Search

KR-20260064679-A - METHOD, DEVICE AND RECORDING MEDIUM FOR PROVIDING MULTIPLE KINDS OF USER AUTHENTICATION SCHEME

KR20260064679AKR 20260064679 AKR20260064679 AKR 20260064679AKR-20260064679-A

Abstract

A method is provided for providing a plurality of types of user authentication methods performed by an electronic device. The method may include: receiving a request for a first page including an input interface for inputting first authentication information from a user terminal; determining whether at least a portion of second authentication information exists in the electronic device; transmitting a first page configured to visualize first proposal information suggesting the use of a second authentication method in response to at least a portion of second authentication information existing in the electronic device; transmitting a first page configured not to visualize first proposal information in response to at least a portion of second authentication information not existing in the electronic device; and transmitting a second page including second proposal information suggesting the transmission of at least a portion of second authentication information to the user terminal in response to user authentication being completed through the first page configured not to visualize first proposal information.

Inventors

  • 최윤정
  • 강하라
  • 장현아
  • 훙, 쿠오웨이
  • 유가희
  • 이수강

Assignees

  • 쿠팡 주식회사

Dates

Publication Date
20260507
Application Date
20260424

Claims (12)

  1. A method for providing multiple types of user authentication methods performed by an electronic device, The above multiple types of user authentication methods include a first authentication method based on first authentication information and a second authentication method based on second authentication information, wherein the first authentication information and the second authentication information are configured to be at least partially different, and the method, A step of transmitting to the user terminal a page containing proposal information that proposes transmitting at least a portion of the second authentication information to the electronic device in response to the completion of user authentication through the first authentication method, wherein the proposal information includes a setting interface for setting the proposal information not to be visualized on the user terminal; A step of receiving a request from the user terminal to prevent the above-mentioned proposal information from being visualized on the user terminal; and A method for providing a plurality of types of user authentication methods, comprising the step of transmitting a page not containing the proposal information to the user terminal in response to the user terminal completing user authentication through the first authentication method during a preset period or a preset number of user authentications.
  2. In paragraph 1, A method for providing a plurality of types of user authentication methods, wherein each of the first authentication information and the second authentication information is configured to include first data and second data.
  3. In paragraph 2, The first data of the first authentication information includes at least one of an ID, an email address, and a phone number, and A method for providing multiple types of user authentication methods, wherein the second data of the first authentication information is data determined to be unique to the first data of the first authentication information before user authentication based on the first authentication method is completed.
  4. In paragraph 1, A method for providing multiple types of user authentication methods, wherein the second authentication method is an authentication method used to unlock a lock mode in which the user terminal is configured to receive only a preset input.
  5. In paragraph 2, The first data of the second authentication information is data generated based on user input, and A method for providing multiple types of user authentication methods, wherein the second data of the second authentication information is data generated without being based on user input.
  6. In paragraph 5, A method for providing multiple types of user authentication methods, wherein the first data of the second authentication information includes at least one of a PIN and biometric information.
  7. In paragraph 6, A method for providing multiple types of user authentication methods, wherein the above biometric information includes at least one of fingerprint information, iris information, and facial recognition information.
  8. In paragraph 5, A method for providing multiple types of user authentication methods, wherein the second data of the second authentication information includes a public key and a private key.
  9. In paragraph 8, A method for providing a plurality of types of user authentication methods, further comprising the step of the electronic device receiving the public key from the user terminal.
  10. In Paragraph 9, A method for providing multiple types of user authentication methods, further comprising the step of storing the public key so as to be associated with device identification information of the user terminal.
  11. As an electronic device, One or more processors; and It includes one or more memories in which instructions executed by the above one or more processors are stored, and An electronic device configured such that when the instructions are executed by the above one or more processors, the above one or more processors are configured to execute a method according to any one of claims 1 to 10.
  12. A non-transient computer-readable storage medium storing instructions that cause one or more processors to perform an operation when executed by one or more processors, The above instructions are configured to cause one or more processors to execute a method according to any one of claims 1 through 10, a non-transient computer-readable storage medium.

Description

Method, device and recording medium for providing multiple types of user authentication schemes The present application relates to a method, apparatus, and recording medium for providing a plurality of types of user authentication methods. Recently, services provided to a large number of users based on networks such as the Internet have been increasing. To use these services, users are required to create a user account and undergo user authentication from the service provider. For instance, user authentication can be performed by comparing the information entered by the user via their terminal with the information stored on a server or other device at the time the account is created. However, entering information every time the service is used requires significant time and effort from the user. Furthermore, if the user cannot remember the information, they are required to undergo an additional authentication process, causing them to expend even more time and effort. To address the aforementioned problems, improved user authentication methods are being proposed. However, users accustomed to existing authentication methods may not be familiar with the new methods or may not be sufficiently motivated to become accustomed to them. FIG. 1 illustrates a system according to one embodiment of the present disclosure. FIG. 2 illustrates a computing device capable of implementing devices according to one embodiment of the present disclosure. FIGS. 3a and 3b are exemplary drawings of a login page for a first authentication method according to one embodiment of the present disclosure, and FIGS. 3c to 3f are exemplary drawings of login pages for a second authentication method according to one embodiment of the present disclosure. FIGS. 4a and FIGS. 4b illustrate a first page in which the first proposed information is not visualized. FIG. 5a is an exemplary drawing of a page containing information proposing to register a second authentication method according to one embodiment of the present disclosure to an electronic device, and FIG. 5b to 5e are exemplary drawings of pages for registering a second authentication method according to one embodiment of the present disclosure to an electronic device. FIG. 6 is an exemplary drawing of a gateway page according to one embodiment of the present disclosure. FIGS. 7a and 7b illustrate an example of a passkey registration and management page according to one embodiment of the present disclosure. FIG. 8 is an operation flowchart of a method for providing a plurality of types of user authentication methods according to one embodiment of the present disclosure. The various embodiments described in this document are illustrative for the purpose of clearly explaining the technical concept of the present disclosure and are not intended to limit it to specific embodiments. The technical concept of the present disclosure includes various modifications, equivalents, alternatives, and embodiments optionally combined from all or part of each embodiment described in this document. Furthermore, the scope of the technical concept of the present disclosure is not limited to the various embodiments presented below or the specific descriptions thereof. Terms used in this document, including technical or scientific terms, may have the meaning generally understood by those skilled in the art to which this disclosure pertains, unless otherwise defined. Expressions used in this document, such as “includes,” “may include,” “is equipped,” “is equipped,” “has,” and “may have,” imply the existence of the subject feature (e.g., function, operation, or component, etc.) and do not exclude the existence of other additional features. In other words, such expressions should be understood as open-ended terms implying the possibility of including other embodiments. Singular expressions used in this document may include the meaning of the plural form unless the context otherwise indicates, and this applies likewise to singular expressions described in the claims. Expressions such as "first," "second," or "first," "second" used in this document are used to distinguish one object from another when referring to multiple objects of the same kind, unless the context implies otherwise, and do not limit the order or importance of said objects. Expressions used in this document such as “A, B, and C,” “A, B, or C,” “A, B, and/or C,” or “at least one of A, B, and C,” “at least one of A, B, or C,” “at least one of A, B, and/or C,” “at least one selected from A, B, and C,” “at least one selected from A, B, or C,” “at least one selected from A, B, and/or C,” etc., may mean each of the listed items or all possible combinations of the listed items. For example, “at least one selected from A and B” may refer to (1) A, (2) at least one of A, (3) B, (4) at least one of B, (5) at least one of A and at least one of B, (6) at least one of A and B, (7) at least one of B and A, and (8) all of A and B. The expression "based on" or "acco