Unlock instant, AI-driven research and patent intelligence for your innovation.

The authentication system and the authentication method which use a portable communication terminal

A communication terminal and authentication system technology, applied in the authentication system and authentication field using portable communication terminals, can solve problems such as inability to judge

Inactive Publication Date: 2006-09-27
NEC CORP
View PDF1 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the color picture is illegally copied, this technology cannot judge whether "the other person who owns the copied color picture" is the right person

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • The authentication system and the authentication method which use a portable communication terminal
  • The authentication system and the authentication method which use a portable communication terminal
  • The authentication system and the authentication method which use a portable communication terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] figure 1 is a block diagram showing Embodiment 1 of the present invention. figure 1 An example in which the present invention is applied to an entrance gate management system is shown.

[0032] Such as figure 1 As shown in , the system includes a mobile communication network 101, an authentication server 102, the Internet 103, an authentication device 104, a portable communication terminal 105 ("portable phone terminal" is used as an example below) and a door 107.

[0033] Also, the mobile communication network 101 can accommodate two or more mobile communication base stations 101a. The mobile communication network 101 can communicate with the mobile phone terminal 105 . The authentication server 102 is connectable to the authentication device via the Internet 103 . In addition, the authentication device can be connected with the authentication server via the intranet.

[0034] The portable phone terminal 105 is connectable to the authentication server 102 via the ...

Embodiment 2

[0088] In Embodiment 1, the encrypted moving picture signal generated by the authentication server 102 is transmitted to the mobile phone terminal via the TV telephone line.

[0089] In Embodiment 2 to be described below, the cryptographic moving picture signal generated by the authentication server 102 is transmitted to the portable telephone terminal 105 via the authentication device 104 .

[0090] The portable telephone terminal transmits the encrypted moving picture signal received from the authentication device to the authentication server. In this second embodiment, the light receiving unit 105a-1 of the mobile phone terminal which is not used in the first embodiment is used. Furthermore, Embodiment 2 uses the light emitting function of the light emitting / light receiving element 104a (inside the authentication device).

[0091] Figure 9 is a flowchart for explaining the operation of Embodiment 2.

[0092] exist Figure 9 , if the authentication device receives ID in...

Embodiment 3

[0102] Next, refer to Figure 10 and 11 , to illustrate Embodiment 3 of the present invention.

[0103] This embodiment is an example of applying the present invention to an automatic teller machine (ATM) system. In this example, figure 1 The authentication device 104 is replaced by Figure 10 ATM 304.

[0104] Figure 11 is a flowchart for explaining the operation of the entire system using the above-mentioned ATM.

[0105] Fundamentally, the internal composition of an ATM is the same as Figure 6 The internal composition of the authentication device is the same, as Figure 10 shown in . Figure 10 The ATM machine 304 includes a control unit 304a, a cash dispensing control unit 304b, a processing unit 304c, and a light receiving element 304d.

[0106] Next, refer to Figure 11 The operation of this embodiment will be described.

[0107] If the user inserts an ATM card in the ATM 304, then in step 1101, the ATM 304 reads the account number in the ATM card. Next, in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is an authentication method used in the system including a communication network, a mobile communication terminal (MT) and an authentication sub-system. When the subsystem receives an authentication request, it generates a first password information and converts the first password information to a first password motion picture signal. The first password motion picture signal changes its uniform color of a frame according to the first password information. The first password motion picture signal is transmitted to the MT. The MT receives the first password motion picture signal and transmits a second password motion picture signal to the subsystem. The subsystem performs inversion of the received second password motion picture signal to the second password information, and compares this second password information with the first password information. One of the first and second password motion picture signals is transmitted as a light signal.

Description

technical field [0001] The present invention relates to an authentication technique capable of preventing spoofing, and particularly relates to an authentication technique using a portable communication terminal. Background technique [0002] Password entry for personal identification is usually done through keypad entry and communication with an external authentication device. Recently, techniques using radio equipment have been proposed. RFID (Radio Frequency Identification), IrDA, Bluetooth, etc. have been proposed as radio equipment. But using these devices' password-entry technology requires the addition of these new radios. [0003] In addition, a password input technique using a still picture sensor is also known. In this technique, an image sensor such as a camera captures symbols and characters such as barcodes and two-dimensional barcodes as still picture signals. And the input device reads the password in the captured still picture by using pattern recognition...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F1/00G06F21/34H04W84/10H04W88/02H04W88/18
CPCG07C9/00087G06F21/43G07C2209/62G07C9/00015G07C2009/00095G07C9/21G07C9/26G07C9/257E05B3/06
Inventor 小松兼一
Owner NEC CORP