Search

KR-20260063727-A - USER AUTHENTICATION METHOD AND SYSTEM USING FACIAL RECOGNITION

KR20260063727AKR 20260063727 AKR20260063727 AKR 20260063727AKR-20260063727-A

Abstract

The present invention relates to a user authentication method and system using facial recognition, comprising: a user terminal that captures facial recognition information corresponding to a unique facial key, generates a hash key by combining a unique device key and the unique facial key, stores and transmits the generated hash key, and requests user authentication using the facial recognition information; a central server that receives and registers the hash key from the user terminal and performs primary authentication for the user terminal by comparing the hash key stored in the user terminal with the registered hash key upon the authentication request from the user terminal; and at least one distributed server that exists independently from the central server, receives and registers the hash key together with the central server, and performs secondary authentication for the user terminal by comparing the hash key stored in the user terminal with the registered hash key upon the authentication request from the user terminal.

Inventors

  • 김희태

Assignees

  • 주식회사 지후소프트

Dates

Publication Date
20260507
Application Date
20241031

Claims (8)

  1. A user terminal that captures facial recognition information corresponding to a unique facial key, generates a hash key by combining a device unique key and the unique facial key, stores and transmits the generated hash key, and requests user authentication using the facial recognition information; A central server that receives and registers the hash key from the user terminal, and performs primary authentication for the user terminal by comparing the hash key stored in the user terminal with the registered hash key upon an authentication request from the user terminal; and At least one distributed server that exists independently from the central server, receives and registers the hash key together with the central server, and performs secondary authentication for the user terminal by comparing the hash key stored in the user terminal with the registered hash key upon an authentication request from the user terminal; A user authentication system using facial recognition including
  2. In paragraph 1, A user authentication system using facial recognition, characterized in that the central server above stores the user ID and registration date and time together with the hash key.
  3. In paragraph 1, A user authentication system using facial recognition, characterized in that the central server sets the initial state of the hash key to "waiting" and, when the hash key is changed to an "approved" state by an administrator, uses the hash key for user authentication.
  4. In paragraph 1, A user authentication system using facial recognition, characterized in that the central server is located within a virtual private cloud isolated from the outside.
  5. In paragraph 4, A user authentication system using facial recognition, characterized in that the above virtual private cloud includes an internet gateway responsible for the connection between the internet and the central server so that at least one distributed server can access the central server.
  6. In paragraph 4, A user authentication system using facial recognition, characterized in that the above-described virtual private cloud includes an Application Load Balancer that provides a connection path between the central server and the user terminal and distributes traffic among multiple servers.
  7. A step in which a user terminal captures facial recognition information corresponding to a unique facial key; The above user terminal generates a hash key by combining a device unique key and a facial unique key; The above user terminal stores and transmits the generated hash key; A central server receiving and registering the above hash key; and At least one distributed server existing independently from the central server receives and registers the hash key; A facial recognition user registration method including
  8. A step in which a user terminal requests user authentication using the user's facial recognition information; A step in which a central server performs primary authentication for the user terminal by comparing a hash key stored in the user terminal with a registered hash key; and A step in which at least one distributed server existing independently from the central server performs secondary authentication for the user terminal by comparing a hash key stored in the user terminal with a registered hash key; A user authentication method using facial recognition including

Description

User Authentication Method and System Using Facial Recognition The present invention relates to a user authentication system, and more specifically, to a user authentication method and system using facial recognition. Currently, companies and organizations utilize various methods to authenticate employees' identities when they clock in and out. While fingerprint recognition, iris recognition, and time cards are commonly used, facial recognition technology is being increasingly adopted by businesses due to its convenient, contactless nature and superior security. Although facial recognition technology is provided by global cloud service providers such as AWS and Microsoft, as well as some domestic software companies, it operates as a paid cloud-based service, incurring costs every time a user attempts authentication. Consequently, in environments with a large number of users or frequent authentication attempts, costs can increase exponentially and become a significant burden for companies or organizations. Furthermore, workplaces such as large logistics companies employ a significant number of workers. When these many employees arrive at work simultaneously, they must stand in line at fingerprint recognition terminals, which can lead to wasted time. Therefore, there is a demand for a fast, accurate, and cost-effective facial recognition authentication method. FIG. 1 is a block diagram showing the schematic configuration of a user authentication system according to an embodiment of the present invention. FIG. 2 is a flowchart illustrating a user registration process according to an embodiment of the present invention, FIG. 3 is a flowchart illustrating a user authentication process according to an embodiment of the present invention, and FIG. 4 is a flowchart illustrating a user authentication process using modified facial recognition information according to an embodiment of the present invention. It should be noted that technical terms used in this specification are used merely to describe specific embodiments and are not intended to limit the invention. Furthermore, unless specifically defined otherwise in this specification, technical terms used in this specification should be interpreted in the sense generally understood by those skilled in the art to which the invention pertains, and should not be interpreted in an overly broad or overly narrow sense. Additionally, if a technical term used in this specification is an incorrect technical term that fails to accurately express the spirit of the invention, it should be understood as being replaced by a technical term that can be correctly understood by those skilled in the art. Moreover, general terms used in this invention should be interpreted according to their prior definitions or the context, and should not be interpreted in an overly narrow sense. Additionally, singular expressions used in this specification include plural expressions unless the context clearly indicates otherwise. In this application, terms such as "composed of" or "comprising" should not be interpreted as necessarily including all of the various components or steps described in the specification, and should be interpreted as meaning that some of the components or steps may not be included, or that additional components or steps may be included. Furthermore, the suffixes "module" and "part" for components used in this specification are assigned or used interchangeably solely for the ease of drafting the specification, and do not inherently possess distinct meanings or roles. Additionally, terms including ordinal numbers, such as first, second, etc., used herein may be used to describe various components, but said components should not be limited by said terms. Such terms are used solely for the purpose of distinguishing one component from another. For example, without departing from the scope of the present invention, the first component may be named the second component, and similarly, the second component may be named the first component. Hereinafter, preferred embodiments according to the present invention will be described in detail with reference to the attached drawings. Identical or similar components are given the same reference number regardless of the drawing symbols, and redundant descriptions thereof will be omitted. Furthermore, in describing the present invention, detailed descriptions of related prior art are omitted if it is determined that such descriptions could obscure the essence of the invention. Additionally, it should be noted that the attached drawings are intended only to facilitate an understanding of the concept of the present invention and should not be interpreted as limiting the concept of the invention. FIG. 1 is a block diagram showing the schematic configuration of a user authentication system according to an embodiment of the present invention. Referring to FIG. 1, the user authentication system according to the present invention may include a user t