Authentication system, method of controlling the authentication system, and portable authentication apparatus
An authentication device and authentication system technology, which is applied in the direction of cooperative operation devices, digital data authentication, computer security devices, etc., can solve the problems of large authentication devices, unsuitable application of notebook PC locks, information leakage, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] Exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings.
[0036] figure 1 is a schematic diagram for illustrating the outline of the authentication method according to the present invention. In conventional authentication methods, wireless communication is performed between an authentication device ("card reader") connected to a PC via a communication cable and an IC card ("card") carried by a user. When the user leaves the area where communication is possible, it is determined that the user leaves the PC, and the PC operation is locked. When the user returns to an area where communication is possible, the locked state is released. In conventional authentication methods, by performing such processing, information such as work data is prevented from being leaked when the user is away from the PC.
[0037] However, the "card reader" used in the conventional authentication method is a fixed authenticati...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 