Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Imformation providing and user verifying device and method

A technology for user authentication and equipment, applied in the direction of user identity/authority authentication, digital data authentication, instruments, etc., can solve problems such as increased working hours

Inactive Publication Date: 2008-02-27
RICOH KK
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, implementing such functionality for each application would add unnecessary man-hours to developing each application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Imformation providing and user verifying device and method
  • Imformation providing and user verifying device and method
  • Imformation providing and user verifying device and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Preferred embodiments of the present invention will now be described with reference to the accompanying drawings.

[0053] FIG. 1 is a block diagram of a first preferred embodiment of the user authentication system of the present invention.

[0054] As shown in FIG. 1 , an authentication system 1 in this embodiment includes an authentication server 10 and a terminal 20 connected through a network such as the Internet and a LAN (Local Area Network).

[0055] The terminal 20 is a terminal such as a PC (Personal Computer) used by a user. The terminal 20 is equipped with a SOAP proxy 22 , a client application module 23 , and a fingerprint reading device driver 24 .

[0056] The SOAP agent 22 is a module that utilizes SOAP (Simple Object Access Protocol) to realize communication between the terminal 20 and the verification server 10, and as a functional interface transparent to the client application module 23, provides the function of the verification server 10 to Client ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In an information providing device and method, a plurality of information providers, including first and second information providers, are made to be associated with each other. The first information provider is caused to receive a first user information item, stored in a first information management unit, in response to a user information receiving request. The second information provider is caused to receive a second user information item, correlated with the first user information item and stored in a second information management unit, in response to a predetermined identification data. A unified information item is created by combining the first user information item and the second user information item based on the predetermined identification data is outputted.

Description

technical field [0001] The present invention relates to an information providing apparatus, method, and computer program product for providing user information items independently managed by separate providers to a user in an integrated manner. Furthermore, the present invention also relates to a user authentication device, method and computer program product associated with several authentication units for user authentication. Background technique [0002] Generally speaking, in order to prevent unauthorized access to the information system, the application program of the information system is equipped with an authentication function for the user. [0003] A typical example of a method of implementing an authentication function is a cryptographic system that requires a user ID and password to be entered when the application is started. [0004] Only users who have correctly entered the user ID and password are allowed to use the application, so the user can use various fun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F1/00G06F21/31G06F21/32H04L9/32H04L29/06H04L29/08
CPCG06F21/32G06F2221/2119H04L63/083H04L67/02H04L67/1002G06F21/40H04L29/08072H04L69/329H04L63/0807H04L63/0861H04L29/08144H04L29/0809G06F21/33H04L67/1001
Inventor 江畑润
Owner RICOH KK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products