Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information processing device and information processing method

An information processing device and processor technology, applied in secure communication devices, computer security devices, electronic digital data processing, etc., can solve the problems of passwords that cannot be returned, heavy burden, and user information cannot be synchronized.

Active Publication Date: 2018-08-31
CANON KK
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At this time, when the user information is transferred from the information processing device that manages the hashed password as the reference source to the information processing device that manages the unhashed password, since the hash function is a one-way function (irreversibility), the password cannot Return to the state before the hash
As a result, there may be a state where user information cannot be synchronized between information processing devices using different password management methods
In this case, the user needs to transfer the password among the various information processing devices, causing a heavy burden

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information processing device and information processing method
  • Information processing device and information processing method
  • Information processing device and information processing method

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0028] A first embodiment of the present invention will be described.

[0029] [system structure]

[0030] figure 1 is a block diagram showing an example of the structure of the entire system according to the present invention. Components to be described later are connected to the LAN 100 . The MFP 101 , the MFP 102 , the MFP 103 , and the MFP 110 are all multifunction peripherals (MFPs) and include an image reading device, a printing device, and a communication device. Each MFP has applications for copying, printing, scanning image transmission, and the like. Each MFP also has a function of performing user authentication prior to use of the MFP to enforce restrictions on use of these applications by each user, personalization by each user, and the like.

[0031] The PC 150 is a general PC (Personal Computer) installed with a web browser (not shown) and the like, and used to manage the respective MFPs.

[0032] [Hardware structure]

[0033] figure 2 It is a hardware bl...

no. 2 example

[0056] A second embodiment of the present invention will be described. In the second embodiment, the processing of the imported user information is performed using user authentication when accessing the web application of the MFP from the web browser of the PC connected to the network is used as a trigger.

[0057] Figure 11 The procedure performed to the web browser (not shown) of the PC 150 and the MFP 101 according to the present embodiment is exemplified. This processing procedure is implemented by causing each of the CPUs of the PC and the MFP to read the program stored in the storage unit and execute the program.

[0058] In step S1101 , the remote UI 311 of the user authentication processing unit 302 of the MFP 101 transmits a web page for user authentication to the PC 150 . The content of the user authentication information page used here is the same as the screen displayed on the operation unit 209 in the first embodiment ( Figure 4 ) have the same content. In s...

no. 3 example

[0067] A third embodiment of the present invention will be described. In the third embodiment, the trigger to update user information managed as a hashed password after import is not the MFP where the user information exists but another MFP connected to the network.

[0068] Figure 12 is a flowchart of updating the user information management unit 301 of the MFP 102 immediately after the process of updating the user information management unit 301 using authentication on the operation unit 209 of the MFP 101 as a trigger. ie, this is in Figure 10 Processing performed between the processing of step S1007 and the processing of step S1008 in .

[0069]In step S1007, the user information management unit 301 of the MFP 101 updates the password of a certain user's record. After that, in step S1201 , the user information management unit 301 of the MFP 101 acquires from the device management unit 320 an MFP whose password should also be updated. MFPs whose passwords should be up...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An information processing apparatus (101) comprises: storage means (Fig.6) for storing a first converted value converted by a one-way function in association with user identification information; input means (209) for receiving input of the user identification information and authentication information; holding means (Fig.8) for holding the authentication information input by the user; authentication means (302) for executing user authentication by converting, by the one-way function, the authentication information input by the user into a second converted value and checking the second converted value against the stored first converted value in association with the user identification information input by the user; and storage control means (Fig.6) for, based on success of the user authentication, causing the storage means to store the authentication information held by the holding means in place of the first converted value stored in the storage means.

Description

technical field [0001] The present invention relates to an information processing device and an information processing method, and more particularly, relates to authentication of a user. Background technique [0002] When user authentication is performed between information processing apparatuses connected to a network, user passwords converted by a hash function are often used for authentication. As a hash function to be used, there are hash functions having different security strengths, such as MD4 (Message Digest Algorithm 4), MD5, and SHA1 (Secure Hash Algorithm 1). The hash function to be used varies according to the authentication protocol. For example, MD4 is used for NTLM (Windows NT LAN Manager) authentication, and SHA1 is used for SNMPv3 (Simple Network Management Protocol version 3). As a password storage method in an information processing apparatus, hashed passwords are generally stored. Japanese Patent Laid-Open No. 2011-199718 proposes a method of integrati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
CPCG06F21/31G06F21/608H04L9/3236H04L63/08H04L63/083
Inventor 山田哲也
Owner CANON KK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products