SYSTEM AND METHOD FOR SECURITY AUTHENTICATION VIA MOBILE DEVICE
First Claim
1. A system for security authentication via a mobile device, comprising:
- a first terminal of a user configured to request mobile authentication;
a server configured to generate authentication information and a key for encryption in response to the request for the mobile authentication, encrypt the authentication information with the key, and divide the key into first information and second information to transmit the first information to the first terminal and transmit the second information and the encrypted information to a second terminal of the user different from the first terminal; and
the second terminal of the user configured to acquire the first information from the first terminal, generate the key based on the first information and the second information, and acquires the authentication information by using the generated key.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are a system for security authentication via a mobile device, which includes: a first terminal of a user which requests mobile authentication; a server which generates authentication information and a key for encryption, encrypts the authentication information with the key, and divides the key into first information and second information to transmit the first information to the first terminal and transmit the second information and the encrypted information to a second terminal of the user; and the second terminal which acquires the first information from the first terminal, generates the key based on the first information and the second information, and acquires the authentication information by using the generated key.
32 Citations
20 Claims
-
1. A system for security authentication via a mobile device, comprising:
-
a first terminal of a user configured to request mobile authentication; a server configured to generate authentication information and a key for encryption in response to the request for the mobile authentication, encrypt the authentication information with the key, and divide the key into first information and second information to transmit the first information to the first terminal and transmit the second information and the encrypted information to a second terminal of the user different from the first terminal; and the second terminal of the user configured to acquire the first information from the first terminal, generate the key based on the first information and the second information, and acquires the authentication information by using the generated key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for security authentication via a mobile device, comprising:
-
receiving, by a server performing mobile authentication, a request for mobile authentication from a first terminal of a user; generating, by the server, authentication information and a key for encryption in response to the request for the mobile authentication; encrypting, by the server, the authentication information with the key; dividing, by the server, the key into first information and second information; transmitting, by the server, the first information to the first terminal; and transmitting, by the server, the second information and the encrypted information to a second terminal of the user different from the first terminal. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method for security authentication via a mobile device, comprising:
-
receiving, by a second terminal of a user, encrypted information and second information of a key for encryption from a server; acquiring, by the second terminal, first information of the key from a first terminal of the user which requests the server for mobile authentication; generating, by the second terminal, the key based on the first information and the second information; acquiring, by the second terminal, the authentication information by decrypting the encrypted information using the key; and transmitting, by the second terminal, the acquired authentication information to the server. - View Dependent Claims (17, 18, 19, 20)
-
Specification