Check patentability & draft patents in minutes with Patsnap Eureka AI!

Authentication system and authentication program

A technology of authentication system and organization system, applied in the direction of transmission system, digital transmission system, user identity/authority verification, etc., which can solve the problems of lack of convenience

Pending Publication Date: 2020-11-13
MITSUBISHI ELECTRIC CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the lack of convenience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system and authentication program
  • Authentication system and authentication program
  • Authentication system and authentication program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0042] based on Figure 1 to Figure 18 The authentication cooperation system 100 will be described.

[0043] ***Description of structure***

[0044] based on figure 1 , the configuration of the authentication cooperation system 100 will be described.

[0045] The authentication cooperation system 100 includes a plurality of organization systems.

[0046] A plurality of organizational systems communicate with each other via the Internet 101 . The Internet 101 is an example of a network.

[0047] An organizational system is a computer system in an organization.

[0048] In Embodiment 1, the authentication cooperation system 100 is provided with the 1st organization system 110A, the 2nd organization system 110B, and the 3rd organization system 110C.

[0049] The first organization system 110A is a computer system of the first organization.

[0050] The second organization system 110B is a computer system of the second organization.

[0051] The third organization system 1...

Embodiment approach 2

[0398] For the method of not using the certification authority certificate block chain, based on Figure 19 and Figure 20 , the points different from Embodiment 1 will be mainly described.

[0399] ***Description of structure***

[0400] The structure of the authentication cooperation system 100 is the same as that in Embodiment 1 (see figure 1 ).

[0401] The structure of the organization system 110 is the same as that in Embodiment 1 (see figure 2 ).

[0402] The configuration of the user terminal 130 is the same as that in Embodiment 1 (see image 3 ).

[0403] The structure of the server device 140 is the same as that in Embodiment 1 (refer to Figure 4 ).

[0404] The configuration of the authentication system 120 is the same as that in Embodiment 1 (see Figure 5 ).

[0405] The configuration of the management device 200 is the same as that in Embodiment 1 (see Figure 6 ).

[0406] The configuration of the authentication device 300 is the same as that in E...

Embodiment approach 3

[0432] Regarding the way of using virtualization technology, based on Figure 21 , differences from Embodiment 1 and Embodiment 2 will be mainly described.

[0433] ***Description of structure***

[0434] based on Figure 21 , the configuration of the authentication cooperation system 100 will be described.

[0435]The structure of the authentication cooperation system 100 is the same as that in Embodiment 1 (see figure 1 ).

[0436] However, each authentication cooperation system 100 includes one or more physical computers.

[0437] At least any one of the user terminal 130 , the server device 140 , the management device 200 , the authentication device 300 , and the certification authority device 400 is installed on the physical computer through virtualization technology. The specific virtualization technology is virtual machine or container technology.

[0438] For example, in each organization system 110, the management device 200, the certification device 300, and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An authentication system (120), of a first organization to which a first user belongs, wherein when the first user accesses a service of another organization from a user terminal of the first organization, an authentication device (300) receives a hello message from a system of the other organization; encrypts the hello message by use of a client secret key of the first user; and transmits the encrypted hello message as a signature message to the system of the other organization.

Description

technical field [0001] The present invention relates to techniques for authentication collaboration. Background technique [0002] When using services of a plurality of organizations through PKI authentication, users of each organization need to be issued client certificates according to the number of terminals used. Therefore, convenience is lacking. PKI is the abbreviation of Public Key Infrastructure. [0003] Patent Document 1 discloses a method that does not use a plurality of client certificates. [0004] In this method, the authentication cooperating device prompts the user of the terminal on which the certificate is installed to the service providing device. Thus, a user can use a plurality of terminals with one piece of personal authentication information. For example, personal authentication information is a set of an ID (identifier) ​​and a password, or a set of a secret key and a public key. [0005] prior art literature [0006] patent documents [0007] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3239H04L9/3268H04L9/3247H04L63/0823H04L63/0442H04L63/0815H04L9/50H04L9/3263H04L9/0643
Inventor 本庄将也松本光弘
Owner MITSUBISHI ELECTRIC CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More