Authentication system, authentication device, terminal device, and authentication method
A technology of a terminal device and an authentication device, which is applied in the directions of digital data authentication, computer security device, user identity/authority verification, etc., can solve the problems of increased password risk and high computational risk.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0057] FIG. 1 is a block diagram showing the configuration of an authentication system according to the first embodiment.
[0058] In FIG. 1, 101 is a terminal device, 102 is a display unit, 103 is an input unit, 104 is a storage unit (random number response value storage unit), 105 is a communication unit (receiving unit and sending unit), and 106 is a server device ( authentication device), 107 is a management unit (password storage unit), 108 is a random number generation unit, 109 is a calculation unit (authentication value calculation unit), 110 is a judgment unit (authentication judgment unit), 111 is a communication unit, 112 is a terminal The judging unit of the device 101 (terminal-side authentication judging unit).
[0059] In this embodiment, the storage unit 104 is constituted by a nonvolatile memory, and is detachable from the terminal device 101 .
[0060] In this embodiment, the management unit 107 is constituted by a hard disk device, and stores the password o...
Embodiment 2
[0103] In the first embodiment above, when calculating the input value of one bit according to one bit of the password, a random number is used as the query value. Hereinafter, an example in which a plurality of random numbers are used as challenge values for each bit of the password will be described. Hereinafter, an example in which two random numbers are used as challenge values for each bit of the password will be described. In addition, a group of a plurality of random numbers corresponding to each bit of the password is called a random array. In addition, in this embodiment, eight digits are used for the password, and eight input values are input during the authentication of the server device, and five input values are input during the authentication of the terminal device.
[0104] Figure 8 is a block diagram showing the configuration of the authentication system according to this embodiment.
[0105] exist Figure 8 Among them, 501 is a terminal device, 50...
Embodiment 3
[0164] In the above embodiments, when accessing the server device, a random number is displayed on the terminal device, and authentication is performed on the server device based on the corresponding input value input by the user. In a network system in which a third party's authentication device that the user is logging in is provided by a service providing device different from the service providing device, this embodiment is suitable for authentication when the user accesses the service providing device.
[0165] Figure 21 is a block diagram showing the configuration of the authentication system according to this embodiment.
[0166] exist Figure 21 Among them, 1101 is a terminal device, 1102 is a display unit, 1103 is an input unit, 1104 is a storage unit, 1105 is an authentication unit (decryption unit), 1106 is a communication unit (sending unit and receiving unit), 1107 is an authentication device, 1108 is a 1109 is a management unit (password storage unit), 1110 is...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 