Authentication method and system using portable terminal

A technology of an authentication system and an authentication method, which is applied in the field of authentication and system using portable terminal devices, can solve the problems of weak security, leakage of user information, fragile malicious code, etc., and achieves the effect of improving convenience

Inactive Publication Date: 2013-04-10
株式会社艾克洛芙
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Since the authentication is handled by the server, if the server is attacked, the user information of the users registered in the server will be leaked, so the authentication of the user becomes weak
[0008] In addition, user terminals, whose security is weaker than that of servers, are very vulnerable to various malicious codes that are widely spread through the Internet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system using portable terminal
  • Authentication method and system using portable terminal
  • Authentication method and system using portable terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Hereinafter, it demonstrates in detail with reference to drawings.

[0025] figure 1 A schematic diagram is shown for explaining the authentication system and the authentication method using the authentication system of the present invention.

[0026] in the description figure 1 Previously, the designation "50" indicated "user terminals" such as personal computers and notebook computers,

[0027] Reference numeral "100" denotes "portable terminal devices" such as mobile phones, smart phones, and PDAs,

[0028] Reference numeral "200" represents the authentication system of the present invention,

[0029] Reference numeral "300" denotes a server that provides various services to users such as a portal site, a general site (web site), a blog, a site of a public institution, and a site of a financial institution such as a bank. In addition, the server may be various forms of sites that provide information to users, may be a personal homepage, and other various sites th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention is to authenticate the user on the basis of an identifier and authentication information which are provided from a portable terminal and service server to a user terminal and displayed. Accordingly, an external invader cannot perform authentication instead of the user unless the external invader collects information required for authentication from all of the portable terminal, the service server, and the user terminal at the same time. The present invention can be used for processing authentication in portal sites, banking facilities including banks, personal blogs, homepages, and various other websites using the Internet.

Description

technical field [0001] The present invention relates to an authentication method and system using a portable terminal, and more specifically, to an authentication method and system for blocking authentication based on a wrong person by using a portable terminal, wherein the authentication of the portable terminal utilizes a portable terminal, a server , and the authentication system cooperate with each other to perform authentication. Background technique [0002] Currently, portal sites or banks conduct username / password-based authentication to authenticate users, or authenticate users with authentication certificates. [0003] When the user terminal (for example, computer, notebook computer, PDA etc.) is installed under the situation of the malicious program of intercepting keyboard input, the authentication method based on username / password leaks to the outside easily, thereby security is relatively poor; When the authentication certificate stored in the storage medium (...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W88/02
CPCH04W12/06H04L63/0853H04L63/18H04L67/02G06F21/32
Inventor 任尤爀
Owner 株式会社艾克洛芙
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products