Authentication system, authentication server, authentication method, authentication program, terminal, authentication request method, authentication request program, and storage medium
A technology for verifying servers and verification methods, which is applied in the field of verification systems and their improvement, and can solve problems such as illegal use
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 2 approach
[0426] A second preferred embodiment of the present invention will now be described in detail with reference to the accompanying drawings.
[0427] (1) Outline of the second embodiment
[0428] Fig. 20 is a conceptual diagram showing an automatic login system implemented as a second embodiment of the present invention. The automatic login system 100 enables the user to request authentication using the card-specific information 101 stored in the IC card 10 and the password information 102 stored in the portable memory 11 when performing the automatic login process.
[0429] The server 100 performs a user authentication process by acquiring a user ID and a password from the card-specific information 101 and the password information 102, respectively. In this case, the card-specific information 101 and the password information 102 constitute authentication request information, and the user ID and password constitute authentication information.
[0430] The server 110 includes a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 