USER AUTHENTICATION METHOD FOR ENHANCING INTEGRITY AND SECURITY
First Claim
1. A user authentication method using a user terminal and an authentication server, the user authentication method comprising:
- (1) if a personal password for registration of a user is input by the user, combining the personal password and a mechanical unique key of the user terminal, performing a primary conversion using a unidirectional function, and generating a first common authentication key, and performing a secondary conversion of encrypting the first common authentication key by using an encryption key and providing the encrypted first common authentication key to the authentication server, by the user terminal, and matching the encrypted first common authentication key with user information and registering the encrypted first common authentication key, by the authentication server;
(2) performing a conversion using a unidirectional function while an embedded unique key of an authentication institute and the encrypted first common authentication key are taken as elements and generating a first server authentication key, and performing an OTP operation on the first server authentication key or a second server authentication key that is a converted value of the first server authentication key and generating first server authentication information, by the authentication server;
(3) if the personal password is input by the user for authentication, combining the personal password and the mechanical unique key of the user terminal, performing a primary conversion using a unidirectional function, generating a second common authentication key in real time, performing a secondary conversion of encrypting the second common authentication key by using the encryption key, and generating an encrypted second common authentication key, performing a conversion using a unidirectional function while the unique key of the authentication institute provided by the authentication server in advance and the encrypted second common authentication key are taken as elements and generating a first user authentication key, and performing an OTP operation on the first user authentication key or a second user authentication key that is a converted value or the first user authentication key and generating first user authentication information, by the user terminal; and
(4) performing a user authentication or an authentication of the authentication server for determining a genuineness of the authentication server, based on whether the first server authentication information and the first user authentication information coincide with each other.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed is a user authentication method including at least: (1) performing a primary conversion to generate a first common authentication key and performing a secondary conversion to provide an encrypted first common authentication key, and registering the encrypted first common authentication key; (2) generating a first server authentication key, and performing an OTP operation on the first server authentication key to generate first server authentication information; (3) performing a primary conversion to generate a second common authentication key, performing a secondary conversion to generate an encrypted second common authentication key, generating a first user authentication key, and performing an OTP operation on the first user authentication key to generate first user authentication information; and (4) performing a user authentication or an authentication of the authentication server for determining a genuineness of the authentication server, based on coincidence of the first server authentication information and the first user authentication information.
63 Citations
26 Claims
-
1. A user authentication method using a user terminal and an authentication server, the user authentication method comprising:
-
(1) if a personal password for registration of a user is input by the user, combining the personal password and a mechanical unique key of the user terminal, performing a primary conversion using a unidirectional function, and generating a first common authentication key, and performing a secondary conversion of encrypting the first common authentication key by using an encryption key and providing the encrypted first common authentication key to the authentication server, by the user terminal, and matching the encrypted first common authentication key with user information and registering the encrypted first common authentication key, by the authentication server; (2) performing a conversion using a unidirectional function while an embedded unique key of an authentication institute and the encrypted first common authentication key are taken as elements and generating a first server authentication key, and performing an OTP operation on the first server authentication key or a second server authentication key that is a converted value of the first server authentication key and generating first server authentication information, by the authentication server; (3) if the personal password is input by the user for authentication, combining the personal password and the mechanical unique key of the user terminal, performing a primary conversion using a unidirectional function, generating a second common authentication key in real time, performing a secondary conversion of encrypting the second common authentication key by using the encryption key, and generating an encrypted second common authentication key, performing a conversion using a unidirectional function while the unique key of the authentication institute provided by the authentication server in advance and the encrypted second common authentication key are taken as elements and generating a first user authentication key, and performing an OTP operation on the first user authentication key or a second user authentication key that is a converted value or the first user authentication key and generating first user authentication information, by the user terminal; and (4) performing a user authentication or an authentication of the authentication server for determining a genuineness of the authentication server, based on whether the first server authentication information and the first user authentication information coincide with each other. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A user authentication method using a user terminal and an authentication server, the user authentication method comprising:
-
(1) if a procedure for registration of a user is started by a user, performing a primary conversion using a unidirectional function while a mechanical unique key of the user terminal is taken as an element and generating a first common authentication key, and performing a secondary conversion of encrypting the first common authentication key and providing the encrypted first common authentication key to the authentication server, by the user terminal, and matching the encrypted first common authentication key with user information to register the encrypted first common authentication key, by the authentication server; (2) performing a conversion using a unidirectional function while an embedded unique key of an authentication institute and the encrypted first common authentication key are taken as elements and generating a first server authentication key, and performing an OTP operation on the first server authentication key or a second server authentication key that is a converted value of the first server authentication key and generating first server authentication information, by the authentication server; (3) if an authentication procedure is started by the user for authentication, performing a primary conversion using a unidirectional function while a mechanical unique key of the user terminal is taken as an element, generating a second common authentication key in real time, performing a secondary conversion of encrypting the second common authentication key and generate an encrypted second common authentication key, performing a conversion using a unidirectional function while the unique key of the authentication institute provided by the authentication server in advance and the encrypted second common authentication key are taken as elements to generate a first user authentication key, performing an OTP operation on the first user authentication key or a second user authentication key that is a converted value of the first user authentication key and generating first user authentication information; and (4) performing a user authentication or an authentication of the authentication server for determining a genuineness of the authentication server, based on whether the first server authentication information and the first user authentication information coincide with each other. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
Specification