WO2005086012A1 - 電子端末装置保護システム - Google Patents
電子端末装置保護システム Download PDFInfo
- Publication number
- WO2005086012A1 WO2005086012A1 PCT/JP2004/002941 JP2004002941W WO2005086012A1 WO 2005086012 A1 WO2005086012 A1 WO 2005086012A1 JP 2004002941 W JP2004002941 W JP 2004002941W WO 2005086012 A1 WO2005086012 A1 WO 2005086012A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- tally
- terminal device
- electronic
- authentication
- personal authentication
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/73—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
Definitions
- the present invention relates to a method for ensuring the security of a terminal device using authentication, and more particularly to an electronic terminal device protection system that can guarantee security even when using a terminal device borrowed from another person in a hot spot or the like.
- the present invention provides a wireless Internet connection system for shared use such as a hot spot, in which not only the contractor himself can easily use the terminal device, but also others authorized by the contractor can use the terminal device, It provides an electronic terminal device protection system that prevents stored application software and authentication information from leaking out.
- the electronic terminal device protection system of the present invention comprises a main computer of a communication center that provides application software and performs a predetermined service, and an electronic terminal device of a user connected to the main computer through a communication line to use the service.
- the system When the service is subscribed, the system registers the authentication ID and the hardware address of the terminal device used for use in the main computer of the communication center when subscribing to the service, and the main computer calculates the electronic tally of the authentication ID and the hardware address of the terminal device.
- the electronic tally information is downloaded to the electronic terminal device together with the application software, and the electronic terminal device uses the electronic tally and the authentication ID of the hardware address obtained based on the electronic tally information when using the service.
- the tally is sent to the master computer, and the master computer divides the received authentication ID and the stored authentication ID. And verifying the authenticity of the electronic terminal device to be connected by integrating and matching the received hardware address tally with the stored hardware address tally.
- the user registers an authentication ID and a unique hardware address of the terminal device used in the communication center when applying for the use of the service.
- the communication center actually refers to a computer system or a main computer provided in the communication center.
- the hard address includes a so-called media access control address MAC, but any other device that uniquely identifies a terminal device may be used.
- a unique ID such as a CPU ID and a board ID is provided for the electronic terminal device. Any suitable one can be used.
- the communication center converts the authentication ID into an electronic tally, embeds the half-tally in application software such as a browser provided by the communication center, downloads it to the terminal device, and prepares for use of the service. It goes without saying that the authentication information such as the tally may not be embedded in the application software but may be attached separately.
- the electronic tally refers to a division of electronic information into two or more by a special electronic tally method, as disclosed by the present applicant in ⁇ / ⁇ ⁇ 99 / 0135500. This means that the original electronic information cannot be restored unless all electronic tallies are assembled and integrated.
- the electronic tally method divides the original data into many elements, combines elements based on random numbers, and rearranges elements belonging to the same group based on random numbers to create several electronic tallies. Each tally is sent or stored on a different route, electronic tally is collected when necessary, and the original information is restored and used by rearranging the elements in reverse order. It has a high degree of safety according to the law. '
- the security can be further improved by using a compression encoding means or adding random number data in the code word.
- the terminal device requests the service of the communication center, for example, when connecting to the wireless Internet
- the electronic tally in the application software is sent to the communication center, and the communication center checks the validity of the authentication ID. I do.
- the communication center converts the stored hardware address into an electronic tally, and transmits tally information describing the tallying method to the terminal device.
- the terminal device electronically tallies its own hardware address based on the received tally information and sends the specified half to the communication center.
- the communication center can verify the authenticity of the terminal device to be connected by checking whether the correct hard-wired address can be restored by merging with the one-piece stored and stored.
- the communication center If the inspection passes, the communication center generates a new electronic tally for the certified ID, downloads the one-half, and rewrites the application software to prepare for the next connection.
- a legitimate terminal device can be used by mechanically connecting to a wireless Internet connection point without performing complicated user authentication.
- this system is highly secure because authentication information and hardware addresses are not released into the Internet communication network except during registration.
- the application software copied to another terminal device has a different hardware address, by checking the hardware address so that it does not run if it is incorrect, illegal software can be used. Elimination of usage—Software can be protected.
- the tally information of the personal authentication is attached to the application software, and the main computer of the communication center stores the tally of the personal authentication information of the authorized person.
- the electronic terminal device After the notification from the authorized person, the electronic terminal device displays a request for the tally of the personal authentication when the service request is received from the electronic terminal device, and the electronic terminal device uses the tally information of the personal authentication to display the tally of the personal authentication. May be generated and sent to the main computing device, and the reception of the service use may be determined by comparing with the tally of the personal authentication stored in the main computing device.
- the application software attaches tally information for personal authentication
- the main computing device stores the tally of the authenticated person
- the electronic terminal device requests service use.
- a message is displayed
- a message prompting for personal authentication is displayed
- the personal authentication entered on the electronic terminal device is converted into an electronic tally
- the tally of the personal authentication is sent to the main computer together with the personal authentication information.
- the authentication may be integrated with the stored tally of the authenticated user to restore the authenticated user and collated with the transmitted authentication information to determine the acceptance of the use of the service.
- the electronic terminal device protection system of the present invention when the terminal device is stolen or when the application software and the authentication information in the terminal device are stolen, the password is requested and registered in advance. By checking against the password of the authorized person, unauthorized use can be prevented. Requiring the user to always enter a password when connecting a terminal device would reduce the convenience of the wireless Internet connection and could prevent users from receiving support. It is preferable to request a password for the first time when an offer is made.
- the complete password is stored in the communication center, there is a danger that the important password will be leaked when the communication center is attacked. Therefore, once the password has been registered, the information is converted into an electronic tally, leaving only one half in the communication center, and information on the tallying procedure is embedded in the application software and stored in the user's terminal device. You may send it and keep it.
- the user inputs the password to the terminal device, the terminal device divides the entered password into a tally according to a specified procedure, and sends a portion corresponding to the tally stored in the communication center to the communication center.
- the communication center authenticates the password based on the tally sent. Verification of authenticity can be performed by checking whether the same tally as the one left at the communication center has been sent, or by checking whether the remaining tally can be restored to a complete password.
- User authentication can use not only passwords but also biological features such as fingerprint matching and voiceprint matching.
- Inquiry methods using these electronic tally methods are safe with little risk of passwords leaking to the outside.
- connection can be made very easily, and in the event that the device is stolen or lost, it is set so that it cannot be used by anyone other than the authorized person to prevent unauthorized use. Can be prevented.
- FIG. 1 is a block diagram illustrating the configuration of a terminal device protection system according to one embodiment of the present invention
- FIG. 2 is a flowchart illustrating the procedure of the terminal device protection system according to this embodiment
- FIG. It is a flowchart explaining the procedure of an addition process.
- the terminal device protection system of this embodiment protects the terminal device 2 when the terminal device 2 owned by the user 1 is connected to the communication center 4 via the wireless communication network 3.
- the wireless communication network 3 includes a joint use type wireless Internet connection point such as a so-called hot spot.
- the terminal device protection system does not require complicated procedures such as user authentication, and the user 1 can connect to the communication center 4 simply by accessing from the terminal device 2. it can. Especially in hotspots When the device 2 enters the service area, it is automatically connected in the middle.
- the terminal device 2 when the terminal device 2 is lent to another person with the approval of the authorized authority, the terminal device 2 can be connected to the communication center 4 when operated by the borrower in the same manner as when operated by the authorized authority. .
- the system according to the present embodiment is an application that is distributed by the communication center 4 to the terminal device 2.
- the electronic tally information is incorporated into the gram 21 and the terminal device 2 accesses the communication center 4 from the terminal device 2.
- the use of electronic tallying technology provides double or triple information protection.
- FIG. 2 shows an example of a procedure to be taken for protection, which is divided into a procedure performed by the terminal device 2 and a procedure performed by the communication center 4.
- the identification ID of the person receiving the service and the hard address unique to the terminal device 2 receiving the service are sent to the communication center 4.
- An MA C address which is often used as a hard address, can be used, but a device number unique to an essential component of a terminal device such as a CPU or a mother board may be used.
- the MAC address is typically used as the hard address.
- the hardware address is configured to be automatically read and transmitted.
- the identification ID may be set by the communication center 4. The transmission of such information may be performed at an appropriate timing during the registration procedure. You may fill out an application form with a fixed format and send it along with other necessary information, or you may have the registration approved before sending.
- the communication center 4 Upon receiving the service use application, the communication center 4 registers as a user unless otherwise specified, and records the identification ID and the MAC address in the client identification information database 41 (S21).
- the application software required to enjoy the service is Select from distribution database 4 2 and distribute to terminal 2.
- the application software resides in the terminal device 2 and controls the enjoyment of the service.
- the application software connects the terminal device to the wireless LAN at a hot spot, and a browser that enables browsing of a predetermined web. It may be a program or the like.
- the identification ID and MAC address information are embedded in the application software for use in user verification when using the service (S22).
- the first type of information to be embedded in application software is a half-tally ID, which is an electronic tally of the identification ID.
- the identification ID is compressed and encoded by the electronic tally method, divided into a number of elements, separated into two groups, one for the communication center 4 and the other for the terminal device 2, and rearranged in each case based on random numbers. An arbitrary length random number is added and compression-encoded, and one tally ID is incorporated into the application software and passed to the terminal device 2.
- the information of the other tally ID and the electronic tallying procedure is stored in the client identification information database 41 of the communication center 4.
- the second type of information to be embedded in application software is tally information of hardware addresses.
- the communication center 4 electronically tallies the MAC address of the terminal 2 and records one of the tallies, and embeds the electronic tallying procedure information in the application software and sends it to the terminal 2.
- the terminal device 2 stores the application software 21 distributed from the communication center 4 and prepares for use of the service (S12).
- User 1 connects terminal 2 to wireless LAN 3 to receive service using terminal 2.
- the terminal device 2 makes an access request
- the tally ID included in the application software 21 is transmitted to the communication center 4 (S13).
- the communication center 4 can verify that the user 1 has the right to enjoy the service by confirming that the identification ID can be restored by integrating with the other tally ID stored in the communication center 4 (S23) ).
- the validity of the connected terminal device 2 is verified by determining whether or not the MAC address is the same as the registered one. For this reason, the communication center 4 Electronically tally the stored MAC address and store one tally MAC address. Then, the tally information describing the electronic tally processing procedure is sent to the terminal device 2 (S24).
- the MAC address is tallyed at the time of registration, and a fixed electronic tally processing procedure built into the application software 21 from the beginning is used. You may use it.
- the terminal device 2 performs electronic tally processing on its own MAC address based on the received tally information, and sends the generated tally MAC address to the communication center 4 (S14). If the terminal device 2 was originally registered, the tally of the MAC address sent from the terminal device 2 must be the same as the tally generated by the communication center 4. For example, even if an attempt is made to port the application software 21 to another terminal device and use it, since the MAC address of the terminal device is different and the tally is different, the tally of the terminal device 2 is obtained by simply comparing the tallies. The validity can be verified (S25). Note that the tally processing in the terminal device 2 generates a part that complements the tally stored in the communication center 4, and the communication center 4 can restore the original MAC address by integrating and restoring the two tallies. It may also be determined whether or not.
- the communication center 4 permits the connection of the terminal device 2 and uses a so-called one-time ID, and uses the identification ID recorded for the next access.
- the electronic tally processing is performed again, and the generated tally ID is sent to the terminal device 2 (S26).
- the terminal device 2 writes and stores the received tally ID in a predetermined position of the stored application software 21 (S15). .
- the body of the authentication information is not exposed in the communication path when using the service, so that there is no fear that the authentication information is stolen during the communication.
- the moving terminal device 2 enters a new hot spot, the tally ID is almost automatically transmitted and connected, so that the communication can be maintained.
- an electronic terminal device protection system can be constructed using only one of the MAC address and identification ID.
- the password is sent to the communication center 4 (S41).
- the password is electronically tallyed, the tally and the tally information are stored in the database 41, and the tally information is incorporated in the application software and transmitted to the terminal device 2 (S42). Discard the password itself without storing it.
- the terminal device 2 stores application software 21 including password tally information (S32).
- the communication center 4 authenticates itself with various authentication information such as a password provided by the authorized person 1 and accepts a request for preventing unauthorized use. (S43).
- the communication center 4 requests a password from the accessing person (S44).
- the terminal device 2 converts the password into an electronic tally based on the passcode tally information incorporated in the application software 21 and converts the tally and the password itself. It is sent to the communication center 4 (S35).
- Communication Center 4 integrates the received tally with the tally stored by itself and passes Restore the password and verify whether the received password is the same as the restored password. If they are not the same, the access is not that of the authorized person, so the connection is rejected (S45). If the two match, it can be seen that the authorized person 1 is using the terminal device 2, so normal use is permitted.
- the password itself will be discarded after use. This is because it is preferable to prevent leakage of authentication information even when the communication center 4 is attacked.
- the protection of the personal authentication information can be further enhanced.
- the communication center 4 sends the electronic tally information to the terminal device 2 and converts the personal authentication entered by the authorized person 1 into an electronic tally based on the tally information embedded in the application software 21.
- One tally is sent to communication center 14 for storage.
- terminal device 2 When access is made from terminal device 2 after notification from legitimate authority 1, password is requested, but terminal device 2 sends to communication center 4 the password entered by the user based on the same tally information. Only the tally generated by If this tally is collated with the stored tally, if it is the same, it is understood that the tally is the same.
- the password itself is not exposed in the communication path, and does not exist in the communication center 14, so that there is no fear that the authentication information is leaked, and the method is safe.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/592,086 US20070192606A1 (en) | 2004-03-08 | 2004-03-08 | Electronic terminal device protection system |
JP2006510591A JP4564957B2 (ja) | 2004-03-08 | 2004-03-08 | 電子端末装置保護システム |
PCT/JP2004/002941 WO2005086012A1 (ja) | 2004-03-08 | 2004-03-08 | 電子端末装置保護システム |
EP04718408A EP1724691A1 (en) | 2004-03-08 | 2004-03-08 | Electronic terminal device protection system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2004/002941 WO2005086012A1 (ja) | 2004-03-08 | 2004-03-08 | 電子端末装置保護システム |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005086012A1 true WO2005086012A1 (ja) | 2005-09-15 |
Family
ID=34917843
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2004/002941 WO2005086012A1 (ja) | 2004-03-08 | 2004-03-08 | 電子端末装置保護システム |
Country Status (4)
Country | Link |
---|---|
US (1) | US20070192606A1 (ja) |
EP (1) | EP1724691A1 (ja) |
JP (1) | JP4564957B2 (ja) |
WO (1) | WO2005086012A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007127120A2 (en) | 2006-04-24 | 2007-11-08 | Ruckus Wireless, Inc. | Dynamic authentication in secured wireless networks |
JP2008225831A (ja) * | 2007-03-13 | 2008-09-25 | Hitachi Information & Control Solutions Ltd | シンクライアントシステム、これに用いるサーバ、クライアント端末、セキュリティカード並びにデータ通信方法 |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060057960A1 (en) * | 2004-09-10 | 2006-03-16 | Tran Bao Q | Systems and methods for remote data storage |
GB2428317A (en) * | 2005-07-13 | 2007-01-24 | Hewlett Packard Development Co | Data collation system |
US20080220880A1 (en) * | 2005-09-07 | 2008-09-11 | Bally Gaming, Inc. | Trusted Cabinet Identification System |
CN101322346A (zh) | 2005-12-01 | 2008-12-10 | 鲁库斯无线公司 | 借助于无线基站虚拟化的按需服务 |
US9071583B2 (en) | 2006-04-24 | 2015-06-30 | Ruckus Wireless, Inc. | Provisioned configuration for automatic wireless connection |
US9769655B2 (en) | 2006-04-24 | 2017-09-19 | Ruckus Wireless, Inc. | Sharing security keys with headless devices |
WO2012151224A2 (en) | 2011-05-01 | 2012-11-08 | Ruckus Wireless, Inc. | Remote cable access point reset |
US8756668B2 (en) | 2012-02-09 | 2014-06-17 | Ruckus Wireless, Inc. | Dynamic PSK for hotspots |
US9092610B2 (en) | 2012-04-04 | 2015-07-28 | Ruckus Wireless, Inc. | Key assignment for a brand |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002312317A (ja) * | 2001-04-11 | 2002-10-25 | Casio Comput Co Ltd | 認証システムおよび認証方法 |
JP2002333927A (ja) * | 2001-05-08 | 2002-11-22 | Sony Corp | データ配付方法、データ配付方法のプログラム、データ処理方法及び記録媒体 |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001331450A (ja) * | 2000-05-24 | 2001-11-30 | Toppan Printing Co Ltd | 認証システムおよびその方法、サービス提供システムおよびその方法 |
KR20010008101A (ko) * | 2000-11-08 | 2001-02-05 | 제경성 | 하드웨어의 고유번호를 이용한 전자거래 시스템 및 그 방법 |
FI115098B (fi) * | 2000-12-27 | 2005-02-28 | Nokia Corp | Todentaminen dataviestinnässä |
EP1393457A4 (en) * | 2001-05-07 | 2005-01-05 | John F King | MODEM FUNCTION AND USE OF A PERSONAL DIGITAL ASSISTANT IN WIRELESS MODE |
US7580972B2 (en) * | 2001-12-12 | 2009-08-25 | Valve Corporation | Method and system for controlling bandwidth on client and server |
JP3870081B2 (ja) * | 2001-12-19 | 2007-01-17 | キヤノン株式会社 | 通信システム及びサーバ装置、ならびに制御方法及びそれを実施するためのコンピュータプログラム、該コンピュータプログラムを格納する記憶媒体 |
JP2004070560A (ja) * | 2002-08-05 | 2004-03-04 | Bank Of Tokyo-Mitsubishi Ltd | ライセンス管理装置及びプログラム |
US7895443B2 (en) * | 2002-11-05 | 2011-02-22 | Safenet, Inc. | Secure authentication using hardware token and computer fingerprint |
US7188245B2 (en) * | 2002-12-09 | 2007-03-06 | Kabushiki Kaisha Toshiba | Contents transmission/reception scheme with function for limiting recipients |
JP2004234632A (ja) * | 2003-01-06 | 2004-08-19 | Sony Corp | 認証システム、認証サーバ、認証方法、認証プログラム、端末、認証要求方法、認証要求プログラム、及び記憶媒体 |
US20040236939A1 (en) * | 2003-02-20 | 2004-11-25 | Docomo Communications Laboratories Usa, Inc. | Wireless network handoff key |
JP2005110112A (ja) * | 2003-10-01 | 2005-04-21 | Nec Corp | 通信システムにおける無線通信装置の認証方法及び無線通信装置及び基地局及び認証装置。 |
-
2004
- 2004-03-08 JP JP2006510591A patent/JP4564957B2/ja not_active Expired - Fee Related
- 2004-03-08 WO PCT/JP2004/002941 patent/WO2005086012A1/ja active Application Filing
- 2004-03-08 US US10/592,086 patent/US20070192606A1/en not_active Abandoned
- 2004-03-08 EP EP04718408A patent/EP1724691A1/en not_active Withdrawn
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002312317A (ja) * | 2001-04-11 | 2002-10-25 | Casio Comput Co Ltd | 認証システムおよび認証方法 |
JP2002333927A (ja) * | 2001-05-08 | 2002-11-22 | Sony Corp | データ配付方法、データ配付方法のプログラム、データ処理方法及び記録媒体 |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007127120A2 (en) | 2006-04-24 | 2007-11-08 | Ruckus Wireless, Inc. | Dynamic authentication in secured wireless networks |
EP2013758A4 (en) * | 2006-04-24 | 2012-01-25 | Ruckus Wireless Inc | DYNAMIC AUTHENTICATION IN SECURE WIRELESS NETWORKS |
CN103441984B (zh) * | 2006-04-24 | 2017-09-05 | 鲁库斯无线公司 | 安全无线网络中的动态认证 |
JP2008225831A (ja) * | 2007-03-13 | 2008-09-25 | Hitachi Information & Control Solutions Ltd | シンクライアントシステム、これに用いるサーバ、クライアント端末、セキュリティカード並びにデータ通信方法 |
Also Published As
Publication number | Publication date |
---|---|
EP1724691A1 (en) | 2006-11-22 |
JP4564957B2 (ja) | 2010-10-20 |
US20070192606A1 (en) | 2007-08-16 |
JPWO2005086012A1 (ja) | 2008-01-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2115993B1 (en) | Method for generating digital fingerprint | |
US8490169B2 (en) | Server-token lockstep systems and methods | |
CN110990827A (zh) | 一种身份信息验证方法、服务器及存储介质 | |
US20080189772A1 (en) | Method for generating digital fingerprint using pseudo random number code | |
JP2003534589A (ja) | 認証システム及び方法 | |
WO2007094165A1 (ja) | 本人確認システムおよびプログラム、並びに、本人確認方法 | |
JP2005050308A (ja) | 個人認証デバイスとこのシステムおよび方法 | |
EP1886204B1 (en) | Transaction method and verification method | |
JP2004178408A (ja) | 個人認証端末、個人認証方法及びコンピュータプログラム | |
JP4564957B2 (ja) | 電子端末装置保護システム | |
KR101066693B1 (ko) | 전자 인증서의 보안 및 확인 방법 | |
CN117216740A (zh) | 一种基于区块链技术的数字身份认证方法 | |
US20030037239A1 (en) | Method and apparatus to mutually authentication software modules | |
JPH10260939A (ja) | コンピュータネットワークのクライアントマシン認証方法,クライアントマシン,ホストマシン及びコンピュータシステム | |
JP4303952B2 (ja) | 多重認証システム、コンピュータプログラムおよび多重認証方法 | |
JP2005011239A (ja) | チケット授受システム、チケット確認装置、及びチケット授受方法 | |
US20100058453A1 (en) | Identification process of application of data storage and identification hardware with ic card | |
JP2005115583A (ja) | ユーザ認証システム | |
KR20230089520A (ko) | 블록체인을 이용한 액세스 토큰 관리 시스템 및 방법 | |
JP2006126891A (ja) | 生体情報登録方法、生体情報を利用する情報提供システム、端末及びサーバ | |
JP2018022941A (ja) | 管理システム、管理サーバ及び管理プログラム | |
EP1689120B1 (en) | An authentication method for information storing application | |
JP2007258789A (ja) | エージェント認証システム、エージェント認証方法、及びエージェント認証プログラム | |
JP2005018421A (ja) | 管理装置及びサービス提供装置及び通信システム | |
JP2020005064A (ja) | 利用者権限認証システム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 10592086 Country of ref document: US Ref document number: 2004718408 Country of ref document: EP Ref document number: 2007192606 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 2004718408 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006510591 Country of ref document: JP |
|
WWP | Wipo information: published in national office |
Ref document number: 10592086 Country of ref document: US |