The present invention relates to a method of authenticating a user who intends to connect to a server on an on-line basis, and more particularly, to a user authentication method of allowing an authentication server module in a server to authenticate a user by using a user's e-mail address and information on hardware devices mounted on an authentication client platform.
With the advent of various kinds of on-line services targetting users who connect to the Internet, each and every service website uses a range of methods for user authentication. The most generalized authentication method is a method of requiring a user to input a user's identification (ID) and password when the user accesses a website to then perform a log-in operation, and checking whether the input ID and password are identical to user's existing established and registered ID and password, thereby performing user authentication.
However, when a user intends to join various websites and register as a member, by using his or her own identification (ID), he or she should change his or her own ID with a new ID and register as a member with the new ID if his or her own ID has been already registered by a different user.
Further, since each website frequently requires a string of different structures, for example, that an ID and a password be input with only alphabetical characters or only numbers, or only a mixture of alphabetical characters and numbers, at the time of subscribing for the website or performing a log-in operation, the user must inevitably register different IDs and passwords at each respective website.
As a result, it is not easy to decipher and input the appropriate registered ID and password at a website, among the many established and registered IDs and passwords. Also, since users forget infrequently used IDs and passwords at times, they must go through a very burdensome process of confirming their IDs and passwords to then perform a log-in operation.
Recently websites increasingly adopt users' e-mail addresses as their IDs, rather than a separate ID. However, since a separate password is still required, it is inconvenient for users when they lose and wish to alter their passwords.
An authentication method based on a public key infrastructure (PKI) which is a composite security system providing encryption and an electronic signature through a PKI algorithm does not require a user ID, and has merits in that it enables nearly perfect data security when encrypting and decrypting data since encryption and decryption differ from each other between the transmission and reception ends. However, since each user should manage his or her own password in the case of the PKI-based authentication method, he/she must receive authentication again at the time of having lost his or her password. In addition, it consumes much costs and time to construct a PKI-based authentication system, and it is difficult to manage issuance and cancellation authentications.
To solve the above problems, it is an object of the present invention to provide a user authentication method of authenticating a user by only using a user's e-mail address and hardware information of an authentication client platform, which are verified for their uniqueness, without needing to manage a plurality of differing IDs and passwords for different websites.
To accomplish the above object of the present invention, there is provided a user authentication method of authenticating a user in an authentication server module using user's authentication client hardware information and e-mail address, the user authentication method comprising the steps of: downloading the authentication client module from the authentication server module and installing the same in a case that no authentication client module has been installed in a user's authentication client platform; said authentication client module transmitting the user's e-mail address and authentication client platform hardware information; and determining user authentication according to whether or not the e-mail address and hardware information received from the authentication server module is identical to user's e-mail address and hardware information stored in an authentication database.
Preferably, the user authentication method further comprises the steps of: said authentication server module transmitting a confirmation e-mail to the user in a case where an e-mail address which is identical to the received e-mail address does not exist in the authentication database; said user transmitting an identifier of the user's e-mail address and the hardware information of the authentication client platform, using the received confirmation e-mail; and said authentication server module recognizing the identifier of the e-mail as a response e-mail for the confirmation e-mail transmitted to the user, storing the user's hardware information in the authentication database, and performing user authentication registration.
Also, it is preferable that the confirmation e-mail is made up of a message written in a hypertext markup language (HTML), and thus, if the message is clicked, the e-mail identifier and the user's hardware information are transmitted to the authentication server module.
Also, it is preferable that the confirmation e-mail is attached with an execution file, and thus, after the confirmation e-mail has been transmitted to a user and then the attached execution file is executed by the user, the e-mail identifier and the user's authentication client platform hardware information are transmitted to the authentication server.
Also, it is preferable that if a plurality of pieces of hardware information for the user's authentication client platform are searched and displayed by the authentication client module, the corresponding hardware information is selected or determined as a higher priority sequence by the user.
Also, it is preferable that a user can receive authentication for a plurality of authentication client platforms from the authentication server module according to a server operator's policy.
Also, it is preferable that the hardware information is an inherent identification symbol which is permanently input for each device when being manufactured by a hardware manufacturer in which the inherent identification symbol cannot be changed unduly, and which can be recognized by a software program readable in the authentication client module.
Also, the authentication client platform can transmit and receive an e-mail via a network.
The above and other objects and advantages of the present invention will become more apparent by describing in detail the preferred embodiment thereof with reference to the accompanying drawings in which:
A preferred embodiment of the present invention will be described in detail with reference to the accompanying drawings.
As shown in
Here, when a user inputs hardware information and an e-mail address through an unshown input unit contained in the authentication client platform 10, the input e-mail address is recorded as a particular file or registry in the authentication client platform 10. Thus, when the user connects to the corresponding server 16 at a later time, the stored user's e-mail address is read and then displayed on an unshown display by the authentication client module 11. In a case where a plurality of pieces of hardware information are displayed, the user selects particular information and then inputs the selected information.
The authentication server module 18 checks whether a user's e-mail address exists in an authentication database 20 (step 208). When the corresponding e-mail address and the received hardware information are identical to the e-mail address and the hardware information stored in the authentication database 20, an authentication completion message is transmitted to the user (steps 210 and 212). Meanwhile, when the former is not identical to the latter, user authentication is not allowed and then a message that the user authentication has been disallowed is transmitted to the user (step 214).
Meanwhile, if an e-mail address transmitted from the user does not exist in the authentication database 20, the authentication server module 18 judges that the currently connected user is not a registered person that has undergone authentication, and transmits a confirmation e-mail to an e-mail address received from the user (step 218). The confirmation e-mail is an e-mail address written in a language, such as HTML, and is provided with a portion on a message screen which can be clicked. Thus, if a user clicks the portion, an e-mail identifier and hardware information of a user's authentication client platform are transmitted to the server 16. In this case, the authentication server module 18 receives the user's hardware information from the verified e-mail address to thus perform authentication (step 222).
Also, a confirmation e-mail transmitted from the authentication server module 18 may not be an e-mail address written in HTML. In other words, if an execution file attached to an e-mail is transmitted to a user, the user executes the received attached execution file and transmits an e-mail identifier and hardware information of a user's authentication client platform to the server 16.
Here, the authentication server module 18 can confirm that an e-mail transmitted from a user is a corresponding user's response e-mail for a confirmation e-mail transmitted from the authentication server module 18.
Meanwhile, although not illustrated in
That is, in a case where the received hardware information is not identical to the registered hardware information, the authentication server module 18 transmits a confirmation e-mail to an e-mail address of a corresponding user according to a user authentication policy, to thereby re-confirm whether or not a user is authenticated, and can change hardware information according to a request of the user having the corresponding e-mail address in a case where the user has been authenticated and registered.
The authentication server module 18 can allow the user to add hardware information for corresponding authentication client platforms to a predetermined limited number of authentication client platforms in an authentication method using the hardware information, by taking into consideration that user uses different authentication client platforms at the office or home. In this case, since a confirmation e-mail transmitted from the authentication server is received at a user's e-mail address which is used as an actual user's ID and undergoes an authentication process although the user's authentication client platform has been changed, reliability for user authentication can be enhanced.
Also, a portable and simple hardware device which is mounted in a user's authentication client platform, and thus registered as hardware information in an authentication database 20, for example, a smart card in an authentication client platform where a memory stick or a card reader is mounted, is mounted in a different authentication client platform, to thus connect to a corresponding website to receive authentication without changing the user's hardware information stored in the authentication database.
As described above, the authentication method according to the present invention uses user's hardware information and a user's e-mail address, their uniqueness of which is verified so as to remove any risk of overlap of different user's IDs. Therefore, a situation in which a user inevitably needs to change his/her ID since his/her ID is overlapped with a different user's ID whenever he/she is authenticated and registered at a website does not exist.
Also, since a user does not need to input a password during authentication, there is no burden from losing his/her password. Also, a webserver can reduce management costs, such as reissuance process caused by losing one's password.
The present invention is not limited to the above-described embodiment. It is apparent to one who is skilled in the art that there are many variations and modifications that can be made without departing from the spirit of the present invention and the scope of the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
10-2002-0029115 | May 2002 | KR | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/KR03/01028 | 5/26/2003 | WO | 00 | 11/24/2004 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO03/100629 | 12/4/2003 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5608387 | Davies | Mar 1997 | A |
5684951 | Goldman et al. | Nov 1997 | A |
5768132 | Cordery et al. | Jun 1998 | A |
6049785 | Gifford | Apr 2000 | A |
6209104 | Jalili | Mar 2001 | B1 |
6246769 | Kohut | Jun 2001 | B1 |
6353852 | Nestoriak et al. | Mar 2002 | B1 |
6385729 | DiGiorgio et al. | May 2002 | B1 |
6393484 | Massarani | May 2002 | B1 |
6434700 | Alonso et al. | Aug 2002 | B1 |
6691227 | Neves et al. | Feb 2004 | B1 |
6701522 | Rubin et al. | Mar 2004 | B1 |
6874090 | See et al. | Mar 2005 | B2 |
6980081 | Anderson | Dec 2005 | B2 |
7039949 | Cartmell et al. | May 2006 | B2 |
7127524 | Renda et al. | Oct 2006 | B1 |
7240364 | Branscomb et al. | Jul 2007 | B1 |
7624437 | Fagundo et al. | Nov 2009 | B1 |
20020023059 | Bari et al. | Feb 2002 | A1 |
20020032855 | Neves et al. | Mar 2002 | A1 |
20020040441 | See et al. | Apr 2002 | A1 |
20020055848 | Jae et al. | May 2002 | A1 |
20020143885 | Ross, Jr. | Oct 2002 | A1 |
20030210127 | Anderson | Nov 2003 | A1 |
20040117376 | Lavin et al. | Jun 2004 | A1 |
20040243832 | Wilf et al. | Dec 2004 | A1 |
20050268100 | Gasparini et al. | Dec 2005 | A1 |
20060020525 | Borelli et al. | Jan 2006 | A1 |
20060212407 | Lyon | Sep 2006 | A1 |
Number | Date | Country |
---|---|---|
04-147361 | May 1992 | JP |
2001-052068 | Feb 2001 | JP |
2001-285285 | Oct 2001 | JP |
2002-007343 | Jan 2002 | JP |
2002-007345 | Jan 2002 | JP |
2002-064483 | Feb 2002 | JP |
2002-108779 | Apr 2002 | JP |
2002-108871 | Apr 2002 | JP |
2002-117006 | Apr 2002 | JP |
WO 0075760 | Dec 2000 | WO |
WO 0075760 | Dec 2000 | WO |
Number | Date | Country | |
---|---|---|---|
20050165698 A1 | Jul 2005 | US |