Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Legitimacy confirmation system, legitimacy confirming method, information processing card, confirming device and authentication device

A technology for inspection systems and inspection equipment, applied in digital data authentication, data processing applications, computer security devices, etc., can solve problems such as improper use of passwords, users' inability to determine unauthorized terminals, stolen passwords, etc., to prevent leakage Effect

Active Publication Date: 2009-08-26
NEC CORP
View PDF2 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, in the above process, it has not been proved that the authentication system terminal requiring a password is valid for the user
[0007] More specifically, in the case of modifying an unauthorized terminal so as to appear to be legally authenticated, the user cannot determine that the terminal is an unauthorized terminal
As a result, users are always at risk of misusing or having their passwords stolen through fake authentication system terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Legitimacy confirmation system, legitimacy confirming method, information processing card, confirming device and authentication device
  • Legitimacy confirmation system, legitimacy confirming method, information processing card, confirming device and authentication device
  • Legitimacy confirmation system, legitimacy confirming method, information processing card, confirming device and authentication device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0107] (The structure of the authorization system)

[0108] figure 1 It is a schematic diagram showing the structure of an authentication system using an IC card as the first embodiment of the present invention. figure 1 The illustrated authentication system using an IC card includes an IC card 10, an authentication system terminal 20, a portable inspection device 30, and a communication line 40 connecting the authentication system terminal 20 and the portable inspection device 30. The IC card 10 is used as an information processing card having an information processing function.

[0109] The communication line 40 is a telephone line, the Internet, a radio wave connection (wireless communication), or the like.

[0110] When receiving various services using the IC card, the user inserts the IC card 10 into the authentication system terminal 20, and inputs a password (equivalent to authentication information) through the keypad of the authentication system terminal 20.

[0111] T...

no. 2 example

[0216] Next, a second embodiment of the present invention will be described with reference to the drawings.

[0217] Picture 9 It is a schematic diagram of the structure of an authentication system using an IC card according to the second embodiment. Picture 9 The illustrated authentication system using an IC card includes an IC card 10a, an authentication system terminal 20a, and a portable inspection device 30a.

[0218]In order to receive various services through the IC card 10a, the user inserts the IC card 10a into the authentication system terminal 20a. After the IC card 10a is returned from the authentication system terminal 20a, the user inserts the IC card 10a into the portable inspection device 30a. In accordance with the information displayed on the portable inspection device 30a, the user inputs a password (or authentication information) through the keypad of the authentication system terminal 20a.

[0219] Using the entered password, the authentication system termi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Even in the case a user mistakenly inputs authentication information to a counterfeit authentication system, the authentication information is certainly prevented from leaking out. [MEANS FOR SOLVING PROBLEMS] A legitimacy confirming system is provided with an information processing card, an authentication system for carrying out a mutual authentication with the information processing card and a confirming device. The information processing card is comprised of a legitimacy authenticating means for authenticating the legitimacy of the authentication system, and a masquerade prevention means for carrying out a masquerade prevention processing for a result authenticated by the legitimacy authenticating means. The confirming device is comprised of a verifying means for verifying a result of an authentication that is output from the information processing card and that is subjected to the masquerade prevention processing, and a verified result output means for outputting the result verified by the verifying means in a user perceivable state. The verifying means is not provided in the confirming device but may be alternatively provided in the verifying device.

Description

Technical field [0001] The present invention relates to a validity checking system, a validity checking method, an information processing card, checking equipment and authentication equipment. For example, the present invention will be applied to the following validity checking system, validity checking method, IC card, checking device, and authentication device: it prevents the leakage of authentication information about the user due to impersonation in the authentication system using the IC card, and realizes Secure computer system. This patent application is based on an earlier Japanese patent application No. 2006-254365 filed on September 20, 2006, and claims the priority of the patent application, and all contents of the patent application are incorporated herein by reference. Background technique [0002] As disclosed in Patent Document 1, in an authentication system for a computer system using an IC (Integrated Circuit) card, identity authentication must be performed to co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K17/00G06K19/10G06F21/20H04L9/32G06F21/34G06F21/44
CPCG06Q20/388G06F21/445G06Q20/40975G06Q20/341G06F21/34G07F7/1008G06K17/00G06K19/10H04L9/32
Inventor 黄雷
Owner NEC CORP
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More