WO2009157482A1 - Terminal de communication, dispositif de génération d’informations d’authentification, système d’authentification, programme de génération d’informations d’authentification, procédé de génération d’informations d’authentification et procédé d’authentification - Google Patents

Terminal de communication, dispositif de génération d’informations d’authentification, système d’authentification, programme de génération d’informations d’authentification, procédé de génération d’informations d’authentification et procédé d’authentification Download PDF

Info

Publication number
WO2009157482A1
WO2009157482A1 PCT/JP2009/061513 JP2009061513W WO2009157482A1 WO 2009157482 A1 WO2009157482 A1 WO 2009157482A1 JP 2009061513 W JP2009061513 W JP 2009061513W WO 2009157482 A1 WO2009157482 A1 WO 2009157482A1
Authority
WO
WIPO (PCT)
Prior art keywords
server
authentication information
authentication
predetermined
information
Prior art date
Application number
PCT/JP2009/061513
Other languages
English (en)
Japanese (ja)
Inventor
剛 越智
譲 富樫
幸雄 永渕
俊仁 波多野
Original Assignee
エヌ・ティ・ティ・コミュニケーションズ株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by エヌ・ティ・ティ・コミュニケーションズ株式会社 filed Critical エヌ・ティ・ティ・コミュニケーションズ株式会社
Publication of WO2009157482A1 publication Critical patent/WO2009157482A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Definitions

  • the present invention relates to a communication device that accesses a plurality of servers, an authentication information generation device that generates authentication information of a plurality of servers, an authentication system, an authentication information generation program executed by a communication terminal, an authentication information generation method, and an authentication method.
  • Non-Patent Document 1 In order to realize an integrated communication service that can be used from a communication terminal such as a PC (Personal Computer), it is necessary to integrate multiple systems and provide them as a single user interface. When such a plurality of systems are integrated, there is a single sign-on that allows access to all systems by logging in once. Single sign-on is described in Non-Patent Document 1, for example.
  • Single sign-on requires an ID / password management system that centrally manages user IDs and passwords for a plurality of systems. Each time a new user is added, data is registered in the ID / password management system. Work occurs. Each time the service provided to the user is expanded (a new system is added), various data setting operations are generated for the ID / password management system.
  • the data registration / setting work for such ID / password management system has a large work load especially when a different management / operation process is performed for each system, and also affects the operation cost.
  • the present invention has been made in view of the above circumstances, and an object of the present invention is to provide an authentication technology that can access a plurality of servers without complicating a user's login operation and suppresses the operational load and operational cost of the system. Is to provide.
  • the present invention provides a communication terminal that accesses a plurality of servers, the plurality of servers including a predetermined server and at least one other server, to the predetermined server.
  • An authentication request unit that performs an authentication request to the other server, and a generation unit that generates authentication information for the other server, wherein the authentication request unit is a predetermined server input by a user
  • the authentication information for the server is transmitted to the predetermined server as an authentication request, and the authentication information for the other server generated by the generation unit is transmitted to the other server as an authentication request.
  • the authentication information for the other server is generated based on the authentication information and the identification information of the other server.
  • the present invention is an authentication information generation device that generates authentication information of at least one other server other than the predetermined server, and an acquisition unit that acquires authentication information for the predetermined server from the predetermined server;
  • a generating unit configured to generate authentication information for the other server based on the acquired authentication information for the predetermined server and the identification information of the other server, and transmit the generated authentication information to the other server;
  • the present invention is an authentication system having a communication terminal that accesses a plurality of servers and an authentication information generation device that generates authentication information.
  • the plurality of servers include a predetermined server and at least one other
  • the authentication information generating device includes: an acquisition unit that acquires authentication information for the predetermined server from the predetermined server; the acquired authentication information for the predetermined server; and identification information of another server; A first generation unit that generates authentication information for another server and transmits the generated authentication information to the other server, and the communication terminal includes an authentication request to the predetermined server, and An authentication request unit that makes an authentication request to the other server, and a second generation unit that generates authentication information for the other server, the authentication request unit for a predetermined server input by a user Authenticate information
  • the authentication information for the other server generated by the generation unit is transmitted to the other server as an authentication request, and the second generation unit transmits the authentication information for the predetermined server. And authentication information for the other server is generated based on the identification information of the other server.
  • the present invention is also an authentication information generation program executed by a communication terminal that accesses a plurality of servers, wherein the plurality of servers include a predetermined server and at least one other server, and the communication terminal includes Based on the first authentication requesting step of transmitting the authentication information for the predetermined server input by the user as an authentication request to the predetermined server, the authentication information for the predetermined server, and the identification information of the other server A second generation step for generating authentication information for another server; a second authentication request step for transmitting the authentication information for another server generated in the second generation step to the other server as an authentication request; Is executed.
  • the present invention is an authentication information generation method for generating authentication information of at least one other server other than the predetermined server, which is performed by the authentication information generation apparatus, wherein the authentication information for the predetermined server is transmitted from the predetermined server. Generating the authentication information for the other server based on the acquired authentication information for the predetermined server and the identification information of the other server, and generating the generated authentication information to the other server Steps.
  • the present invention is an authentication method performed by an authentication system including a communication terminal that accesses a plurality of servers and an authentication information generation device that generates authentication information
  • the plurality of servers include a predetermined server, Including at least one other server, wherein the authentication information generating device acquires an authentication information for the predetermined server from the predetermined server, the acquired authentication information for the predetermined server, and another server A first generation step of generating authentication information for another server based on the identification information and transmitting the generated authentication information to the other server, wherein the communication terminal has a predetermined input by the user Based on the first authentication request step for transmitting the authentication information for the server as an authentication request to the predetermined server, the authentication information for the predetermined server, and the identification information of the other server, A second generation step of generating authentication information for the server, and a second authentication request step of transmitting the authentication information for the other server generated in the second generation step to the other server as an authentication request.
  • the present invention it is possible to access a plurality of servers without complicating a user's login operation, and it is possible to reduce the system operation load and operation cost.
  • FIG. 1 is a diagram illustrating an overall configuration of an authentication system to which an embodiment of the present invention is applied. It is a sequence diagram which shows the whole process of this embodiment. It is a figure which shows typically the pre-processing of an authentication information generation apparatus. It is a flowchart of the login process of a communication terminal.
  • FIG. 1 is an overall configuration diagram of an authentication system to which an embodiment of the present invention is applied.
  • the authentication system of this embodiment includes a communication terminal 1, an authentication information generation device 2, and a plurality of servers 3, 4, 5.
  • the plurality of servers 3, 4, and 5 are Web servers, for example, and provide various services to the communication terminal 1.
  • the plurality of servers 3, 4, 5 of the present embodiment includes a predetermined server 3 and at least one other server 4, 5 other than the predetermined server 3.
  • the other servers 4 and 5 are servers that cooperate with the predetermined server 3 only in an authentication process to be described later. However, functionally (for example, a service provided to the communication terminal 1) does not necessarily cooperate with the predetermined server 3. There is no need.
  • the predetermined server 3 is referred to as “main server A”, and the other servers 4 and 5 are referred to as “cooperation servers”.
  • the communication terminal 1 logs in (accesses) a plurality of servers 3, 4, 5 via a network 9 such as the Internet. It is assumed that the communication terminal 1 can log in (access) the cooperation server B4 and the cooperation server C5 after the login to the main server A3 is completed.
  • the illustrated communication terminal 1 generates an authentication request unit 11 that makes an authentication request to the main server A3 and the cooperation servers 4 and 5 and generates authentication information (for example, a user ID and a password) for the cooperation servers 4 and 5.
  • a storage unit 13 for storing status information and index values.
  • the authentication information generation device 2 generates authentication information of the cooperation servers 4 and 5.
  • the authentication information generation device 2 shown in the figure includes an acquisition unit 21 that acquires (receives) authentication information for the main server A3 from the main server A3 via the network 9, and a cooperation server based on the acquired authentication information for the main server A3. It has the production
  • the communication terminal 1 and the authentication information generation device 2 described above can use a general-purpose computer system including at least a CPU, a memory, and a communication control device for connecting to a network.
  • a general-purpose computer system including at least a CPU, a memory, and a communication control device for connecting to a network.
  • each function of each device is realized by the CPU executing a predetermined program loaded on the memory.
  • the functions of the communication terminal 1 and the authentication information generation device 2 are the CPU of the communication terminal 1 in the case of the program for the communication terminal 1, and the authentication information generation device 2 in the case of the program for the authentication information generation device 2. This is implemented by each CPU.
  • Each device includes an input device, an output device, and an external storage device as necessary.
  • FIG. 2 is a sequence diagram showing the overall processing of this embodiment.
  • the acquisition unit 21 of the authentication information generation device 2 acquires authentication information (ID: A, PWD: A) for the main server A from the main server A as a pre-process (S11). And the production
  • the generation unit 22 when the authentication information for the main server A for a plurality of users is acquired, the generation unit 22 generates the authentication information for the cooperation servers B and C for a plurality of users (S12, S14). It transmits to cooperation server B and C (S13, S15).
  • the linkage server B and the linkage server C store the authentication information received from the authentication information generation device 2 in storage devices (not shown) provided in the linkage server B and the linkage server C, respectively. Then, the authentication information generation apparatus 2 notifies the user of the communication terminal 1 of the authentication information for the main server A for the user by a predetermined method (for example, mailing, online via the network 9). (S16).
  • the user of the communication terminal 1 inputs the notified authentication information for the main server A to the communication terminal 1 and performs a login operation on the main server A.
  • the user previously downloads a communication terminal authentication program (such as a launcher) for accessing the main server A and the linked servers B and C via the network 9 from a predetermined server (for example, the authentication information generating device 2). And installed in the communication terminal 1. Thereby, the functions 11 to 13 (see FIG. 1) of the communication terminal 1 are realized.
  • a communication terminal authentication program such as a launcher
  • the authentication request unit 11 of the communication terminal 1 accepts the login operation (S17), and the main server A receives the authentication information (ID: A, PWD: A) for the main server A input by the login operation via the network 9. (S18).
  • the main server A authenticates whether or not the received authentication information is valid authentication information (S19). Specifically, if the main server A matches the authentication information output to the authentication information generation device 2 in S11, the main server A determines that the authentication information is valid and permits login. Then, the main server A transmits the authentication result to the communication terminal 1 (S20). In the case of authentication OK (success), the login process is completed, and the communication terminal 1 can use the service provided by the main server A. On the other hand, in the case of authentication NG (failure), an error message or the like is displayed on the communication terminal 1.
  • the user After the login to the main server A is completed, the user inputs a login operation (access request) to the cooperation server B into the communication terminal 1.
  • the authentication request unit 11 of the communication terminal 1 accepts a login operation to the cooperation server B (S21)
  • the generation unit 22 uses the authentication information for the main server A input in S17.
  • Authentication information ID: B, PWD: B
  • the communication terminal 1 transmits the produced
  • the cooperation server B authenticates whether or not the received authentication information is valid authentication information (S24). Specifically, when the cooperation server B matches the authentication information received from the authentication information generation apparatus 2 in S13, the cooperation server B determines that the authentication information is valid and permits login. And the cooperation server B transmits an authentication result to the communication terminal 1 (S25). In the case of authentication OK (success), the login process is completed, and the communication terminal 1 can use the service provided by the cooperation server B. On the other hand, in the case of authentication NG (failure), an error message or the like is displayed on the communication terminal 1.
  • the user inputs a login operation (access request) to the cooperation server C to the communication terminal 1.
  • the authentication request unit 11 of the communication terminal 1 accepts a login operation to the cooperation server C (S26)
  • the generation unit 22 uses the authentication information for the main server A input in S17.
  • Authentication information ID: C, PWD: C
  • the communication terminal 1 transmits the produced
  • the cooperation server C authenticates whether or not the received authentication information is valid authentication information (S29). Specifically, when the server C matches the authentication information received from the authentication information generation device 2 in S15, the cooperation server C determines that the authentication information is valid and permits login. And the cooperation server C transmits an authentication result to the communication terminal 1 (S30). In the case of authentication OK (success), the login process is completed, and the communication terminal 1 can use the service provided by the cooperation server C. On the other hand, in the case of authentication NG (failure), an error message or the like is displayed on the communication terminal 1.
  • FIG. 3 is a diagram schematically showing the processing of the authentication information generating apparatus 2.
  • the acquisition unit 21 of the authentication information generation device 2 sends authentication information (ID: A # 1, PWD: A # 1) for the main server A for the communication terminal 1 (user # 1) from the main server A3 to the network. 9 or the like (S41).
  • generation part 22 produces
  • the index value (I) for example, it is conceivable to generate a character string from the authentication information using a one-way function such as MD5 (Message Digest 5).
  • MD5 Message Digest 5
  • the generation unit 22 stores the generated index value and the acquired authentication information in the index list storage unit 23 (S43).
  • the index list storage unit 23 stores authentication information and index values for the main server A for each user.
  • the generation unit 22 generates authentication information for the cooperation server B (ID: B # 1, PWD: B # 1) based on the index value (I) generated in S42 and stored in the index list storage unit 23. Is generated (S44). Specifically, the generation unit 22 inputs the index value (I) and the identification information (B) of the cooperation server B to the one-way function F such as MD5 by the following formula, thereby obtaining the cooperation server B. Generate authentication information for use.
  • One-way function F (I, B) ID B # 1, PWD B # 1
  • generation part 22 produces
  • the cooperation server C Generate authentication information for use.
  • One-way function F (I, C) ID C # 1, PWD C # 1
  • generation part 22 transmits the authentication information for cooperation server B4 to the cooperation server B, and the authentication information for cooperation server C5 to the cooperation server C5, respectively (S46, S47).
  • FIG. 4 is a flowchart of processing of the communication terminal 1.
  • the authentication request unit 11 of the communication terminal 1 accepts a login request to the main server A input by the user (S51).
  • the login request includes authentication information (ID: A # 1, PWD: A # 1) for the main server A notified from the authentication information generating device 2.
  • requirement part 11 transmits the authentication information which the user input to the main server A via the network 9 (S52).
  • the main server A authenticates whether or not the received authentication information is valid authentication information, and transmits the authentication result to the communication terminal 1.
  • authentication request unit 11 displays an error message and accepts re-input of authentication information (S51).
  • authentication OK uccess
  • the authentication request unit 11 stores the status “authenticated” of the authentication result in the storage unit 13 (S54). It is assumed that the initial status of the storage unit 13 is “not authenticated”.
  • the generation unit 12 generates an index value (I) that is a unique character string based on the authentication information of the main server A, and stores it in the storage unit 13 (S55).
  • the index value for example, it is conceivable to generate a character string from authentication information using a one-way function such as MD5.
  • a logic algorithm for generating the index value (I) by the generating unit 12 of the communication terminal 1 and a logic algorithm for generating the index value (I) by the generating unit 22 of the authentication information generating device 2 (FIG. 3: S42). Is the same.
  • requirement part 11 receives the access request to the cooperation server B which the user input (S61). It is assumed that the access request includes identification information (B) of the cooperation server B. Then, the generation unit 12 refers to the status stored in the storage unit 13 (S62). When the status is “authenticated” (S63), the index value (I) of the main server A generated and stored in S55 Based on the above, authentication information (ID B # 1, PWD B # 1) for the cooperation server B is generated (S64). Specifically, the generation unit 12 inputs the index value (I) and the identification information (B) of the cooperation server B to the one-way function F such as MD5 according to the following formula, so that the cooperation server B Generate authentication information for use.
  • the one-way function F such as MD5
  • One-way function F (I, B) ID B # 1, PWD B # 1
  • the logic algorithm in which the generation unit 12 of the communication terminal 1 generates authentication information for the cooperation server B and the logic algorithm in which the generation unit 22 of the authentication information generation apparatus 2 generates authentication information for the cooperation server B is the same.
  • the authentication request unit 11 displays an error message.
  • generation part 12 transmits the authentication information for cooperation server B to the cooperation server B via the network 9 (S65).
  • Cooperation server B authenticates whether or not the authentication information is valid authentication information, and transmits the authentication result to communication terminal 1.
  • authentication OK success
  • the communication terminal 1 can use the service provided by the cooperation server B.
  • authentication NG facialure
  • an error message or the like is displayed on the communication terminal 1.
  • the authentication request unit 11 receives an access request to the cooperation server C input by the user (S71). It is assumed that the access request includes identification information (C) of the cooperation server C. Then, similarly to S62 to S65, the generation unit 12 refers to the status stored in the storage unit 13 (S72), and when the status is “authenticated” (S73), the main server generated and stored in S55 Based on the index value (I) of A, authentication information (ID C # 1, PWD C # 1) for the cooperation server C is generated (S74). When the status is “not authenticated” (S73), the authentication request unit 11 displays an error message. And the production
  • the cooperation server C authenticates whether the authentication information is valid authentication information, and transmits the authentication result to the communication terminal 1.
  • authentication OK success
  • the communication terminal 1 can use the service provided by the cooperation server C.
  • authentication NG falseure
  • an error message or the like is displayed on the communication terminal 1.
  • the communication terminal 1 generates the authentication information of the cooperation servers B and C based on the authentication information of the main server A and transmits the authentication information to the cooperation servers B and C. Accordingly, the user can log in (access) the cooperation servers B and C without inputting the authentication information for the cooperation servers B and C themselves. That is, in this embodiment, a plurality of servers can be accessed without complicating the user's login operation.
  • the authentication information generation device 2 and the communication terminal 1 generate authentication information of identification information of the cooperation servers B and C using a common logic such as a one-way function.
  • a common logic such as a one-way function.
  • the present invention is not limited to the above-described embodiment, and various modifications are possible within the scope of the gist.
  • the authentication information user ID
  • Passwords are assigned different authentication information.
  • the existing Web server extracts all the user IDs already assigned to the user at any point in time, and is used up to the upper n digits (n ⁇ 1) in all the user IDs.
  • a character string that is not used (unused character string) is identified and notified to the authentication information generation apparatus.
  • the generation unit of the authentication information generation device uses the unused character string notified from the existing Web server as a prefix, and generates authentication information for the existing Web server (cooperation server) based on the authentication information of the main server In this case (FIG. 3: S44, S45), a user ID in which an unused character string (prefix) is set in the upper n digits of the user ID is generated.
  • the generation unit of the communication terminal uses an unused character string notified from the existing Web server or the authentication information generation device as a prefix, and uses the existing Web server (cooperation server) based on the authentication information of the main server.
  • Authentication information (FIG. 4: S64, S74), a user ID in which an unused character string (prefix) is set in the upper n digits of the user ID is generated.
  • the existing Web server (cooperation server) when the user ID is assigned to the user specific to the Web server thereafter, the specified unused character string is not used for the upper n digits of the user ID. Shall.
  • generating the authentication information for each cooperation server (FIG. 3: S44, S45, FIG. 4: S64, S74).
  • generating the authentication information for each cooperation server (FIG. 3: S44, S45, FIG. 4: S64, S74).
  • a unique number or character string, a URL of the cooperation server, or the like For example, it is conceivable to use a unique number or character string, a URL of the cooperation server, or the like.
  • Communication terminal 11 Authentication request unit 12: Generation unit 13: Storage unit 2: Authentication information generation device 21: Acquisition unit 22: Generation unit 23: Index list storage unit 3: Main server (predetermined server) A 4: Linked server (other server) B 5: Cooperation server (other server) C 9: Network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Afin de pouvoir accéder à plusieurs serveurs sans compliquer une opération d’ouverture de session d’un utilisateur pour réduire ainsi la charge opérationnelle et le coût opérationnel d’un système, un terminal de communication (1) comprend une unité de demande d’authentification (11) pour faire une demande d’authentification à un serveur prédéterminé (3) et une demande d’authentification à un serveur différent (4, 5), et une unité de génération (12) pour générer des informations d’authentification pour le serveur différent. L’unité de demande d’authentification (11) transmet des informations d’authentification pour le serveur prédéterminé, qui ont été entrées par l’utilisateur, en tant que demande d’authentification, au serveur prédéterminé (3) et transmet les informations d’authentification pour le serveur différent qui ont été générées par l’unité de génération (12), en tant que demande d’authentification, au serveur différent (4, 5). L’unité de génération (12) génère les informations d’authentification pour le serveur différent en se basant sur les informations d’authentification pour le serveur prédéterminé et des informations d’identification liées au serveur différent (3, 4).
PCT/JP2009/061513 2008-06-27 2009-06-24 Terminal de communication, dispositif de génération d’informations d’authentification, système d’authentification, programme de génération d’informations d’authentification, procédé de génération d’informations d’authentification et procédé d’authentification WO2009157482A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2008169377 2008-06-27
JP2008-169377 2008-06-27

Publications (1)

Publication Number Publication Date
WO2009157482A1 true WO2009157482A1 (fr) 2009-12-30

Family

ID=41444546

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2009/061513 WO2009157482A1 (fr) 2008-06-27 2009-06-24 Terminal de communication, dispositif de génération d’informations d’authentification, système d’authentification, programme de génération d’informations d’authentification, procédé de génération d’informations d’authentification et procédé d’authentification

Country Status (2)

Country Link
JP (1) JP2010033562A (fr)
WO (1) WO2009157482A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012103744A (ja) * 2010-11-05 2012-05-31 Jr East Mechatronics Co Ltd 情報処理装置、idデータ管理方法、及びプログラム
JP2015108903A (ja) * 2013-12-03 2015-06-11 日本電信電話株式会社 分散情報連携システムとそのデータ操作方法及びプログラム
JP2016128998A (ja) * 2015-01-09 2016-07-14 日立電線ネットワークス株式会社 認証システム
US9769154B2 (en) 2012-04-25 2017-09-19 Rowem Inc. Passcode operating system, passcode apparatus, and super-passcode generating method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101780860B1 (ko) * 2015-06-10 2017-09-21 강찬고 클라우드 서비스와 이메일 서비스가 융합된 시스템 및 그 방법

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002073562A (ja) * 2000-09-04 2002-03-12 Ntt Communications Kk 単一ユーザパスワードによる複数サイトアクセス方法及びその装置
JP2002312320A (ja) * 2001-04-18 2002-10-25 Life:Kk アクセス制御システム及びアクセス制御方法
WO2004061691A1 (fr) * 2002-12-26 2004-07-22 Fujitsu Limited Dispositif de controle de mot de passe
JP2006268719A (ja) * 2005-03-25 2006-10-05 Nec Corp パスワード認証システム及びパスワード認証方法
JP2007193464A (ja) * 2006-01-18 2007-08-02 Nippon Hoso Kyokai <Nhk> デジタル放送受信機、コンテンツ提供装置および認証管理装置
JP2008009607A (ja) * 2006-06-28 2008-01-17 Fuji Xerox Co Ltd 情報処理システムおよび制御プログラム

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002073562A (ja) * 2000-09-04 2002-03-12 Ntt Communications Kk 単一ユーザパスワードによる複数サイトアクセス方法及びその装置
JP2002312320A (ja) * 2001-04-18 2002-10-25 Life:Kk アクセス制御システム及びアクセス制御方法
WO2004061691A1 (fr) * 2002-12-26 2004-07-22 Fujitsu Limited Dispositif de controle de mot de passe
JP2006268719A (ja) * 2005-03-25 2006-10-05 Nec Corp パスワード認証システム及びパスワード認証方法
JP2007193464A (ja) * 2006-01-18 2007-08-02 Nippon Hoso Kyokai <Nhk> デジタル放送受信機、コンテンツ提供装置および認証管理装置
JP2008009607A (ja) * 2006-06-28 2008-01-17 Fuji Xerox Co Ltd 情報処理システムおよび制御プログラム

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012103744A (ja) * 2010-11-05 2012-05-31 Jr East Mechatronics Co Ltd 情報処理装置、idデータ管理方法、及びプログラム
US9769154B2 (en) 2012-04-25 2017-09-19 Rowem Inc. Passcode operating system, passcode apparatus, and super-passcode generating method
JP2015108903A (ja) * 2013-12-03 2015-06-11 日本電信電話株式会社 分散情報連携システムとそのデータ操作方法及びプログラム
JP2016128998A (ja) * 2015-01-09 2016-07-14 日立電線ネットワークス株式会社 認証システム

Also Published As

Publication number Publication date
JP2010033562A (ja) 2010-02-12

Similar Documents

Publication Publication Date Title
JP5296726B2 (ja) Webコンテンツ提供システム、Webサーバ、コンテンツ提供方法、及びこれらのプログラム
US8869258B2 (en) Facilitating token request troubleshooting
US20080040773A1 (en) Policy isolation for network authentication and authorization
US20100138899A1 (en) Authentication intermediary server, program, authentication system and selection method
US9544769B2 (en) Method for providing application service
US20110173688A1 (en) Information processing apparatus and method
KR20040111638A (ko) 어플리케이션 발생기
JP4960738B2 (ja) 認証システム、認証方法および認証プログラム
JP2009043042A (ja) 認証システムおよび認証方法
JP2006252418A (ja) 認証情報を用いたシングルサインオンの連携方法、そのシステム、仲介サーバ、動作方法及び動作プログラム
WO2009157482A1 (fr) Terminal de communication, dispositif de génération d’informations d’authentification, système d’authentification, programme de génération d’informations d’authentification, procédé de génération d’informations d’authentification et procédé d’authentification
JP2007293562A (ja) 認証装置、集線装置、認証方法、認証プログラム
JP6574265B2 (ja) 認証制御システム、サーバ装置、認証制御方法、及びプログラム
CN103179108B (zh) 应用认证方法及计算机系统
US10735399B2 (en) System, service providing apparatus, control method for system, and storage medium
JP6829698B2 (ja) 認証システムおよび認証方法
JPWO2013098925A1 (ja) 情報処理装置、情報処理システム、情報処理方法およびプログラム
CN111817860B (zh) 一种通信认证方法、装置、设备及存储介质
JP2011076430A (ja) 認証id管理システム及び認証id管理方法
JP4837060B2 (ja) 認証装置及びプログラム
Kim et al. Vulnerability detection mechanism based on open API for multi-user's convenience
CN115102724B (zh) 一种双Token跨端跳转系统的登录方法、系统
JP2018133022A (ja) Api提供装置及びapi使用権委譲の同意方法
JP5749222B2 (ja) アクセス許可制御システム、アクセス許可制御方法
JP2017134535A (ja) システム、及びシステムの制御方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09770192

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09770192

Country of ref document: EP

Kind code of ref document: A1