CN1321036A - Personal verifying method using portable phone - Google Patents

Personal verifying method using portable phone Download PDF

Info

Publication number
CN1321036A
CN1321036A CN 01110058 CN01110058A CN1321036A CN 1321036 A CN1321036 A CN 1321036A CN 01110058 CN01110058 CN 01110058 CN 01110058 A CN01110058 A CN 01110058A CN 1321036 A CN1321036 A CN 1321036A
Authority
CN
China
Prior art keywords
software
portable telephone
personal computer
authenticating method
memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 01110058
Other languages
Chinese (zh)
Inventor
阿部聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Publication of CN1321036A publication Critical patent/CN1321036A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Stored Programmes (AREA)

Abstract

The invention provides individual authenticating method by using a portable telephone. The portable telephone is provided with identification devices (voice authentication, retina authentication, personal identification number authentication and fingerprint authentication), an individual is recognized by using any of the identification devices, software desired to be used is made available without selecting a personal computer, the telephone is inserted into a portable telephone insertion opening specially provided in a personal computer on the desk where the individual wants to work so that authentication between the personal computer and the telephone can be performed to allow the whole available software to be used in such a manner that software itself receiving a license is stored in an internal memory or that a software use license is stored in the memory in the telephone.

Description

Use the authenticating method of portable telephone
The present invention relates to a kind of authenticating method that uses portable telephone, particularly relate to a kind of use portable telephone and carry out the personal authentication, and on personal computer, use authenticating method software, that use portable telephone that rights of using are arranged.
In the past, on personal computer, use when the software of rights of using is arranged, when being installed to the software that rights of using are arranged on the personal computer, the Verification Number that obtains in the time of can buying software by input uses this software, perhaps can obtain and buy authentication, after server is downloaded software, use from the server of keeping software.
, illegally use a computer, the situation of software, portable telephone and the Internet is a lot, how improving safety in utilization has been social urgent task in the past; In addition, to keep the increase of administrative expenses also be the problem that people worried in the use of system.And, because everyone will have personal computer generally speaking, so that computer, tables' demand has been surpassed should the amount of having.
On described personal computer in the past, use when the software of rights of using is arranged, exist following problem:
Problem 1 is: can only use the software that rights of using are arranged oneself on the own personal computer that is had.Its reason is that corresponding personal computer authenticates, signs license contract.
Problem 2 is: no matter where go out, all can not use personal computer.Its reason is to be difficult to obtain the software that needs use with going out.
Problem 3 is: the space that need much be used to place personal computer.Its reason is which platform personal computer all need have the software of obtaining permission.
Now, a lot of people almost use portable telephone every day.The objective of the invention is: provide a kind of and make portable telephone not only only be used as phone to use, but, improve constantly loss security performance that portable telephone has and the use authenticating method also more convenient, that use portable telephone that makes computer software by strengthening its authentication function.
The authenticating method of use portable telephone of the present invention is that the portable telephone that has individual identification functions such as cipher authentication, sound authentication, nethike embrane authentication and finger print identifying by handle is installed on the personal computer, thereby the recognition function of utilizing portable telephone to have is differentiated the occupancy permit of personal computer with software.
Therefore, the present invention has the following advantages.
Improve the fail safe of portable telephone, software and computer, eliminate the illegal phenomenon of using.
Even under the situation that portable telephone is lost, also can stop the phenomenon that portable telephone is illegally used.
Buying all of software undertaken by usual channel, stop illegally to use the phenomenon of software.
As long as portable telephone is inserted computer just can use a computer; Use for computer also is the same, no matter is in company or outside the company, and every people who has right can give and computed permission.
Be not limited to use a computer, use any computer can utilization to obtain the software of personal permit anywhere, consequently: use more convenient, and because do not need personal computer, personal disk, so can the implementation space and effective utilization of assets.
Comprise following item as embodiments of the invention.
The enforcement of software is to be undertaken by being stored in memory in the portable telephone or the software on the memory in the personal computer.
If there is not the software licensing card, in order to buy the software that needs, by after the authentication of accepting certificate server the method on the memory of the software download that needs in the portable telephone, perhaps accept after the authentication of certificate server software is bought, implemented to method on the memory of the software download that needs in the personal computer.
When personal computer is taken portable telephone, eliminate the software that downloading in the personal computer memory.
When passing through local area network, during the software on having the personal computer of other rights of using, finding to be hopeful to use, by the portable telephone with individual identification function is installed on the computer, utilize the permission situation of the recognition function judgement software of portable telephone, on personal computer, implement software with the software of wishing use.
Software is upgraded and when buying software, hang up for the certificate server that has software with portable telephone, accept authentication, by upgrading and buying processing, utilize standby time or fix time in to the software on the portable telephone memory automatically implement the upgrading or append.
Reading to deposit to the information data of local area network from the personal computer is that portable telephone by being installed on the personal computer carries out.
Use music data or view data as implementing to use software.
Can use PHS as portable phone.
Following simple declaration accompanying drawing:
Fig. 1 has outside drawing PID personal identification device, portable telephone used in the present invention;
Fig. 2 is the flow chart of the expression personal authentication course of work;
Fig. 3 is the figure that expression is installed to portable telephone the state on the personal computer;
Fig. 4 is the flow chart that is illustrated in the certification work that carries out between personal computer and the portable telephone;
Fig. 5 is the key diagram when entrusting certificate server to authenticate by portable telephone;
Fig. 6 is that expression utilizes certificate server to carry out the flow chart of certification work;
Fig. 7 is the key diagram of expression when using other personal computer to start software;
Fig. 8 is after expression is accepted ID authentication with certificate server, the key diagram when carrying out work such as software is bought, upgrading.
Embodiment
Embodiments of the invention are described with reference to the accompanying drawings.
With reference to Fig. 1 as can be known, portable telephone 1 has PID personal identification device 1a (sound authentication, nethike embrane authentication, cipher authentication and finger print identifying).
Below, utilize Fig. 2 that personal authentication's work of portable telephone 1 is described.In step 11, utilize 1 couple of individual of portable telephone (AShi) to begin to authenticate.If any one recognition device with step 12~15 can be discerned AShi, then AShi can use portable telephone 1 in step 16.If can not discern then enter step 17, under the situation of losing portable telephone 1, other people can not illegally utilize this portable telephone 1 again.
With reference to Fig. 3 as can be known,, have the portable telephone 1 of recognition function, do not select personal computer 2 just can utilize to wish the software that utilizes by use for the reasonable use of software.The software that obtains licence itself is stored in the built-in memory in advance, perhaps the software licensing card is hidden in the memory that stores in the portable telephone 1.By in the portable telephone socket of the desktop PC's 2 of portable telephone 1 insertion beamhouse operation special setting, between computer 2 and portable telephone 1, authenticate, the software that allows to use all is in the state that can use.
Utilize the flow chart of Fig. 4 that this course of work is described.In step 21, portable telephone 1 is inserted the portable telephone socket of personal computer 2.Then, whether the machine master who confirms this portable telephone 1 in step 22 has the right of using personal computer 2 (for example, whether have administrative power or whether have only as user's right etc.).If the right as the user is identified, in step 23, when having the software licensing card in the memory in the portable telephone 1, just can use the memory of personal computer 2 and the software on the hard disk.When having software itself in the memory in portable telephone 1, the portable telephone 1 interior software of can enough personal computers 2 directly read is had a guide look of, so just can be by start, utilize software by mouse button.If there is not the right to use, then can not use personal computer 2 according to step 24.
After the clear and definite usage license of software, be not limited only to a personal computer, any computer anywhere can utilize the software that has obtained personal permit, consequently: use more convenient, and because do not need personal computer, personal disk, so can the implementation space and effective utilization of assets.
With reference to Fig. 5 as can be known, utilize portable telephone 1 this moment, do not deposit in or read to certificate server by the Internet (having diagram), authenticating (sound authentication, nethike embrane authentication, cipher authentication and finger print identifying) entrusts, after receiving the authentication end notification, on the memory or hard disk (HDD) of the software download that needs in the personal computer 2, make it to be in the state that can use.
Utilize the flow chart of Fig. 6 that this course of work is described.At first, the desktop computer according to the user is set in step 31.In step 32, judge whether software itself is arranged on the memory in the portable telephone 1.If have, in step 35, just utilize the software on portable telephone 1 memory.If no, just in step 33, judged whether the software licensing card.If have, just in step 36, judge whether the software that on personal computer 2, uses.If have, just in step 37, use software.If there is not the software licensing card, just in step 34, judge whether to buy the software of wishing use.When buying, just in step 39, accept the authentication of certificate server 3; Software repertoire is used in the hope that can utilize because can read on picture, so by selecting mode of payment and in step 40, clicking here with mouse button, the software download that needs is bought software to the memory of portable telephone 1 or on the hard disk of personal computer 2, just can in step 41, use software.And when not buying, just in step 42, can not use software.
When in hard disk, having downloaded software, take portable telephone 1, through after a while, the software in the hard disk will be eliminated.
In step 36, the software licensing card is arranged on the memory in portable telephone 1, under the non-existent situation of software itself, if the software of hopeless use on personal computer 2, then as shown in Figure 7, in step 38, by the local area network (LAN) of the Internet, if the software that is hopeful to use on the personal computer 2 with other rights of using just starts application software herein.
Under the situation of Fig. 7, be to choose from personal computer 2 information of carrying out that are inserted with portable telephone 1 by LAN, find out personal computer 2 ', start required software from personal computer 2 '.
As shown in Figure 8, upgrading and purchase about software, hang up for the certificate server 3 that has software from portable telephone 1, accept the ID authentication, by upgrading and buying processing, utilize standby time automatically or fix time to the software implementation on portable telephone 1 memory upgrading or append.
When the updating operation of software licensing in the portable telephone and software itself is also implemented to guard contract, as long as requirement is arranged, also can download and upgrade licensing and software itself at night by portable telephone 1.
When each software is granted upgrading, just can select whether will upgrade the memory in the portable telephone 1, if selected automatic renewal, then can make it to download in standby time or at the appointed time.
As other embodiment of the present invention,,, just can from the personal computer 2 that has the LAN function, save LAN card, LAN card etc. by using portable telephone about hardware; About utilizing software, also can use the music file that is called as music data, video recording data etc.As portable telephone, then can also use PHS (Personal Handyphone System).

Claims (18)

1. an authenticating method that uses portable telephone is characterized in that: utilize the recognition function of the portable telephone with individual identification function to differentiate the occupancy permit of personal computer with software.
2. authenticating method according to claim 1 is characterized in that: described individual identification function is the individual identification function that authenticates according to password.
3. authenticating method according to claim 1 is characterized in that: described individual identification function is the individual identification function that authenticates according to sound.
4. authenticating method according to claim 1 is characterized in that: described individual identification function is the individual identification function that authenticates according to nethike embrane.
5. authenticating method according to claim 1 is characterized in that: described individual identification function is the individual identification function that authenticates according to fingerprint.
6. according to any described authenticating method in the claim 1~5, it is characterized in that: the enforcement of described software is to be undertaken by the software that is stored on the memory in the described portable telephone.
7. according to any described authenticating method in the claim 1~5, it is characterized in that: the enforcement of described software is to be undertaken by the software that is stored on the memory in the described personal computer.
8. according to any described authenticating method in the claim 1~5, it is characterized in that: if there is not the software licensing card, just by after the authentication of accepting certificate server on the memory of the software download that needs in the portable telephone, buy and implement software.
9. according to any described authenticating method in the claim 1~5, it is characterized in that: if there is not the software licensing card, just by after the authentication of accepting certificate server on the memory of the software download that needs in the personal computer, buy and implement software.
10. authenticating method according to claim 9 is characterized in that: when portable telephone when personal computer is taken, eliminate the software that downloading in the personal computer memory.
11. according to any described authenticating method in the claim 1~5, it is characterized in that: when the software that is hopeful to use on the personal computer with other rights of using, by local area network, on the personal computer that has the software of wishing use, implement software.
12. according to any described authenticating method in the claim 1~5, it is characterized in that: when software being upgraded or buy software, hang up for the certificate server that has software with portable telephone, accept authentication, by upgrading and buying processing, utilize standby time or fix time in to the software on the portable telephone memory automatically implement the upgrading or append.
13. authenticating method according to claim 11 is characterized in that: reading to deposit to the information data of local area network from personal computer is that portable telephone by being installed on the personal computer carries out.
14. authenticating method according to claim 6 is characterized in that: use music data as executive software.
15. authenticating method according to claim 6 is characterized in that: use view data as executive software.
16. authenticating method according to claim 7 is characterized in that: use music data as executive software.
17. authenticating method according to claim 7 is characterized in that: use view data as executive software.
18. authenticating method according to claim 1 is characterized in that: described portable phone is PHS.
CN 01110058 2000-03-28 2001-03-28 Personal verifying method using portable phone Pending CN1321036A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP087960/2000 2000-03-28
JP2000087960A JP2001273135A (en) 2000-03-28 2000-03-28 Method and device for individual authentication by using portable telephone

Publications (1)

Publication Number Publication Date
CN1321036A true CN1321036A (en) 2001-11-07

Family

ID=18603904

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 01110058 Pending CN1321036A (en) 2000-03-28 2001-03-28 Personal verifying method using portable phone

Country Status (2)

Country Link
JP (1) JP2001273135A (en)
CN (1) CN1321036A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1322703C (en) * 2005-05-16 2007-06-20 刘小鹏 Self-determined authentication card with multiplayer ciphers, system, method and authentication telephone set
CN100461915C (en) * 2005-11-28 2009-02-11 中兴通讯股份有限公司 Method for conducting secrete handling for PC broadside-on mobile terminal information

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003091509A (en) 2001-09-17 2003-03-28 Nec Corp Personal authentication method for portable communication equipment and program describing the same
AU2002359973A1 (en) * 2001-12-07 2003-06-17 Ntt Docomo, Inc. Mobile communication terminal, application software initiating apparatus, application software initiating system, application software initiating method, and application software initiating program
US7418255B2 (en) 2002-02-21 2008-08-26 Bloomberg Finance L.P. Computer terminals biometrically enabled for network functions and voice communication
DE20204651U1 (en) * 2002-03-18 2003-08-07 Harder, Wulf, Åmål Device for protection against unauthorized use of software
DE20206628U1 (en) * 2002-04-22 2003-09-04 Harder, Wulf, Åmål Device for protection against unauthorized use of software
JP4040424B2 (en) * 2002-10-16 2008-01-30 Kddi株式会社 Software license management method, software license management system, and computer program
KR20050091472A (en) * 2004-03-12 2005-09-15 엘지전자 주식회사 Call connection control method for mobile station
JP2006053808A (en) * 2004-08-13 2006-02-23 Fuji Electric Holdings Co Ltd Operator authentication management system
WO2009131130A1 (en) * 2008-04-23 2009-10-29 日本電気株式会社 Information processing system, information processing device, mobile communication device, and method for managing user information used for them
CN102946604B (en) * 2012-11-07 2017-02-08 中兴通讯股份有限公司 Method and device for version protection of mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1322703C (en) * 2005-05-16 2007-06-20 刘小鹏 Self-determined authentication card with multiplayer ciphers, system, method and authentication telephone set
CN100461915C (en) * 2005-11-28 2009-02-11 中兴通讯股份有限公司 Method for conducting secrete handling for PC broadside-on mobile terminal information

Also Published As

Publication number Publication date
JP2001273135A (en) 2001-10-05

Similar Documents

Publication Publication Date Title
KR101009126B1 (en) Revocation of a certificate and exclusion of other principals in a digital rights managementdrm system based on a revocation list from a delegated revocation authority
US6857067B2 (en) System and method for preventing unauthorized access to electronic data
US7900239B2 (en) Controlling access to a resource by a program using a digital signature
EP1443381B1 (en) System and method for secure software activation with volume licenses
US8813231B2 (en) Secure system for allowing the execution of authorized computer program code
CN1992596A (en) User authentication device and method
US20070150418A1 (en) Software licensing using certificate issued by authorized authority
US20080235791A1 (en) System and Method for Distributed Module Authentication
US20090178123A1 (en) Trusted internet identity
US9047452B2 (en) Multi-user BIOS authentication
JP2006501536A (en) Copyright management system using legal expression language
JP2006164237A (en) User authentication by combination of speaker reference and reverse turing test
GB2404536A (en) Protection of data using software wrappers
EP1189128A3 (en) Secure system and method for accessing files in computers using fingerprints
CN1321036A (en) Personal verifying method using portable phone
US20100031372A1 (en) Method and system for secure flexible software licensing
US7047409B1 (en) Automated tracking of certificate pedigree
Reddy et al. Application-centric security policies on unmodified Android
US7376977B2 (en) Defense against virus attacks
CN112000933A (en) Application software activation method and device, electronic equipment and storage medium
US20080282343A1 (en) Digital Rights Management Using Biometric Data
US20030005320A1 (en) Electronic security information management method and recording medium using an IC card
JP2007011795A (en) User authentication system and its method
JP2001350534A (en) Method and system for downloading charged software
JPH1125053A (en) Certification security server dealing with ic card and dedicated application program interface(api) for certification processing of application program

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication