Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User authentication method and user authentication system

A technology of user authentication and authentication system, applied in the field of user authentication system, can solve problems such as difficult to effectively prevent illegal access to the system, password leakage to third parties, and password peeking

Inactive Publication Date: 2005-06-29
PASSLOGY CO LTD
View PDF1 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] However, the behavior of users to manage passwords means that their systems are exposed to security risks. As long as users take such behaviors, it means that the existing methods of user authentication that rely solely on passwords are inherently safe. question
[0010] Also, even if the user manages the password very carefully, there are still problems such as, for example, the password entered on the terminal device installed in the store is peeped, or a "tapping" device is installed on the terminal device itself, so that the password is leaked to a third party
[0011] Further, even if the user authentication method of a mobile phone that has limited access to the system as described above, when the user loses his mobile phone, or is stolen or obtained by a third party, its security level is no more than that of the traditional user authentication method. The same level of authentication, in this kind of user authentication, it is difficult to effectively prevent illegal access to the system
Likewise, the same problem exists in user authentication using random number tables

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method and user authentication system
  • User authentication method and user authentication system
  • User authentication method and user authentication system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 approach

[0054] FIG. 1 is a schematic diagram illustrating an overall scheme of a user authentication method according to the present embodiment. As shown in the figure, the system 11 to be used is connected to the authentication server 12 through a communication line. Here, a case where the target system 11 is connected to the authentication server 12 via the Internet is exemplified. The use target system 11 is a system that requires user authentication when the user uses it. The use target system 11 permits use only to users judged to be legitimate through user authentication processing described later. Typical application examples of the application target system 11 are, for example, a lock switch system for a safe room, a credit card payment terminal device, etc., and it can also be used for a membership site on the Internet realized as a virtual space.

[0055] Such a use target system 11 stores a unique system ID (system identification information) in an internal ROM. And the ...

no. 2 approach

[0106] This embodiment is a modification of the first embodiment, and is characterized in that a password for user authentication is input through the mobile phone 13 instead of the system 11 to be used. Furthermore, in this embodiment, instead of the fixed system ID, when using the use target system 11, a newly generated use ID is used.

[0107] FIG. 15 is an explanatory schematic diagram of an overall scheme of the user authentication method according to the present embodiment.

[0108] First, the user uses the personal computer 15 to register in advance his own password derivation pattern for the use target system 11 in the authentication database 14 ((1) in the figure). When the user actually uses the usage target system 11, in order to obtain the usage ID, the user operates the user interface of the usage target system 11 to display the usage ID ((2) in the figure). The use target system 11 acquires the time information of the operation, applies a random number generatin...

no. 3 approach

[0113] This embodiment relates to a login method using a password derivation mode using a mobile phone 13, and is characterized in that: the authentication server 12 presents candidates for a password derivation mode to the mobile phone 13, and the user selects from the presented candidates for a password derivation mode .

[0114] FIG. 16 is a diagram showing an example of a password derivation mode login screen displayed on the mobile phone 13 . Like the above-mentioned embodiment, for example, when logging in the user account to the target system 11, the authentication server 12 sends an email including the URL of the page data constituting the login screen to the user's mobile phone 13 by email, and the user who receives the email By selecting the URL in the contents of the mail displayed on the mobile phone 13, the login screen is provided to the mobile phone 13.

[0115] That is, when the authentication server 12 receives a password derivation pattern registration reque...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a user authentication method and a user authentication system. The password derivation pattern of each user is logged into the authentication server in advance. When the user uses the system, the authentication server generates a pattern for prompting and prompts the user. For the pattern for prompting, The user enters a password corresponding to its own password derivation mode, and the authentication server authenticates the entered password according to the prompted mode and the password derivation mode logged in by the user, and notifies the user system of the authentication result.

Description

technical field [0001] The invention relates to a user authentication method and a user authentication system for realizing the method. And this application is related to the following Japanese patent applications. In each of the designated countries where incorporation of references is recognized, the contents stated in the following applications are referred to and incorporated into this application as part of this application. [0002] Special Request 2002-36056, the application date is February 13, 2002. Background technique [0003] In recent years, various information devices typified by computers have gained popularity. In particular, mobile phones with e-mail functions and Internet access functions have gained rapid popularity and become a necessary information tool for everyone. [0004] With the advancement of the information society, security issues such as abnormal access to the system have become more and more important. In order to prevent unauthorized acce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/36H04L29/06
CPCG06F21/31G06F21/33G06F21/36H04L63/104H04L63/083G06F17/00G06F21/00H04L9/32
Inventor 小川秀治
Owner PASSLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products