Authentication computer and program

A computer and client computer technology, applied in the field of authentication systems, can solve the problem of bank untrustworthiness compensation, damage and other problems, and achieve the effect of improving security and convenience

Inactive Publication Date: 2009-05-27
KEYTEL
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, if the password of the camera is secretly photographed or the cash card is stolen, the deposit will be withdraw

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication computer and program
  • Authentication computer and program
  • Authentication computer and program

Examples

Experimental program
Comparison scheme
Effect test

Example

[0075] (First embodiment)

[0076] figure 1 It is a schematic configuration diagram of the personal authentication system of the first embodiment. figure 1 The personal authentication system shown in FIG. 1 includes a plurality of client devices 10 and a mail authentication device 3. The client device 10 is a computer operated by a user who intends to receive authentication. And the client device 10 is connected to the network 9. Regarding client device 10, it will be figure 2 Details in the. In addition, the network 9 is a data communication network such as a dedicated line network, a public switched telephone line network, or a LAN. At the same time, the network 9 can be an internal network or the Internet. The mail authentication device 3 is connected to the client device 10 via the network 9. Specifically, the mail authentication device 3 is connected to the client device 10 via an internal network or the Internet. In addition, the mail authentication device 3 may include ...

Example

[0121] (Second embodiment)

[0122] Hereinafter, the personal authentication system of the second embodiment will be described, but the overlapping parts with the personal authentication system of the first embodiment will be omitted by using the same symbols.

[0123] The configuration of the personal system of the second embodiment and the personal authentication system of the first embodiment ( figure 1 ) Are the same, so the description is omitted here. However, in the second embodiment, the network 9 is the Internet. In addition, the client device 10 transmits the authentication request and the authentication result request to the mail authentication device 3 via HTTP. In addition, the client device 10 will receive the authentication mail address and the authentication result from the mail authentication device 3 via HTTP. Therefore, when the client device 10 is a mobile phone, a WEB browser function and an email sending function are installed. In addition, the mail authenti...

Example

[0129] (Third Embodiment)

[0130] Next, the personal authentication system of the third embodiment will be described, but the same symbols are used to omit the description of the points that overlap with the personal authentication systems of the first and second embodiments.

[0131] The mail authentication device 3 included in the personal authentication system of the second embodiment has an authentication function and a transmission function of a web page including user's unique information. At this time, in order to change the conventional WEB server to have the function of the mail authentication device 3, it is necessary to change the program of the WEB server. In this regard, in the third embodiment, an embodiment in which the personal authentication method of the present invention can be easily introduced into a conventional WEB server will be described. The conventional WEB server included in the personal authentication system of the third embodiment is used as the intr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

It is possible to provide an individual authentication system having a high safety and user-friendliness. An authentication computer stores user information. Upon reception of an authentication request from a client computer, the authentication computer allocates a mail address not allocated to any of authentication requests received previously among mail addresses which can be received by the authentication computer, to the received authentication request. Upon reception of an e-mail and an authentication result request from a client computer, the authentication computer identifies the authentication request corresponding to the received authentication result request, identifies the mail address of the transmission source of the e-mail destined to the mail address allocated to the identified authentication request, references the user information, identifies the user corresponding to the mail address of the identified transmission source, and transmits information corresponding to the identified user to the client computer as the transmission source of the received authentication result request.

Description

technical field [0001] The present invention relates to an authentication system, an authentication computer, and a program. Background technique [0002] Conventionally, when a service is provided to a specific user, a combination of a user ID and a password has been known as personal authentication. For example, a person logging in to a WEB site via the Internet inputs a user ID and password according to a WEB screen displayed on a personal computer to be operated, and sends an authentication request to the WEB server. In addition, when a user of a financial institution withdraws money from the ATM of the financial institution, he inserts the cash card into the ATM, enters the password, and sends an authentication request to the server. The user ID at this time is the cash card. [0003] However, the user of the WEB site needs to input the user ID and password according to the screen of the WEB site. In addition, this authentication method is widely used, and is adopted ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/20G06K17/00H04L9/32G06F21/31G06F21/32G06F21/34
Inventor 平出心高桥正道
Owner KEYTEL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products