•ด์งˆ ๊ฒƒ์ด๋‹ค.Other objects of the present invention will become more apparent through the preferred embodiments described below.

๋ณธ ๋ฐœ๋ช…์˜ ์ผ ์ธก๋ฉด์— ๋”ฐ๋ฅด๋ฉด, ์‚ฌ์šฉ์ž์˜ ์‚ฌ์šฉ์ž ๋‹จ๋ง์— ๋Œ€ํ•œ ์ด์šฉํŒจํ„ด์„ ์ˆ˜์ง‘ํ•˜๋Š” ์ด์šฉํŒจํ„ด ์ˆ˜์ง‘๋ถ€; ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด์„ ๋ถ„์„ํ•˜์—ฌ ์ •์ƒ์ธ์ง€ ์—ฌ๋ถ€๋ฅผ ํŒ๋‹จํ•˜๋Š” ์ด์šฉํŒจํ„ด ๋ถ„์„๋ถ€; ์ƒ๊ธฐ ํŒ๋‹จ ๊ฒฐ๊ณผ์— ๋”ฐ๋ผ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ์กฐ์ •ํ•˜๋Š” ์ธ์ฆ์ˆ˜์ค€ ์กฐ์ •๋ถ€๋ฅผ ํฌํ•จํ•˜๋Š”, ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ ์‚ฌ์šฉ์ž ๋‹จ๋ง์ด ์ œ๊ณต๋œ๋‹ค. According to an aspect of the present invention, a usage pattern collecting unit for collecting a usage pattern for the user terminal of the user; A usage pattern analyzer for analyzing whether the usage pattern is normal or not; According to the determination result, an authentication user terminal using an analysis of a usage pattern of a user, including an authentication level adjustment unit for adjusting an authentication level, is provided.

์ƒ๊ธฐ ์ด์šฉํŒจํ„ด์€ ์ƒ๊ธฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์œ„์น˜์— ๊ด€ํ•œ ๊ฒƒ์ด๋˜, ํŠน์ • ์‹œ์ ์— ์ƒ๊ธฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ GPS ์ •๋ณด ๋ฐ ์ƒ๊ธฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์ด ์ ‘์†ํ•œ ์™€์ดํŒŒ์ด ๊ณต์œ ๊ธฐ์˜ ์‹๋ณ„ ์ •๋ณด ์ค‘ ์ ์–ด๋„ ํ•˜๋‚˜๋ฅผ ๋น„๊ตํ•œ ๊ฒฐ๊ณผ์— ๋”ฐ๋ผ ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด ๋ถ„์„๋ถ€์—์„œ ์ •์ƒ ์—ฌ๋ถ€๋ฅผ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ๋‹ค.The usage pattern relates to the location of the user terminal, and at the specific time point, the usage pattern analysis unit according to a result of comparing at least one of GPS information of the user terminal and identification information of the Wi-Fi router connected to the user terminal. It is possible to determine whether it is normal.

์ƒ๊ธฐ ์ด์šฉํŒจํ„ด์€ ์ƒ๊ธฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์„ ํ†ตํ•œ ํ†ตํ™” ๋‚ด์—ญ์— ๊ด€ํ•œ ๊ฒƒ์ด๋˜, 1์ฐจ์ ์œผ๋กœ ํ†ตํ™” ์ƒ๋Œ€๋ฐฉ ๋ฐ ํ†ตํ™”์‹œ๊ฐ„์„ ๋ถ„์„ํ•œ ๊ฒฐ๊ณผ์— ๋”ฐ๋ผ ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด ๋ถ„์„๋ถ€์—์„œ ์ •์ƒ ์—ฌ๋ถ€๋ฅผ ํŒ๋‹จํ•˜๋ฉฐ, ํ•„์š”์— ๋”ฐ๋ผ ์ƒ๊ธฐ ํ†ตํ™” ๋‚ด์—ญ์— ๋Œ€ํ•œ ์Œ์„ฑ์„ STT ๋ณ€ํ™˜ํ•œ ๊ฒฐ๊ณผ์— ๋Œ€ํ•ด ์ƒ๊ธฐ ์‚ฌ์šฉ์ž์— ๋Œ€ํ•ด ์ง€์ •๋œ ์ถ”์ž„์ƒˆ๋ฅผ ํฌํ•จํ•˜๋Š”์ง€ ์—ฌ๋ถ€์— ๋Œ€ํ•œ ๊ฒฐ๊ณผ์— ๋”ฐ๋ผ ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด ๋ถ„์„๋ถ€์—์„œ ์ •์ƒ ์—ฌ๋ถ€๋ฅผ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ๋‹ค.The usage pattern relates to the call history through the user terminal, and primarily determines whether the use pattern analysis unit is normal according to a result of analyzing the call counterpart and the call time, and if necessary, According to a result of whether or not the result of STT conversion of the voice includes the designated follow-up for the user, the use pattern analyzer may determine whether it is normal.

์ƒ๊ธฐ ์ด์šฉํŒจํ„ด์€ SNS ์‚ฌ์šฉ ๋‚ด์—ญ์— ๊ด€ํ•œ ๊ฒƒ์ด๋˜, 1์ฐจ์ ์œผ๋กœ SNS ์ฑ„ํŒ… ์ƒ๋Œ€๋ฐฉ ๋ฐ ์ฑ„ํŒ…์‹œ๊ฐ„์„ ๋ถ„์„ํ•œ ๊ฒฐ๊ณผ์— ๋”ฐ๋ผ ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด ๋ถ„์„๋ถ€์—์„œ ์ •์ƒ ์—ฌ๋ถ€๋ฅผ ํŒ๋‹จํ•˜๋ฉฐ, ํ•„์š”์— ๋”ฐ๋ผ ์ƒ๊ธฐ ์‚ฌ์šฉ์ž์— ๋Œ€ํ•ด ์ง€์ •๋œ ํŠน์œ ์˜ ์ด๋ชจํ‹ฐ์ฝ˜์„ ์‚ฌ์šฉํ•˜๋Š”์ง€ ์—ฌ๋ถ€ ํ˜น์€ ๋ฌธ์ž ์ž…๋ ฅ ์‹œ ๋ฐฑ์ŠคํŽ˜์ด์Šค๊ฐ€ ์ž…๋ ฅ๋  ๋•Œ ์ƒ๊ธฐ ๋ฐฑ์ŠคํŽ˜์ด์Šค์— ์˜ํ•ด ์‚ญ์ œ๋œ ์ž…๋ ฅ์„ ๋ถ„์„ํ•˜์—ฌ ์ƒ๊ธฐ ์‚ฌ์šฉ์ž์— ๋Œ€ํ•ด ์ง€์ •๋œ ์˜คํƒ€ ๋ฐ์ดํ„ฐ์— ๋Œ€์‘๋˜๋Š”์ง€ ์—ฌ๋ถ€์— ๋”ฐ๋ผ ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด ๋ถ„์„๋ถ€์—์„œ ์ •์ƒ ์—ฌ๋ถ€๋ฅผ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ๋‹ค.The usage pattern relates to the details of SNS usage, and primarily determines whether the usage pattern analysis unit is normal according to a result of analyzing the SNS chat partner and the chat time, and if necessary, a specific emoticon designated for the user. The pattern analysis unit may determine whether the input pattern is normal by analyzing the input deleted by the backspace when the backspace is input or when the character is input. have.

์ƒ๊ธฐ ์ด์šฉํŒจํ„ด์€ ์ƒ๊ธฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์œ„์น˜, ์ƒ๊ธฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์„ ํ†ตํ•œ ํ†ตํ™” ๋‚ด์—ญ, SNS ์‚ฌ์šฉ ๋‚ด์—ญ, ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ์‚ฌ์šฉ ์ ์œ ์œจ ์ค‘ ์ ์–ด๋„ ํ•˜๋‚˜๋ฅผ ํฌํ•จํ•˜๋˜, ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด ๋ถ„์„๋ถ€๋Š” OR ์กฐ๊ฑด ์—ฐ์‚ฐ์„ ํ†ตํ•ด ์ •์ƒ ์—ฌ๋ถ€๋ฅผ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ๋‹ค.The usage pattern may include at least one of a location of the user terminal, a call history through the user terminal, an SNS usage history, and an application occupancy rate of the application, and the usage pattern analyzer may determine whether it is normal through an OR condition calculation. .

์ธ์ฆ์ˆ˜์ค€ ์กฐ์ •๋ถ€๋Š” ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด์ด ์ •์ƒ์ ์ธ ๊ฒƒ์œผ๋กœ ๋ถ„์„๋œ ๊ฒฝ์šฐ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ์ƒ๋Œ€์ ์œผ๋กœ ๋‚ฎ๊ฒŒ ์„ค์ •ํ•˜๊ณ , ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด์ด ๋น„์ •์ƒ์ ์ธ ๊ฒƒ์œผ๋กœ ๋ถ„์„๋œ ๊ฒฝ์šฐ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ์ƒ๋Œ€์ ์œผ๋กœ ๋†’๊ฒŒ ์„ค์ •ํ•  ์ˆ˜ ์žˆ๋‹ค.The authentication level adjusting unit may set the authentication level relatively low when the usage pattern is analyzed as normal, and set the authentication level relatively high when the usage pattern is analyzed as abnormal.

์ƒ๊ธฐ ์ธ์ฆ์ˆ˜์ค€ ์กฐ์ •๋ถ€์—์„œ ์กฐ์ •๋œ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ๋ฉ”์‹œ์ง€ ํ˜•ํƒœ๋กœ ๋งŒ๋“ค์–ด ์ „์†กํ•˜๋Š” ๋ฉ”์‹œ์ง€ ์ „์†ก๋ถ€๋ฅผ ํฌํ•จํ•  ์ˆ˜ ์žˆ๋‹ค.The authentication level adjustment unit may include a message transmission unit for transmitting the authentication level adjusted in the form of a message.

๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„์— ๋“ฑ๋กํ•  ๊ณต๊ฐœํ‚ค์™€ ์Œ์„ ์ด๋ฃจ๋Š” ๊ฐœ์ธํ‚ค๋ฅผ ์ƒ๊ธฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์— ๋“ฑ๋กํ•˜๋Š” ํ‚ค ๋“ฑ๋ก๋ถ€๋ฅผ ๋” ํฌํ•จํ•˜๋˜, ์ƒ๊ธฐ ๋ฉ”์‹œ์ง€ ์ „์†ก๋ถ€๋Š” ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€๋ฅผ ์ƒ๊ธฐ ๊ฐœ์ธํ‚ค๋กœ ์•”ํ˜ธํ™”ํ•˜์—ฌ ์›น ์„œ๋ฒ„๋กœ ์ „์†กํ•  ์ˆ˜ ์žˆ๋‹ค.The apparatus may further include a key registration unit that registers a private key paired with a public key to be registered in a message authentication server to the user terminal, wherein the message transmission unit encrypts the authentication level message with the private key and transmits the private key to the web server.

ํ•œํŽธ ๋ณธ ๋ฐœ๋ช…์˜ ๋‹ค๋ฅธ ์ธก๋ฉด์— ๋”ฐ๋ฅด๋ฉด, ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด์„ ์ˆ˜์ง‘ํ•˜๊ณ  ๋ถ„์„ํ•˜์—ฌ ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด์ด ์ •์ƒ์ ์ธ์ง€ ์—ฌ๋ถ€์— ๋”ฐ๋ผ ์กฐ์ •๋œ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ๊ฐœ์ธํ‚ค๋กœ ์•”ํ˜ธํ™”ํ•œ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€๋ฅผ ์ „์†กํ•˜๋Š” ์‚ฌ์šฉ์ž ๋‹จ๋ง; ์•”ํ˜ธํ™”๋œ ์ƒ๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€๋ฅผ ์ˆ˜์‹ ํ•˜๊ณ , ์ƒ๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€์˜ ๋ฉ”์‹œ์ง€ ์ธ์ฆ์ด ์„ฑ๊ณต๋œ ๊ฒฝ์šฐ์— ํ•œํ•ด ์ƒ๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€์— ํฌํ•จ๋œ ์ƒ๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์— ๋”ฐ๋ผ ์ˆ˜์ค€๋ณ„ ๋กœ๊ทธ์ธ์„ ์ˆ˜ํ–‰ํ•˜๋Š” ์›น ์„œ๋ฒ„; ๋ฐ ์ƒ๊ธฐ ๊ฐœ์ธํ‚ค์— ๋Œ€์‘๋˜๋Š” ๊ณต๊ฐœํ‚ค๊ฐ€ ๋“ฑ๋ก๋˜๊ณ , ์ƒ๊ธฐ ์›น ์„œ๋ฒ„๋กœ๋ถ€ํ„ฐ์˜ ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์š”์ฒญ์— ๋”ฐ๋ผ ์•”ํ˜ธํ™”๋œ ์ƒ๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€๋ฅผ ์ƒ๊ธฐ ๊ณต๊ฐœํ‚ค๋กœ ๋ณตํ˜ธํ™”ํ•˜์—ฌ ๋ฉ”์‹œ์ง€ ์ธ์ฆ์„ ์ˆ˜ํ–‰ํ•˜์—ฌ ์ƒ๊ธฐ ์›น ์„œ๋ฒ„๋กœ ์ธ์ฆ ๊ฒฐ๊ณผ๋ฅผ ์ „์†กํ•˜๋Š” ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„๋ฅผ ํฌํ•จํ•˜๋Š”, ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ ์‹œ์Šคํ…œ์ด ์ œ๊ณต๋œ๋‹ค. On the other hand, according to another aspect of the present invention, a user terminal for collecting and analyzing a user's usage pattern and transmitting a user authentication level message encrypted with a private key of the authentication level adjusted according to whether the usage pattern is normal; A web server configured to receive the encrypted identity authentication level message and perform login for each level according to the identity authentication level included in the identity authentication level message only when message authentication of the identity authentication level message is successful; And a public key corresponding to the private key is registered, decrypts the encrypted user authentication level message with the public key according to a message authentication request from the web server, performs message authentication, and transmits an authentication result to the web server. Provided is a user authentication system utilizing a user pattern analysis, including a message authentication server.

์ƒ๊ธฐ ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„๋Š” ์ƒ๊ธฐ ๊ณต๊ฐœํ‚ค๋กœ ๋ณตํ˜ธํ™”๊ฐ€ ์„ฑ๊ณตํ•œ ๊ฒฝ์šฐ ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„ฑ๊ณต์„ ์ƒ๊ธฐ ์ธ์ฆ ๊ฒฐ๊ณผ๋กœ ์ „์†กํ•˜๊ณ , ์ƒ๊ธฐ ๊ณต๊ฐœํ‚ค๋กœ ๋ณตํ˜ธํ™”๊ฐ€ ์‹คํŒจํ•œ ๊ฒฝ์šฐ ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์‹คํŒจ๋ฅผ ์ƒ๊ธฐ ์ธ์ฆ ๊ฒฐ๊ณผ๋กœ ์ „์†กํ•  ์ˆ˜ ์žˆ๋‹ค.The message authentication server may transmit a message authentication success as the authentication result when the decryption is successful with the public key, and transmit a message authentication failure as the authentication result when decryption with the public key fails.

์ƒ๊ธฐ ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„๋Š” ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„ฑ๊ณต์˜ ๊ฒฝ์šฐ ๋ณตํ˜ธํ™”๋œ ์ƒ๊ธฐ ๋ณธ์ธ ์ธ์ฆ ๋ฉ”์‹œ์ง€๋ฅผ ์ƒ๊ธฐ ์›น ์„œ๋ฒ„๋กœ ์ „์†กํ•  ์ˆ˜ ์žˆ๋‹ค.The message authentication server may transmit the decrypted identity authentication message to the web server in the case of successful message authentication.

์ƒ๊ธฐ ์›น ์„œ๋ฒ„๋Š” ์ƒ๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์— ์ƒ์‘ํ•˜์—ฌ ์žํ•„์„œ๋ช…, ํ™์ฑ„์ธ์‹, ์ง€๋ฌธ์ธ์ฆ, ๋น„๋ฐ€๋ฒˆํ˜ธ ์ž…๋ ฅ ์ค‘ ์ง€์ •๋œ n๊ฐœ์— ๋Œ€ํ•œ ํ™•์ธ๋งŒ์œผ๋กœ๋„ ๋กœ๊ทธ์ธ์ด ๋˜๊ฒŒ ํ•  ์ˆ˜ ์žˆ๋‹ค.The web server may log in by checking only n items, such as handwritten signature, iris recognition, fingerprint authentication, and password input, corresponding to the user authentication level.

์ „์ˆ ํ•œ ๊ฒƒ ์™ธ์˜ ๋‹ค๋ฅธ ์ธก๋ฉด, ํŠน์ง•, ์ด์ ์ด ์ดํ•˜์˜ ๋„๋ฉด, ํŠนํ—ˆ์ฒญ๊ตฌ๋ฒ”์œ„ ๋ฐ ๋ฐœ๋ช…์˜ ์ƒ์„ธํ•œ ์„ค๋ช…์œผ๋กœ๋ถ€ํ„ฐ ๋ช…ํ™•ํ•ด์งˆ ๊ฒƒ์ด๋‹ค.Other aspects, features, and advantages other than those described above will become apparent from the following drawings, claims, and detailed description of the invention.

๋ณธ ๋ฐœ๋ช…์˜ ์‹ค์‹œ์˜ˆ์— ๋”ฐ๋ฅด๋ฉด, ์Šค๋งˆํŠธํฐ๊ณผ ๊ฐ™์€ ์‚ฌ์šฉ์ž ๋‹จ๋ง์— ๋Œ€ํ•œ ์ด์šฉํŒจํ„ด์„ ๋ถ„์„ํ•œ ๊ฒฐ๊ณผ์— ๋”ฐ๋ผ ํ‰์ƒ์‹œ์™€ ๊ฐ™์œผ๋ฉด ๋ณธ์ธ ์†Œ์ง€ ์ƒํƒœ๋กœ ํŒ์ •ํ•˜์—ฌ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ๋‚ฎ์ถ”๊ณ , ํ‰์ƒ์‹œ์™€ ๋‹ค๋ฅด๋ฉด ๋ณธ์ธ ๋ฏธ์†Œ์ง€ ์ƒํƒœ๋กœ ํŒ์ •ํ•˜์—ฌ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ๋†’์—ฌ ๋ณธ์ธ ์ธ์ฆ์˜ ๊ฐ„ํŽธํ™”์™€ ํ•จ๊ป˜ ํ–ฅ์ƒ๋œ ์ •ํ™•์„ฑ์„ ํ™•๋ณดํ•  ์ˆ˜ ์žˆ๋Š” ํšจ๊ณผ๊ฐ€ ์žˆ๋‹ค.According to an embodiment of the present invention, according to a result of analyzing a usage pattern for a user terminal such as a smart phone, if it is the same as usual, it is determined as the possession state of the user and lowers the level of authentication of the person, and if it is different from the usual, Increasing the level of authentication has the effect of simplifying identity verification and ensuring improved accuracy.

๋„ 1์€ ๋ณธ ๋ฐœ๋ช…์˜ ์ผ ์‹ค์‹œ์˜ˆ์— ๋”ฐ๋ฅธ ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ์„ ์œ„ํ•œ ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ๊ฐœ๋žต์ ์ธ ๊ตฌ์„ฑ ๋ธ”๋ก๋„, 1 is a schematic configuration block diagram of a user terminal for user authentication using analysis of a user's usage pattern according to an embodiment of the present invention;

๋„ 2๋Š” ๋„ 1์˜ ์‚ฌ์šฉ์ž ๋‹จ๋ง์—์„œ ์ˆ˜ํ–‰๋˜๋Š” ๋ณธ์ธ ์ธ์ฆ ๋ฐฉ๋ฒ•์˜ ์ˆœ์„œ๋„,2 is a flow chart of a user authentication method performed in the user terminal of FIG.

๋„ 3์€ ๋ณธ ๋ฐœ๋ช…์˜ ์ผ ์‹ค์‹œ์˜ˆ์— ๋”ฐ๋ฅธ ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ ์‹œ์Šคํ…œ์˜ ๊ฐœ๋žต์ ์ธ ๊ตฌ์„ฑ ๋ธ”๋ก๋„ ๋ฐ ๋ณธ์ธ ์ธ์ฆ ๋ฐฉ๋ฒ•์˜ ํ๋ฆ„๋„, 3 is a schematic block diagram of a user authentication system using a user pattern analysis according to an embodiment of the present invention and a flow chart of a user authentication method;

๋„ 4๋Š” ๋ณธ์ธ ์ธ์ฆ ์‹œ์Šคํ…œ์— ํฌํ•จ๋˜๋Š” ๊ธˆ์œต ์„œ๋ฒ„์˜ ๊ฐœ๋žต์ ์ธ ๊ตฌ์„ฑ ๋ธ”๋ก๋„, 4 is a schematic structural block diagram of a financial server included in a personal authentication system;

๋„ 5๋Š” ๋ณธ์ธ ์ธ์ฆ ์‹œ์Šคํ…œ์— ํฌํ•จ๋˜๋Š” ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„์˜ ๊ฐœ๋žต์ ์ธ ๊ตฌ์„ฑ ๋ธ”๋ก๋„. 5 is a schematic structural block diagram of a message authentication server included in a user authentication system.

๋ณธ ๋ฐœ๋ช…์€ ๋‹ค์–‘ํ•œ ๋ณ€๊ฒฝ์„ ๊ฐ€ํ•  ์ˆ˜ ์žˆ๊ณ  ์—ฌ๋Ÿฌ ๊ฐ€์ง€ ์‹ค์‹œ์˜ˆ๋ฅผ ๊ฐ€์งˆ ์ˆ˜ ์žˆ๋Š” ๋ฐ”, ํŠน์ • ์‹ค์‹œ์˜ˆ๋“ค์„ ๋„๋ฉด์— ์˜ˆ์‹œํ•˜๊ณ  ์ƒ์„ธํ•˜๊ฒŒ ์„ค๋ช…ํ•˜๊ณ ์ž ํ•œ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ด๋Š” ๋ณธ ๋ฐœ๋ช…์„ ํŠน์ •ํ•œ ์‹ค์‹œ ํ˜•ํƒœ์— ๋Œ€ํ•ด ํ•œ์ •ํ•˜๋ ค๋Š” ๊ฒƒ์ด ์•„๋‹ˆ๋ฉฐ, ๋ณธ ๋ฐœ๋ช…์˜ ์‚ฌ์ƒ ๋ฐ ๊ธฐ์ˆ  ๋ฒ”์œ„์— ํฌํ•จ๋˜๋Š” ๋ชจ๋“  ๋ณ€๊ฒฝ, ๊ท ๋“ฑ๋ฌผ ๋‚ด์ง€ ๋Œ€์ฒด๋ฌผ์„ ํฌํ•จํ•˜๋Š” ๊ฒƒ์œผ๋กœ ์ดํ•ด๋˜์–ด์•ผ ํ•œ๋‹ค.As the present invention allows for various changes and numerous embodiments, particular embodiments will be illustrated in the drawings and described in detail in the written description. However, this is not intended to limit the present invention to specific embodiments, it should be understood to include all changes, equivalents, and substitutes included in the spirit and scope of the present invention.

์–ด๋–ค ๊ตฌ์„ฑ์š”์†Œ๊ฐ€ ๋‹ค๋ฅธ ๊ตฌ์„ฑ์š”์†Œ์— "์—ฐ๊ฒฐ๋˜์–ด" ์žˆ๋‹ค๊ฑฐ๋‚˜ "์ ‘์†๋˜์–ด" ์žˆ๋‹ค๊ณ  ์–ธ๊ธ‰๋œ ๋•Œ์—๋Š”, ๊ทธ ๋‹ค๋ฅธ ๊ตฌ์„ฑ์š”์†Œ์— ์ง์ ‘์ ์œผ๋กœ ์—ฐ๊ฒฐ๋˜์–ด ์žˆ๊ฑฐ๋‚˜ ๋˜๋Š” ์ ‘์†๋˜์–ด ์žˆ์„ ์ˆ˜๋„ ์žˆ์ง€๋งŒ, ์ค‘๊ฐ„์— ๋‹ค๋ฅธ ๊ตฌ์„ฑ์š”์†Œ๊ฐ€ ์กด์žฌํ•  ์ˆ˜๋„ ์žˆ๋‹ค๊ณ  ์ดํ•ด๋˜์–ด์•ผ ํ•  ๊ฒƒ์ด๋‹ค. ๋ฐ˜๋ฉด์—, ์–ด๋–ค ๊ตฌ์„ฑ์š”์†Œ๊ฐ€ ๋‹ค๋ฅธ ๊ตฌ์„ฑ์š”์†Œ์— "์ง์ ‘ ์—ฐ๊ฒฐ๋˜์–ด" ์žˆ๋‹ค๊ฑฐ๋‚˜ "์ง์ ‘ ์ ‘์†๋˜์–ด" ์žˆ๋‹ค๊ณ  ์–ธ๊ธ‰๋œ ๋•Œ์—๋Š”, ์ค‘๊ฐ„์— ๋‹ค๋ฅธ ๊ตฌ์„ฑ์š”์†Œ๊ฐ€ ์กด์žฌํ•˜์ง€ ์•Š๋Š” ๊ฒƒ์œผ๋กœ ์ดํ•ด๋˜์–ด์•ผ ํ•  ๊ฒƒ์ด๋‹ค. When a component is referred to as being "connected" or "connected" to another component, it may be directly connected to or connected to that other component, but it may be understood that other components may be present in between. Should be. On the other hand, when a component is said to be "directly connected" or "directly connected" to another component, it should be understood that there is no other component in between.

์ œ1, ์ œ2 ๋“ฑ์˜ ์šฉ์–ด๋Š” ๋‹ค์–‘ํ•œ ๊ตฌ์„ฑ์š”์†Œ๋“ค์„ ์„ค๋ช…ํ•˜๋Š”๋ฐ ์‚ฌ์šฉ๋  ์ˆ˜ ์žˆ์ง€๋งŒ, ์ƒ๊ธฐ ๊ตฌ์„ฑ์š”์†Œ๋“ค์€ ์ƒ๊ธฐ ์šฉ์–ด๋“ค์— ์˜ํ•ด ํ•œ์ •๋˜์–ด์„œ๋Š” ์•ˆ ๋œ๋‹ค. ์ƒ๊ธฐ ์šฉ์–ด๋“ค์€ ํ•˜๋‚˜์˜ ๊ตฌ์„ฑ์š”์†Œ๋ฅผ ๋‹ค๋ฅธ ๊ตฌ์„ฑ์š”์†Œ๋กœ๋ถ€ํ„ฐ ๊ตฌ๋ณ„ํ•˜๋Š” ๋ชฉ์ ์œผ๋กœ๋งŒ ์‚ฌ์šฉ๋œ๋‹ค. Terms such as first and second may be used to describe various components, but the components should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.

๋ณธ ๋ช…์„ธ์„œ์—์„œ ์‚ฌ์šฉํ•œ ์šฉ์–ด๋Š” ๋‹จ์ง€ ํŠน์ •ํ•œ ์‹ค์‹œ์˜ˆ๋ฅผ ์„ค๋ช…ํ•˜๊ธฐ ์œ„ํ•ด ์‚ฌ์šฉ๋œ ๊ฒƒ์œผ๋กœ, ๋ณธ ๋ฐœ๋ช…์„ ํ•œ์ •ํ•˜๋ ค๋Š” ์˜๋„๊ฐ€ ์•„๋‹ˆ๋‹ค. ๋‹จ์ˆ˜์˜ ํ‘œํ˜„์€ ๋ฌธ๋งฅ์ƒ ๋ช…๋ฐฑํ•˜๊ฒŒ ๋‹ค๋ฅด๊ฒŒ ๋œปํ•˜์ง€ ์•Š๋Š” ํ•œ, ๋ณต์ˆ˜์˜ ํ‘œํ˜„์„ ํฌํ•จํ•œ๋‹ค. ๋ณธ ๋ช…์„ธ์„œ์—์„œ, "ํฌํ•จํ•˜๋‹ค" ๋˜๋Š” "๊ฐ€์ง€๋‹ค" ๋“ฑ์˜ ์šฉ์–ด๋Š” ๋ช…์„ธ์„œ์ƒ์— ๊ธฐ์žฌ๋œ ํŠน์ง•, ์ˆซ์ž, ๋‹จ๊ณ„, ๋™์ž‘, ๊ตฌ์„ฑ์š”์†Œ, ๋ถ€ํ’ˆ ๋˜๋Š” ์ด๋“ค์„ ์กฐํ•ฉํ•œ ๊ฒƒ์ด ์กด์žฌํ•จ์„ ์ง€์ •ํ•˜๋ ค๋Š” ๊ฒƒ์ด์ง€, ํ•˜๋‚˜ ๋˜๋Š” ๊ทธ ์ด์ƒ์˜ ๋‹ค๋ฅธ ํŠน์ง•๋“ค์ด๋‚˜ ์ˆซ์ž, ๋‹จ๊ณ„, ๋™์ž‘, ๊ตฌ์„ฑ์š”์†Œ, ๋ถ€ํ’ˆ ๋˜๋Š” ์ด๋“ค์„ ์กฐํ•ฉํ•œ ๊ฒƒ๋“ค์˜ ์กด์žฌ ๋˜๋Š” ๋ถ€๊ฐ€ ๊ฐ€๋Šฅ์„ฑ์„ ๋ฏธ๋ฆฌ ๋ฐฐ์ œํ•˜์ง€ ์•Š๋Š” ๊ฒƒ์œผ๋กœ ์ดํ•ด๋˜์–ด์•ผ ํ•œ๋‹ค.The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. Singular expressions include plural expressions unless the context clearly indicates otherwise. As used herein, the terms "comprise" or "have" are intended to indicate that there is a feature, number, step, action, component, part, or combination thereof described on the specification, and one or more other features. It is to be understood that the present invention does not exclude the possibility of the presence or the addition of numbers, steps, operations, components, components, or a combination thereof.

๋˜ํ•œ, ๊ฐ ๋„๋ฉด์„ ์ฐธ์กฐํ•˜์—ฌ ์„ค๋ช…ํ•˜๋Š” ์‹ค์‹œ์˜ˆ์˜ ๊ตฌ์„ฑ ์š”์†Œ๊ฐ€ ํ•ด๋‹น ์‹ค์‹œ์˜ˆ์—๋งŒ ์ œํ•œ์ ์œผ๋กœ ์ ์šฉ๋˜๋Š” ๊ฒƒ์€ ์•„๋‹ˆ๋ฉฐ, ๋ณธ ๋ฐœ๋ช…์˜ ๊ธฐ์ˆ ์  ์‚ฌ์ƒ์ด ์œ ์ง€๋˜๋Š” ๋ฒ”์œ„ ๋‚ด์—์„œ ๋‹ค๋ฅธ ์‹ค์‹œ์˜ˆ์— ํฌํ•จ๋˜๋„๋ก ๊ตฌํ˜„๋  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ๋˜ํ•œ ๋ณ„๋„์˜ ์„ค๋ช…์ด ์ƒ๋žต๋ ์ง€๋ผ๋„ ๋ณต์ˆ˜์˜ ์‹ค์‹œ์˜ˆ๊ฐ€ ํ†ตํ•ฉ๋œ ํ•˜๋‚˜์˜ ์‹ค์‹œ์˜ˆ๋กœ ๋‹ค์‹œ ๊ตฌํ˜„๋  ์ˆ˜๋„ ์žˆ์Œ์€ ๋‹น์—ฐํ•˜๋‹ค.In addition, the components of the embodiments described with reference to the drawings are not limited to the corresponding embodiments, and may be implemented to be included in other embodiments within the scope of the technical spirit of the present invention. Even if the description is omitted, it is obvious that a plurality of embodiments may be reimplemented into one integrated embodiment.

๋˜ํ•œ, ์ฒจ๋ถ€ ๋„๋ฉด์„ ์ฐธ์กฐํ•˜์—ฌ ์„ค๋ช…ํ•จ์— ์žˆ์–ด, ๋„๋ฉด ๋ถ€ํ˜ธ์— ๊ด€๊ณ„์—†์ด ๋™์ผํ•œ ๊ตฌ์„ฑ ์š”์†Œ๋Š” ๋™์ผํ•˜๊ฑฐ๋‚˜ ๊ด€๋ จ๋œ ์ฐธ์กฐ๋ถ€ํ˜ธ๋ฅผ ๋ถ€์—ฌํ•˜๊ณ  ์ด์— ๋Œ€ํ•œ ์ค‘๋ณต๋˜๋Š” ์„ค๋ช…์€ ์ƒ๋žตํ•˜๊ธฐ๋กœ ํ•œ๋‹ค. ๋ณธ ๋ฐœ๋ช…์„ ์„ค๋ช…ํ•จ์— ์žˆ์–ด์„œ ๊ด€๋ จ๋œ ๊ณต์ง€ ๊ธฐ์ˆ ์— ๋Œ€ํ•œ ๊ตฌ์ฒด์ ์ธ ์„ค๋ช…์ด ๋ณธ ๋ฐœ๋ช…์˜ ์š”์ง€๋ฅผ ๋ถˆํ•„์š”ํ•˜๊ฒŒ ํ๋ฆด ์ˆ˜ ์žˆ๋‹ค๊ณ  ํŒ๋‹จ๋˜๋Š” ๊ฒฝ์šฐ ๊ทธ ์ƒ์„ธํ•œ ์„ค๋ช…์„ ์ƒ๋žตํ•œ๋‹ค. In addition, in the description with reference to the accompanying drawings, the same components regardless of reference numerals will be given the same or related reference numerals and redundant description thereof will be omitted. In the following description of the present invention, if it is determined that the detailed description of the related known technology may unnecessarily obscure the subject matter of the present invention, the detailed description thereof will be omitted.

๋„ 1์€ ๋ณธ ๋ฐœ๋ช…์˜ ์ผ ์‹ค์‹œ์˜ˆ์— ๋”ฐ๋ฅธ ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ์„ ์œ„ํ•œ ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ๊ฐœ๋žต์ ์ธ ๊ตฌ์„ฑ ๋ธ”๋ก๋„์ด๊ณ , ๋„ 2๋Š” ๋„ 1์˜ ์‚ฌ์šฉ์ž ๋‹จ๋ง์—์„œ ์ˆ˜ํ–‰๋˜๋Š” ๋ณธ์ธ ์ธ์ฆ ๋ฐฉ๋ฒ•์˜ ์ˆœ์„œ๋„์ด๋‹ค. FIG. 1 is a schematic block diagram of a user terminal for user authentication using analysis of a usage pattern of a user according to an embodiment of the present invention, and FIG. 2 is a flowchart of a user authentication method performed in the user terminal of FIG. .

๋ณธ ๋ฐœ๋ช…์˜ ์ผ ์‹ค์‹œ์˜ˆ์— ๋”ฐ๋ฅธ ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ์„ ์œ„ํ•œ ์‚ฌ์šฉ์ž ๋‹จ๋ง(100)์€ ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด์„ ์ˆ˜์ง‘ํ•˜๊ณ  ๋ถ„์„ํ•˜์—ฌ ์‚ฌ์šฉ์ž๊ฐ€ ํ‰์ƒ์‹œ ์ด์šฉํ•˜๋˜ ํŒจํ„ด๊ณผ ์œ ์‚ฌํ•œ ์ •๋„์— ๋”ฐ๋ผ ๋ณธ์ธ ์†Œ์ง€ ์—ฌ๋ถ€๋ฅผ ํŒ์ •ํ•˜์—ฌ ๋ณธ์ธ ์ธ์ฆ์ด ์š”๊ตฌ๋˜๋Š” ์ƒํ™ฉ์—์„œ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ์กฐ์ •ํ•  ์ˆ˜ ์žˆ๋„๋ก ํ•œ ๊ฒƒ์„ ํŠน์ง•์œผ๋กœ ํ•œ๋‹ค. The user terminal 100 for the user authentication using the analysis of the use pattern of the user according to an embodiment of the present invention collects and analyzes the use pattern of the user to determine whether the user possesses the user according to the degree similar to the pattern normally used by the user. It is characterized in that it is possible to adjust the level of identity authentication in the situation where the identity verification is required.

๋ณธ ์‹ค์‹œ์˜ˆ์— ๋”ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ์„ ์œ„ํ•œ ์‚ฌ์šฉ์ž ๋‹จ๋ง(100)์€ ์ด์šฉํŒจํ„ด ์ˆ˜์ง‘๋ถ€(110), ์ด์šฉํŒจํ„ด ๋ถ„์„๋ถ€(120), ์ธ์ฆ์ˆ˜์ค€ ์กฐ์ •๋ถ€(130)๋ฅผ ํฌํ•จํ•œ๋‹ค. ์ด์šฉํŒจํ„ด ์ˆ˜์ง‘๋ถ€(110), ์ด์šฉํŒจํ„ด ๋ถ„์„๋ถ€(120), ์ธ์ฆ์ˆ˜์ค€ ์กฐ์ •๋ถ€(130)๋Š” ์Šค๋งˆํŠธํฐ๊ณผ ๊ฐ™์€ ์‚ฌ์šฉ์ž ๋‹จ๋ง(100)์— ์„ค์น˜๋˜๋Š” ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ํ˜•ํƒœ์˜ ์†Œํ”„ํŠธ์›จ์–ด๋กœ ๊ตฌํ˜„๋  ์ˆ˜ ์žˆ๋‹ค. The user terminal 100 for identity verification according to the present embodiment includes a usage pattern collector 110, a usage pattern analyzer 120, and an authentication level adjuster 130. The use pattern collector 110, the use pattern analyzer 120, and the authentication level adjuster 130 may be implemented as software in an application form installed in the user terminal 100 such as a smartphone.

์ด์šฉํŒจํ„ด ์ˆ˜์ง‘๋ถ€(110)๋Š” ์‚ฌ์šฉ์ž ๋‹จ๋ง(100)์„ ์ด์šฉํ•˜๋Š” ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด์— ๊ด€ํ•œ ์ •๋ณด๋ฅผ ์ˆ˜์ง‘ํ•œ๋‹ค(๋‹จ๊ณ„ S10). ์ด์šฉํŒจํ„ด ์ˆ˜์ง‘์€ ํ˜„ ์‹œ์ ์œผ๋กœ๋ถ€ํ„ฐ ๋ฏธ๋ฆฌ ์ง€์ •๋œ ์‹œ๊ฐ„(์˜ˆ์ปจ๋Œ€, 3์‹œ๊ฐ„) ์ด๋‚ด๋กœ ํ•œ์ •๋  ์ˆ˜ ์žˆ๋‹ค. ์ด๋Š” ๋ถ„์‹ค ๋“ฑ์œผ๋กœ ์ธํ•ด ์‚ฌ์šฉ์ž ๋‹จ๋ง(100)์˜ ์ตœ๊ทผ ์ƒํƒœ์— ๋ณ€๊ฒฝ์‚ฌํ•ญ์ด ๋ฐœ์ƒํ–ˆ์Œ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  ์˜ˆ์ „์— ์ˆ˜์ง‘๋œ ์ •๋ณด์— ์˜ํ•ด ์‚ฌ์šฉ์ž ๋‹จ๋ง(100)์˜ ์ตœ๊ทผ ์ƒํƒœ ํŒŒ์•…์— ์–ด๋ ค์›€์ด ์žˆ์„ ์ˆ˜ ์žˆ๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค. The usage pattern collecting unit 110 collects information on the usage pattern of the user using the user terminal 100 (step S10). The usage pattern collection may be limited to within a predetermined time (for example, 3 hours) from the present time. This is because there may be difficulty in grasping the latest state of the user terminal 100 by information collected in the past despite the change in the recent state of the user terminal 100 due to loss or the like.

์ด์šฉํŒจํ„ด์˜ ์ˆ˜์ง‘ ์‹œ๊ฐ„์€ ์ˆ˜์ง‘๋Œ€์ƒ์ธ ์‚ฌ์šฉ์ž์˜ ์—ฐ๋ น, ๊ฑฐ์ฃผ์ง€ ๋“ฑ๊ณผ ๊ฐ™์€ ์‚ฌ์šฉ์ž ์†์„ฑ, ์ด์šฉํŒจํ„ด์˜ ์ข…๋ฅ˜ ์ค‘ ์ ์–ด๋„ ํ•˜๋‚˜์— ๋”ฐ๋ผ ๋‹ค์–‘ํ•˜๊ฒŒ ์„ค์ •๋  ์ˆ˜ ์žˆ๋‹ค. The collection time of the usage pattern may be variously set according to at least one of a user attribute such as an age, a place of residence, and the like of the usage pattern.

์ˆ˜์ง‘๋Œ€์ƒ์ด ๋˜๋Š” ์ด์šฉํŒจํ„ด์€ ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์œ„์น˜ ์ •๋ณด, ์‚ฌ์šฉ์ž ๋‹จ๋ง์„ ํ†ตํ•œ ํ†ตํ™” ์ •๋ณด, ์‚ฌ์šฉ์ž ๋‹จ๋ง์„ ์ด์šฉํ•œ SNS(์†Œ์…œ ๋„คํŠธ์›Œํฌ ์„œ๋น„์Šค) ์ด์šฉ ์ •๋ณด, ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ์‚ฌ์šฉ ์ ์œ ์œจ ์ค‘ ์ ์–ด๋„ ํ•˜๋‚˜๋ฅผ ํฌํ•จํ•  ์ˆ˜ ์žˆ๋‹ค. The usage pattern to be collected may include at least one of location information of the user terminal, call information through the user terminal, social network service (SNS) usage information using the user terminal, and application usage share.

์ด์šฉํŒจํ„ด ๋ถ„์„๋ถ€(120)๋Š” ์ด์šฉํŒจํ„ด ์ˆ˜์ง‘๋ถ€(110)์— ์˜ํ•ด ์ˆ˜์ง‘๋œ ์ด์šฉํŒจํ„ด์„ ๋ถ„์„ํ•˜์—ฌ ์ •์ƒ์ ์ธ์ง€ ์—ฌ๋ถ€๋ฅผ ํŒ๋‹จํ•œ๋‹ค(๋‹จ๊ณ„ S15). ์ด์šฉํŒจํ„ด์ด ์ •์ƒ์ ์ด๋ผ๋Š” ๊ฒƒ์€ ์‚ฌ์šฉ์ž ๋‹จ๋ง(100)์— ๋Œ€ํ•ด ์ง€์ •๋œ ์‚ฌ์šฉ์ž์— ์˜ํ•ด ์ˆ˜ํ–‰๋  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋˜๋Š” ์ด์šฉํŒจํ„ด์„ ๊ฐ€์ง์„ ์˜๋ฏธํ•œ๋‹ค. The usage pattern analyzer 120 analyzes the usage patterns collected by the usage pattern collector 110 to determine whether they are normal (step S15). The normal usage pattern means that the usage pattern is expected to be performed by a user designated for the user terminal 100.

์ด์šฉํŒจํ„ด์ด ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์œ„์น˜ ์ •๋ณด์ธ ๊ฒฝ์šฐ์˜ ๋ถ„์„์€ ๋‹ค์Œ๊ณผ ๊ฐ™๋‹ค. The analysis when the usage pattern is location information of the user terminal is as follows.

์ง€์ •๋œ ์‚ฌ์šฉ์ž๊ฐ€ ํ•ด๋‹น ์‚ฌ์šฉ์ž ๋‹จ๋ง(100)์„ ์†Œ์ง€ํ•˜๊ณ  ์žˆ๋‹ค๋ฉด, ์‚ฌ์šฉ์ž๊ฐ€ ์žˆ์„ ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋˜๋Š” ์œ„์น˜์— ์‚ฌ์šฉ์ž ๋‹จ๋ง(100)์ด ์žˆ๋Š”์ง€ ์—ฌ๋ถ€๋ฅผ ํŒŒ์•…ํ•œ๋‹ค. If the designated user has the corresponding user terminal 100, it is determined whether the user terminal 100 is located at the location where the user is expected to be present.

์˜ˆ์ปจ๋Œ€, ์‚ฌ์šฉ์ž์˜ ์ฃผ๋œ ์œ„์น˜๊ฐ€ ์ง‘๊ณผ ํšŒ์‚ฌ์ธ ๊ฒฝ์šฐ, ์‚ฌ์šฉ์ž ๋‹จ๋ง(100)์— ์˜ํ•ด ์ˆ˜์ง‘๋œ ์œ„์น˜ ์ •๋ณด๊ฐ€ ํ•ด๋‹น ์‚ฌ์šฉ์ž์— ๋Œ€ํ•ด ์„ค์ •๋œ ์ง‘ ํ˜น์€ ํšŒ์‚ฌ๋ผ๋ฉด ์ •์ƒ์ ์ธ ๊ฒƒ์œผ๋กœ ํŒ๋‹จํ•˜์ง€๋งŒ, ์ง‘ ํ˜น์€ ํšŒ์‚ฌ๊ฐ€ ์•„๋‹Œ ์ œ3์˜ ์žฅ์†Œ๋ผ๋ฉด ํ˜„์žฌ ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์ด์šฉํŒจํ„ด์ด ๋น„์ •์ƒ์ ์ธ ๊ฒƒ์œผ๋กœ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ์„ ๊ฒƒ์ด๋‹ค. For example, if the main location of the user is a home and a company, if the location information collected by the user terminal 100 is a home or a company set for the user, it is determined to be normal. It may be determined that the usage pattern of the user terminal is abnormal.

์ด๋Ÿฌํ•œ ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์œ„์น˜ ์ •๋ณด๋Š” ์‹œ๊ฐ„ ์ •๋ณด์™€ ์—ฐ๊ด€๋˜์–ด ๋ถ„์„์— ์ด์šฉ๋  ์ˆ˜๋„ ์žˆ๋‹ค. ์˜ˆ์ปจ๋Œ€, ์‚ฌ์šฉ์ž์— ๋Œ€ํ•ด ์„ค์ •๋œ ์œ„์น˜๊ฐ€ ์ง‘๊ณผ ํšŒ์‚ฌ์ธ ๊ฒฝ์šฐ, ํ‰์ผ ์—…๋ฌด ์‹œ๊ฐ„(์˜ˆ. ์›”~๊ธˆ ์˜ค์ „ 9์‹œ~18์‹œ)์ด๋ผ๋ฉด ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์œ„์น˜๊ฐ€ ํšŒ์‚ฌ ํ˜น์€ ๊ทธ ๊ทผ๋ฐฉ์ธ ๊ฒฝ์šฐ์— ํ•œํ•ด ์ด์šฉํŒจํ„ด์ด ์ •์ƒ์ ์ด๊ณ , ํ‰์ผ ์—…๋ฌด ์‹œ๊ฐ„์ž„์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์œ„์น˜๊ฐ€ ์ง‘์ด๋ผ๋ฉด ์ด์šฉํŒจํ„ด์ด ๋น„์ •์ƒ์ ์ธ ๊ฒƒ์œผ๋กœ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ์„ ๊ฒƒ์ด๋‹ค. The location information of the user terminal may be used for analysis in association with time information. For example, if the location set for the user is a home or a company, the usage pattern is normal only when the user terminal is located at or near the company if the workday is a weekday (for example, 9:00 AM to 18:00 AM). If the location of the user terminal is at home despite the working hours on weekdays, it may be determined that the usage pattern is abnormal.

๋ณธ ์‹ค์‹œ์˜ˆ์—์„œ ์ด์šฉํŒจํ„ด์˜ ๋ถ„์„์— ์ด์šฉ๋˜๋Š” ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์œ„์น˜ ์ •๋ณด๋Š” GPS ๊ฐ’์ผ ์ˆ˜ ์žˆ๋‹ค. ์ด๋ฅผ ์œ„ํ•ด ์ด์šฉํŒจํ„ด ์ˆ˜์ง‘๋ถ€(110)๋Š” ์‚ฌ์šฉ์ž ๋‹จ๋ง(100)์— ๋ณ„๋„ ๊ตฌ๋น„๋œ GPS ๋ชจ๋“ˆ๋กœ๋ถ€ํ„ฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์œ„์น˜ ์ •๋ณด๋ฅผ ํš๋“ํ•  ์ˆ˜ ์žˆ๋‹ค. In the present embodiment, the location information of the user terminal used to analyze the usage pattern may be a GPS value. To this end, the usage pattern collector 110 may obtain location information of the user terminal from a GPS module separately provided in the user terminal 100.

๋˜๋Š” ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์œ„์น˜ ์ •๋ณด๋Š” ํ•ด๋‹น ์‚ฌ์šฉ์ž ๋‹จ๋ง(100)์ด ์ ‘์†ํ•œ ์™€์ดํŒŒ์ด ๊ณต์œ ๊ธฐ์˜ ์‹๋ณ„ ์ •๋ณด์ผ ์ˆ˜ ์žˆ๋‹ค. ์•ž์„œ ์„ค๋ช…ํ•œ GPS ๊ฐ’์€ ์‚ฌ์šฉ์ž ๋‹จ๋ง(100)์ด ์‹ค์™ธ์— ์œ„์น˜ํ•˜๋Š” ๊ฒฝ์šฐ์—๋Š” ์ •ํ™•ํ•œ ์œ„์น˜๋ฅผ ์•Œ๋ ค์ฃผ์ง€๋งŒ, ์‹ค๋‚ด์— ์œ„์น˜ํ•˜๋Š” ๊ฒฝ์šฐ์—๋Š” GPS ์‹ ํ˜ธ๊ฐ€ ์ˆ˜์‹ ๋˜์ง€ ์•Š์•„ ํ™œ์šฉ๋  ์ˆ˜ ์—†๊ฒŒ ๋œ๋‹ค. ๋”ฐ๋ผ์„œ, ์ตœ๊ทผ ์Šค๋งˆํŠธํฐ๊ณผ ๊ฐ™์€ ์‚ฌ์šฉ์ž ๋‹จ๋ง(100)์—์„œ ๋งŽ์ด ์‚ฌ์šฉ๋˜๊ณ  ์žˆ๋Š” ์™€์ดํŒŒ์ด(WiFi) ํ†ต์‹ ์„ ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋‹ค. Alternatively, the location information of the user terminal may be identification information of the Wi-Fi router connected to the corresponding user terminal 100. The GPS value described above indicates the correct location when the user terminal 100 is located outdoors, but cannot be utilized because the GPS signal is not received when the user terminal 100 is located outdoors. Therefore, it is possible to utilize the Wi-Fi (WiFi) communication that is used a lot in the user terminal 100, such as a smart phone.

์™€์ดํŒŒ์ด ํ†ต์‹ ์„ ์œ„ํ•ด์„œ๋Š” ์‚ฌ์šฉ์ž ๋‹จ๋ง์ด ์‹ค๋‚ด ์ž„์˜์˜ ์œ„์น˜์— ์„ค์น˜๋œ ์™€์ดํŒŒ์ด ๊ณต์œ ๊ธฐ์— ์ ‘์†ํ•ด์•ผ ํ•˜๋ฉฐ, ์ด ๋•Œ ์ ‘์†๋˜๋Š” ์™€์ดํŒŒ์ด ๊ณต์œ ๊ธฐ๋Š” ํƒ€ ์™€์ดํŒŒ์ด ๊ณต์œ ๊ธฐ์™€๋Š” ์‹๋ณ„ ๊ฐ€๋Šฅํ•œ ์‹๋ณ„์ •๋ณด(์˜ˆ์ปจ๋Œ€, ๋งฅ ์–ด๋“œ๋ ˆ์Šค(Mac Address))๋ฅผ ๊ฐ€์ง€๊ณ  ์žˆ๋‹ค. ์ด ๋•Œ ์‚ฌ์šฉ์ž ๋‹จ๋ง์ด ํ˜„์žฌ ์ ‘์† ์ค‘์ธ ์™€์ดํŒŒ์ด ๊ณต์œ ๊ธฐ์˜ ์‹๋ณ„์ •๋ณด๊ฐ€ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค์— ๋“ฑ๋ก๋œ ์ด์ „์— ์ ‘์†ํ•œ ์ด๋ ฅ์ด ์žˆ๋Š” ์™€์ดํŒŒ์ด ๊ณต์œ ๊ธฐ์˜ ์‹๋ณ„์ •๋ณด ์ค‘ ํ•˜๋‚˜์ธ ๊ฒฝ์šฐ์—๋Š” ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์ด์šฉํŒจํ„ด์ด ์ •์ƒ์ ์ธ ๊ฒƒ์œผ๋กœ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ๋‹ค. ํ•˜์ง€๋งŒ, ์‚ฌ์šฉ์ž ๋‹จ๋ง์ด ํ˜„์žฌ ์ ‘์† ์ค‘์ธ ์™€์ดํŒŒ์ด ๊ณต์œ ๊ธฐ์˜ ์‹๋ณ„์ •๋ณด๋ฅผ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค์— ๋“ฑ๋ก๋œ ์ด์ „์— ์ ‘์†ํ•œ ์ด๋ ฅ์ด ์žˆ๋Š” ์™€์ดํŒŒ์ด ๊ณต์œ ๊ธฐ์˜ ์‹๋ณ„์ •๋ณด๋“ค๊ณผ ๋น„๊ตํ–ˆ์„ ๋•Œ ๋™์ผํ•œ ์ •๋ณด๊ฐ€ ์—†์„ ๊ฒฝ์šฐ์—๋Š” ์‚ฌ์šฉ์ž ๋‹จ๋ง์ด ์ด์ „์— ์œ„์น˜ํ•œ ์ ์ด ์—†๋Š” ์žฅ์†Œ์— ์žˆ๋Š” ๊ฒƒ์œผ๋กœ ๋ณด๊ณ , ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์ด์šฉํŒจํ„ด์ด ๋น„์ •์ƒ์ ์ธ ๊ฒƒ์œผ๋กœ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ์„ ๊ฒƒ์ด๋‹ค. In order to perform Wi-Fi communication, the user terminal needs to access a Wi-Fi router installed at an arbitrary location in the room, and the Wi-Fi router to be connected has identification information (eg, a Mac address) that can be distinguished from other Wi-Fi routers. In this case, when the identification information of the Wi-Fi router which is currently connected to the user terminal is one of the identification information of the Wi-Fi router having a previously accessed history registered in the database, it may be determined that the usage pattern of the user terminal is normal. However, when the identification information of the currently connected Wi-Fi router is compared with the identification information of the previously-connected Wi-Fi router registered in the database, when there is no identical information, the place where the user terminal has not been previously located As seen from, it may be determined that the usage pattern of the user terminal is abnormal.

๋‹ค์Œ์œผ๋กœ ์ด์šฉํŒจํ„ด์ด ์‚ฌ์šฉ์ž ๋‹จ๋ง์„ ํ†ตํ•œ ํ†ตํ™” ์ •๋ณด์ธ ๊ฒฝ์šฐ์˜ ๋ถ„์„์€ ๋‹ค์Œ๊ณผ ๊ฐ™๋‹ค. Next, the analysis when the usage pattern is call information through the user terminal is as follows.

์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์ตœ์‹  ํ†ตํ™” ๋‚ด์—ญ์„ ํ™•์ธํ•œ ๊ฒฐ๊ณผ, ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค์— ๋“ฑ๋ก๋œ ๊ณผ๊ฑฐ ์ด๋ ฅ๊ณผ ๋น„๊ตํ•  ๋•Œ ์‚ฌ์šฉ์ž๊ฐ€ ์ž์ฃผ ํ†ตํ™”๋ฅผ ํ•˜๋˜ ์ƒ๋Œ€๋ฐฉ๊ณผ ํ†ตํ™”ํ•œ ๊ฒƒ์œผ๋กœ ๋ถ„์„๋œ ๊ฒฝ์šฐ, ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์ด์šฉํŒจํ„ด์ด ์ •์ƒ์ ์ธ ๊ฒƒ์œผ๋กœ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ๋‹ค. ์—ฌ๊ธฐ์„œ, ์‚ฌ์šฉ์ž์— ์˜ํ•ด ํ†ตํ™”์˜ ๋นˆ๋ฒˆํ•จ ์ •๋„๊ฐ€ ์ง€์ •๋˜๊ฑฐ๋‚˜ ๊ณผ๊ฑฐ ์ด๋ ฅ์„ ๋ถ„์„ํ•œ ๊ฒฐ๊ณผ์— ๋”ฐ๋ผ ํ†ตํ™” ํšŸ์ˆ˜๊ฐ€ ๋งŽ์€ ์ƒ์œ„ ๋ช‡ ๋ช…์„ ์ด์šฉํŒจํ„ด ๋ถ„์„ ์‹œ ์ •์ƒํŒจํ„ด ํŒ๋‹จ์„ ์œ„ํ•œ ๊ธฐ์ค€์œผ๋กœ ์„ค์ •๋  ์ˆ˜ ์žˆ๋‹ค. As a result of checking the latest call history of the user terminal, when it is analyzed that the user talks to the other party to which the user frequently talks, it may be determined that the usage pattern of the user terminal is normal. Here, the frequency of the call is designated by the user, or according to the result of analyzing the past history, the top few persons having a large number of calls may be set as a reference for determining the normal pattern when analyzing the usage pattern.

ํ•˜์ง€๋งŒ, ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์ตœ์‹  ํ†ตํ™” ๋‚ด์—ญ์„ ํ™•์ธํ•œ ๊ฒฐ๊ณผ, ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค์— ๋“ฑ๋ก๋œ ๊ณผ๊ฑฐ ์ด๋ ฅ๊ณผ ๋น„๊ตํ•  ๋•Œ ์‚ฌ์šฉ์ž๊ฐ€ ์ฒ˜์Œ ํ†ตํ™”ํ•˜๊ฑฐ๋‚˜ ์ž์ฃผ ํ†ตํ™”ํ•˜๋˜ ์ƒ๋Œ€๋ฐฉ์ด ์•„๋‹Œ ๊ฒฝ์šฐ, ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์ด์šฉํŒจํ„ด์ด ๋น„์ •์ƒ์ ์ธ ๊ฒƒ์œผ๋กœ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ๋‹ค. ๋˜ํ•œ, ์ตœ์‹  ํ†ตํ™” ๋‚ด์—ญ์„ ๋ถ„์„ํ•œ ๊ฒฐ๊ณผ, ํŠน์ • ์ƒ๋Œ€๋ฐฉ๊ณผ์˜ ํ†ตํ™”์‹œ๊ฐ„์ด ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค์— ๊ธฐ ๋“ฑ๋ก๋œ ๊ณผ๊ฑฐ ์ด๋ ฅ๊ณผ ๋น„๊ตํ•  ๋•Œ ๋น„์ •์ƒ์ ์œผ๋กœ ๊ธธ๊ฑฐ๋‚˜ ์งง์„ ๊ฒฝ์šฐ์—๋„ ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์ด์šฉํŒจํ„ด์ด ๋น„์ •์ƒ์ ์ธ ๊ฒƒ์œผ๋กœ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ๋‹ค. However, as a result of confirming the latest call history of the user terminal, when the user is not the first call or a frequent call partner compared with the past history registered in the database, it may be determined that the usage pattern of the user terminal is abnormal. In addition, as a result of analyzing the latest call history, even if the talk time with a specific counterpart is abnormally long or short compared to the past history registered in the database, it can be determined that the usage pattern of the user terminal is abnormal.

๋˜ํ•œ, ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์ตœ์‹  ํ†ตํ™” ๋‚ด์—ญ์— ๋Œ€ํ•œ ์Œ์„ฑ์„ STT(Speech to Text) ๋ณ€ํ™˜ํ•œ ๊ฒฐ๊ณผ๋ฅผ ๋ถ„์„ํ•˜์—ฌ, ์‚ฌ์šฉ์ž์— ์ƒ์‘ํ•˜๋Š” ๋งํˆฌ๋ฅผ ํฌํ•จํ•˜๋Š”์ง€ ์—ฌ๋ถ€์— ๋”ฐ๋ผ ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์ด์šฉํŒจํ„ด์ด ์ •์ƒ์ ์ธ์ง€ ์—ฌ๋ถ€๋ฅผ ํŒ๋‹จํ•  ์ˆ˜๋„ ์žˆ๋‹ค. In addition, by analyzing the results of speech to text (STT) conversion of the voice of the latest call history of the user terminal, it may be determined whether the usage pattern of the user terminal is normal according to whether or not the speech corresponding to the user is included. .

์‚ฌ์šฉ์ž์— ์ƒ์‘ํ•˜๋Š” ๋งํˆฌ๋Š” ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค์— ๋“ฑ๋ก๋œ ๊ณผ๊ฑฐ์˜ ํ†ตํ™” ๋‚ด์—ญ์— ๋Œ€ํ•œ ๋ถ„์„์„ ํ†ตํ•ด ๋Œ€ํ™”์— ์ค‘์š”ํ•˜๊ฒŒ ์‚ฌ์šฉ๋˜๋Š” ํ‚ค์›Œ๋“œ ์ด์™ธ์— ๋ถˆํ•„์š”ํ•˜์ง€๋งŒ ํ•ด๋‹น ์‚ฌ์šฉ์ž์— ๋Œ€ํ•ด ๋ฏธ๋ฆฌ ์ง€์ •๋œ ํšŸ์ˆ˜ ์ด์ƒ์œผ๋กœ ์ž์ฃผ ๋“ฑ์žฅํ•˜๋Š” ํŠน์œ ์˜ ์ถ”์ž„์ƒˆ(์˜ˆ. '์Œ~', '์•„~' ๋“ฑ)๋ฅผ ํฌํ•จํ•  ์ˆ˜ ์žˆ๋‹ค. Corresponding to a user is not only a keyword that is important for conversation through analysis of past call history registered in the database, but a distinctive feature that frequently appears more than a predetermined number of times for the user (e.g. ',' Ah ', etc.).

๋‹ค์Œ์œผ๋กœ ์ด์šฉํŒจํ„ด์ด ์‚ฌ์šฉ์ž ๋‹จ๋ง์„ ์ด์šฉํ•œ SNS ์‚ฌ์šฉ ๋‚ด์—ญ์ธ ๊ฒฝ์šฐ์˜ ๋ถ„์„์€ ๋‹ค์Œ๊ณผ ๊ฐ™๋‹ค. Next, the analysis when the usage pattern is the usage history of the SNS using the user terminal is as follows.

์‚ฌ์šฉ์ž ๋‹จ๋ง์—์„œ ์ตœ๊ทผ ์‚ฌ์šฉํ•œ SNS์˜ ๋‚ด์šฉ์„ ๋ถ„์„ํ•œ ๊ฒฐ๊ณผ, ์‚ฌ์šฉ์ž ๋‹จ๋ง์„ ํ†ตํ•ด ์ฑ„ํŒ…์„ ์ˆ˜ํ–‰ํ•  ๋•Œ SNS ์ƒ๋Œ€๋ฐฉ์ด ๋ˆ„๊ตฌ์ธ์ง€ ๊ทธ๋ฆฌ๊ณ  ์ฑ„ํŒ… ์‹œ๊ฐ„์ด ์–ธ์ œ์ธ์ง€๋ฅผ ๋ถ„์„ํ•˜์—ฌ ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์ด์šฉํŒจํ„ด์ด ์ •์ƒ์ ์ธ์ง€ ์—ฌ๋ถ€๋ฅผ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ๋‹ค. ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค์— ๊ธฐ ๋“ฑ๋ก๋œ ๊ณผ๊ฑฐ ์ด๋ ฅ์— ๊ธฐ์ดˆํ•  ๋•Œ ๋ฏธ๋ฆฌ ์ง€์ •๋œ ์ž„๊ณ„์น˜ ์ด์ƒ์œผ๋กœ ์ฑ„ํŒ…์„ ์ž์ฃผ ํ•˜๋˜ ์ƒ๋Œ€๋ฐฉ์ธ์ง€, ํ•ด๋‹น ์ƒ๋Œ€๋ฐฉ๊ณผ์˜ ์ฑ„ํŒ… ์‹œ๊ฐ„์ด ํ‰์ƒ์‹œ ์ž์ฃผ ์ฑ„ํŒ…์„ ํ•˜๋˜ ์‹œ๊ฐ„์ธ์ง€ ์—ฌ๋ถ€์— ๋”ฐ๋ผ ์ด์šฉํŒจํ„ด์˜ ์ •์ƒ ์—ฌ๋ถ€๊ฐ€ ํŒ๋‹จ๋  ์ˆ˜ ์žˆ๋‹ค. As a result of analyzing the contents of the recently used SNS in the user terminal, it is possible to determine whether the usage pattern of the user terminal is normal by analyzing who the SNS counterpart is and when the chat time is performed when chatting through the user terminal. . Based on the past history registered in the database, it may be determined whether the usage pattern is normal according to whether the person frequently chats at a predetermined threshold or more, or whether the chat time with the corresponding party is a normal chat time. .

๋˜ํ•œ, SNS์˜ ๊ฒŒ์‹œ๊ธ€์— ๋Œ€ํ•ด ๋‹ต๊ธ€์„ ๋‹ฌ ๋•Œ์— ํ•ด๋‹น ์‚ฌ์šฉ์ž๊ฐ€ ์ž์ฃผ ์‚ฌ์šฉํ•˜๋Š” ํŠน์œ ์˜ ๋ฌธ๊ตฌ ํ˜น์€ ์ด๋ชจํ‹ฐ์ฝ˜์ด ์กด์žฌํ•˜๋Š” ๊ฒฝ์šฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์ด์šฉํŒจํ„ด์ด ์ •์ƒ์ ์ธ ๊ฒƒ์œผ๋กœ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ๋‹ค. In addition, when replying to the posts of the SNS, if there is a specific phrase or emoticon frequently used by the user, it may be determined that the usage pattern of the user terminal is normal.

ํ˜น์€ ์ฑ„ํŒ…์„ ์ˆ˜ํ–‰ํ•˜๊ฑฐ๋‚˜ ๋‹ต๊ธ€์„ ๋‹ฌ๊ธฐ ์œ„ํ•ด ๋ฌธ์ž๋ฅผ ์ž…๋ ฅํ•˜๋Š” ๊ณผ์ •์—์„œ ์˜คํƒ€๋ฅผ ์ˆ˜์ •ํ•˜๊ธฐ ์œ„ํ•œ ๋ฐฑ์ŠคํŽ˜์ด์Šค๊ฐ€ ์ž…๋ ฅ๋  ๋•Œ ๋ฐฑ์ŠคํŽ˜์ด์Šค์— ์˜ํ•ด ์‚ญ์ œ๋œ ์ด์ „ ์ž…๋ ฅ์„ ๋ถ„์„ํ•  ์ˆ˜๋„ ์žˆ๋‹ค. ์‚ญ์ œ๋œ ์ด์ „ ์ž…๋ ฅ์ด ์‚ฌ์šฉ์ž์— ์ƒ์‘ํ•˜์—ฌ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค์— ๋“ฑ๋ก๋˜์–ด ์žˆ๋Š” ์˜คํƒ€ ๋ฐ์ดํ„ฐ์— ํฌํ•จ๋˜๋Š” ๊ฒฝ์šฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์ด์šฉํŒจํ„ด์ด ์ •์ƒ์ ์ธ ๊ฒƒ์œผ๋กœ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ๋‹ค. ์˜คํƒ€ ๋ฐ์ดํ„ฐ๋Š” ๋ฐฑ์ŠคํŽ˜์ด์Šค ์ž…๋ ฅ์— ๋”ฐ๋ผ ์‚ญ์ œ๋œ ์ด์ „ ์ž…๋ ฅ์„ ์ผ์ • ๊ธฐ๊ฐ„ ์ด์ƒ ์ˆ˜์ง‘ํ•œ ๊ฒฐ๊ณผ์ผ ์ˆ˜ ์žˆ๋‹ค. ์ด๋Š” ๋ฌธ์ž ์ž…๋ ฅ ๊ณผ์ •์—์„œ ์‚ฌ์šฉ์ž๋งˆ๋‹ค ์ž์ฃผ ํ‹€๋ฆฌ๋Š” ๋ฌธ์ž ์ž…๋ ฅ ๊ฒฐ๊ณผ๋ฅผ ํ™œ์šฉํ•œ ๊ฒƒ์ด๋‹ค. Or, you can analyze previous input deleted by backspace when a backspace is entered to correct a typo while typing a character to chat or reply. If the deleted previous input is included in the typo data registered in the database corresponding to the user, it may be determined that the usage pattern of the user terminal is normal. The typo data may be a result of collecting a previous input deleted for a predetermined period of time according to the backspace input. This is based on the character input result that is frequently different for each user in the character input process.

๋‹ค์Œ์œผ๋กœ ์ด์šฉํŒจํ„ด์ด ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ์‚ฌ์šฉ ์ ์œ ์œจ์ธ ๊ฒฝ์šฐ์˜ ๋ถ„์„์€ ๋‹ค์Œ๊ณผ ๊ฐ™๋‹ค. Next, the analysis when the usage pattern is the application usage share of the user terminal is as follows.

์‚ฌ์šฉ์ž ๋‹จ๋ง์—์„œ ์ตœ๊ทผ ์‹คํ–‰๋œ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜๋“ค์— ๋Œ€ํ•ด ๊ทธ ์‚ฌ์šฉ ์ ์œ ์œจ์„ ๋ถ„์„ํ•˜์—ฌ, ํ•ด๋‹น ์‚ฌ์šฉ์ž์— ๋Œ€ํ•ด ๊ธฐ ์„ค์ •๋œ ์‚ฌ์šฉ ์ ์œ ์œจ๊ณผ ์ผ์ • ๋น„์œจ ์ด์ƒ์˜ ์œ ์‚ฌ์„ฑ์„ ๊ฐ€์งˆ ๊ฒฝ์šฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์ด์šฉํŒจํ„ด์ด ์ •์ƒ์ ์ธ ๊ฒƒ์œผ๋กœ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ๋‹ค. ์˜ˆ์ปจ๋Œ€, ์‚ฌ์šฉ์ž๋งˆ๋‹ค ์ž์ฃผ ์‚ฌ์šฉํ•˜๊ฒŒ ๋˜๋Š” ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์ด ๋‹ค๋ฅผ ์ˆ˜ ์žˆ๊ณ , ๋™์ผ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜๋“ค์„ ์‚ฌ์šฉํ•˜๋”๋ผ๋„ ์‚ฌ์šฉ์ž ์„ฑํ–ฅ์— ๋”ฐ๋ผ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜๋ณ„ ์‚ฌ์šฉ์‹œ๊ฐ„์ด ๋‹ค๋ฅผ ์ˆ˜ ์žˆ๋‹ค. ๋”ฐ๋ผ์„œ, ์ตœ๊ทผ ์ผ์ • ์‹œ๊ฐ„ ๋™์•ˆ ์‚ฌ์šฉ๋œ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜๋“ค์˜ ์ข…๋ฅ˜์™€ ๊ทธ ์‚ฌ์šฉ ์ ์œ ์œจ๋กœ๋ถ€ํ„ฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์‚ฌ์šฉ์ž์— ๋Œ€ํ•œ ์„ฑํ–ฅ์„ ์ถ”์ •ํ•  ์ˆ˜ ์žˆ๊ฒŒ ๋˜๋Š” ๊ฒƒ์ด๋‹ค. By analyzing the usage share of recently executed applications in the user terminal, it may be determined that the usage pattern of the user terminal is normal when the user share has a similarity or more than a predetermined ratio. For example, applications that are frequently used for each user may be different, and even if the same applications are used, the usage time for each application may be different according to the user's inclination. Therefore, it is possible to estimate the propensity for the user of the user terminal from the type of applications used and the usage occupancy in recent years.

์ด์šฉํŒจํ„ด ๋ถ„์„๋ถ€(120)๋Š” ์ „์ˆ ํ•œ ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์œ„์น˜, ์‚ฌ์šฉ์ž ๋‹จ๋ง์„ ํ†ตํ•œ ํ†ตํ™” ๋‚ด์—ญ, SNS ์‚ฌ์šฉ ๋‚ด์—ญ, ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ์‚ฌ์šฉ ์ ์œ ์œจ ์ค‘ ์ ์–ด๋„ ํ•˜๋‚˜๋ฅผ ๋ถ„์„ํ•˜๊ธฐ ์œ„ํ•œ ์ด์šฉํŒจํ„ด์œผ๋กœ ํ™œ์šฉํ•˜๋˜, ์ด์šฉํŒจํ„ด์ด ๋ณต์ˆ˜ ๊ฐœ์ธ ๊ฒฝ์šฐ์—๋Š” OR ์กฐ๊ฑด ์—ฐ์‚ฐ์„ ํ†ตํ•ด ์ •์ƒ ์—ฌ๋ถ€๋ฅผ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ๋‹ค. ์ฆ‰, ์ด์šฉํŒจํ„ด ์ค‘ ํ•˜๋‚˜๋ผ๋„ ์ •์ƒ์ ์ธ ํŒจํ„ด์œผ๋กœ ํŒ๋‹จ๋˜๋ฉด ํ˜„์žฌ ์‚ฌ์šฉ์ž ๋‹จ๋ง์„ ์ •์ƒ์ ์ธ ์‚ฌ์šฉ์ž๊ฐ€ ์†Œ์ง€ํ•œ ๊ฒƒ์œผ๋กœ ๋ณด๋Š” ๊ฒƒ์ด๋‹ค. ์ด๋Š” ์ง„์ •ํ•œ ์‚ฌ์šฉ์ž๋ผ ํ• ์ง€๋ผ๋„ ๋งค์ˆœ๊ฐ„ ๋ชจ๋“  ์ด์šฉํŒจํ„ด์„ ์ •์ƒ ์กฐ๊ฑด(์ •์ƒ ํŒจํ„ด์ด ๋˜๋„๋ก ํ•˜๋Š” ์ž„๊ณ„์น˜)์„ ๋งŒ์กฑ์‹œํ‚ฌ ์ˆ˜ ์—†๊ธฐ ๋•Œ๋ฌธ์ด๋ฉฐ, ์–ด๋А ํ•˜๋‚˜์˜ ์ด์šฉํŒจํ„ด์ด๋ผ๋„ ์ •์ƒ ์กฐ๊ฑด์„ ๋งŒ์กฑํ•˜๋ฉด ์ง„์ •ํ•œ ์‚ฌ์šฉ์ž๋กœ ํŒ๋‹จํ•˜๊ธฐ์— ์ถฉ๋ถ„ํ•˜๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค. The usage pattern analyzer 120 may be used as a usage pattern for analyzing at least one of the above-described location of the user terminal, call history through the user terminal, SNS usage history, and usage share of the application. It is possible to determine whether it is normal through OR condition operation. That is, if at least one of the usage patterns is determined to be a normal pattern, the current user terminal is considered to be possessed by a normal user. This is because even a true user cannot satisfy a normal condition (a threshold value for making a normal pattern) at every moment, and if any one of the usage patterns satisfies the normal condition, it is sufficient to be determined as a true user.

์ธ์ฆ์ˆ˜์ค€ ์กฐ์ •๋ถ€(130)๋Š” ์ด์šฉํŒจํ„ด ๋ถ„์„๋ถ€(120)์—์„œ ๋ถ„์„ํ•œ ๊ฒฐ๊ณผ์— ๋”ฐ๋ผ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ์กฐ์ •ํ•  ์ˆ˜ ์žˆ๋‹ค. The authentication level adjusting unit 130 may adjust the authentication level according to the result analyzed by the use pattern analyzer 120.

๋งŒ์•ฝ ์ด์šฉํŒจํ„ด์ด ์ •์ƒ์ ์ธ ๊ฒƒ์œผ๋กœ ๋ถ„์„๋œ ๊ฒฝ์šฐ์—๋Š” ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ์ƒ๋Œ€์ ์œผ๋กœ ๋‚ฎ๊ฒŒ ์„ค์ •ํ•˜๊ณ (๋‹จ๊ณ„ S20), ์ด์šฉํŒจํ„ด์ด ๋น„์ •์ƒ์ ์ธ ๊ฒƒ์œผ๋กœ ๋ถ„์„๋œ ๊ฒฝ์šฐ์—๋Š” ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ์ƒ๋Œ€์ ์œผ๋กœ ๋†’๊ฒŒ ์„ค์ •ํ•œ๋‹ค(๋‹จ๊ณ„ S25). If the usage pattern is analyzed to be normal, the authentication level is set relatively low (step S20). If the usage pattern is analyzed to be abnormal, the authentication level is set relatively high (step S25).

๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์ด ๋‚ฎ๋‹ค๋Š” ๊ฒƒ์€ ํŠน์ • ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ์‹คํ–‰ ํ˜น์€ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋‚ด์—์„œ ํŠน์ • ํ–‰์œ„๋ฅผ ์ˆ˜ํ–‰ํ•  ๋•Œ ๋ณธ์ธ ์ธ์ฆ์ด ์š”๊ตฌ๋˜๋Š” ๊ฒฝ์šฐ ๋ณธ์ธ ์ธ์ฆ ์š”๊ฑด์„ ์™„ํ™”์‹œ์ผฐ์Œ์„ ์˜๋ฏธํ•œ๋‹ค. ์˜ˆ์ปจ๋Œ€, ๊ธˆ์œต ๊ฑฐ๋ž˜๋ฅผ ์œ„ํ•œ ๋ณธ์ธ ์ธ์ฆ ์š”๊ฑด์œผ๋กœ ์žํ•„์„œ๋ช…, ํ™์ฑ„์ธ์‹, ์ง€๋ฌธ์ธ์ฆ, ๋น„๋ฐ€๋ฒˆํ˜ธ ์ž…๋ ฅ ๋“ฑ์ด ์žˆ์„ ๋•Œ, ์ด๋“ค ์ค‘ n๊ฐœ ์ดํ•˜์— ๋Œ€ํ•œ ํ™•์ธ๋งŒ์œผ๋กœ๋„ ๋ณธ์ธ ์ธ์ฆ์ด ๋˜๋„๋ก ํ•  ์ˆ˜ ์žˆ๋‹ค. The low level of identity verification means that if identity verification is required when running a particular application or performing a specific action within an application, it means that the identity verification requirements have been relaxed. For example, when there is a handwritten signature, iris recognition, fingerprint authentication, password input, etc. as a requirement for identity verification for financial transactions, the identity verification may be performed by checking only n or less of them.

์ด์™€ ๋ฐ˜๋Œ€๋กœ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์ด ๋†’๋‹ค๋Š” ๊ฒƒ์€ ์•ž์„œ ์„ค๋ช…ํ•œ ๋‹ค์ˆ˜์˜ ๋ณธ์ธ ์ธ์ฆ ์š”๊ฑด์— ๋Œ€ํ•ด์„œ n๊ฐœ ์ด์ƒ์— ๋Œ€ํ•œ ํ™•์ธ์„ ํ•˜๋„๋ก ๋ณธ์ธ ์ธ์ฆ ์š”๊ฑด์„ ๊ฐ•ํ™”์‹œ์ผฐ์Œ์„ ์˜๋ฏธํ•œ๋‹ค. In contrast, a high level of identity means that the identity verification requirement has been strengthened to verify at least n of the multiple identity requirements described above.

๋ณธ์ธ ์ธ์ฆ์„ ํ•„์š”๋กœ ํ•˜๋Š” ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์ด ์‹คํ–‰๋  ๋•Œ ์ธ์ฆ์ˆ˜์ค€ ์กฐ์ •๋ถ€(130)์— ์˜ํ•ด ์กฐ์ •๋œ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์ด API(์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ํ”Œ๋žซํผ ์ธํ„ฐํŽ˜์ด์Šค)๋กœ ์ œ๊ณต๋  ์ˆ˜ ์žˆ๋‹ค. ๋˜๋Š” ํ›„์ˆ ํ•  ๊ธˆ์œต ์„œ๋ฒ„์™€ ๊ฐ™์€ ์›น ์„œ๋ฒ„์— ๋ฉ”์‹œ์ง€ ํ˜•ํƒœ๋กœ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์ด ์ „์†ก๋  ์ˆ˜๋„ ์žˆ๋‹ค. When an application requiring identity authentication is executed, the identity level adjusted by the authentication level adjusting unit 130 may be provided as an API (application platform interface). Alternatively, the authentication level may be transmitted in the form of a message to a web server such as a financial server to be described later.

๋ณธ ์‹ค์‹œ์˜ˆ์—์„œ ์ด์šฉํŒจํ„ด ์ˆ˜์ง‘๋ถ€(110)๋Š” ์ˆ˜์ง‘ํ•œ ์ด์šฉํŒจํ„ด์„ ๋ถ„์„ํ•˜๊ธฐ ์ข‹์€ ๋ฐ์ดํ„ฐ ํฌ๋งท์œผ๋กœ ๊ฐ€๊ณตํ•  ์ˆ˜ ์žˆ๋‹ค. ๋˜ํ•œ, ์ด์šฉํŒจํ„ด ์ˆ˜์ง‘๋ถ€(110)์—์„œ ์ˆ˜์ง‘ํ•œ ์ด์šฉํŒจํ„ด์€ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค์— ์ €์žฅ๋˜์–ด, ๋ฏธ๋ž˜์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ์œ„ํ•œ ๊ณผ๊ฑฐ ์ด๋ ฅ์œผ๋กœ ์ด์šฉ๋  ์ˆ˜ ์žˆ๋‹ค. In the present embodiment, the usage pattern collector 110 may process the collected usage patterns into a data format that is easy to analyze. In addition, the usage pattern collected by the usage pattern collector 110 may be stored in a database and used as a past history for future usage pattern analysis.

๋˜ํ•œ, ์ด์šฉํŒจํ„ด ์ˆ˜์ง‘๋ถ€(110)๋Š” ์ด์šฉํŒจํ„ด์ด ๋ฐœ์ƒํ•  ๋•Œ๋งˆ๋‹ค ์ˆ˜์‹œ๋กœ ํ™œ์„ฑํ™”๋˜์–ด ์ž‘๋™ํ•  ์ˆ˜ ์žˆ๋‹ค. ๊ทธ๋ฆฌ๊ณ  ์ด์šฉํŒจํ„ด ๋ถ„์„๋ถ€(120) ๋ฐ ์ธ์ฆ์ˆ˜์ค€ ์กฐ์ •๋ถ€(130)๋Š” ๋ณธ์ธ ์ธ์ฆ์ด ํ•„์š”ํ•œ ๊ฒฝ์šฐ์—๋งŒ ํ™œ์„ฑํ™”๋˜์–ด ์ž‘๋™ํ•  ์ˆ˜ ์žˆ๋‹ค. In addition, the usage pattern collector 110 may be activated and operate from time to time whenever the usage pattern occurs. In addition, the use pattern analysis unit 120 and the authentication level adjusting unit 130 may be activated and operate only when identity authentication is required.

๋ณธ ์‹ค์‹œ์˜ˆ์— ๋”ฐ๋ฅธ ์‚ฌ์šฉ์ž ๋‹จ๋ง์—์„œ์˜ ๋ณธ์ธ ์ธ์ฆ ๊ณผ์ •์— ๋Œ€ํ•ด ์˜ˆ๋ฅผ ๋“ค์–ด ์„ค๋ช…ํ•˜๋ฉด ๋‹ค์Œ๊ณผ ๊ฐ™๋‹ค. Referring to the identity authentication process in the user terminal according to the embodiment as an example.

์Šค๋งˆํŠธํฐ ์‚ฌ์šฉ์ž๊ฐ€ ํ‰์†Œ์— ์ถœ๊ทผ์‹œ๊ฐ„์ธ 8์‹œ๋ถ€ํ„ฐ 9์‹œ๊นŒ์ง€๋Š” ์ฃผ๋กœ ์Œ์•…์•ฑ์„ ์ด์šฉํ•˜์—ฌ ์Œ์•…์„ ๋“ฃ๊ณ , ์ ์‹ฌ์‹œ๊ฐ„์—๋Š” ์นœ๊ตฌ๋“ค๊ณผ SNS๋ฅผ ํ•˜๋Š” ๋“ฑ์˜ ํŒจํ„ด์„ ๋ถ„์„ํ•˜์—ฌ ๊ฐ‘์ž๊ธฐ ์‚ฌ์šฉํ•˜์ง€ ์•Š๋Š” ์•ฑ์„ ์‚ฌ์šฉ์„ ํ•œ๋‹ค๋“ ๊ฐ€, ์•„๋‹ˆ๋ฉด ์ถœ๊ทผ์‹œ๊ฐ„์— ์Œ์•…์•ฑ์„ ์‚ฌ์šฉํ•˜์ง€ ์•Š๋Š” ๋“ฑ์˜ ๋น„์ •์ƒ์ ์ธ ํŒจํ„ด์ด ๋ณด์ด๋Š” ๊ฒฝ์šฐ์—๋Š” ๋ณธ์ธ์ด ์•„๋‹ ์ˆ˜ ์žˆ๋‹ค๋Š” ํŒ๋‹จ์— ์˜ํ•˜์—ฌ ๋ชจ๋ฐ”์ผ๋ฑ…ํ‚น ๋“ฑ ๋ณธ์ธ์ธ์ฆ์ด ํ•„์š”ํ•œ ๊ฒฝ์šฐ ๋” ๊ฐ•ํ™”๋œ ๋ณธ์ธ์ธ์ฆ ์ˆ˜๋‹จ์„ ์‚ฌ์šฉํ•˜๊ฒŒ ํ•˜์ง€๋งŒ, ์‚ฌ์šฉ์ž์˜ ํŒจํ„ด์ด ์ผ์ •ํ•œ ๊ฒฝ์šฐ๋Š” ๊ฐ„๋‹จํ•œ ๋ฐฉ์‹์˜ ๋กœ๊ทธ์ธ์œผ๋กœ ๋ณธ์ธ์ธ์ฆ์„ ๋งˆ๋ฌด๋ฆฌ ํ•  ์ˆ˜ ์žˆ๋‹ค. Smartphone users usually listen to music using the music app from 8:00 to 9 o'clock, and analyze the patterns such as socializing with friends during lunchtime, and suddenly use an app that they do not use. Or, if you see an abnormal pattern such as not using the music app at work, if you need to verify your identity, such as mobile banking by the judgment that you may not be able to use a stronger authentication means, but the pattern of the user In this case, you can finish the authentication by simple login.

๋ณธ ๋ฐœ๋ช…์˜ ๋˜ ๋‹ค๋ฅธ ์ผ๋ก€๋ฅผ ๋“ค๋ฉด. ๋ชจ๋ฐ”์ผ ๋ฑ…ํ‚น์‹œ ํ‰์†Œ์— ์ž์ฃผ ๊ฑฐ๋ž˜ํ•˜๋Š” ์‚ฌ๋žŒ๊ณผ์˜ ์†ก๊ธˆ์€ ์ด์šฉํŒจํ„ด์ด ์ผ์ •ํ•œ ๊ฒƒ์œผ๋กœ ๋ณด๊ณ  ๊ฐ„๋‹จํ•œ ๋กœ๊ทธ์ธ์œผ๋กœ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•  ์ˆ˜ ์žˆ์ง€๋งŒ, ์ƒˆ๋กœ์šด ์‚ฌ๋žŒ ๋˜๋Š” ์ƒˆ๋กœ์šด ๊ณ„์ขŒ๋ฒˆํ˜ธ์ธ ๊ฒฝ์šฐ๋Š” ์ด์šฉํŒจํ„ด์ด ๋ณ€ํ™”๋œ ๊ฒƒ์œผ๋กœ ๋ณด๊ณ  ๋” ๊ฐ•ํ™”๋œ ๋ณด์•ˆ์ˆ˜๋‹จ์„ ๊ฑฐ์ณ์•ผ๋งŒ ๋ณธ์ธ์ธ์ฆ์ด ๋˜๋„๋ก ํ•  ์ˆ˜ ์žˆ๋‹ค.For another example of the present invention. In the case of mobile banking, remittances with people who frequently trade can be made by a simple log-in by seeing a certain usage pattern, but in the case of a new person or a new account number, the usage pattern has been changed and must go through stronger security measures. It can be authenticated.

๋„ 3์€ ๋ณธ ๋ฐœ๋ช…์˜ ์ผ ์‹ค์‹œ์˜ˆ์— ๋”ฐ๋ฅธ ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ ์‹œ์Šคํ…œ์˜ ๊ฐœ๋žต์ ์ธ ๊ตฌ์„ฑ ๋ธ”๋ก๋„ ๋ฐ ๋ณธ์ธ ์ธ์ฆ ๋ฐฉ๋ฒ•์˜ ํ๋ฆ„๋„์ด๊ณ , ๋„ 4๋Š” ๋ณธ์ธ ์ธ์ฆ ์‹œ์Šคํ…œ์— ํฌํ•จ๋˜๋Š” ๊ธˆ์œต ์„œ๋ฒ„์˜ ๊ฐœ๋žต์ ์ธ ๊ตฌ์„ฑ ๋ธ”๋ก๋„์ด๋ฉฐ, ๋„ 5๋Š” ๋ณธ์ธ ์ธ์ฆ ์‹œ์Šคํ…œ์— ํฌํ•จ๋˜๋Š” ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„์˜ ๊ฐœ๋žต์ ์ธ ๊ตฌ์„ฑ ๋ธ”๋ก๋„์ด๋‹ค. 3 is a schematic block diagram of a user authentication system utilizing a user pattern analysis according to an embodiment of the present invention and a flow chart of a user authentication method, and FIG. 4 is a schematic diagram of a financial server included in a user authentication system. 5 is a schematic block diagram of a message authentication server included in an identity authentication system.

๋ณธ ์‹ค์‹œ์˜ˆ์— ๋”ฐ๋ฅธ ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ ์‹œ์Šคํ…œ(1)์€ ์ „์ˆ ํ•œ ์‚ฌ์šฉ์ž ๋‹จ๋ง์—์„œ ์ „์†ก๋˜๋Š” ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€๋ฅผ ์ด์šฉํ•˜์—ฌ ๊ธˆ์œต ์„œ๋ฒ„์™€ ๊ฐ™์€ ์›น ์„œ๋ฒ„์—์„œ ๋กœ๊ทธ์ธ ๋“ฑ์— ์š”๊ตฌ๋˜๋Š” ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ์ด์šฉํŒจํ„ด์— ๋”ฐ๋ผ ์ƒ์ดํ•˜๊ฒŒ ์ ์šฉ์‹œํ‚ฌ ์ˆ˜ ์žˆ๋‹ค. ์ด ๊ณผ์ •์—์„œ ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„๋ฅผ ํ†ตํ•œ ๋ฉ”์‹œ์ง€ ์ธ์ฆ์„ ํ†ตํ•ด ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€์— ๋Œ€ํ•œ ์ธ์ฆ์ด ์ถ”๊ฐ€์ ์œผ๋กœ ์ˆ˜ํ–‰๋˜์–ด, ๋ฉ”์‹œ์ง€ ์ „์†ก ๊ณผ์ •์—์„œ์˜ ํ•ดํ‚น๊ณผ ๊ฐ™์€ ๋ฐœ์ƒ ๊ฐ€๋Šฅํ•œ ๋ฌธ์ œ์— ๋”ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ์˜ ์˜ค๋ฅ˜๋ฅผ ์ฐจ๋‹จํ•  ์ˆ˜ ์žˆ๋‹ค. The user authentication system 1 utilizing the user pattern analysis according to the present embodiment uses the user authentication level required for login in a web server such as a financial server using the user authentication level message transmitted from the user terminal described above. It can apply differently according to a pattern. In this process, authentication of the authentication level message is additionally performed through message authentication through the message authentication server, thereby preventing errors in authentication due to possible problems such as hacking in the message transmission process.

๋ณธ ์‹ค์‹œ์˜ˆ์— ๋”ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ ์‹œ์Šคํ…œ(1)์€ ์‚ฌ์šฉ์ž ๋‹จ๋ง(100), ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„(300), ์›น ์„œ๋ฒ„(200)๋ฅผ ํฌํ•จํ•œ๋‹ค. The identity authentication system 1 according to the present embodiment includes a user terminal 100, a message authentication server 300, and a web server 200.

์‚ฌ์šฉ์ž ๋‹จ๋ง(100)์€ ๋„ 1์„ ์ฐธ์กฐํ•˜์—ฌ ์„ค๋ช…ํ•œ ๋ฐ” ์žˆ์œผ๋ฉฐ, ๋ฉ”์‹œ์ง€ ์ „์†ก์„ ์œ„ํ•œ ์ถ”๊ฐ€์ ์ธ ๊ตฌ์„ฑ์š”์†Œ์ธ ํ‚ค ๋“ฑ๋ก๋ถ€(140) ๋ฐ ๋ฉ”์‹œ์ง€ ์ „์†ก๋ถ€(150)๋ฅผ ๋” ํฌํ•จํ•  ์ˆ˜ ์žˆ๋‹ค. The user terminal 100 has been described with reference to FIG. 1 and may further include a key register 140 and a message transmitter 150 which are additional components for message transmission.

์›น ์„œ๋ฒ„(200)๋Š” ๋ฉ”์‹œ์ง€ ์ˆ˜์‹ ๋ถ€(210), ์ธ์ฆ ์š”์ฒญ๋ถ€(220), ์ธ์ฆ๊ฒฐ๊ณผ ์ˆ˜์‹ ๋ถ€(230), ์ˆ˜์ค€๋ณ„ ๋กœ๊ทธ์ธ ์ˆ˜ํ–‰๋ถ€(240)๋ฅผ ํฌํ•จํ•˜๊ณ , ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„(300)๋Š” ๊ณต๊ฐœํ‚ค ๋“ฑ๋ก๋ถ€(310), ์š”์ฒญ ์ˆ˜์‹ ๋ถ€(320), ๋ฉ”์‹œ์ง€ ์ธ์ฆ๋ถ€(330), ์ธ์ฆ๊ฒฐ๊ณผ ์ „์†ก๋ถ€(340)๋ฅผ ํฌํ•จํ•œ๋‹ค. The web server 200 includes a message receiver 210, an authentication requester 220, an authentication result receiver 230, and a login performer 240 for each level. The message authentication server 300 includes a public key register 310. , The request receiving unit 320, the message authenticating unit 330, and the authentication result transmitting unit 340.

ํ‚ค ๋“ฑ๋ก๋ถ€(140)๋Š” ์ธ์ฆ์ˆ˜์ค€ ์กฐ์ •๋ถ€(130)์—์„œ ์กฐ์ •๋œ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ๋ฉ”์‹œ์ง€ ํ˜•ํƒœ๋กœ ์ „์†กํ•˜๋Š” ๊ณผ์ •์—์„œ ๋ณด์•ˆ์„ ์œ„ํ•ด ์Œ์„ ์ด๋ฃจ๋Š” ๊ฐœ์ธํ‚ค์™€ ๊ณต๊ฐœํ‚ค๋ฅผ ์ƒ์„ฑํ•˜์—ฌ ๋“ฑ๋กํ•œ๋‹ค. The key registration unit 140 generates and registers a paired private key and public key for security in the process of transmitting the authentication level adjusted by the authentication level adjusting unit 130 in the form of a message.

ํ‚ค ๋“ฑ๋ก๋ถ€(140)์—์„œ ์ƒ์„ฑ๋œ ๊ฐœ์ธํ‚ค๋Š” ์‚ฌ์šฉ์ž ๋‹จ๋ง(100)์˜ ๋ณด์•ˆ ์˜์—ญ์— ๋“ฑ๋ก๋˜๋ฉฐ, ๊ณต๊ฐœํ‚ค๋Š” ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„(300)๋กœ ์ „์†ก๋˜์–ด ๊ณต๊ฐœํ‚ค ๋“ฑ๋ก๋ถ€(310)์— ์˜ํ•ด ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„(300) ๋‚ด์— ๋“ฑ๋ก๋œ๋‹ค(๋‹จ๊ณ„ S50). The private key generated by the key registration unit 140 is registered in the security area of the user terminal 100, and the public key is transmitted to the message authentication server 300, and the public key registration unit 310 in the message authentication server 300. It is registered (step S50).

๋ฉ”์‹œ์ง€ ์ „์†ก๋ถ€(150)๋Š” ์ธ์ฆ์ˆ˜์ค€ ์กฐ์ •๋ถ€(130)์—์„œ ์กฐ์ •๋œ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ์›น ์„œ๋ฒ„(200)๋กœ ์ „๋‹ฌํ•˜๊ธฐ ์œ„ํ•ด ๋ฉ”์‹œ์ง€ ํ˜•ํƒœ๋กœ ๋งŒ๋“ค์–ด ์ „์†กํ•œ๋‹ค(๋‹จ๊ณ„ S55). ๋ฉ”์‹œ์ง€ ์ „์†ก๋ถ€(150)๋Š” ํ‚ค ๋“ฑ๋ก๋ถ€(140)์— ๋“ฑ๋ก๋œ ๊ฐœ์ธํ‚ค๋ฅผ ์ด์šฉํ•˜์—ฌ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€๋ฅผ ์•”ํ˜ธํ™”ํ•˜์—ฌ ์ „์†กํ•  ์ˆ˜ ์žˆ๋‹ค. The message transmitter 150 transmits the user authentication level adjusted by the authentication level adjusting unit 130 in the form of a message in order to deliver it to the web server 200 (step S55). The message transmission unit 150 may encrypt and transmit the authentication level message using the private key registered in the key registration unit 140.

์›น ์„œ๋ฒ„(200)์˜ ๋ฉ”์‹œ์ง€ ์ˆ˜์‹ ๋ถ€(210)๋Š” ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€๋ฅผ ์ „์†ก๋ฐ›๋Š”๋‹ค. ์ด ๋•Œ ์ „์†ก๋ฐ›์€ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€๋Š” ๊ฐœ์ธํ‚ค๋กœ ์•”ํ˜ธํ™”๋˜์–ด ์žˆ์–ด ๋ณตํ˜ธํ™”๊ฐ€ ๋ถˆ๊ฐ€๋Šฅํ•˜๋‹ค. ๋”ฐ๋ผ์„œ, ์›น ์„œ๋ฒ„(200)์˜ ์ธ์ฆ ์š”์ฒญ๋ถ€(220)๋Š” ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„(300)๋กœ ์ „์†ก๋ฐ›์€ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€๋ฅผ ์ „์†กํ•˜๋ฉด์„œ ์ธ์ฆ์„ ์š”์ฒญํ•œ๋‹ค(๋‹จ๊ณ„ S60). ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์š”์ฒญ์—๋Š” ์ •๋‹นํ•œ ์‚ฌ์šฉ์ž ๋‹จ๋ง๋กœ๋ถ€ํ„ฐ์˜ ๋ฉ”์‹œ์ง€์ธ ๊ฒฝ์šฐ ๋ณตํ˜ธํ™”๋ฅผ ์š”์ฒญํ•˜๋Š” ๋‚ด์šฉ์ด ํฌํ•จ๋  ์ˆ˜ ์žˆ๋‹ค. The message receiving unit 210 of the web server 200 receives the identity authentication level message. At this time, the received authentication level message is encrypted with the private key and cannot be decrypted. Therefore, the authentication request unit 220 of the web server 200 requests authentication while transmitting the authentication level message received from the message authentication server 300 (step S60). The message authentication request may include a content request for decryption when the message is from a legitimate user terminal.

๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„(300)์˜ ์š”์ฒญ ์ˆ˜์‹ ๋ถ€(320)๋Š” ์›น ์„œ๋ฒ„(200)์˜ ์ธ์ฆ ์š”์ฒญ๋ถ€(220)๋กœ๋ถ€ํ„ฐ ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์š”์ฒญ์„ ์ˆ˜์‹ ํ•˜๋ฉฐ, ์ด ๊ฒฝ์šฐ ๋ฉ”์‹œ์ง€ ์ธ์ฆ๋ถ€(330)์—์„œ ๋ฉ”์‹œ์ง€ ์ธ์ฆ์„ ์ˆ˜ํ–‰ํ•œ๋‹ค(๋‹จ๊ณ„ S65). The request receiving unit 320 of the message authentication server 300 receives a message authentication request from the authentication requesting unit 220 of the web server 200, and in this case, the message authentication unit 330 performs message authentication (step S65). ).

๋ฉ”์‹œ์ง€ ์ธ์ฆ์€ ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„(300)์— ๋“ฑ๋ก๋œ ๊ณต๊ฐœํ‚ค๋ฅผ ์ด์šฉํ•˜์—ฌ ๊ฐœ์ธํ‚ค๋กœ ์•”ํ˜ธํ™”๋œ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€์˜ ๋ณตํ˜ธํ™”๊ฐ€ ๊ฐ€๋Šฅํ•œ์ง€๋ฅผ ํŒŒ์•…ํ•จ์œผ๋กœ์จ ์ด๋ฃจ์–ด์งˆ ์ˆ˜ ์žˆ๋‹ค. The message authentication may be performed by using the public key registered in the message authentication server 300 to determine whether the user authentication level message encrypted with the private key can be decrypted.

๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„(300)์— ๋“ฑ๋ก๋œ ๊ณต๊ฐœํ‚ค๋กœ ๋ณตํ˜ธํ™”๊ฐ€ ๋˜์ง€ ์•Š๋Š” ๊ฒฝ์šฐ, ์•”ํ˜ธํ™”์— ์ด์šฉ๋œ ๊ฐœ์ธํ‚ค์™€ ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„(300)์— ๋“ฑ๋ก๋œ ๊ณต๊ฐœํ‚ค๊ฐ€ ์„œ๋กœ ๋งค์นญ๋˜์ง€ ์•Š๋Š” ๊ฒƒ์œผ๋กœ ํ•ด๋‹น ๋ฉ”์‹œ์ง€๊ฐ€ ์ •๋‹นํ•œ ์‚ฌ์šฉ์ž ๋‹จ๋ง๋กœ๋ถ€ํ„ฐ ์˜ค์ง€ ์•Š์€ ๊ฒƒ์œผ๋กœ ๋ณผ ์ˆ˜ ์žˆ๋‹ค. ์ด ๊ฒฝ์šฐ ์ธ์ฆ๊ฒฐ๊ณผ ์ „์†ก๋ถ€(340)๋Š” ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์‹คํŒจ๋กœ ์ธ์ฆ๊ฒฐ๊ณผ๋ฅผ ์ „์†กํ•  ์ˆ˜ ์žˆ๋‹ค(๋‹จ๊ณ„ S70). If the public key registered in the message authentication server 300 is not decrypted, the private key used for encryption and the public key registered in the message authentication server 300 do not match each other, and the message does not come from a legitimate user terminal. It can be seen as. In this case, the authentication result transmitter 340 may transmit the authentication result due to the message authentication failure (step S70).

๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„(300)์— ๋“ฑ๋ก๋œ ๊ณต๊ฐœํ‚ค๋กœ ๋ณตํ˜ธํ™”๊ฐ€ ๋˜๋Š” ๊ฒฝ์šฐ, ์•”ํ˜ธํ™”์— ์ด์šฉ๋œ ๊ฐœ์ธํ‚ค์™€ ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„(300)์— ๋“ฑ๋ก๋œ ๊ณต๊ฐœํ‚ค๊ฐ€ ์„œ๋กœ ๋งค์นญ๋˜๋Š” ๊ฒƒ์œผ๋กœ ํ•ด๋‹น ๋ฉ”์‹œ์ง€๊ฐ€ ์ •๋‹นํ•œ ์‚ฌ์šฉ์ž ๋‹จ๋ง๋กœ๋ถ€ํ„ฐ ์˜จ ๊ฒƒ์œผ๋กœ ๋ณผ ์ˆ˜ ์žˆ๋‹ค. ์ด ๊ฒฝ์šฐ ์ธ์ฆ๊ฒฐ๊ณผ ์ „์†ก๋ถ€(340)๋Š” ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„ฑ๊ณต์œผ๋กœ ์ธ์ฆ๊ฒฐ๊ณผ๋ฅผ ์ „์†กํ•  ์ˆ˜ ์žˆ๋‹ค. ์ธ์ฆ๊ฒฐ๊ณผ์™€ ํ•จ๊ป˜ ๋ณตํ˜ธํ™”๋œ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€๋ฅผ ํ•จ๊ป˜ ์ „์†กํ•  ์ˆ˜ ์žˆ๋‹ค. When decrypted with the public key registered in the message authentication server 300, the private key used for encryption and the public key registered in the message authentication server 300 are matched with each other. have. In this case, the authentication result transmitter 340 may transmit the authentication result with the successful message authentication. The decrypted identity authentication message can be sent along with the authentication result.

์›น ์„œ๋ฒ„(200)์˜ ์ธ์ฆ๊ฒฐ๊ณผ ์ˆ˜์‹ ๋ถ€(230)์—์„œ๋Š” ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„(300)๋กœ๋ถ€ํ„ฐ ์ธ์ฆ๊ฒฐ๊ณผ๋ฅผ ์ˆ˜์‹ ํ•œ๋‹ค. ์ˆ˜์‹ ํ•œ ์ธ์ฆ๊ฒฐ๊ณผ๊ฐ€ ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์‹คํŒจ์ธ ๊ฒฝ์šฐ์—๋Š” ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€ ์ž์ฒด์— ๋ฌธ์ œ๊ฐ€ ์žˆ๋Š” ๊ฒƒ์œผ๋กœ ๋ณด๊ณ , ๋กœ๊ทธ์ธ ์ž์ฒด๊ฐ€ ๋ถˆ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•  ์ˆ˜ ์žˆ๋‹ค. The authentication result receiver 230 of the web server 200 receives the authentication result from the message authentication server 300. If the received authentication result is a message authentication failure, the authentication level message itself may be regarded as a problem, and the login itself may be impossible.

์ˆ˜์‹ ํ•œ ์ธ์ฆ๊ฒฐ๊ณผ๊ฐ€ ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„ฑ๊ณต์ธ ๊ฒฝ์šฐ ์ˆ˜์ค€๋ณ„ ๋กœ๊ทธ์ธ ์ˆ˜ํ–‰๋ถ€(240)์—์„œ๋Š” ์ธ์ฆ๊ฒฐ๊ณผ์™€ ํ•จ๊ป˜ ์ˆ˜์‹ ํ•œ ๋ณตํ˜ธํ™”๋œ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€์— ๋”ฐ๋ผ ์ˆ˜์ค€๋ณ„ ๋กœ๊ทธ์ธ์ด ์ˆ˜ํ–‰๋˜๊ฒŒ ํ•  ์ˆ˜ ์žˆ๋‹ค(๋‹จ๊ณ„ S75). If the received authentication result is a message authentication success level login performing unit 240 may be performed to log in by the level according to the decrypted identity authentication level message received with the authentication result (step S75).

๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์ด ์ƒ๋Œ€์ ์œผ๋กœ ๋‚ฎ๊ฒŒ ์„ค์ •๋œ ๊ฒฝ์šฐ์—๋Š” ๊ฐ„๋‹จํ•œ ๋ณธ์ธ ์ธ์ฆ ์ ˆ์ฐจ๋ฅผ ํ†ตํ•ด ๋กœ๊ทธ์ธ์ด ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•˜๊ณ , ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์ด ์ƒ๋Œ€์ ์œผ๋กœ ๋†’๊ฒŒ ์„ค์ •๋œ ๊ฒฝ์šฐ์—๋Š” ๋ณด๋‹ค ๊ฐ•ํ™”๋œ ๋ณธ์ธ ์ธ์ฆ ์ ˆ์ฐจ๋ฅผ ํ†ตํ•ด์„œ๋งŒ ๋กœ๊ทธ์ธ์ด ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•  ์ˆ˜ ์žˆ๋‹ค. If the authentication level is set relatively low, the user can log in through a simple authentication process. If the authentication level is set relatively high, the user can log in only through a stronger authentication process.

๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์— ๋”ฐ๋ฅธ ๋กœ๊ทธ์ธ์„ ์œ„ํ•œ ๋ณธ์ธ ์ธ์ฆ ์ ˆ์ฐจ์˜ ์ •๋„์— ๋Œ€ํ•ด์„œ๋Š” ํ•„์š”์— ๋”ฐ๋ผ ๋‹ค์–‘ํ•˜๊ฒŒ ์„ค์ •๋  ์ˆ˜ ์žˆ์„ ๊ฒƒ์ด๋‹ค. The degree of identity verification procedure for login according to the identity verification level may be set as needed.

์ƒ์ˆ ํ•œ ๋ณธ ์‹ค์‹œ์˜ˆ์— ๋”ฐ๋ฅธ ๋ณธ์ธ ์ธ์ฆ ๋ฐฉ๋ฒ•์€ ์ปดํ“จํ„ฐ๋กœ ์ฝ์„ ์ˆ˜ ์žˆ๋Š” ๊ธฐ๋ก ๋งค์ฒด์— ์ปดํ“จํ„ฐ๊ฐ€ ์ฝ์„ ์ˆ˜ ์žˆ๋Š” ์ฝ”๋“œ๋กœ์„œ ๊ตฌํ˜„๋˜๋Š” ๊ฒƒ์ด ๊ฐ€๋Šฅํ•˜๋‹ค. ์ปดํ“จํ„ฐ๊ฐ€ ์ฝ์„ ์ˆ˜ ์žˆ๋Š” ๊ธฐ๋ก๋งค์ฒด๋กœ๋Š” ์ปดํ“จํ„ฐ ์‹œ์Šคํ…œ์— ์˜ํ•˜์—ฌ ํ•ด๋…๋  ์ˆ˜ ์žˆ๋Š” ๋ฐ์ดํ„ฐ๊ฐ€ ์ €์žฅ๋œ ๋ชจ๋“  ์ข…๋ฅ˜์˜ ๊ธฐ๋ก ๋งค์ฒด๋ฅผ ํฌํ•จํ•œ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด, ROM(Read Only Memory), RAM(Random Access Memory), ์ž๊ธฐ ํ…Œ์ดํ”„, ์ž๊ธฐ ๋””์Šคํฌ, ํ”Œ๋ž˜์‰ฌ ๋ฉ”๋ชจ๋ฆฌ, ๊ด‘ ๋ฐ์ดํ„ฐ ์ €์žฅ์žฅ์น˜ ๋“ฑ์ด ์žˆ์„ ์ˆ˜ ์žˆ๋‹ค. ๋˜ํ•œ, ์ปดํ“จํ„ฐ๊ฐ€ ์ฝ์„ ์ˆ˜ ์žˆ๋Š” ๊ธฐ๋ก๋งค์ฒด๋Š” ์ปดํ“จํ„ฐ ํ†ต์‹ ๋ง์œผ๋กœ ์—ฐ๊ฒฐ๋œ ์ปดํ“จํ„ฐ ์‹œ์Šคํ…œ์— ๋ถ„์‚ฐ๋˜์–ด, ๋ถ„์‚ฐ๋ฐฉ์‹์œผ๋กœ ์ฝ์„ ์ˆ˜ ์žˆ๋Š” ์ฝ”๋“œ๋กœ์„œ ์ €์žฅ๋˜๊ณ  ์‹คํ–‰๋  ์ˆ˜ ์žˆ๋‹ค. The authentication method according to the present embodiment described above can be embodied as computer readable codes on a computer readable recording medium. Computer-readable recording media include all kinds of recording media having data stored thereon that can be decrypted by a computer system. For example, there may be a read only memory (ROM), a random access memory (RAM), a magnetic tape, a magnetic disk, a flash memory, an optical data storage device, and the like. The computer readable recording medium can also be distributed over computer systems connected over a computer network, stored and executed as readable code in a distributed fashion.

์ƒ๊ธฐ์—์„œ๋Š” ๋ณธ ๋ฐœ๋ช…์˜ ๋ฐ”๋žŒ์งํ•œ ์‹ค์‹œ์˜ˆ๋ฅผ ์ฐธ์กฐํ•˜์—ฌ ์„ค๋ช…ํ•˜์˜€์ง€๋งŒ, ํ•ด๋‹น ๊ธฐ์ˆ  ๋ถ„์•ผ์—์„œ ํ†ต์ƒ์˜ ์ง€์‹์„ ๊ฐ€์ง„ ์ž๋ผ๋ฉด ํ•˜๊ธฐ์˜ ํŠนํ—ˆ ์ฒญ๊ตฌ์˜ ๋ฒ”์œ„์— ๊ธฐ์žฌ๋œ ๋ณธ ๋ฐœ๋ช…์˜ ์‚ฌ์ƒ ๋ฐ ์˜์—ญ์œผ๋กœ๋ถ€ํ„ฐ ๋ฒ—์–ด๋‚˜์ง€ ์•Š๋Š” ๋ฒ”์œ„ ๋‚ด์—์„œ ๋ณธ ๋ฐœ๋ช…์„ ๋‹ค์–‘ํ•˜๊ฒŒ ์ˆ˜์ • ๋ฐ ๋ณ€๊ฒฝ์‹œํ‚ฌ ์ˆ˜ ์žˆ์Œ์„ ์ดํ•ดํ•  ์ˆ˜ ์žˆ์„ ๊ฒƒ์ด๋‹ค.Although the above has been described with reference to a preferred embodiment of the present invention, those skilled in the art to which the present invention pertains without departing from the spirit and scope of the present invention as set forth in the claims below It will be appreciated that modifications and variations can be made.

Claims (12)

์‚ฌ์šฉ์ž์˜ ์‚ฌ์šฉ์ž ๋‹จ๋ง์— ๋Œ€ํ•œ ์ด์šฉํŒจํ„ด์„ ์ˆ˜์ง‘ํ•˜๋Š” ์ด์šฉํŒจํ„ด ์ˆ˜์ง‘๋ถ€;A usage pattern collection unit which collects usage patterns of the user terminal of the user; ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด์„ ๋ถ„์„ํ•˜์—ฌ ์ •์ƒ์ธ์ง€ ์—ฌ๋ถ€๋ฅผ ํŒ๋‹จํ•˜๋Š” ์ด์šฉํŒจํ„ด ๋ถ„์„๋ถ€;A usage pattern analyzer for analyzing whether the usage pattern is normal or not; ์ƒ๊ธฐ ํŒ๋‹จ ๊ฒฐ๊ณผ์— ๋”ฐ๋ผ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ์กฐ์ •ํ•˜๋Š” ์ธ์ฆ์ˆ˜์ค€ ์กฐ์ •๋ถ€๋ฅผ ํฌํ•จํ•˜๋Š”, ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ ์‚ฌ์šฉ์ž ๋‹จ๋ง. Identity authentication user terminal utilizing the user pattern analysis, including an authentication level adjustment unit for adjusting the identity level according to the determination result. ์ œ1ํ•ญ์— ์žˆ์–ด์„œ,The method of claim 1, ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด์€ ์ƒ๊ธฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์œ„์น˜์— ๊ด€ํ•œ ๊ฒƒ์ด๋˜,The usage pattern relates to the location of the user terminal, ํŠน์ • ์‹œ์ ์— ์ƒ๊ธฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ GPS ์ •๋ณด ๋ฐ ์ƒ๊ธฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์ด ์ ‘์†ํ•œ ์™€์ดํŒŒ์ด ๊ณต์œ ๊ธฐ์˜ ์‹๋ณ„ ์ •๋ณด ์ค‘ ์ ์–ด๋„ ํ•˜๋‚˜๋ฅผ ๋น„๊ตํ•œ ๊ฒฐ๊ณผ์— ๋”ฐ๋ผ ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด ๋ถ„์„๋ถ€์—์„œ ์ •์ƒ ์—ฌ๋ถ€๋ฅผ ํŒ๋‹จํ•˜๋Š”, ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ ์‚ฌ์šฉ์ž ๋‹จ๋ง. In accordance with a result of comparing at least one of GPS information of the user terminal and identification information of the Wi-Fi router connected to the user terminal at a specific time point, the use pattern analysis unit determines whether the user pattern is normal or not. Identity user terminal. ์ œ1ํ•ญ์— ์žˆ์–ด์„œ,The method of claim 1, ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด์€ ์ƒ๊ธฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์„ ํ†ตํ•œ ํ†ตํ™” ๋‚ด์—ญ์— ๊ด€ํ•œ ๊ฒƒ์ด๋˜,The usage pattern relates to the call history through the user terminal, 1์ฐจ์ ์œผ๋กœ ํ†ตํ™” ์ƒ๋Œ€๋ฐฉ ๋ฐ ํ†ตํ™”์‹œ๊ฐ„์„ ๋ถ„์„ํ•œ ๊ฒฐ๊ณผ์— ๋”ฐ๋ผ ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด ๋ถ„์„๋ถ€์—์„œ ์ •์ƒ ์—ฌ๋ถ€๋ฅผ ํŒ๋‹จํ•˜๋ฉฐ, The use pattern analyzer determines whether it is normal according to the result of analyzing the call partner and the call time. ํ•„์š”์— ๋”ฐ๋ผ ์ƒ๊ธฐ ํ†ตํ™” ๋‚ด์—ญ์— ๋Œ€ํ•œ ์Œ์„ฑ์„ STT ๋ณ€ํ™˜ํ•œ ๊ฒฐ๊ณผ์— ๋Œ€ํ•ด ์ƒ๊ธฐ ์‚ฌ์šฉ์ž์— ๋Œ€ํ•ด ์ง€์ •๋œ ์ถ”์ž„์ƒˆ๋ฅผ ํฌํ•จํ•˜๋Š”์ง€ ์—ฌ๋ถ€์— ๋Œ€ํ•œ ๊ฒฐ๊ณผ์— ๋”ฐ๋ผ ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด ๋ถ„์„๋ถ€์—์„œ ์ •์ƒ ์—ฌ๋ถ€๋ฅผ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ๋Š”, ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ ์‚ฌ์šฉ์ž ๋‹จ๋ง. According to a result of whether or not the STT conversion of the voice for the call history as needed, whether or not the specified pattern for the user includes the user pattern analysis unit, it is possible to determine whether or not normal User authentication user terminal utilizing. ์ œ1ํ•ญ์— ์žˆ์–ด์„œ,The method of claim 1, ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด์€ SNS ์‚ฌ์šฉ ๋‚ด์—ญ์— ๊ด€ํ•œ ๊ฒƒ์ด๋˜,The usage pattern relates to the history of SNS usage, 1์ฐจ์ ์œผ๋กœ SNS ์ฑ„ํŒ… ์ƒ๋Œ€๋ฐฉ ๋ฐ ์ฑ„ํŒ…์‹œ๊ฐ„์„ ๋ถ„์„ํ•œ ๊ฒฐ๊ณผ์— ๋”ฐ๋ผ ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด ๋ถ„์„๋ถ€์—์„œ ์ •์ƒ ์—ฌ๋ถ€๋ฅผ ํŒ๋‹จํ•˜๋ฉฐ, The use pattern analysis unit determines whether or not normal based on the results of analyzing the SNS chat partner and the chat time. ํ•„์š”์— ๋”ฐ๋ผ ์ƒ๊ธฐ ์‚ฌ์šฉ์ž์— ๋Œ€ํ•ด ์ง€์ •๋œ ํŠน์œ ์˜ ์ด๋ชจํ‹ฐ์ฝ˜์„ ์‚ฌ์šฉํ•˜๋Š”์ง€ ์—ฌ๋ถ€ ํ˜น์€ ๋ฌธ์ž ์ž…๋ ฅ ์‹œ ๋ฐฑ์ŠคํŽ˜์ด์Šค๊ฐ€ ์ž…๋ ฅ๋  ๋•Œ ์ƒ๊ธฐ ๋ฐฑ์ŠคํŽ˜์ด์Šค์— ์˜ํ•ด ์‚ญ์ œ๋œ ์ž…๋ ฅ์„ ๋ถ„์„ํ•˜์—ฌ ์ƒ๊ธฐ ์‚ฌ์šฉ์ž์— ๋Œ€ํ•ด ์ง€์ •๋œ ์˜คํƒ€ ๋ฐ์ดํ„ฐ์— ๋Œ€์‘๋˜๋Š”์ง€ ์—ฌ๋ถ€์— ๋”ฐ๋ผ ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด ๋ถ„์„๋ถ€์—์„œ ์ •์ƒ ์—ฌ๋ถ€๋ฅผ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ๋Š”, ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ ์‚ฌ์šฉ์ž ๋‹จ๋ง.If necessary, depending on whether the user uses a specific emoticon designated for the user or if the character is inputted by analyzing the input deleted by the backspace when the backspace is input when the character is input. User authentication user terminal utilizing the user's usage pattern analysis, which can determine whether the normal use pattern analysis unit. ์ œ1ํ•ญ์— ์žˆ์–ด์„œ, The method of claim 1, ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด์€ ์ƒ๊ธฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์˜ ์œ„์น˜, ์ƒ๊ธฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์„ ํ†ตํ•œ ํ†ตํ™” ๋‚ด์—ญ, SNS ์‚ฌ์šฉ ๋‚ด์—ญ, ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ์‚ฌ์šฉ ์ ์œ ์œจ ์ค‘ ์ ์–ด๋„ ํ•˜๋‚˜๋ฅผ ํฌํ•จํ•˜๋˜, The usage pattern includes at least one of the location of the user terminal, the call history, the SNS usage history, the usage share of the application through the user terminal, ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด ๋ถ„์„๋ถ€๋Š” OR ์กฐ๊ฑด ์—ฐ์‚ฐ์„ ํ†ตํ•ด ์ •์ƒ ์—ฌ๋ถ€๋ฅผ ํŒ๋‹จํ•˜๋Š”, ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ ์‚ฌ์šฉ์ž ๋‹จ๋ง. The use pattern analysis unit is a user authentication user terminal using the analysis of the use pattern of the user to determine whether or not normal through the OR condition calculation. ์ œ1ํ•ญ์— ์žˆ์–ด์„œ,The method of claim 1, ์ธ์ฆ์ˆ˜์ค€ ์กฐ์ •๋ถ€๋Š” ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด์ด ์ •์ƒ์ ์ธ ๊ฒƒ์œผ๋กœ ๋ถ„์„๋œ ๊ฒฝ์šฐ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ์ƒ๋Œ€์ ์œผ๋กœ ๋‚ฎ๊ฒŒ ์„ค์ •ํ•˜๊ณ , ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด์ด ๋น„์ •์ƒ์ ์ธ ๊ฒƒ์œผ๋กœ ๋ถ„์„๋œ ๊ฒฝ์šฐ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ์ƒ๋Œ€์ ์œผ๋กœ ๋†’๊ฒŒ ์„ค์ •ํ•˜๋Š”, ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ ์‚ฌ์šฉ์ž ๋‹จ๋ง. The authentication level adjusting unit uses the user's usage pattern analysis to set the user authentication level relatively low when the usage pattern is analyzed to be normal and to set the user authentication level relatively high when the usage pattern is analyzed as abnormal. Identity user terminal. ์ œ1ํ•ญ์— ์žˆ์–ด์„œ,The method of claim 1, ์ƒ๊ธฐ ์ธ์ฆ์ˆ˜์ค€ ์กฐ์ •๋ถ€์—์„œ ์กฐ์ •๋œ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ๋ฉ”์‹œ์ง€ ํ˜•ํƒœ๋กœ ๋งŒ๋“ค์–ด ์ „์†กํ•˜๋Š” ๋ฉ”์‹œ์ง€ ์ „์†ก๋ถ€๋ฅผ ํฌํ•จํ•˜๋Š”, ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ ์‚ฌ์šฉ์ž ๋‹จ๋ง. Self-authentication user terminal utilizing a user pattern analysis, including a message transmission unit for making and transmitting the authentication level adjusted by the authentication level adjustment unit in the form of a message. ์ œ7ํ•ญ์— ์žˆ์–ด์„œ,The method of claim 7, wherein ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„์— ๋“ฑ๋กํ•  ๊ณต๊ฐœํ‚ค์™€ ์Œ์„ ์ด๋ฃจ๋Š” ๊ฐœ์ธํ‚ค๋ฅผ ์ƒ๊ธฐ ์‚ฌ์šฉ์ž ๋‹จ๋ง์— ๋“ฑ๋กํ•˜๋Š” ํ‚ค ๋“ฑ๋ก๋ถ€๋ฅผ ๋” ํฌํ•จํ•˜๋˜,A key registration unit for registering a private key paired with a public key to be registered in the message authentication server to the user terminal, ์ƒ๊ธฐ ๋ฉ”์‹œ์ง€ ์ „์†ก๋ถ€๋Š” ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€๋ฅผ ์ƒ๊ธฐ ๊ฐœ์ธํ‚ค๋กœ ์•”ํ˜ธํ™”ํ•˜์—ฌ ์›น ์„œ๋ฒ„๋กœ ์ „์†กํ•˜๋Š”, ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ ์‚ฌ์šฉ์ž ๋‹จ๋ง. The message transmission unit is a user authentication user terminal utilizing the analysis of the use pattern of the user, encrypting the authentication level message with the private key and transmits to the web server. ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด์„ ์ˆ˜์ง‘ํ•˜๊ณ  ๋ถ„์„ํ•˜์—ฌ ์ƒ๊ธฐ ์ด์šฉํŒจํ„ด์ด ์ •์ƒ์ ์ธ์ง€ ์—ฌ๋ถ€์— ๋”ฐ๋ผ ์กฐ์ •๋œ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์„ ๊ฐœ์ธํ‚ค๋กœ ์•”ํ˜ธํ™”ํ•œ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€๋ฅผ ์ „์†กํ•˜๋Š” ์‚ฌ์šฉ์ž ๋‹จ๋ง;A user terminal for collecting and analyzing a user's usage pattern and transmitting a user authentication level message encrypted with a private key of the user authentication level adjusted according to whether the usage pattern is normal; ์•”ํ˜ธํ™”๋œ ์ƒ๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€๋ฅผ ์ˆ˜์‹ ํ•˜๊ณ , ์ƒ๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€์˜ ๋ฉ”์‹œ์ง€ ์ธ์ฆ์ด ์„ฑ๊ณต๋œ ๊ฒฝ์šฐ์— ํ•œํ•ด ์ƒ๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€์— ํฌํ•จ๋œ ์ƒ๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์— ๋”ฐ๋ผ ์ˆ˜์ค€๋ณ„ ๋กœ๊ทธ์ธ์„ ์ˆ˜ํ–‰ํ•˜๋Š” ์›น ์„œ๋ฒ„; ๋ฐA web server configured to receive the encrypted identity authentication level message and perform login for each level according to the identity authentication level included in the identity authentication level message only when message authentication of the identity authentication level message is successful; And ์ƒ๊ธฐ ๊ฐœ์ธํ‚ค์— ๋Œ€์‘๋˜๋Š” ๊ณต๊ฐœํ‚ค๊ฐ€ ๋“ฑ๋ก๋˜๊ณ , ์ƒ๊ธฐ ์›น ์„œ๋ฒ„๋กœ๋ถ€ํ„ฐ์˜ ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์š”์ฒญ์— ๋”ฐ๋ผ ์•”ํ˜ธํ™”๋œ ์ƒ๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€ ๋ฉ”์‹œ์ง€๋ฅผ ์ƒ๊ธฐ ๊ณต๊ฐœํ‚ค๋กœ ๋ณตํ˜ธํ™”ํ•˜์—ฌ ๋ฉ”์‹œ์ง€ ์ธ์ฆ์„ ์ˆ˜ํ–‰ํ•˜์—ฌ ์ƒ๊ธฐ ์›น ์„œ๋ฒ„๋กœ ์ธ์ฆ ๊ฒฐ๊ณผ๋ฅผ ์ „์†กํ•˜๋Š” ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„๋ฅผ ํฌํ•จํ•˜๋Š”, ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ ์‹œ์Šคํ…œ. A message for registering a public key corresponding to the private key, decrypting the encrypted user authentication level message according to the message authentication request from the web server with the public key, performing message authentication, and transmitting an authentication result to the web server. Self-authentication system utilizing a user pattern analysis, including an authentication server. ์ œ9ํ•ญ์— ์žˆ์–ด์„œ,The method of claim 9, ์ƒ๊ธฐ ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„๋Š” ์ƒ๊ธฐ ๊ณต๊ฐœํ‚ค๋กœ ๋ณตํ˜ธํ™”๊ฐ€ ์„ฑ๊ณตํ•œ ๊ฒฝ์šฐ ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„ฑ๊ณต์„ ์ƒ๊ธฐ ์ธ์ฆ ๊ฒฐ๊ณผ๋กœ ์ „์†กํ•˜๊ณ , ์ƒ๊ธฐ ๊ณต๊ฐœํ‚ค๋กœ ๋ณตํ˜ธํ™”๊ฐ€ ์‹คํŒจํ•œ ๊ฒฝ์šฐ ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์‹คํŒจ๋ฅผ ์ƒ๊ธฐ ์ธ์ฆ ๊ฒฐ๊ณผ๋กœ ์ „์†กํ•˜๋Š”, ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ ์‹œ์Šคํ…œ.The message authentication server transmits a message authentication success as the authentication result when the decryption with the public key is successful, and transmits a message authentication failure as the authentication result when the decryption with the public key fails. Authentication system. ์ œ10ํ•ญ์— ์žˆ์–ด์„œ,The method of claim 10, ์ƒ๊ธฐ ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„œ๋ฒ„๋Š” ๋ฉ”์‹œ์ง€ ์ธ์ฆ ์„ฑ๊ณต์˜ ๊ฒฝ์šฐ ๋ณตํ˜ธํ™”๋œ ์ƒ๊ธฐ ๋ณธ์ธ ์ธ์ฆ ๋ฉ”์‹œ์ง€๋ฅผ ์ƒ๊ธฐ ์›น ์„œ๋ฒ„๋กœ ์ „์†กํ•˜๋Š”, ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ ์‹œ์Šคํ…œ.The message authentication server is a user authentication system that utilizes the analysis of the usage pattern of the user, in case of successful message authentication transmits the decrypted identity authentication message to the web server. ์ œ10ํ•ญ์— ์žˆ์–ด์„œ,The method of claim 10, ์ƒ๊ธฐ ์›น ์„œ๋ฒ„๋Š” ์ƒ๊ธฐ ๋ณธ์ธ ์ธ์ฆ ์ˆ˜์ค€์— ์ƒ์‘ํ•˜์—ฌ ์žํ•„์„œ๋ช…, ํ™์ฑ„์ธ์‹, ์ง€๋ฌธ์ธ์ฆ, ๋น„๋ฐ€๋ฒˆํ˜ธ ์ž…๋ ฅ ์ค‘ ์ง€์ •๋œ n๊ฐœ์— ๋Œ€ํ•œ ํ™•์ธ๋งŒ์œผ๋กœ๋„ ๋กœ๊ทธ์ธ์ด ๋˜๊ฒŒ ํ•˜๋Š”, ์‚ฌ์šฉ์ž์˜ ์ด์šฉํŒจํ„ด ๋ถ„์„์„ ํ™œ์šฉํ•œ ๋ณธ์ธ ์ธ์ฆ ์‹œ์Šคํ…œ.The web server is a user authentication system that utilizes the analysis of the user's usage pattern, so that the log-in only by confirming the specified n of the handwritten signature, iris recognition, fingerprint authentication, password corresponding to the identity authentication level.
PCT/KR2017/007955 2017-01-06 2017-07-24 Identity authentication system and user equipment utilizing user usage pattern analysis Ceased WO2018128237A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020170002560A KR101762615B1 (en) 2017-01-06 2017-01-06 Identification system and user terminal using usage pattern analysis
KR10-2017-0002560 2017-01-06

Publications (1)

Publication Number Publication Date
WO2018128237A1 true WO2018128237A1 (en) 2018-07-12

Family

ID=59419169

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2017/007955 Ceased WO2018128237A1 (en) 2017-01-06 2017-07-24 Identity authentication system and user equipment utilizing user usage pattern analysis

Country Status (2)

Country Link
KR (1) KR101762615B1 (en)
WO (1) WO2018128237A1 (en)

Families Citing this family (5)

* Cited by examiner, โ€  Cited by third party
Publication number Priority date Publication date Assignee Title
KR102069689B1 (en) * 2018-03-30 2020-01-23 ์ฃผ์‹ํšŒ์‚ฌ ํ”Œ๋žซํผ๋ฒ ์ด์Šค Method and system for authentication of electronic lock based on usage pattern
KR102143181B1 (en) * 2018-08-29 2020-08-10 (์ฃผ)ํŽ˜๋ฅด์†Œ๋‚˜์—์ด์•„์ด Identification method, apparatus and program for fraud detection
KR102259156B1 (en) * 2020-09-28 2021-06-01 ๋ฐ•๋‚˜์€ Authentication system and method for network environment
KR102641501B1 (en) * 2021-09-30 2024-02-27 ์ฃผ์‹ํšŒ์‚ฌ ์นด์นด์˜ค๋ฑ…ํฌ Method for detecting fraud using verification of Social Networking Service
KR102471998B1 (en) * 2022-06-23 2022-12-02 (์ฃผ)ํƒญํ•€ Computer device, method and computer program for providing fido biometric authentication security key based file management service

Citations (5)

* Cited by examiner, โ€  Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070013969A (en) * 2005-07-27 2007-01-31 ์„œ์šธ์‹ ์šฉํ‰๊ฐ€์ •๋ณด ์ฃผ์‹ํšŒ์‚ฌ Identification system and method for identifying subject using customer behavior analysis information
KR20130085544A (en) * 2011-12-19 2013-07-30 ์ฃผ์‹ํšŒ์‚ฌ ์ผ€์ดํ‹ฐ Apparatus and method for control of applications using application sign authentication
KR20140065839A (en) * 2012-11-22 2014-05-30 ํ•œ๊ตญ์ „์žํ†ต์‹ ์—ฐ๊ตฌ์› Apparatus and system for upstreaming personal lifelog data and method thereof
KR20150102292A (en) * 2014-02-28 2015-09-07 ์ฃผ์‹ํšŒ์‚ฌ ์‹œํ๋ธŒ System and method for providing location authentication service using message
JP2016062189A (en) * 2014-09-16 2016-04-25 ๆ ชๅผไผš็คพใ‚ฝใƒƒใƒˆใƒดใ‚ฉใƒผใƒใ‚ง Personal authentication system

Patent Citations (5)

* Cited by examiner, โ€  Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070013969A (en) * 2005-07-27 2007-01-31 ์„œ์šธ์‹ ์šฉํ‰๊ฐ€์ •๋ณด ์ฃผ์‹ํšŒ์‚ฌ Identification system and method for identifying subject using customer behavior analysis information
KR20130085544A (en) * 2011-12-19 2013-07-30 ์ฃผ์‹ํšŒ์‚ฌ ์ผ€์ดํ‹ฐ Apparatus and method for control of applications using application sign authentication
KR20140065839A (en) * 2012-11-22 2014-05-30 ํ•œ๊ตญ์ „์žํ†ต์‹ ์—ฐ๊ตฌ์› Apparatus and system for upstreaming personal lifelog data and method thereof
KR20150102292A (en) * 2014-02-28 2015-09-07 ์ฃผ์‹ํšŒ์‚ฌ ์‹œํ๋ธŒ System and method for providing location authentication service using message
JP2016062189A (en) * 2014-09-16 2016-04-25 ๆ ชๅผไผš็คพใ‚ฝใƒƒใƒˆใƒดใ‚ฉใƒผใƒใ‚ง Personal authentication system

Also Published As

Publication number Publication date
KR101762615B1 (en) 2017-07-31

Similar Documents

Publication Publication Date Title
WO2018128237A1 (en) Identity authentication system and user equipment utilizing user usage pattern analysis
US8713701B2 (en) Multichannel device utilizing a centralized out-of-band authentication system (COBAS)
WO2011118871A1 (en) Authentication method and system using portable terminal
WO2019177298A1 (en) Method and apparatus for managing user authentication in a blockchain network
WO2018155920A1 (en) Method and apparatus for authenticating users in internet of things environment
BR0318596A (en) method and system for authenticating a data processing terminal to a user, method by which a data processing terminal in a data processing system is authenticated, method by which an authentication data processing server authenticates a processing terminal user data, computer program, computer program product, and authentication set to authenticate a user's data processing terminal in a data processing system
US20130305325A1 (en) Methods for Thwarting Man-In-The-Middle Authentication Hacking
WO2015069018A1 (en) System for secure login, and method and apparatus for same
WO2018216988A1 (en) Security authentication system and security authentication method for creating security key by combining authentication factors of multiple users
US7512967B2 (en) User authentication in a conversion system
WO2022045419A1 (en) Blockchain-network-based driver license authentication service method using decentralized id, and user terminal for performing driver license authentication service
WO2020117020A1 (en) Method for generating pki key based on biometric information and device for generating key by using same method
WO2021040283A1 (en) Time and attendance management system server capable of performing time and attendance management on basis of wireless ap access information, and operation method thereof
WO2018216991A1 (en) Security authentication method for creating security key by combining authentication factors of multiple users
WO2018043951A1 (en) Pos device and system for performing payment authentication using biometric information, and control method therefor
WO2018169150A1 (en) Locked screen-based user authentication system and method
JP2002229951A (en) Person identification system
WO2025192952A1 (en) Apparatus for preventing phishing and operating method thereof
Giura et al. Is it really you? User identification via adaptive behavior fingerprinting
US20110022841A1 (en) Authentication systems and methods using a packet telephony device
US20250047667A1 (en) Collaboration application integration for user-identity verification
WO2014163420A1 (en) Identity certification system and method for providing same
WO2017115965A1 (en) User identification system and method using autograph in plurality of terminals
WO2012169752A2 (en) Authentication system and method for device attempting connection
WO2025014013A1 (en) Operation server for safe phone service using qr code, and operation method thereof

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17890130

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17890130

Country of ref document: EP

Kind code of ref document: A1