Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication system, authentication device, terminal device, and authentication method

A technology of a terminal device and an authentication device, which is applied in the directions of digital data authentication, computer security device, user identity/authority verification, etc., can solve the problems of increased password risk and high computational risk.

Inactive Publication Date: 2005-02-23
MITSUBISHI ELECTRIC CORP +1
View PDF1 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] According to the conventional method, since the random number presented by the user is different every time authentication is performed, even if a malicious third party peeks at the input value itself and uses it, it cannot be accepted as a regular user. certified
However, since a calculation formula is used as the password for authenticating the user, it will be a big burden for the user to use a complicated calculation formula as the password. The third party speculates that the risk of its calculation formula increases
In addition, the calculation formula itself used for the password does not change every time authentication is performed, so if the same third party has performed multiple authentications before, the risk of guessing the password further increases
In addition, unlike the widely used passwords composed of characters or numbers, having to memorize calculation formulas will also become a burden for users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system, authentication device, terminal device, and authentication method
  • Authentication system, authentication device, terminal device, and authentication method
  • Authentication system, authentication device, terminal device, and authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] FIG. 1 is a block diagram showing the configuration of an authentication system according to the first embodiment.

[0058] In FIG. 1, 101 is a terminal device, 102 is a display unit, 103 is an input unit, 104 is a storage unit (random number response value storage unit), 105 is a communication unit (receiving unit and sending unit), and 106 is a server device ( authentication device), 107 is a management unit (password storage unit), 108 is a random number generation unit, 109 is a calculation unit (authentication value calculation unit), 110 is a judgment unit (authentication judgment unit), 111 is a communication unit, 112 is a terminal The judging unit of the device 101 (terminal-side authentication judging unit).

[0059] In this embodiment, the storage unit 104 is constituted by a nonvolatile memory, and is detachable from the terminal device 101 .

[0060] In this embodiment, the management unit 107 is constituted by a hard disk device, and stores the password o...

Embodiment 2

[0103] In the first embodiment above, when calculating the input value of one bit according to one bit of the password, a random number is used as the query value. Hereinafter, an example in which a plurality of random numbers are used as challenge values ​​for each bit of the password will be described. Hereinafter, an example in which two random numbers are used as challenge values ​​for each bit of the password will be described. In addition, a group of a plurality of random numbers corresponding to each bit of the password is called a random array. In addition, in this embodiment, eight digits are used for the password, and eight input values ​​are input during the authentication of the server device, and five input values ​​are input during the authentication of the terminal device.

[0104] Figure 8 is a block diagram showing the configuration of the authentication system according to this embodiment.

[0105] exist Figure 8 Among them, 501 is a terminal device, 50...

Embodiment 3

[0164] In the above embodiments, when accessing the server device, a random number is displayed on the terminal device, and authentication is performed on the server device based on the corresponding input value input by the user. In a network system in which a third party's authentication device that the user is logging in is provided by a service providing device different from the service providing device, this embodiment is suitable for authentication when the user accesses the service providing device.

[0165] Figure 21 is a block diagram showing the configuration of the authentication system according to this embodiment.

[0166] exist Figure 21 Among them, 1101 is a terminal device, 1102 is a display unit, 1103 is an input unit, 1104 is a storage unit, 1105 is an authentication unit (decryption unit), 1106 is a communication unit (sending unit and receiving unit), 1107 is an authentication device, 1108 is a 1109 is a management unit (password storage unit), 1110 is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An authentication system giving little load for the user at the time of authentication and retaining high security is realized. A management part 107 of a server apparatus 106 memorizes a password of a character queue of a plurality of digits. A random number generating part 108 generates a random number for each digit of a password. A communication part 111 transmits a plurality of random numbers to a terminal apparatus 101. A calculation part 109 calculates an authentication value used for authentication, with using a random number and a sign of a password, for each digit of the password. In the terminal apparatus 101, a display part 102 displays a random number for each digit of the password, and an input part inputs an input numerical value in response to the random number, for each digit of the password. The input numerical value of each digit is transmitted to the server apparatus 106 through a communication part 105. A judging part 110 of the server apparatus 106 judges whether or not the authentication value coincides with the input numerical value, for each digit of the password, to perform the user authentication.

Description

technical field [0001] The invention relates to a user authentication device and a user authentication method for user authentication. Background technique [0002] As a widely used user authentication method, there is a method in which the user enters his or her own user ID and password when performing user authentication, and judges whether the entered password and user ID match the registered password. Method to check if it is a legitimate user. However, in the method of inputting the fixed password itself in this way, if a third party detects the user's input when the user inputs the password, there is a risk of authentication instead of the authorized user. [0003] In order to solve this problem, Japanese Unexamined Patent Application Publication No. 2000-305899 discloses a user authentication device and method that allow a user to register a calculation formula instead of a password. figure 2 is a structural diagram of a conventional user authentication device discl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/33G06F21/34G06F21/36
CPCG06F2221/2103G06F21/36
Inventor 樱井钟治田保仁史高桥涉
Owner MITSUBISHI ELECTRIC CORP