Supercharge Your Innovation With Domain-Expert AI Agents!

Authentication computer and program

A computer and client computer technology, applied in the field of authentication systems, can solve the problem of bank untrustworthiness compensation, damage and other problems, and achieve the effect of improving security and convenience

Inactive Publication Date: 2009-05-27
KEYTEL
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, if the password of the camera is secretly photographed or the cash card is stolen, the deposit will be withdrawn by the fake user.
Not only depositors, but even banks can suffer significant damage from dishonesty and compensation issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication computer and program
  • Authentication computer and program
  • Authentication computer and program

Examples

Experimental program
Comparison scheme
Effect test

no. 1 Embodiment approach

[0076] figure 1 It is a schematic configuration diagram of the personal authentication system of the first embodiment. figure 1 The personal authentication system shown in has a plurality of client devices 10 and mail authentication devices 3 . The client device 10 is a computer operated by a user who intends to be authenticated. And the client device 10 is connected to the network 9 . Regarding the client device 10, the figure 2 in detail. In addition, the network 9 is a data communication network such as a dedicated line network, a public switched telephone network, or a LAN. Meanwhile, the network 9 may be an internal network or the Internet. The mail authentication device 3 is connected to a client device 10 via a network 9 . Specifically, the mail authentication device 3 is connected to the client device 10 via an internal network or the Internet. In addition, the mail authentication device 3 may be provided with an interface for the Internet and an internal netwo...

no. 2 Embodiment approach

[0122] Hereinafter, the personal authentication system of the second embodiment will be described, but descriptions will be omitted by using the same symbols for points that overlap with the personal authentication system of the first embodiment.

[0123] The configuration of the personal system of the second embodiment is the same as that of the personal authentication system of the first embodiment ( figure 1 ) are the same, so the explanation is omitted here. However, in the second embodiment, the network 9 is the Internet. In addition, the client device 10 transmits an authentication request and an authentication result request to the mail authentication device 3 via HTTP. Then, the client device 10 receives the authentication mail address and the authentication result from the mail authentication device 3 via HTTP. Therefore, when the client device 10 is a mobile phone, it is equipped with a WEB browser function and an e-mail sending function. In addition, the mail aut...

no. 3 Embodiment approach

[0130] Next, the personal authentication system of the third embodiment will be described, but the description will be omitted by using the same reference numerals for points that overlap with the personal authentication systems of the first and second embodiments.

[0131] The mail authentication device 3 included in the personal authentication system of the second embodiment has an authentication function and a function of sending a web page including unique information of the user. In this case, in order to change the conventional WEB server to have the function of the mail authentication device 3, it is necessary to change the program of the WEB server. In contrast, in the third embodiment, an embodiment in which the personal authentication method of the present invention can be easily introduced into a conventional WEB server will be described. The conventional WEB server included in the personal authentication system of the third embodiment is used as the import WEB serv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

It is possible to provide an individual authentication system having a high safety and user-friendliness. An authentication computer stores user information. Upon reception of an authentication request from a client computer, the authentication computer allocates a mail address not allocated to any of authentication requests received previously among mail addresses which can be received by the authentication computer, to the received authentication request. Upon reception of an e-mail and an authentication result request from a client computer, the authentication computer identifies the authentication request corresponding to the received authentication result request, identifies the mail address of the transmission source of the e-mail destined to the mail address allocated to the identified authentication request, references the user information, identifies the user corresponding to the mail address of the identified transmission source, and transmits information corresponding to the identified user to the client computer as the transmission source of the received authentication result request.

Description

technical field [0001] The present invention relates to an authentication system, an authentication computer, and a program. Background technique [0002] Conventionally, when a service is provided to a specific user, a combination of a user ID and a password has been known as personal authentication. For example, a person logging in to a WEB site via the Internet inputs a user ID and password according to a WEB screen displayed on a personal computer to be operated, and sends an authentication request to the WEB server. In addition, when a user of a financial institution withdraws money from the ATM of the financial institution, he inserts the cash card into the ATM, enters the password, and sends an authentication request to the server. The user ID at this time is the cash card. [0003] However, the user of the WEB site needs to input the user ID and password according to the screen of the WEB site. In addition, this authentication method is widely used, and is adopted ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/20G06K17/00H04L9/32G06F21/31G06F21/32G06F21/34
Inventor 平出心高桥正道
Owner KEYTEL
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More