The present disclosure relates to a pattern authentication method for preventing a smudge and a shoulder surfing attack of a mobile device. In particular, the present disclosure relates to a user pattern authentication method that can prevent a smudge and a shoulder surfing attack through pattern authentication combining an event by a touch on a specific region of a mobile device and user pattern input.
As mobile devices are generally used, an interest in technology that prevents leakage of personal information is increasing. An authentication method using user input pattern that is generally used in mobile devices have an advantage of simplicity, but has a problem that it is vulnerable to the attacks of shoulder surfing hacking types (shoulder surfing, monitor recording, CCTV recording)
Korean Patent No. 10-1700799 (titled, “User terminal of having a should surfing protection and method”) discloses a method of recombining corresponding strings by determining a gaze region and a non-gaze region of a user and Korean Patent No. 10-1085490 (titled, “system and method of inputting privacy protection type user password for coping with should surfing attack) disposes only a method of discriminating main number and peripheral numbers and inputting a password using different colors of keypads.
An objective of the present disclosure relates to a pattern authentication method for preventing a smudge and a shoulder surfing attack of a mobile device, and particularly, is to provide a pattern authentication method for preventing a smudge and a shoulder surfing attack of a mobile device, the method of providing pattern authentication improving security using quantum random numbers induced by a true quantum random number generator (TQRNG) that is unpredictable, independent, and not biased when combining an event by a touch on a specific region of a mobile device and user pattern input.
A pattern authentication method for preventing a smudge and a shoulder surfing attack of a mobile device according to an embodiment of the present disclosure includes: a pattern registration step; and a pattern authentication step, in which the pattern registration step includes: a step of receiving a pattern from a user by means of an input unit of a pattern authentication device; a step of matching and storing a code value corresponding to the pattern input from the user by means of a matching unit; and a step of generating a user KDI (Key Derivation ID) by matching the code value to a quantum random number generated by a quantum random number generator by means of a KDI generator.
The pattern authentication step includes: a step of determining whether a user touches a specific region of the input unit of the pattern authentication device for a predetermined time; a step in a normal mode is changed into a substitution conversion mode and the code value is changed in accordance with the number of touches (HOK (Hidden One Click) by the user when it is determined that the user has touched the specific region for a predetermined time; a step of receiving a pattern from the user by means of the input unit of the pattern authentication device; a step of matching and storing a code value corresponding to the pattern input by the user by means of the matching unit; and a step of generating a user KDI by matching the code value and a quantum random number table induced through quantum random numbers by means of the KDI generator.
According to the present disclosure, it is possible to more easily defense a smudge and a shoulder surfing attack by another person only using a pattern input and a touch event on a specific region on a mobile device by a user.
It is possible to increase accessibility and convenience for a user through pattern authentication and it is possible to enhance security using quantum random numbers.
The description of specific structures and functions of embodiments according to the spirit of the present disclosure described herein are provided as examples for describing the embodiments according to the spirit of the present disclosure. The embodiments according to the spirit of the present disclosure may be implemented in various ways and the present disclosure is not limited to the embodiments described herein.
Embodiments described herein may be changed in various ways and various shapes, so specific embodiments are shown in the drawings and will be described in detail in this specification. However, it should be understood that the exemplary embodiments according to the concept of the present disclosure are not limited to the specific examples, but all of modifications, equivalents, and substitutions are included in the scope and spirit of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to limit the present disclosure Singular forms are intended to include plural forms unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” or “have” used in this specification, specify the presence of stated features, numbers, steps, operations, components, parts, or a combination thereof, but do not preclude the presence or addition of one or more other features, numerals, steps, operations, components, parts, or a combination thereof.
Hereinafter, various embodiments of the present disclosure will be described in detail with reference to the accompanying drawings.
Referring to
Thereafter, a matching unit 140 extracts a code value matched to the pattern input from the user and stores the extracted code value in a storage unit (S120). In the code value, a separate alphabet may be matched to each point, but is not limited thereto.
A KDI (Key derivation ID) generator 130 generates a user KDI by matching the matched code value to a quantum random number table (S130). The quantum random number table is a table composed of several quantum random numbers generated by a quantum random number generator 120 of the pattern authentication device 10, and the quantum random numbers induced by a true quantum random number generator that is unpredictable, independent, and not biased.
Referring to
Referring to
When the input unit 110 senses a touch event on a specific region, a normal mode may be changed into a substitution conversion mode. The normal mode refers to a fundamental state of a mobile device or a mobile App in which the touch even of a KDI is set as 0 that is a default, and may control the device to generate vibration or a sound as feedback when there is a touch event by a user.
The input unit 110 receives a pattern from a user (S240). Thereafter, the matching unit 140 matches and stores a code value corresponding to the pattern input by the user in the storage unit (S250). The KDI generator 130 generates a user KDI by matching the code value to the quantum random number table (S260). The user KDI generates a new quantum random number table for each registration and login and performs authentication for each login, whereby security can be further enhanced.
The input unit 110 receives an input event that is executed by an input device. The input unit 110 may be a touch screen and transmits a touch even to the control unit 150.
The quantum random number table is a table including several quantum random numbers generated by the quantum random number generator 10 and the quantum random numbers may be quantum random numbers induced by a true quantum random number generator (TQRNG) that is unpredictable, independent, and not biased.
A KDI (Key derivation ID) generator 130 generates a user KDI by matching the code value to a quantum random number table (S130). The quantum random number table is a table including several quantum random numbers generated by the quantum random number generator, and the quantum random numbers are quantum random numbers induced and generated by a true quantum random number generator (TQRNG) that is unpredictable, independent, and not biased. The security of the user KDI can be further enhanced by generating each quantum random number and performing authentication using the random number for each login.
The matching unit 140 can match a pattern (e.g., points and connection lines of the points) input by a user and a code value (e.g., an alphabet corresponding to each point) corresponding to the pattern.
The control unit 150 controls processing of a process related to execution of application software and controls the operation of the components of the pattern authentication device 10.
The authentication unit 160 can perform authentication using the generated user KDI. It is possible to determine whether it coincides with the information stored in the storage unit.
The storage unit 170 can match and store a code value that is changed in the substitution conversion mode.
The output unit 180 can output vibration or a sound when a user inputs a touch.
Referring to
Referring to
Referring to
Referring to
Referring to
When a user touch event (HOK) is three times and an ACEF pattern is input, random numbers of ‘05f67208’ may be generated as the user KDI. value. There is an effect that security is enhanced by generating and registering a user KDI matched to the quantum random number table including new quantum random numbers at each login.
Although the present disclosure has been described with reference to the exemplary embodiments illustrated in the drawings, those are only examples and may be changed and modified into other equivalent exemplary embodiments from the present disclosure by those skilled in the art. Therefore, the technical protective range of the present disclosure should be determined by the scope described in claims.
Number | Date | Country | Kind |
---|---|---|---|
10-2018-0096660 | Aug 2018 | KR | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/KR2019/003530 | 3/27/2019 | WO |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2020/040395 | 2/27/2020 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
9600688 | Buck | Mar 2017 | B2 |
20080015115 | Guyot-Sionnest | Jan 2008 | A1 |
20150268849 | Beaumier | Sep 2015 | A1 |
20160162672 | Grigg | Jun 2016 | A1 |
20160202857 | Rivera | Jul 2016 | A1 |
20170177851 | Sawant | Jun 2017 | A1 |
20190294258 | Forlines | Sep 2019 | A1 |
Number | Date | Country |
---|---|---|
104915133 | May 2019 | CN |
105264480 | Nov 2019 | CN |
107797655 | Nov 2019 | CN |
10-1085490 | Nov 2011 | KR |
10-2016-0091104 | Aug 2016 | KR |
10-1700799 | Jan 2017 | KR |
10-1887964 | Aug 2018 | KR |
2018048051 | Mar 2018 | WO |
Entry |
---|
Vaidya et al (“Invisible Touch Screen Based PIN Authentication to Prevent Should Surfing”)2016 International Conference on Inventive Computation Technologies (ICICT). IEEE Proceedings: 536. pp. 1-4 (Year: 2016). |
Khedr (“Improved keylogging and shoulder-surfing resistant visual two-factor authentication protocol”), Journal of Information Security and Applications, ELSEVIER: 39. pp. 41-57 (Year: 2018). |
International Search Report issued on Jul. 29, 2019 in corresponding International application No. PCT/KR2019/003530; 4 pages. |
SKT, “Applying quantum encryption to 5G ⋅ IoT”, Maeil Business Newspaper article; URL: https://www.mk.co.kr/ news/business/view/2018/03/143352/; retrieved on Jul. 9, 2019; 5 pages. |
Number | Date | Country | |
---|---|---|---|
20210209216 A1 | Jul 2021 | US |