Authentication computer and program
A computer and client computer technology, applied in the field of authentication systems, can solve the problem of bank untrustworthiness compensation, damage and other problems, and achieve the effect of improving security and convenience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example
[0075] (First embodiment)
[0076] figure 1 It is a schematic configuration diagram of the personal authentication system of the first embodiment. figure 1 The personal authentication system shown in FIG. 1 includes a plurality of client devices 10 and a mail authentication device 3. The client device 10 is a computer operated by a user who intends to receive authentication. And the client device 10 is connected to the network 9. Regarding client device 10, it will be figure 2 Details in the. In addition, the network 9 is a data communication network such as a dedicated line network, a public switched telephone line network, or a LAN. At the same time, the network 9 can be an internal network or the Internet. The mail authentication device 3 is connected to the client device 10 via the network 9. Specifically, the mail authentication device 3 is connected to the client device 10 via an internal network or the Internet. In addition, the mail authentication device 3 may include ...
Example
[0121] (Second embodiment)
[0122] Hereinafter, the personal authentication system of the second embodiment will be described, but the overlapping parts with the personal authentication system of the first embodiment will be omitted by using the same symbols.
[0123] The configuration of the personal system of the second embodiment and the personal authentication system of the first embodiment ( figure 1 ) Are the same, so the description is omitted here. However, in the second embodiment, the network 9 is the Internet. In addition, the client device 10 transmits the authentication request and the authentication result request to the mail authentication device 3 via HTTP. In addition, the client device 10 will receive the authentication mail address and the authentication result from the mail authentication device 3 via HTTP. Therefore, when the client device 10 is a mobile phone, a WEB browser function and an email sending function are installed. In addition, the mail authenti...
Example
[0129] (Third Embodiment)
[0130] Next, the personal authentication system of the third embodiment will be described, but the same symbols are used to omit the description of the points that overlap with the personal authentication systems of the first and second embodiments.
[0131] The mail authentication device 3 included in the personal authentication system of the second embodiment has an authentication function and a transmission function of a web page including user's unique information. At this time, in order to change the conventional WEB server to have the function of the mail authentication device 3, it is necessary to change the program of the WEB server. In this regard, in the third embodiment, an embodiment in which the personal authentication method of the present invention can be easily introduced into a conventional WEB server will be described. The conventional WEB server included in the personal authentication system of the third embodiment is used as the intr...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2023 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap