Authentication device, authentication method, and program to execute same by computer

A technology for authentication equipment and project teams, applied in the field of programs that enable computers to execute the authentication method, can solve problems such as complicated operations and difficulty in remembering passwords, and achieve the effects of improving security and reducing the possibility of inappropriate authentication

Inactive Publication Date: 2012-01-11
SHARP KK
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, a problem arises in that a simple password increases the likelihood that the password will be read by others, while a complex password complicates operations and makes it difficult to remember the password itself

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication device, authentication method, and program to execute same by computer
  • Authentication device, authentication method, and program to execute same by computer
  • Authentication device, authentication method, and program to execute same by computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Hereinafter, embodiments of the present invention will be described with reference to the accompanying drawings.

[0030] figure 1 is a block diagram showing an embodiment of an authentication device according to the present invention. figure 2 is an explanatory diagram in which image display is performed by a mobile phone as an authentication device. In this embodiment, a portable phone functions as an authentication device, however the present invention is not limited thereto, and an information terminal such as a personal computer or a PDA may also be used.

[0031] This authentication device (mobile phone) 10 has a communication unit 8 , a broadcast receiving unit 9 , an input operation unit 11 , a main control unit 12 , an authentication control unit 13 , a display unit 14 and a storage unit 15 .

[0032] The communication section 8 includes a telephone call function and a mail function and an access function to a network such as the Internet, like a portable p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided are an authentication device, an authentication method, and a program to execute the same by a computer by which reading by other people is made difficult when authentication is performed by selecting a correct image for authentication from displayed images, and security can be improved. A main control unit (12) randomly selects at least one and at most a number displayable on a display unit (14) of correct images (23) to be displayed, from a correct image DB (17), and stores the selected images in a display correct image storage unit (19). Dummy images are selected in a number displayable on the display unit (14), from a dummy image DB (18). The main control unit (12) displays the selected display images in a list on the display unit (14). The main control unit (12) changes display numbers and display arrangements of the correct images and the dummy images to be different from those for the prior authentication. When a user selects the correct image, the authentication control unit (13) compares the correct images (23) registered in the display correct image storage unit (19) with the image selected by the user, and if there is a match, completes the authentication.

Description

technical field [0001] The present invention relates to an authentication device and an authentication method for selecting a correct image from displayed images to perform authentication, and a program for causing a computer to execute the authentication method. Background technique [0002] Traditionally, passwords have been used for authentication to be accomplished when numbers, letters, etc. are sequentially input by key operations, and the input numbers, letters, etc. coincide with a pre-registered password. However, problems arise in that a simple password increases the possibility that the password will be read by others, while a complex password complicates operations and makes it difficult to memorize the password itself. [0003] Therefore, Patent Document 1 discloses simultaneous input of a plurality of keys. This makes it possible to perform key operations quickly to complete authentication with one key input, and makes it difficult for others to read which key...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/20H04L9/32H04M1/667G06F21/31G06F21/36
CPCH04M1/72544G06F21/00H04M1/67H04L9/3226G06F21/36H04M1/72427
Inventor 京极哲梅津克彦
Owner SHARP KK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products