Check patentability & draft patents in minutes with Patsnap Eureka AI!

Authentication system and method

An authentication system and authentication page technology, applied in the field of authentication systems, can solve problems such as impairing practicability and meaningless automatic input, and achieve the effect of improving security

Active Publication Date: 2016-03-09
儿玉升司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, requiring a second password when automatically entering login information clearly impairs usability and renders automatic entry pointless
Moreover, the possibility of cheating by a third party changes with the user's terminal environment (such as whether the third party's operation is easy), so it is also necessary to consider setting up a function that allows the user to choose whether to apply automatic input of login information, but from practical From a gender perspective, further countermeasures are required

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system and method
  • Authentication system and method
  • Authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

no. 1 approach

[0051] First, refer to Figure 1 to Figure 9 The authentication system 1 of the first embodiment will be described.

[0052] [Configuration of authentication system 1]

[0053] refer to figure 1 The configuration of the authentication system 1 will be described.

[0054] The authentication system 1 is configured so that the user terminal 2 and the management server 3 are connected so that they can communicate. The user terminal 2 is an information processing terminal used by a user, and is configured to realize various means described later via an existing browser or the like. The management server 3 is a server that manages users on a network including the Internet and an intranet, and performs authentication processing of the user in response to a request from the user terminal 2 .

[0055] [Configuration of User Terminal 2]

[0056] The user terminal 2 is configured to include a registration processing unit 21 for registering login information (user ID and password) a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The authentication system only requires the user to operate in the same manner as the existing authentication system, which can improve the security of the existing authentication system. This authentication system (1, 1A) accepts the registration of the type of login image constituting the authentication button for starting user authentication when registering login information, and when displaying an authentication page for user authentication, displays an authentication page composed of the login image. Buttons and virtual buttons made of other images. Then, in the authentication system (1, 1A), user authentication is performed when the operation button selected by the user is used as an authentication button on the authentication page.

Description

technical field [0001] The present invention relates to an authentication system and method for user authentication based on login information, wherein the login information includes user ID and password for identifying the user. Background technique [0002] With the development of the network environment in recent years, users are required to perform user authentication in various cases. Typically, user authentication is required in the case of accepting online services such as online shopping, e-mail service, etc. In addition, even in a closed network such as a company's internal network, from the so-called restriction that each post can read From the viewpoint of internal management of information, etc., user authentication is also required. [0003] In user authentication, input of a user ID and password (login information) is required. However, in recent years, in order to improve user convenience (practicability), a mechanism for automatically inputting login inform...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/30G06F21/31G06F21/36
CPCG06F21/31G06F21/36H04L63/083G06F21/41
Inventor 儿玉昇司
Owner 儿玉升司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More