User authentication system and data providing system using the same
A user authentication, user technology, applied in the direction of digital data authentication, data processing applications, electronic digital data processing, etc., can solve the problems that have not been solved, and the operation of the entrance site is difficult
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0154] A first embodiment of the present invention will be described with reference to FIGS. 1 to 5 . 1 to 2 are block diagrams showing an outline of the configuration of the present invention. 3(a) to 3(c) to FIG. 5 are explanatory diagrams showing the operation of the present invention.
[0155] (the whole frame)
[0156] The data providing system of the present invention is a system for providing various data to the mobile phone 1 (mobile terminal) held by the user U, and includes: a user operation device 2 (input device for user authentication) actually operated by the user, a mobile phone The telephone 1 distributes data to a data management server 3 (server for user authentication), and a content server 4 to distribute data managed by the data management server 3 . The above devices are connected through the network N, and the mobile phone 1 can also receive data provided by the data management server 3 through the wireless network.
[0157]Furthermore, the user opera...
no. 2 example
[0191] Next, a second embodiment of the present invention will be described with reference to FIGS. 6 to 21 . This embodiment is a data providing system using the user authentication system described in the above-mentioned first embodiment, especially a system that is set to use a mobile phone that is a mobile terminal owned by a user to access a user-specific The portal site, and receives the address data that can access the portal site, that is, the provision of the URL.
[0192] FIG. 6 is a functional block diagram showing a system configuration. 7 to 13 show explanatory diagrams showing the operation of the user and the system, and FIGS. Schematic diagram of an example of the displayed screen.
[0193] (the whole frame)
[0194] The data providing system of the present embodiment is the same as that shown in FIG. 1, and includes: a user operation device 2 (input device for user authentication) actually operated by the user, and a data management server 3 (for user authe...
no. 3 example
[0232] Next, another embodiment of the user authentication system of the present invention will be described. The user authentication system of this embodiment is basically the same in structure as the user authentication system of the above-mentioned first embodiment, but has the following differences.
[0233] First, in this embodiment, when the user U inputs the user ID (identification data) to the user operation device 2, the user operation device 2 entrusts the data management server 3 to generate a password (corresponding data) corresponding to the user ID, and requests to return the password (corresponding data). Password (corresponding to the data generation entrusting unit). Then, the data management server 3 generates and stores a password (corresponding data), and sends it to the user operation device 2 . At this time, the data management server 3 requests the user operation device 2 to display the password on the display (display request means). Then, the user wh...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 