Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication system, method of controlling the authentication system, and portable authentication apparatus

An authentication device and authentication system technology, which is applied in the direction of cooperative operation devices, digital data authentication, computer security devices, etc., can solve the problems of large authentication devices, unsuitable application of notebook PC locks, information leakage, etc.

Inactive Publication Date: 2006-09-27
FUJITSU LTD
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the USB tokens disclosed in the foregoing have a problem in that when a user who has deployed a personal work environment on a PC leaves the PC, other users may see the work environment, thereby causing information to appear while the user is away from his seat. leakage
However, this authentication device has a problem in that it is too large to carry when the user moves between PCs installed in different locations during work.
Therefore, this authentication device is not suitable for the application that needs to lock the notebook PC during business travel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system, method of controlling the authentication system, and portable authentication apparatus
  • Authentication system, method of controlling the authentication system, and portable authentication apparatus
  • Authentication system, method of controlling the authentication system, and portable authentication apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings.

[0036] figure 1 is a schematic diagram for illustrating the outline of the authentication method according to the present invention. In conventional authentication methods, wireless communication is performed between an authentication device ("card reader") connected to a PC via a communication cable and an IC card ("card") carried by a user. When the user leaves the area where communication is possible, it is determined that the user leaves the PC, and the PC operation is locked. When the user returns to an area where communication is possible, the locked state is released. In conventional authentication methods, by performing such processing, information such as work data is prevented from being leaked when the user is away from the PC.

[0037] However, the "card reader" used in the conventional authentication method is a fixed authenticati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A personal-identification-information transmitting unit transmits personal identification information. A portable authentication apparatus receives the personal identification information, and performs an authentication process based on the personal identification information received and personal identification information stored in the portable authentication apparatus in advance. The portable authentication apparatus includes a control unit that controls provision of at least one of predetermined data and software to the information processing apparatus, based on a result of the authentication process.

Description

technical field [0001] The present invention relates to a technique for authenticating a user who operates an information processing device, which is easily portable and applicable to a personal computer (PC) shared by a plurality of users. Background technique [0002] Conventionally, a technique of allowing the operation of the PC only when the authentication process is successful using a card such as an employee identification card for identifying an individual and an authentication device connected to a PC is known. [0003] For example, Japanese Patent Laid-Open No. 2004-246720 discloses a technique involving a Universal Serial Bus (USB) token in which a program such as groupware requiring personal authentication is pre-stored to Build a work environment tailored to everyone on a connected PC. [0004] The following technology is disclosed in SuperWave Corporation, "PC Lock", Online, Internet <URL: http: / / www.superwave.co.jp / data / sws100.pdf> retrieved on March 9,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F1/00G06F21/34G06K17/00H04L9/32
CPCG06F21/79G06F21/35G06F2221/2153G06F2221/2149G06F21/81G06F21/73G06F21/74G06F2221/0773G06F21/10G06F2221/2105G06F21/34G06F21/1077
Inventor 加纳良平佐藤裕一千田阳介小林弘树川岛健信田中透
Owner FUJITSU LTD