Unlock instant, AI-driven research and patent intelligence for your innovation.

Discriminating system, discriminating method, discriminating equipment and its discriminating method

A technology of equipment and encryption method, which is applied in the field of identification system, can solve the problems that there is no device for checking that the IC card is legally used, and the use of the IC card cannot be terminated immediately, so as to achieve the effect of improving security and speed

Inactive Publication Date: 2007-06-20
SONY CORP
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The authentication system has means to check the legitimacy of the certificate stored in the IC card, but does not have means to check whether the IC card is actually used legally
[0009] In the authentication system, if the IC card is lost, since the process of using the IC card for authentication and financial transactions is terminated according to the invalid certificate list periodically issued from the certificate authority provided on the network, any The use of an IC card performed at one point in real time cannot be terminated immediately

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Discriminating system, discriminating method, discriminating equipment and its discriminating method
  • Discriminating system, discriminating method, discriminating equipment and its discriminating method
  • Discriminating system, discriminating method, discriminating equipment and its discriminating method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] An embodiment of the present invention will be described in detail below with reference to the accompanying drawings.

[0031] (1) Structure of the network system according to one embodiment

[0032] Fig. 1 generally shows a network system 1 according to an embodiment. The network system 1 is composed of a World Wide Web (WWW) server 3 installed in a service provider 2, user terminals 4, and a security server 6 installed in an authentication center 5, all of which are connected through the Internet 7.

[0033] The user terminal 4 is an ordinary personal computer, as shown in FIG. The random access memory (RAM) used as the working memory of CPU10 and the input and output part 14 used as input and output interface are connected by bus 13, the network interface 15 that is made up of modem, IC card read-write unit 9, by keyboard, A console 17 consisting of a monitor, a mouse, etc. and a storage unit 18 consisting of a hard disk unit are connected to the input and output s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An information holding medium stores the common key of the user used in the common-key encryption method. In response to a user authentication request sent from an information processing apparatus, the user is authenticated by the common-key encryption method by using the common key stored in the information holding medium of the user. Only when the user has been authenticated, predetermined processing for making the information processing apparatus authenticate the user by the public-key encryption method is performed.

Description

technical field [0001] The present invention relates to an authentication system, an authentication method, an authentication device and an authentication method thereof, and more particularly, to an authentication device that performs encryption by effectively using the advantages of different types of encryption methods. Background technique [0002] As authentication and signature methods in authentication systems, common-key encryption methods and public-key encryption methods have been conventionally used. [0003] In the public key encryption method, one encryption key called a public key is used and information encrypted by this public key is decrypted by the same public key. Since this common key encryption method performs encryption and decryption in a short period, it is used in the case of processing information requiring high-speed processing, such as electronic money or commuter-pass information stored in an IC card. [0004] In the public key encryption method...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00G06F21/31G06F21/33G06F21/35H04L9/32
CPCH04L2209/80H04L9/3263H04L9/32H04L2209/56H04L9/3234
Inventor 中野智行板桥达夫
Owner SONY CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More