Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User authentication method and user authentication system

A user authentication and user technology, applied in the field of user authentication and user authentication systems, can solve the problems of password peeking, password leakage to third parties, and it is difficult to effectively prevent illegal access to the system.

Inactive Publication Date: 2010-08-25
PASSLOGY CO LTD
View PDF1 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] However, the behavior of users to manage passwords means that their systems are exposed to security risks. As long as users take such behaviors, it means that the existing methods of user authentication that rely solely on passwords are inherently safe. question
[0011] Also, even if the user manages the password very carefully, there are still problems such as, for example, the password entered on the terminal device installed in the store is peeped, or a "tapping" device is installed on the terminal device itself, so that the password is leaked to a third party
[0012] Further, even if the user authentication method of a mobile phone that has limited access to the system as described above, when the user loses his mobile phone, or is stolen or obtained by a third party, its security level is no more than that of the traditional user authentication method. The same level of authentication, in this kind of user authentication, it is difficult to effectively prevent illegal access to the system
Likewise, the same problem exists in user authentication using random number tables

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method and user authentication system
  • User authentication method and user authentication system
  • User authentication method and user authentication system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 approach

[0055] FIG. 1 is a schematic diagram illustrating an overall scheme of a user authentication method according to the present embodiment. As shown in the figure, the system 11 to be used is connected to the authentication server 12 through a communication line. Here, a case where the target system 11 is connected to the authentication server 12 via the Internet is exemplified. The use target system 11 is a system that requires user authentication when the user uses it. The use target system 11 permits use only to users judged to be legitimate through user authentication processing described later. Typical application examples of the application target system 11 are, for example, a lock switch system for a safe room, a credit card payment terminal device, etc., and it can also be used for a membership site on the Internet realized as a virtual space.

[0056] Such a use target system 11 stores a unique system ID (system identification information) in an internal ROM. And the ...

no. 2 approach

[0107] This embodiment is a modification of the first embodiment, and is characterized in that a password for user authentication is input through the mobile phone 13 instead of the system 11 to be used. Furthermore, in this embodiment, instead of the fixed system ID, when using the use target system 11, a newly generated use ID is used.

[0108] FIG. 15 is an explanatory schematic diagram of an overall scheme of the user authentication method according to the present embodiment.

[0109] First, the user uses the personal computer 15 to register in advance his own password derivation pattern for the use target system 11 in the authentication database 14 ((1) in the figure). When the user actually uses the usage target system 11, in order to obtain the usage ID, the user operates the user interface of the usage target system 11 to display the usage ID ((2) in the figure). The use target system 11 acquires the time information of the operation, applies a random number generatin...

no. 3 approach

[0114] This embodiment relates to a login method using a password derivation mode using a mobile phone 13, and is characterized in that: the authentication server 12 presents candidates for a password derivation mode to the mobile phone 13, and the user selects from the presented candidates for a password derivation mode .

[0115] FIG. 16 is a diagram showing an example of a password derivation mode login screen displayed on the mobile phone 13 . Like the above-mentioned embodiment, for example, when logging in the user account to the target system 11, the authentication server 12 sends an email including the URL of the page data constituting the login screen to the user's mobile phone 13 by email, and the user who receives the email By selecting the URL in the contents of the mail displayed on the mobile phone 13, the login screen is provided to the mobile phone 13.

[0116] That is, when the authentication server 12 receives a password derivation pattern registration reque...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention is a user verification method and a user verification system, in which a password derivation pattern for each user is pre-registered into a verification server, and when a user is to use the system, the verification server generates a presented pattern and presents this to the user, the user inputs a password corresponding to the user's own password derivation pattern for the presented pattern, the verification server performs verification of the inputted password based on the presented pattern and the user's own password derivation pattern that was registered, and a verification result is then notified to the usage target system.

Description

[0001] This application is a divisional application of the application filed on February 13, 2003 with the application number 03803865.X and the title of the invention "User Authentication Method and User Authentication System". technical field [0002] The invention relates to a user authentication method and a user authentication system for realizing the method. And this application is related to the following Japanese patent applications. In each of the designated countries where incorporation of references is recognized, the contents stated in the following applications are referred to and incorporated into this application as part of this application. [0003] Special Request 2002-36056, the application date is February 13, 2002. Background technique [0004] In recent years, various information devices typified by computers have gained popularity. In particular, mobile phones with e-mail functions and Internet access functions have gained rapid popularity and become ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/00G06F21/31G06F21/36
CPCH04L63/104G06F21/31H04L63/083G06F21/36G06F21/33G06F17/00G06F21/00H04L9/32
Inventor 小川秀治
Owner PASSLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products