The authentication system and the authentication method which use a portable communication terminal
A communication terminal and authentication system technology, applied in the authentication system and authentication field using portable communication terminals, can solve problems such as inability to judge
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0031] figure 1 is a block diagram showing Embodiment 1 of the present invention. figure 1 An example in which the present invention is applied to an entrance gate management system is shown.
[0032] Such as figure 1 As shown in , the system includes a mobile communication network 101, an authentication server 102, the Internet 103, an authentication device 104, a portable communication terminal 105 ("portable phone terminal" is used as an example below) and a door 107.
[0033] Also, the mobile communication network 101 can accommodate two or more mobile communication base stations 101a. The mobile communication network 101 can communicate with the mobile phone terminal 105 . The authentication server 102 is connectable to the authentication device via the Internet 103 . In addition, the authentication device can be connected with the authentication server via the intranet.
[0034] The portable phone terminal 105 is connectable to the authentication server 102 via the ...
Embodiment 2
[0088] In Embodiment 1, the encrypted moving picture signal generated by the authentication server 102 is transmitted to the mobile phone terminal via the TV telephone line.
[0089] In Embodiment 2 to be described below, the cryptographic moving picture signal generated by the authentication server 102 is transmitted to the portable telephone terminal 105 via the authentication device 104 .
[0090] The portable telephone terminal transmits the encrypted moving picture signal received from the authentication device to the authentication server. In this second embodiment, the light receiving unit 105a-1 of the mobile phone terminal which is not used in the first embodiment is used. Furthermore, Embodiment 2 uses the light emitting function of the light emitting / light receiving element 104a (inside the authentication device).
[0091] Figure 9 is a flowchart for explaining the operation of Embodiment 2.
[0092] exist Figure 9 , if the authentication device receives ID in...
Embodiment 3
[0102] Next, refer to Figure 10 and 11 , to illustrate Embodiment 3 of the present invention.
[0103] This embodiment is an example of applying the present invention to an automatic teller machine (ATM) system. In this example, figure 1 The authentication device 104 is replaced by Figure 10 ATM 304.
[0104] Figure 11 is a flowchart for explaining the operation of the entire system using the above-mentioned ATM.
[0105] Fundamentally, the internal composition of an ATM is the same as Figure 6 The internal composition of the authentication device is the same, as Figure 10 shown in . Figure 10 The ATM machine 304 includes a control unit 304a, a cash dispensing control unit 304b, a processing unit 304c, and a light receiving element 304d.
[0106] Next, refer to Figure 11 The operation of this embodiment will be described.
[0107] If the user inserts an ATM card in the ATM 304, then in step 1101, the ATM 304 reads the account number in the ATM card. Next, in...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 