Authentication system and authentication program
A technology of authentication system and organization system, applied in the direction of transmission system, digital transmission system, user identity/authority verification, etc., which can solve the problems of lack of convenience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach 1
[0042] based on Figure 1 to Figure 18 The authentication cooperation system 100 will be described.
[0043] ***Description of structure***
[0044] based on figure 1 , the configuration of the authentication cooperation system 100 will be described.
[0045] The authentication cooperation system 100 includes a plurality of organization systems.
[0046] A plurality of organizational systems communicate with each other via the Internet 101 . The Internet 101 is an example of a network.
[0047] An organizational system is a computer system in an organization.
[0048] In Embodiment 1, the authentication cooperation system 100 is provided with the 1st organization system 110A, the 2nd organization system 110B, and the 3rd organization system 110C.
[0049] The first organization system 110A is a computer system of the first organization.
[0050] The second organization system 110B is a computer system of the second organization.
[0051] The third organization system 1...
Embodiment approach 2
[0398] For the method of not using the certification authority certificate block chain, based on Figure 19 and Figure 20 , the points different from Embodiment 1 will be mainly described.
[0399] ***Description of structure***
[0400] The structure of the authentication cooperation system 100 is the same as that in Embodiment 1 (see figure 1 ).
[0401] The structure of the organization system 110 is the same as that in Embodiment 1 (see figure 2 ).
[0402] The configuration of the user terminal 130 is the same as that in Embodiment 1 (see image 3 ).
[0403] The structure of the server device 140 is the same as that in Embodiment 1 (refer to Figure 4 ).
[0404] The configuration of the authentication system 120 is the same as that in Embodiment 1 (see Figure 5 ).
[0405] The configuration of the management device 200 is the same as that in Embodiment 1 (see Figure 6 ).
[0406] The configuration of the authentication device 300 is the same as that in E...
Embodiment approach 3
[0432] Regarding the way of using virtualization technology, based on Figure 21 , differences from Embodiment 1 and Embodiment 2 will be mainly described.
[0433] ***Description of structure***
[0434] based on Figure 21 , the configuration of the authentication cooperation system 100 will be described.
[0435]The structure of the authentication cooperation system 100 is the same as that in Embodiment 1 (see figure 1 ).
[0436] However, each authentication cooperation system 100 includes one or more physical computers.
[0437] At least any one of the user terminal 130 , the server device 140 , the management device 200 , the authentication device 300 , and the certification authority device 400 is installed on the physical computer through virtualization technology. The specific virtualization technology is virtual machine or container technology.
[0438] For example, in each organization system 110, the management device 200, the certification device 300, and th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



