Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication server, authentication system and authentication method

A technology of authentication server and authentication unit, which is applied in the field of authentication server, and can solve problems such as two-dimensional code victimization, malicious software, and virus infection of mobile communication terminals

Active Publication Date: 2017-03-08
A T COMM
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, there is a problem that if the mobile communication terminal is infected with a virus, malware, etc. by connecting to a malicious website loaded with viruses, malware, etc.
[0006] Such problems are not limited to URLs. In the case of reading a two-dimensional code whose information has been illegally tampered with, that is, if there is an illegality related to the two-dimensional code, if there is no method for confirming the illegality, there may be a problem. Problems caused by reading illegal QR codes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication server, authentication system and authentication method
  • Authentication server, authentication system and authentication method
  • Authentication server, authentication system and authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Hereinafter, an authentication system according to an embodiment of the present invention will be described with reference to the drawings.

[0057] figure 1 It is a diagram showing a configuration example of the authentication system according to the embodiment. Such as figure 1 As shown, the authentication system 1 includes a virtual vending machine 10 , a mobile communication terminal 20 , and an authentication server 30 .

[0058] The virtual vending machine 10 is composed of, for example, a poster, an internally illuminated panel, etc., and the item information (in the figure 1 In the illustrated example, items A, B, and C, etc.) and a self-authenticating two-dimensional code 200 in which authentication information is embedded in the two-dimensional code 100 to be embedded (in figure 1 In the shown example, self-authentication type two-dimensional codes 200A, 200B, and 200C) are displayed in association with each other.

[0059] Among them, the virtual vending ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In an authentication system 1, a mobile communication client 20 transmits to an authentication server 30 a bit signal that includes an image capture bit sequence obtained by capturing an image of a self-aware two-dimensional code 200 having authentication information embedded in a correction area, and a number bit sequence that indicates a serial number of an authentication application program being stored in storage 23. The authentication server 30 authenticates the user of the mobile communication client 20 and the self-aware two-dimensional code 200. Subsequently, the authentication server 30 transmits designated information expressed by the self-aware two-dimensional code 200 to the mobile communication client 20, on the condition that the user and the self-aware two-dimensional code 200 are successfully authenticated. Consequently, the mobile communication client 20 is able to acquire the designated information expressed by the self-aware two-dimensional code 200.

Description

technical field [0001] The present invention relates to an authentication server, an authentication system, an authentication method and a program, and in particular to an authentication server, an authentication system, an authentication method and a program capable of detecting forgery of two-dimensional codes. Background technique [0002] Two-dimensional codes such as QR (Quick Response: Quick Response) codes (registered trademark) are used in various fields as a structure for easily acquiring predetermined information. In particular, as a means for guiding consumers using mobile communication terminals such as mobile phones and smart phones to a desired website such as a website on which a company's advertisement is posted, for example, the following patent document 1 is known. information dissemination system. However, in this specification, the entire specification, claims, and drawings of Patent Document 1 are incorporated by reference. [0003] Patent Document 1: ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/44G06K7/00G09C1/00
CPCG06F21/33G06F21/44G09C1/00G09C5/00H04L9/3226H04L63/0442H04L63/1441G06F21/31H04L63/083
Inventor 丰泉博东阳一
Owner A T COMM