Unlock instant, AI-driven research and patent intelligence for your innovation.

Device authentication system

An authentication system and machine technology, applied in transmission systems, instruments, computers, etc., can solve the problems of using communication volume difference, unable to identify the terminal connection of communication devices, unable to identify the type of user used, etc., to improve security. Effect

Inactive Publication Date: 2006-06-28
WILLCOM INC +1
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, when a communication device such as a data communication credit card is connected to a terminal to transmit or download data from a data server, there may be cases where the communication device cannot be identified even if the model of the communication device can be identified. The problem with the terminal connected to the
In addition, according to a survey of the actual use of communication devices, it is known that the monthly average usage traffic when connected to a personal computer is used, and the monthly average traffic usage when connected to a portable terminal such as a PDA is used. There is a significant difference between them, and there is a big difference in the amount of traffic used due to the different terminal models used
Therefore, users who use terminals to receive services want to receive paid services that vary depending on the model they use. However, on the service provider side, since the model of the user cannot be identified, there is a problem that it cannot accurately respond to the user's request. this question of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device authentication system
  • Device authentication system
  • Device authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The ideal implementation mode of the present invention will be described below with reference to the accompanying drawings. However, the present invention is not limited to the following embodiments, and for example, the components of these embodiments can be appropriately combined with each other.

[0035] The device authentication system in the first embodiment of the present invention, such as figure 1 As shown, there are PDA (terminal) 1, Datacom credit card 2, NAS (NAS: Network Access Server) 3, machine authentication server 4, and user authentication server 5.

[0036] PDA1 is a portable terminal used by users wishing to send data and download services, and data communication credit card 2 is a card communication device with data communication functions. NAS3 is a server that accesses networks such as the Internet according to requests from terminals, and routes them to appropriate servers according to requests from terminals. In addition, NAS3 and PAD1 are conn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a device authentication system, which is composed of a terminal, a data communication device connected to the terminal, and a service provider. The terminal encrypts stored device information, generates authentication information, and transmits the user information of the data communication device and the service provider. Encrypted machine information. The service provider uses the machine authentication server to decrypt the encrypted machine information, judges whether the terminal is consistent with the service content provided by the service provider according to the decrypted machine information, and controls whether to send the user information according to the authentication result. Authenticate the user to the server.

Description

technical field [0001] The present invention relates to a system for connecting a data communication device to a terminal to download necessary data from a data server, in particular to a device authentication system for authenticating a terminal connected to a data communication device. [0002] This application claims priority to Japanese Patent Application No. 2003-155703 for which it applied on May 30, 2003, and uses the content here. Background technique [0003] In recent years, with the rapid popularization of the Internet, not only personal computers connected by wired lines, but also communication devices such as data communication credit cards are installed on portable terminals such as notebook personal computers or PDAs (PDA: Personal Data Assistants) to It is also becoming popular to perform data distribution or data download from a data server. In such a system, it is impossible to identify the type of user terminal accompanying data delivery, and therefore op...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F15/00G06F21/34G06F21/44H04L9/32H04L29/06
CPCH04L63/0435H04L63/08H04L63/0876H04L9/32H04L9/30
Inventor 荒木健吉佐藤秀行
Owner WILLCOM INC