CN111787023A - Approved login system and method - Google Patents

Approved login system and method Download PDF

Info

Publication number
CN111787023A
CN111787023A CN202010655490.4A CN202010655490A CN111787023A CN 111787023 A CN111787023 A CN 111787023A CN 202010655490 A CN202010655490 A CN 202010655490A CN 111787023 A CN111787023 A CN 111787023A
Authority
CN
China
Prior art keywords
login
client terminal
user
approver
user client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010655490.4A
Other languages
Chinese (zh)
Other versions
CN111787023B (en
Inventor
南部敏郎
山崎吉行
金丸泰平
小山伸江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mitsubishi Electric Building Solutions Corp
Original Assignee
Mitsubishi Electric Building Techno Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitsubishi Electric Building Techno Service Co Ltd filed Critical Mitsubishi Electric Building Techno Service Co Ltd
Priority to CN202010655490.4A priority Critical patent/CN111787023B/en
Publication of CN111787023A publication Critical patent/CN111787023A/en
Application granted granted Critical
Publication of CN111787023B publication Critical patent/CN111787023B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an authorized login system and method, which can log in a client terminal on the basis of ensuring higher security even under the condition that a smart card cannot be logged in. When an approval login for logging in to the user client terminal with an ID and a password is applied from a user of the user client terminal instead of a smart card login, the approver client terminal approves the login of the user client terminal to a login control server; changing, by the login control server, a state of the user client terminal to a state approved by an approver when approval of login is requested; and confirming, by the user client terminal, a state of the user client terminal when the ID and the password are input to the user client terminal by the user, and authenticating the ID and the password to determine whether login is possible if the user client terminal is approved by an approver.

Description

Approved login system and method
The present application is a divisional application of an invention patent application having an application date of 2016, 10/12, and an application number of 201610890591.3, entitled "alternative registration system and method and approved registration system and method".
Technical Field
The present invention relates to a substitute login system (login system) and a substitute login method, and an approval login system and an approval login method for logging (login) in to a client terminal in the case where smart card login (smart card login) is impossible.
Background
Conventionally, smart card registration is known as follows: when logging in to a client terminal, a user inserts a smart card (smart card) into a card reader (cardreader), inputs a Personal Identification Number (PIN) on a login screen, and can log in when a correct PIN is input (see, for example, non-patent document 1).
In the smart card registration, an electronic certificate stored in the smart card is used to authenticate a user. By authenticating that the user has the smart card and the user has input the correct PIN upon smart card login, security (security) is enhanced as compared with authentication based on an ID and a password (password).
Here, when the smart card is lost or forgotten during the smart card registration or when the smart card fails, the user cannot register the smart card in the client terminal. As a technique for assisting (support) registration to a client terminal when registration to the client terminal is impossible, the following technique is known.
First, the following client terminal registration apparatuses are known: a password request mail (mail) including an ID of a client terminal is transmitted to a management server (server) according to a predetermined operation of a portable terminal of a user, the management server generates a password and stores the password in association with the ID in a storage unit after receiving the password request mail, and transmits a password information mail including the generated password to the portable terminal according to a mail address (mail address) stored in the storage unit in advance in association with the ID, so that the user can acquire the password, while the user can use the client terminal according to a match between an acquisition password input at the time of login of the client terminal of the user and the password of the storage unit (for example, refer to patent document 1).
Further, the following biometric authentication system (system) is known: in a biometric authentication system, each of client PCs includes a biometric information acquisition device (device) for acquiring biometric information of an operator, an HDD storing biometric information assigned to a person in charge of the client PC and attendance information of the person in charge, and biometric authentication software (soft) for performing an authentication process based on the biometric information acquired by the biometric information acquisition device and the biometric information of the person in charge stored in the HDD, and when the authentication fails, the biometric authentication software identifies the client PC in charge of the person in charge based on the attendance information stored in the HDD, transmits the biometric information acquired by the biometric information acquisition device to the client PC of the attendant, and requests the authentication (for example, refer to patent document 2).
Patent document 1: japanese patent laid-open publication No. 2002-251376
Patent document 2: japanese patent laid-open No. 2008-15866
Non-patent document 1: pueraria and people, "application of smart card login for cooperating with PKI" to personal authentication system in shared terminal ", Minggu university information cooperation base center news, 2007 month 2, Vol.6, No.1, p.27-40 (Pueraria and people," PKI と support したスマートカードログオンについて "-application of システムへ of people における at the end of the community)," Minggu university condition support センターニュース, 2007 month 2, Vol.6, No.1, p.27-40)
However, the following problems have been encountered in the prior art.
That is, the techniques described in patent documents 1 and 2 are used to assist in login to a client terminal, but are not applicable when a smart card is lost or forgotten during login of the smart card or when the smart card fails.
Further, the techniques described in patent documents 1 and 2 do not perform authentication corresponding to the user having a smart card, and therefore have a problem that security is lowered compared to smart card registration.
Disclosure of Invention
The present invention has been made to solve the above-described problems, and an object of the present invention is to provide a system and a method for registering a smart card in a client terminal while ensuring high security even when the smart card cannot be registered.
An approval login system of the present invention comprises an approver client terminal, a login control server, and a user client terminal connected to each other via a network, wherein the approver client terminal has an approver client side login control unit that approves login of a user client terminal to the login control server when an approval login to the user client terminal using an ID and a password is requested from a user of the user client terminal instead of a smart card login, the login control server has a server side login control unit that changes a state (status) of the user client terminal to a state approved by the approver when the approval login is requested by the approver client side login control unit, and the user client terminal has a user client side login control unit, when a user inputs an ID and a password, the user client side login control unit confirms the state of the user client terminal to the server side login control unit, and if the user client terminal is approved by an approver, authenticates the ID and the password to determine whether login is possible.
According to the approval login system of the present invention, the user of the client terminal requests the approver (for example, the host) to perform an approval login for logging in to the client terminal using the ID and the password after obtaining the approval of the approver, the approver accesses (accesses) the login control server from the client terminal of the approver and approves the login of the client terminal of the user, and the user logs in to the client terminal of the approver using the ID and the password.
Therefore, even when the smart card cannot be registered, the user can log in to the client terminal while ensuring high security.
Drawings
Fig. 1 is a block (block) configuration diagram showing an alternative registration system according to embodiment 1 of the present invention.
Fig. 2 is a sequence chart showing processing of the alternative registration system according to embodiment 1 of the present invention.
Fig. 3 is a block diagram showing the approval login system according to embodiment 2 of the present invention.
Fig. 4 is a sequence diagram showing the process of the approval login system according to embodiment 2 of the present invention.
Description of the reference symbols
10: a portable terminal; 11: a display unit; 12: an operation section; 13: an application section; 20: logging in a control server; 21: a server-side arithmetic unit; 22: a server side login control part; 23: a user information database; 30: a client terminal; 31: a display unit; 32: an operation section; 33: a client side login control part; 34: a client-side arithmetic unit; 50: an approver client terminal; 51: a display unit; 52: an operation section; 53: approver client side login control unit; 60: logging in a control server; 61: a server side login control part; 62: a user information database; 70: a user client terminal; 71: a display unit; 72: an operation section; 73: the user client side logs in the control part.
Detailed Description
Hereinafter, preferred embodiments of the alternative login system and the approval login system according to the present invention will be described with reference to the drawings. The alternative login system and the authorized login system add a necessary function to a login process (logonprocess) of Windows (registered trademark) so that applications can be logged in without performing smart card login. Further, as long as the smart card login is normally performed, the substitute login or the approval login can be applied on the same day.
Embodiment mode 1
First, the following alternative login system will be explained: the user of the client terminal starts an application from the portable terminal, requests the login control server for a one-time password for performing alternate login for logging in the client terminal using the ID and the password and a one-time password generated by specifying a matrix (matrix) table and a display portion in the table, and logs in the client terminal using the one-time password obtained from the login control server.
Fig. 1 is a block diagram showing an alternative login system according to embodiment 1 of the present invention. In fig. 1, the alternative login system is composed of a mobile terminal 10, a login control server 20, and a client terminal 30. In addition, the user logs in to the client terminal 30 through a smart card at normal times.
Here, the mobile terminal 10 and the login control server 20 establish communication via the network (even if the mobile terminal 10 is online (online)) after the application is started, but the login control server 20 and the client terminal 30 may not be connected to each other (that is, the client terminal 30 may be offline (offline)). The user holds the mobile terminal 10 and the client terminal 30.
The portable terminal 10 includes a display unit 11, an operation unit 12, and an application unit 13. Here, the mobile terminal 10 is, for example, a mobile phone. The display unit 11 is a display (display), and the operation unit 12 is a hardware key (hardware key) or a software key (software key). The application unit 13 downloads an application for performing the alternative registration from a download (download) server cooperating with the alternative registration system.
When downloading an application, a specific authentication number (e.g., a staff number of a user) is notified to a download server cooperating with the alternative login system, and a PIN is set. The registration control server 20 acquires user information given to the mobile terminal 10 by the download server in cooperation according to a predetermined protocol, and can recognize which user's mobile terminal has accessed when the mobile terminal 10 has accessed.
The registration control server 20 includes a server-side arithmetic unit 21, a server-side registration control unit 22, and a user information database (database) 23. When the substitute registration is requested from the application unit 13 of the mobile terminal 10, the server-side calculation unit 21 calculates the one-time password using the authentication number indicating the user information or user unique information of the user of the mobile terminal 10 stored in the user information database 23 and the date and time of the internal clock, not shown.
When the client terminal 30 is online, that is, when the login control server 20 and the client terminal 30 are connected to each other, the server-side login control unit 22 controls login with respect to the client terminal 30. Specifically, the server-side registration control unit 22 restricts smart card registration to the client terminal 30 when the application unit 13 requests alternate registration, but cancels the alternate registration of the client terminal 30 so that the smart card registration can be performed when the client terminal 30 requests cancellation of the alternate registration.
When the client terminal 30 is online and performs the alternate registration, the server-side registration control unit 22 prohibits registration with another client terminal owned by the user and prohibits remote desktop (remote desktop).
The user information database 23 stores an authentication number indicating a user of the mobile terminal 10 and an ID indicating a user of the client terminal 30. Here, it is assumed that the authentication number and the ID are communicated with each other. That is, when an access is made from the client terminal 30, the login control server 20 can recognize from which user's client terminal the access is made. In the user information database 23, any other value may be used as long as one user can be identified from the authentication number and the ID.
The client terminal 30 includes a display unit 31, an operation unit 32, a client registration control unit 33, and a client arithmetic unit 34. Here, the client terminal 30 is, for example, a PC. The display unit 31 is a display, and the operation unit 32 is a hardware keyboard (hardware keyboard) or a software keyboard (software keyboard).
The client side registration control unit 33 controls registration with the client terminal 30. Specifically, when a smart card is inserted into the client terminal 30, the client-side login control unit 33 requests the entry of a PIN by the function of Windows, authenticates the PIN, checks the application state instead of login with the login control server 20, and determines whether or not login is possible.
When the ID and the password are input to the client terminal 30, the client-side login control unit 33 determines that the login is to be replaced, requests the input of the one-time password, authenticates the ID, the password, and the one-time password, and determines whether the login is possible.
When the client terminal 30 has already been logged in by the substitute login, the client login control unit 33 disables the smart card login thereafter. At this time, when the client terminal 30 is online, the server-side registration control unit 22 may be configured to disable the smart card registration for the client terminal 30 that has registered in place of the registration.
When the client terminal 30 is online, the client side registration control unit 33 requests the server side registration control unit 22 to cancel the alternative registration in response to a request from the user. The user's upper part requests the server-side registration control unit 22 from its own client terminal to cancel the alternative registration.
When the ID and the password are input to the client terminal 30, the client-side arithmetic unit 34 calculates the one-time password using the input ID and the date and time of the internal clock, not shown.
Here, the server-side arithmetic unit 21 and the client-side arithmetic unit 34 have algorithms (algorithms) that communicate with each other in the arithmetic operation of the one-time password. That is, the server-side arithmetic unit 21 and the client-side arithmetic unit 34 calculate the same one-time password using the authentication number and ID that are communicated with each other and the date and time of the built-in clock of each of the login control server 20 and the client terminal 30.
Therefore, the client side registration control unit 33 compares the one-time password input to the client terminal 30 with the one-time password calculated by the client side arithmetic unit 34, and when both of them match each other, can determine that registration is possible. The one-time password is updated in a time unit set arbitrarily (for example, every 6 hours), and when the password is registered again after the update, the one-time password is acquired again.
Fig. 2 is a sequence diagram showing processing of the alternative login system according to embodiment 1 of the present invention. In fig. 2, first, the user starts the application unit 13 of the mobile terminal 10 and inputs the PIN (step) S1).
Next, the user requests the login control server 20 from the application unit 13 of the mobile terminal 10 to replace the login (step S2).
Next, the server-side arithmetic unit 21 calculates the one-time password using the authentication number indicating the user of the mobile terminal 10 and the date and time of the built-in clock (step S3).
Next, the server-side arithmetic unit 21 transmits the calculated one-time password to the mobile terminal 10 (step S4).
Next, the user activates the client terminal 30 (step S5), and inputs the ID and the password (step S6).
Next, the client-side arithmetic unit 34 calculates a one-time password using the inputted ID and the date and time of the built-in clock (step S7).
Next, the client side login control unit 33 requests the user to input the one-time password (step S8), and the user inputs the one-time password (step S9), thereby authenticating the ID, the password, and the one-time password and logging in (step S10).
When the alternative registration is canceled, after the client terminal 30 is on-line, the client registration controller 33 requests the server registration controller 22 to cancel the alternative registration in response to a request from the user (step S11), and the server registration controller 22 cancels the alternative registration of the client terminal 30 (step S12).
In this way, when the user cannot perform the smart card login, the user can log in to the PC while securing security by activating the application unit 13 of the mobile terminal 10, inputting the PIN, and inputting the one-time password transmitted to the mobile terminal 10 to the client terminal 30.
As described above, according to embodiment 1, the user of the client terminal starts the application from the mobile terminal, requests the login control server for the one-time password for performing the alternate login for logging in to the client terminal using the ID, the password, and the one-time password, and logs in to the client terminal using the one-time password obtained from the login control server.
Therefore, even when the smart card cannot be registered, the user can log in to the client terminal while ensuring high security.
When the smart card is found, the host requests the cancellation of the substitute registration, thereby enabling the smart card to be registered and improving the convenience of the user.
Embodiment mode 2
Next, the following approval login system will be explained: the user of the client terminal requests an approver (for example, a boss) to perform an approval login for logging in to the client terminal using the ID and the password after obtaining the approval of the approver, the approver accesses the login control server from the client terminal of the approver to approve the client terminal of the login user, and the user logs in to the client terminal of the approver using the ID and the password.
Fig. 3 is a block diagram showing the approval login system according to embodiment 2 of the present invention. In fig. 3, the approval/registration system is composed of an approver client terminal 50, a registration control server 60, and a user client terminal 70. In addition, in normal times, the user logs in to the client terminals 50 and 70 through smart card registration.
Here, the approver client terminal 50, the login control server 60, and the user client terminal 70 are connected to each other via a network (i.e., the approver client terminal 50 and the user client terminal 70 are online).
The approver client terminal 50 includes a display unit 51, an operation unit 52, and an approver client-side registration control unit 53. Here, the approver client terminal 50 is, for example, a PC. The display unit 51 is a monitor, and the operation unit 52 is a hardware keyboard or a software keyboard.
The approver client side registration control unit 53 controls registration to the user client terminal 70. Specifically, when the approver client side registration control unit 53 requests an approval registration from the user, the registration control server 60 approves the registration of the user client terminal 70 by the operation of the approver.
Here, when the approver approves the login to the user client terminal 70, the approver needs to log in to the approver client terminal 50 through the smart card login. Further, when the approver applies for approval registration, the approver cannot perform self-approval and needs to apply for registration to another approver. Also, there is a limit to the number of persons (e.g., 3 persons) that an approver can approve within one day.
The registration control server 60 includes a server-side registration control unit 61 and a user information database 62. The server-side registration control unit 61 controls registration with the user client terminal 70. Specifically, when the ID and the password are input to the user client terminal 70, it is determined that login is approved, and it is determined whether the user client terminal 70 is approved by the approver.
The approver client side registration control unit 53, after approving the registration of the user client terminal 70 with respect to the registration control server 60, requests the server side registration control unit 61 to cancel the approval registration in response to a request from the user. When the approver client side registration control unit 53 requests to cancel the approval registration, the server side registration control unit 61 cancels the approval registration of the user client terminal 70.
When the login is approved, the server-side login control unit 61 prohibits the login to another client terminal owned by the user and prohibits the remote desktop.
The user information database 62 stores IDs indicating users of the approver client terminal 50 and the user client terminal 70. That is, when access is made from the approver client terminal 50 and the user client terminal 70, the login control server 60 can recognize from which user client terminal the access is made.
The user client terminal 70 includes a display unit 71, an operation unit 72, and a user client side registration control unit 73. Here, the user client terminal 70 is, for example, a PC. The display unit 71 is a display, and the operation unit 72 is a hardware keyboard or a software keyboard.
The user client side registration control unit 73 controls registration with the user client terminal 70. Specifically, when the user client terminal 70 is inserted with a smart card, the user client side login control unit 73 requests the entry of a PIN by the function of Windows, authenticates the PIN, checks the application state of the approved login with the login control server 20, and determines whether or not the login is possible.
When the ID and the password are input to the user client terminal 70, the user client side login control unit 73 determines that the login is approved, confirms to the server side login control unit 61 whether the user client terminal 70 is approved by the approver, and if the user client terminal is approved, authenticates the ID and the password and determines whether the login is possible.
When the user client side login control unit 73 logs in to the user client terminal 70 by the approval login, the smart card login is disabled thereafter. The user client side login control unit 73 allows the smart card to be logged in when the authorized login of the user client terminal 70 is cancelled.
Fig. 4 is a sequence diagram showing the process of the approval login system according to embodiment 2 of the present invention. In fig. 4, first, in response to an application for approval of login from the user, the approver requests the login control server 60 to approve the login (step S21).
Next, the server side registration control unit 61 changes the state of the user client terminal 70 to a state approved by the approver (step S22).
Next, the user activates the user client terminal 70 (step S23), and inputs the ID and the password (step S24).
Next, the user client registration control unit 73 confirms the state of the user client terminal 70 with the server registration control unit 61 (step S25).
Next, the server side registration control unit 61 replies to the user client side registration control unit 73 that the user client terminal 70 is approved by the approver (step S26).
Next, the user client side login control unit 73 performs login by authenticating the ID and the password (step S27).
In addition, when the approval login is canceled, the approver requests the login control server 60 to cancel the approval login in response to a request for the approval login from the user (step S28), and the server-side login control unit 61 cancels the approval login of the user client terminal 70 (step S29).
In this way, when the user cannot perform the smart card registration, the user requests the approver to perform the approval registration, and the approver accesses the registration control server 60 from the approver client terminal 50 and approves the registration of the user client terminal 70, thereby allowing the user to log in to the PC while ensuring security.
As described above, according to embodiment 2, the user of the client terminal requests the approver (for example, the boss) to perform an approval login for logging in to the client terminal using the ID and the password after obtaining the approval of the approver, the approver accesses the login control server from the client terminal of the approver and approves the client terminal of the login user, and the user logs in to the client terminal of the approver using the ID and the password.
Therefore, even when the smart card cannot be registered, the user can log in to the client terminal while ensuring high security.
When the user finds the smart card, the approver (e.g., the host) requests the user to cancel the substitute registration, thereby enabling the user to perform the smart card registration and improving the convenience of the user.

Claims (3)

1. An authorized login system is composed of an approver client terminal, a login control server, and a user client terminal connected to each other via a network,
the approver client terminal includes an approver client side login control unit that approves login of the user client terminal to the login control server when an approval login is requested from a user of the user client terminal to log in to the user client terminal using an ID and a password instead of a smart card login,
the login control server includes a server-side login control unit that changes the state of the user client terminal to a state approved by an approver when the approver client-side login control unit requests approval of login,
the user client terminal has a user client side login control part which confirms the state of the user client terminal to the server side login control part when an ID and a password are input by the user, and authenticates the ID and the password to determine whether login is possible if the user client terminal is approved by an approver;
the user client side login control unit disables the smart card login thereafter when the user client terminal is logged in by the approval login.
2. The approval login system of claim 1, wherein,
the server-side login control section cancels the approval login in accordance with a request of the approver client terminal so that the smart card login is enabled.
3. An approval login method implemented by an approval login system composed of an approver client terminal, a login control server, and a user client terminal connected to each other via a network,
the approval login method has the following steps:
when an approval login for logging in to the user client terminal with an ID and a password is applied from a user of the user client terminal instead of a smart card login, the approver client terminal approves the login of the user client terminal to the login control server;
changing, by the login control server, a state of the user client terminal to a state approved by an approver when approval of login is requested; and
confirming, by the user client terminal, a state of the user client terminal when an ID and a password are input to the user client terminal by the user, and authenticating the ID and the password to determine whether login is possible if the user client terminal is approved by an approver;
in the case of logging in to the user client terminal by approval of login, the smart card login is made impossible thereafter.
CN202010655490.4A 2015-11-12 2016-10-12 Approval login system and method Active CN111787023B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010655490.4A CN111787023B (en) 2015-11-12 2016-10-12 Approval login system and method

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JP2015-222040 2015-11-12
JP2015222040A JP6230584B2 (en) 2015-11-12 2015-11-12 Alternative logon system and alternative logon method, and authorized logon system and authorized logon method
CN201610890591.3A CN106850527A (en) 2015-11-12 2016-10-12 Instead of login system and method and approval login system and method
CN202010655490.4A CN111787023B (en) 2015-11-12 2016-10-12 Approval login system and method

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201610890591.3A Division CN106850527A (en) 2015-11-12 2016-10-12 Instead of login system and method and approval login system and method

Publications (2)

Publication Number Publication Date
CN111787023A true CN111787023A (en) 2020-10-16
CN111787023B CN111787023B (en) 2023-04-18

Family

ID=58770654

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202010655490.4A Active CN111787023B (en) 2015-11-12 2016-10-12 Approval login system and method
CN201610890591.3A Pending CN106850527A (en) 2015-11-12 2016-10-12 Instead of login system and method and approval login system and method

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201610890591.3A Pending CN106850527A (en) 2015-11-12 2016-10-12 Instead of login system and method and approval login system and method

Country Status (2)

Country Link
JP (1) JP6230584B2 (en)
CN (2) CN111787023B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113836547B (en) * 2021-08-30 2023-12-22 济南浪潮数据技术有限公司 Method, system and monitoring platform for limiting common user to log on monitoring platform

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6189032B1 (en) * 1997-02-27 2001-02-13 Hitachi, Ltd. Client-server system for controlling access rights to certain services by a user of a client terminal
US20020029348A1 (en) * 2000-07-28 2002-03-07 Du Sterling D. Smart card security information configuration and recovery system
US20020095602A1 (en) * 2001-01-17 2002-07-18 Pherson James E. System for controlling access to resources in a storage area network
JP2004157845A (en) * 2002-11-07 2004-06-03 Noritsu Koki Co Ltd Authentication system in maintenance
JP2005025301A (en) * 2003-06-30 2005-01-27 Casio Comput Co Ltd Information management system and program
CN1585349A (en) * 2003-07-30 2005-02-23 松下电器产业株式会社 System and method for announcement of approval status information
JP2005128986A (en) * 2003-10-24 2005-05-19 Ez Soft Kk Electronic approval system and electronic seal
CN1741104A (en) * 2005-09-09 2006-03-01 中国工商银行 Long-distance authorizing system and method
KR20090120148A (en) * 2008-05-19 2009-11-24 주식회사 케이티 System and method of automatic guidance related to usim card password and apparatus therefor
JP2012168050A (en) * 2011-02-15 2012-09-06 Tosoh Corp Analysis system having approval means
CN102831350A (en) * 2012-08-30 2012-12-19 北京立思辰计算机技术有限公司 Self-service compact disk recording whole life cycle monitoring and auditing method
CN103593602A (en) * 2012-08-14 2014-02-19 深圳中兴网信科技有限公司 User authorization management method and system
CN104521216A (en) * 2012-08-07 2015-04-15 西门子公司 Authorising a user by means of a portable communications terminal
JP2015130028A (en) * 2014-01-07 2015-07-16 日本電気株式会社 Proxy log-in device, terminal, control method and program
CN104836789A (en) * 2015-03-20 2015-08-12 湖南科技大学 Location privacy protection scheme based on space region anonymity
CN104836786A (en) * 2014-02-10 2015-08-12 现代自动车株式会社 Automatic login system and automatic login method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000010927A (en) * 1998-06-25 2000-01-14 Nec Yonezawa Ltd Authentication system and device
JP4643313B2 (en) * 2005-03-09 2011-03-02 富士通株式会社 Relief method when biometric authentication is impossible for client / server system with biometric authentication function
US10069827B2 (en) * 2012-10-31 2018-09-04 International Business Machines Corporation Extending authentication and authorization capabilities of an application without code changes
JP2014099127A (en) * 2012-11-16 2014-05-29 Hitachi Ltd Authentication system with invalidating function

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6189032B1 (en) * 1997-02-27 2001-02-13 Hitachi, Ltd. Client-server system for controlling access rights to certain services by a user of a client terminal
US20020029348A1 (en) * 2000-07-28 2002-03-07 Du Sterling D. Smart card security information configuration and recovery system
US20020095602A1 (en) * 2001-01-17 2002-07-18 Pherson James E. System for controlling access to resources in a storage area network
JP2004157845A (en) * 2002-11-07 2004-06-03 Noritsu Koki Co Ltd Authentication system in maintenance
JP2005025301A (en) * 2003-06-30 2005-01-27 Casio Comput Co Ltd Information management system and program
CN1585349A (en) * 2003-07-30 2005-02-23 松下电器产业株式会社 System and method for announcement of approval status information
JP2005128986A (en) * 2003-10-24 2005-05-19 Ez Soft Kk Electronic approval system and electronic seal
CN1741104A (en) * 2005-09-09 2006-03-01 中国工商银行 Long-distance authorizing system and method
KR20090120148A (en) * 2008-05-19 2009-11-24 주식회사 케이티 System and method of automatic guidance related to usim card password and apparatus therefor
JP2012168050A (en) * 2011-02-15 2012-09-06 Tosoh Corp Analysis system having approval means
CN104521216A (en) * 2012-08-07 2015-04-15 西门子公司 Authorising a user by means of a portable communications terminal
CN103593602A (en) * 2012-08-14 2014-02-19 深圳中兴网信科技有限公司 User authorization management method and system
CN102831350A (en) * 2012-08-30 2012-12-19 北京立思辰计算机技术有限公司 Self-service compact disk recording whole life cycle monitoring and auditing method
JP2015130028A (en) * 2014-01-07 2015-07-16 日本電気株式会社 Proxy log-in device, terminal, control method and program
CN104836786A (en) * 2014-02-10 2015-08-12 现代自动车株式会社 Automatic login system and automatic login method
CN104836789A (en) * 2015-03-20 2015-08-12 湖南科技大学 Location privacy protection scheme based on space region anonymity

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"不同安全认证体系的比较与分析", 《中国防伪报道》, no. 10, 10 October 2008 (2008-10-10) *
SARU KUMARI: "Cryptanalysis of "A Robust Smart-Card-Based Remote User Password Authentication Scheme", 《2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES》, 16 September 2013 (2013-09-16) *
季玉茹;梁胜;王德忠;: "基于C/S结构的城市建设项目审批系统研发", no. 01 *
颜虹;周华;谭敏;王昊;: "材料申请审批系统的开发与应用", no. 04 *

Also Published As

Publication number Publication date
CN106850527A (en) 2017-06-13
CN111787023B (en) 2023-04-18
JP2017091305A (en) 2017-05-25
JP6230584B2 (en) 2017-11-15

Similar Documents

Publication Publication Date Title
US10755507B2 (en) Systems and methods for multifactor physical authentication
CN105339949B (en) System for managing the access to medical data
US9892576B2 (en) Biometrics identification module and personal wearable electronics network based authentication and transaction processing
US11841929B2 (en) Authentication translation
CN109684801B (en) Method and device for generating, issuing and verifying electronic certificate
US20040019787A1 (en) Method and system for authenticating communication terminals
EP3385895A1 (en) Biometric information personal identity authenticating system and method using financial card information stored in mobile communication terminal
WO2013119967A1 (en) Systems and methods for password-free authentication
US20170316408A1 (en) Bionumerical Authentication Systems
KR101451639B1 (en) Identification and theft prevention system using one times random key, and method thereof
US20070214364A1 (en) Dual layer authentication system for securing user access to remote systems and associated methods
JP2020195347A (en) Aerosol generator and aerosol generation method
JP2003044442A (en) Method and device for data authentication
EP3713204A1 (en) Communication authentication apparatus and communication system comprising same
CN112292845B (en) Information processing apparatus, information processing method, and program
JP7196241B2 (en) Information processing device, control method, and program
EP3219073B1 (en) Identity assertion based on biometric information
CN111787023B (en) Approval login system and method
KR20080077786A (en) Method for personal authentication using mobile and subscriber identify module and device thereof
TW201816646A (en) Electronic transaction authentication method and system using mobile device application program providing high security in financial electronic transaction
JP6841781B2 (en) Authentication server device, authentication system and authentication method
US10984131B2 (en) Method for providing personal information of a user requested by a given online service
JP2019168843A (en) Management server, authentication method, computer program, service cooperation system, communication terminal and electronic lock
JP2016085638A (en) Server device, terminal device, system, information processing method, and program
JP2005004466A (en) Terminal use authentication system and terminal use authentication program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Tokyo, Japan

Applicant after: Mitsubishi Electric Building Solutions Co.,Ltd.

Address before: Tokyo, Japan

Applicant before: MITSUBISHI ELECTRIC BUILDING TECHNO-SERVICE Co.,Ltd.

GR01 Patent grant
GR01 Patent grant