×

USER AUTHENTICATION METHOD FOR ENHANCING INTEGRITY AND SECURITY

  • US 20170318011A1
  • Filed: 03/20/2017
  • Published: 11/02/2017
  • Est. Priority Date: 04/28/2016
  • Status: Active Application
First Claim
Patent Images

1. A user authentication method using a user terminal and an authentication server, the user authentication method comprising:

  • (1) if a personal password for registration of a user is input by the user, combining the personal password and a mechanical unique key of the user terminal, performing a primary conversion using a unidirectional function, and generating a first common authentication key, and performing a secondary conversion of encrypting the first common authentication key by using an encryption key and providing the encrypted first common authentication key to the authentication server, by the user terminal, and matching the encrypted first common authentication key with user information and registering the encrypted first common authentication key, by the authentication server;

    (2) performing a conversion using a unidirectional function while an embedded unique key of an authentication institute and the encrypted first common authentication key are taken as elements and generating a first server authentication key, and performing an OTP operation on the first server authentication key or a second server authentication key that is a converted value of the first server authentication key and generating first server authentication information, by the authentication server;

    (3) if the personal password is input by the user for authentication, combining the personal password and the mechanical unique key of the user terminal, performing a primary conversion using a unidirectional function, generating a second common authentication key in real time, performing a secondary conversion of encrypting the second common authentication key by using the encryption key, and generating an encrypted second common authentication key, performing a conversion using a unidirectional function while the unique key of the authentication institute provided by the authentication server in advance and the encrypted second common authentication key are taken as elements and generating a first user authentication key, and performing an OTP operation on the first user authentication key or a second user authentication key that is a converted value or the first user authentication key and generating first user authentication information, by the user terminal; and

    (4) performing a user authentication or an authentication of the authentication server for determining a genuineness of the authentication server, based on whether the first server authentication information and the first user authentication information coincide with each other.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×