Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Electronic authentication method and electronic authentication system

A verification system and electronic technology, applied in the field of illegal activities, can solve problems such as inability to ensure, inconvenient, and inability to determine the legitimacy of access to various devices, and achieve the effect of eliminating access

Inactive Publication Date: 2007-12-26
INT BUSINESS MASCH CORP
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The use of fake USB sticks allows access to target resources and does not prevent illegal actions
Furthermore, the technology in the above document is a technology in which the legitimacy of access to various devices cannot be confirmed without connecting the user's USB memory to a certain PC, and the user cannot be assured that by connecting the USB memory to an arbitrary PC, To use the aspect of the USB memory (portability), so it is inconvenient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic authentication method and electronic authentication system
  • Electronic authentication method and electronic authentication system
  • Electronic authentication method and electronic authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Hereinafter, the best mode for carrying out the invention (hereinafter, referred to as an embodiment) will be described in detail with reference to the accompanying drawings.

[0057] FIG. 4 illustrates the relationship among physical devices, users, and actions performed by unauthorized persons in an authentication method according to an embodiment of the present invention.

[0058] As shown in FIG. 4 , the usage example of the online banking service used by the user 410 includes: an external device 400 owned by the user, a communication terminal 420 to which the external device 400 is attached, and a communication terminal 420 communicatively connected via an external network 470 to the host computer 450 of Bank "A". User 410 may access host computer 450 from "A" bank's Internet banking site 440 . The external device 400 includes a recording memory 600 . The recording memory 600 is a nonvolatile memory unit. The external device 400 may also include an arithmetic un...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system for authenticating, in a host managing an electronic site and a site information table, user information inputted by a communication terminal communicably connected to the electronic site. The user information may comprise a dynamic password that corresponds to a static password and is contained in a local information table. Upon receiving user information transmitted by the communication terminal, the host authenticates the user information based on its site information table in order to allow for performing a transaction from the communication terminal. The host changes the user information to update the site information table during a transactable period after authenticating the user information and transmits the changed user information to the communication terminal in order to update the user information at the communication terminal. Upon receiving the changed user information from the host, the communication terminal updates the user information in its local information table accordingly.

Description

technical field [0001] The present invention relates to a technology for protecting electronic verification in website verification to prevent illegal acts of stealing passwords when performing e-commerce transactions. More particularly, the present invention relates to the use for protecting electronic authentication against illegal activities such as phishing and skimming when transactions such as online banking services and online stock trading are performed via the Internet Electronic verification method and system thereof. Background technique [0002] With the spread of the Internet, e-commerce transactions via the Internet without human intervention have been continuously developed. In particular, the development of e-commerce transactions is surprising for such transactions as financial transactions and electronic content transactions of banks or securities companies that are completely completed in the network. Personal authentication of bank or credit card transa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/00G06F21/34G06K17/00G06K19/10G06Q20/10G06Q20/40G06Q40/00G06Q40/02G06Q50/00G09C1/00H04L9/32
CPCG06Q20/4014G06F21/34G06F21/31G06F2221/2153G06Q20/40G06F2221/2115G07F7/1008G06Q20/10G07F7/1025
Inventor 成田出高山雅行
Owner INT BUSINESS MASCH CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products