CN1321036A - Personal verifying method using portable phone - Google Patents
Personal verifying method using portable phone Download PDFInfo
- Publication number
- CN1321036A CN1321036A CN 01110058 CN01110058A CN1321036A CN 1321036 A CN1321036 A CN 1321036A CN 01110058 CN01110058 CN 01110058 CN 01110058 A CN01110058 A CN 01110058A CN 1321036 A CN1321036 A CN 1321036A
- Authority
- CN
- China
- Prior art keywords
- software
- portable telephone
- personal computer
- authenticating method
- memory
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Stored Programmes (AREA)
Abstract
The invention provides individual authenticating method by using a portable telephone. The portable telephone is provided with identification devices (voice authentication, retina authentication, personal identification number authentication and fingerprint authentication), an individual is recognized by using any of the identification devices, software desired to be used is made available without selecting a personal computer, the telephone is inserted into a portable telephone insertion opening specially provided in a personal computer on the desk where the individual wants to work so that authentication between the personal computer and the telephone can be performed to allow the whole available software to be used in such a manner that software itself receiving a license is stored in an internal memory or that a software use license is stored in the memory in the telephone.
Description
The present invention relates to a kind of authenticating method that uses portable telephone, particularly relate to a kind of use portable telephone and carry out the personal authentication, and on personal computer, use authenticating method software, that use portable telephone that rights of using are arranged.
In the past, on personal computer, use when the software of rights of using is arranged, when being installed to the software that rights of using are arranged on the personal computer, the Verification Number that obtains in the time of can buying software by input uses this software, perhaps can obtain and buy authentication, after server is downloaded software, use from the server of keeping software.
, illegally use a computer, the situation of software, portable telephone and the Internet is a lot, how improving safety in utilization has been social urgent task in the past; In addition, to keep the increase of administrative expenses also be the problem that people worried in the use of system.And, because everyone will have personal computer generally speaking, so that computer, tables' demand has been surpassed should the amount of having.
On described personal computer in the past, use when the software of rights of using is arranged, exist following problem:
Problem 1 is: can only use the software that rights of using are arranged oneself on the own personal computer that is had.Its reason is that corresponding personal computer authenticates, signs license contract.
Problem 2 is: no matter where go out, all can not use personal computer.Its reason is to be difficult to obtain the software that needs use with going out.
Problem 3 is: the space that need much be used to place personal computer.Its reason is which platform personal computer all need have the software of obtaining permission.
Now, a lot of people almost use portable telephone every day.The objective of the invention is: provide a kind of and make portable telephone not only only be used as phone to use, but, improve constantly loss security performance that portable telephone has and the use authenticating method also more convenient, that use portable telephone that makes computer software by strengthening its authentication function.
The authenticating method of use portable telephone of the present invention is that the portable telephone that has individual identification functions such as cipher authentication, sound authentication, nethike embrane authentication and finger print identifying by handle is installed on the personal computer, thereby the recognition function of utilizing portable telephone to have is differentiated the occupancy permit of personal computer with software.
Therefore, the present invention has the following advantages.
Improve the fail safe of portable telephone, software and computer, eliminate the illegal phenomenon of using.
Even under the situation that portable telephone is lost, also can stop the phenomenon that portable telephone is illegally used.
Buying all of software undertaken by usual channel, stop illegally to use the phenomenon of software.
As long as portable telephone is inserted computer just can use a computer; Use for computer also is the same, no matter is in company or outside the company, and every people who has right can give and computed permission.
Be not limited to use a computer, use any computer can utilization to obtain the software of personal permit anywhere, consequently: use more convenient, and because do not need personal computer, personal disk, so can the implementation space and effective utilization of assets.
Comprise following item as embodiments of the invention.
The enforcement of software is to be undertaken by being stored in memory in the portable telephone or the software on the memory in the personal computer.
If there is not the software licensing card, in order to buy the software that needs, by after the authentication of accepting certificate server the method on the memory of the software download that needs in the portable telephone, perhaps accept after the authentication of certificate server software is bought, implemented to method on the memory of the software download that needs in the personal computer.
When personal computer is taken portable telephone, eliminate the software that downloading in the personal computer memory.
When passing through local area network, during the software on having the personal computer of other rights of using, finding to be hopeful to use, by the portable telephone with individual identification function is installed on the computer, utilize the permission situation of the recognition function judgement software of portable telephone, on personal computer, implement software with the software of wishing use.
Software is upgraded and when buying software, hang up for the certificate server that has software with portable telephone, accept authentication, by upgrading and buying processing, utilize standby time or fix time in to the software on the portable telephone memory automatically implement the upgrading or append.
Reading to deposit to the information data of local area network from the personal computer is that portable telephone by being installed on the personal computer carries out.
Use music data or view data as implementing to use software.
Can use PHS as portable phone.
Following simple declaration accompanying drawing:
Fig. 1 has outside drawing PID personal identification device, portable telephone used in the present invention;
Fig. 2 is the flow chart of the expression personal authentication course of work;
Fig. 3 is the figure that expression is installed to portable telephone the state on the personal computer;
Fig. 4 is the flow chart that is illustrated in the certification work that carries out between personal computer and the portable telephone;
Fig. 5 is the key diagram when entrusting certificate server to authenticate by portable telephone;
Fig. 6 is that expression utilizes certificate server to carry out the flow chart of certification work;
Fig. 7 is the key diagram of expression when using other personal computer to start software;
Fig. 8 is after expression is accepted ID authentication with certificate server, the key diagram when carrying out work such as software is bought, upgrading.
Embodiment
Embodiments of the invention are described with reference to the accompanying drawings.
With reference to Fig. 1 as can be known, portable telephone 1 has PID personal identification device 1a (sound authentication, nethike embrane authentication, cipher authentication and finger print identifying).
Below, utilize Fig. 2 that personal authentication's work of portable telephone 1 is described.In step 11, utilize 1 couple of individual of portable telephone (AShi) to begin to authenticate.If any one recognition device with step 12~15 can be discerned AShi, then AShi can use portable telephone 1 in step 16.If can not discern then enter step 17, under the situation of losing portable telephone 1, other people can not illegally utilize this portable telephone 1 again.
With reference to Fig. 3 as can be known,, have the portable telephone 1 of recognition function, do not select personal computer 2 just can utilize to wish the software that utilizes by use for the reasonable use of software.The software that obtains licence itself is stored in the built-in memory in advance, perhaps the software licensing card is hidden in the memory that stores in the portable telephone 1.By in the portable telephone socket of the desktop PC's 2 of portable telephone 1 insertion beamhouse operation special setting, between computer 2 and portable telephone 1, authenticate, the software that allows to use all is in the state that can use.
Utilize the flow chart of Fig. 4 that this course of work is described.In step 21, portable telephone 1 is inserted the portable telephone socket of personal computer 2.Then, whether the machine master who confirms this portable telephone 1 in step 22 has the right of using personal computer 2 (for example, whether have administrative power or whether have only as user's right etc.).If the right as the user is identified, in step 23, when having the software licensing card in the memory in the portable telephone 1, just can use the memory of personal computer 2 and the software on the hard disk.When having software itself in the memory in portable telephone 1, the portable telephone 1 interior software of can enough personal computers 2 directly read is had a guide look of, so just can be by start, utilize software by mouse button.If there is not the right to use, then can not use personal computer 2 according to step 24.
After the clear and definite usage license of software, be not limited only to a personal computer, any computer anywhere can utilize the software that has obtained personal permit, consequently: use more convenient, and because do not need personal computer, personal disk, so can the implementation space and effective utilization of assets.
With reference to Fig. 5 as can be known, utilize portable telephone 1 this moment, do not deposit in or read to certificate server by the Internet (having diagram), authenticating (sound authentication, nethike embrane authentication, cipher authentication and finger print identifying) entrusts, after receiving the authentication end notification, on the memory or hard disk (HDD) of the software download that needs in the personal computer 2, make it to be in the state that can use.
Utilize the flow chart of Fig. 6 that this course of work is described.At first, the desktop computer according to the user is set in step 31.In step 32, judge whether software itself is arranged on the memory in the portable telephone 1.If have, in step 35, just utilize the software on portable telephone 1 memory.If no, just in step 33, judged whether the software licensing card.If have, just in step 36, judge whether the software that on personal computer 2, uses.If have, just in step 37, use software.If there is not the software licensing card, just in step 34, judge whether to buy the software of wishing use.When buying, just in step 39, accept the authentication of certificate server 3; Software repertoire is used in the hope that can utilize because can read on picture, so by selecting mode of payment and in step 40, clicking here with mouse button, the software download that needs is bought software to the memory of portable telephone 1 or on the hard disk of personal computer 2, just can in step 41, use software.And when not buying, just in step 42, can not use software.
When in hard disk, having downloaded software, take portable telephone 1, through after a while, the software in the hard disk will be eliminated.
In step 36, the software licensing card is arranged on the memory in portable telephone 1, under the non-existent situation of software itself, if the software of hopeless use on personal computer 2, then as shown in Figure 7, in step 38, by the local area network (LAN) of the Internet, if the software that is hopeful to use on the personal computer 2 with other rights of using just starts application software herein.
Under the situation of Fig. 7, be to choose from personal computer 2 information of carrying out that are inserted with portable telephone 1 by LAN, find out personal computer 2 ', start required software from personal computer 2 '.
As shown in Figure 8, upgrading and purchase about software, hang up for the certificate server 3 that has software from portable telephone 1, accept the ID authentication, by upgrading and buying processing, utilize standby time automatically or fix time to the software implementation on portable telephone 1 memory upgrading or append.
When the updating operation of software licensing in the portable telephone and software itself is also implemented to guard contract, as long as requirement is arranged, also can download and upgrade licensing and software itself at night by portable telephone 1.
When each software is granted upgrading, just can select whether will upgrade the memory in the portable telephone 1, if selected automatic renewal, then can make it to download in standby time or at the appointed time.
As other embodiment of the present invention,,, just can from the personal computer 2 that has the LAN function, save LAN card, LAN card etc. by using portable telephone about hardware; About utilizing software, also can use the music file that is called as music data, video recording data etc.As portable telephone, then can also use PHS (Personal Handyphone System).
Claims (18)
1. an authenticating method that uses portable telephone is characterized in that: utilize the recognition function of the portable telephone with individual identification function to differentiate the occupancy permit of personal computer with software.
2. authenticating method according to claim 1 is characterized in that: described individual identification function is the individual identification function that authenticates according to password.
3. authenticating method according to claim 1 is characterized in that: described individual identification function is the individual identification function that authenticates according to sound.
4. authenticating method according to claim 1 is characterized in that: described individual identification function is the individual identification function that authenticates according to nethike embrane.
5. authenticating method according to claim 1 is characterized in that: described individual identification function is the individual identification function that authenticates according to fingerprint.
6. according to any described authenticating method in the claim 1~5, it is characterized in that: the enforcement of described software is to be undertaken by the software that is stored on the memory in the described portable telephone.
7. according to any described authenticating method in the claim 1~5, it is characterized in that: the enforcement of described software is to be undertaken by the software that is stored on the memory in the described personal computer.
8. according to any described authenticating method in the claim 1~5, it is characterized in that: if there is not the software licensing card, just by after the authentication of accepting certificate server on the memory of the software download that needs in the portable telephone, buy and implement software.
9. according to any described authenticating method in the claim 1~5, it is characterized in that: if there is not the software licensing card, just by after the authentication of accepting certificate server on the memory of the software download that needs in the personal computer, buy and implement software.
10. authenticating method according to claim 9 is characterized in that: when portable telephone when personal computer is taken, eliminate the software that downloading in the personal computer memory.
11. according to any described authenticating method in the claim 1~5, it is characterized in that: when the software that is hopeful to use on the personal computer with other rights of using, by local area network, on the personal computer that has the software of wishing use, implement software.
12. according to any described authenticating method in the claim 1~5, it is characterized in that: when software being upgraded or buy software, hang up for the certificate server that has software with portable telephone, accept authentication, by upgrading and buying processing, utilize standby time or fix time in to the software on the portable telephone memory automatically implement the upgrading or append.
13. authenticating method according to claim 11 is characterized in that: reading to deposit to the information data of local area network from personal computer is that portable telephone by being installed on the personal computer carries out.
14. authenticating method according to claim 6 is characterized in that: use music data as executive software.
15. authenticating method according to claim 6 is characterized in that: use view data as executive software.
16. authenticating method according to claim 7 is characterized in that: use music data as executive software.
17. authenticating method according to claim 7 is characterized in that: use view data as executive software.
18. authenticating method according to claim 1 is characterized in that: described portable phone is PHS.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP087960/2000 | 2000-03-28 | ||
JP2000087960A JP2001273135A (en) | 2000-03-28 | 2000-03-28 | Method and device for individual authentication by using portable telephone |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1321036A true CN1321036A (en) | 2001-11-07 |
Family
ID=18603904
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 01110058 Pending CN1321036A (en) | 2000-03-28 | 2001-03-28 | Personal verifying method using portable phone |
Country Status (2)
Country | Link |
---|---|
JP (1) | JP2001273135A (en) |
CN (1) | CN1321036A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1322703C (en) * | 2005-05-16 | 2007-06-20 | 刘小鹏 | Self-determined authentication card with multiplayer ciphers, system, method and authentication telephone set |
CN100461915C (en) * | 2005-11-28 | 2009-02-11 | 中兴通讯股份有限公司 | Method for conducting secrete handling for PC broadside-on mobile terminal information |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003091509A (en) | 2001-09-17 | 2003-03-28 | Nec Corp | Personal authentication method for portable communication equipment and program describing the same |
AU2002359973A1 (en) * | 2001-12-07 | 2003-06-17 | Ntt Docomo, Inc. | Mobile communication terminal, application software initiating apparatus, application software initiating system, application software initiating method, and application software initiating program |
US7418255B2 (en) | 2002-02-21 | 2008-08-26 | Bloomberg Finance L.P. | Computer terminals biometrically enabled for network functions and voice communication |
DE20204651U1 (en) * | 2002-03-18 | 2003-08-07 | Harder, Wulf, Åmål | Device for protection against unauthorized use of software |
DE20206628U1 (en) * | 2002-04-22 | 2003-09-04 | Harder, Wulf, Åmål | Device for protection against unauthorized use of software |
JP4040424B2 (en) * | 2002-10-16 | 2008-01-30 | Kddi株式会社 | Software license management method, software license management system, and computer program |
KR20050091472A (en) * | 2004-03-12 | 2005-09-15 | 엘지전자 주식회사 | Call connection control method for mobile station |
JP2006053808A (en) * | 2004-08-13 | 2006-02-23 | Fuji Electric Holdings Co Ltd | Operator authentication management system |
WO2009131130A1 (en) * | 2008-04-23 | 2009-10-29 | 日本電気株式会社 | Information processing system, information processing device, mobile communication device, and method for managing user information used for them |
CN102946604B (en) * | 2012-11-07 | 2017-02-08 | 中兴通讯股份有限公司 | Method and device for version protection of mobile terminal |
-
2000
- 2000-03-28 JP JP2000087960A patent/JP2001273135A/en active Pending
-
2001
- 2001-03-28 CN CN 01110058 patent/CN1321036A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1322703C (en) * | 2005-05-16 | 2007-06-20 | 刘小鹏 | Self-determined authentication card with multiplayer ciphers, system, method and authentication telephone set |
CN100461915C (en) * | 2005-11-28 | 2009-02-11 | 中兴通讯股份有限公司 | Method for conducting secrete handling for PC broadside-on mobile terminal information |
Also Published As
Publication number | Publication date |
---|---|
JP2001273135A (en) | 2001-10-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101009126B1 (en) | Revocation of a certificate and exclusion of other principals in a digital rights managementdrm system based on a revocation list from a delegated revocation authority | |
US6857067B2 (en) | System and method for preventing unauthorized access to electronic data | |
US7900239B2 (en) | Controlling access to a resource by a program using a digital signature | |
EP1443381B1 (en) | System and method for secure software activation with volume licenses | |
US8813231B2 (en) | Secure system for allowing the execution of authorized computer program code | |
CN1992596A (en) | User authentication device and method | |
US20070150418A1 (en) | Software licensing using certificate issued by authorized authority | |
US20080235791A1 (en) | System and Method for Distributed Module Authentication | |
US20090178123A1 (en) | Trusted internet identity | |
US9047452B2 (en) | Multi-user BIOS authentication | |
JP2006501536A (en) | Copyright management system using legal expression language | |
JP2006164237A (en) | User authentication by combination of speaker reference and reverse turing test | |
GB2404536A (en) | Protection of data using software wrappers | |
EP1189128A3 (en) | Secure system and method for accessing files in computers using fingerprints | |
CN1321036A (en) | Personal verifying method using portable phone | |
US20100031372A1 (en) | Method and system for secure flexible software licensing | |
US7047409B1 (en) | Automated tracking of certificate pedigree | |
Reddy et al. | Application-centric security policies on unmodified Android | |
US7376977B2 (en) | Defense against virus attacks | |
CN112000933A (en) | Application software activation method and device, electronic equipment and storage medium | |
US20080282343A1 (en) | Digital Rights Management Using Biometric Data | |
US20030005320A1 (en) | Electronic security information management method and recording medium using an IC card | |
JP2007011795A (en) | User authentication system and its method | |
JP2001350534A (en) | Method and system for downloading charged software | |
JPH1125053A (en) | Certification security server dealing with ic card and dedicated application program interface(api) for certification processing of application program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |