Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication server device, authentication server device-use program and authentication method

A technology for authenticating servers and authenticating requests, applied in digital data authentication, computer security devices, instruments, etc., can solve the problems of inability to input characters, the server cannot correctly authenticate the operation of people, and cannot recognize characters, etc., and achieves the effect of suppressing the load.

Active Publication Date: 2015-03-11
RAKUTEN GRP INC
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] However, in the case of using the existing verification code technology including the technology disclosed in the above-mentioned Patent Document 1, because characters and the like are missing too much or are deformed too much, people cannot recognize the characters and the like. input of text, etc.
The problem that this creates is that although a human is operating, the server cannot properly authenticate the fact that a human is operating

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication server device, authentication server device-use program and authentication method
  • Authentication server device, authentication server device-use program and authentication method
  • Authentication server device, authentication server device-use program and authentication method

Examples

Experimental program
Comparison scheme
Effect test

no. 1 approach

[0041] First, by attaching Figure 1 to Figure 10 A first embodiment of the present invention will be described. in addition, figure 1 is a block diagram showing a general configuration of the authentication system of the first embodiment; figure 2 It is a block diagram showing the detailed configuration of the user terminal of the first embodiment. in addition, image 3 is a block diagram showing a detailed configuration of the server of the first embodiment; Figure 4 It is a figure which exemplifies the storage content of the memory|storage part of 1st Embodiment. in addition, Figure 5 to Figure 8 are flowcharts respectively showing the authentication processing of the first embodiment, Figure 9 is a flowchart showing the details of authentication processing, Figure 10 It is a diagram showing an example of an operation screen displayed on a user terminal during the authentication process.

[0042] Such as figure 1 As shown, the authentication system S of the fi...

no. 2 approach

[0076] Next, pass Figure 11 A second embodiment which is another embodiment of the present invention will be described. in addition, Figure 11 It is a diagram showing an example of an operation screen displayed on a user terminal. In addition, since the hardware configuration of the authentication system of the second embodiment is basically the same as that of the authentication system S of the first embodiment, in the following description, the same as that used in the description of the authentication system S of the first embodiment will be used. The second embodiment will be described with reference to the part number.

[0077] In the above-mentioned first embodiment, according to the operation instruction 61 (refer to Figure 10 ) to operate cursor P and select objects 62 to 66 (refer to Figure 10 ), and then perform the authentication operation. In contrast, in the second embodiment to be described below, the object itself displayed on the display 6 is moved acc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An authentication server apparatus is capable of simply and accurately assessing whether a user terminal is being operated by a person. In the authentication server apparatus connected to the user terminal, operating instructions for instructing operation by an operator by using objects are associated with operation information and stored. A session ID is imparted for each session with the user terminal, operating instructions are selected for each session, a page provided with the selected operating instructions and the objects is generated, and position information is received corresponding to operations executed at the user terminal that has displayed the page. At authentication time, operating instructions using the session ID of the session are associated with position information received from the terminal, and using the stored operation information associated with the operating instruction that have been associated with the received position information, and the position information, an assessment is made of whether or not the operations were made by an operator.

Description

technical field [0001] The present invention relates to the technical field of an authentication server device, a program for the authentication server device, and an authentication method. More specifically, it relates to the technical field of an authentication server device, a program for the authentication server device, and an authentication method for authenticating whether or not a person requesting authentication is a person and not a so-called bot. Background technique [0002] For a long time, for example, in the Internet, etc., it is necessary to verify whether the data input on the user terminal is input by human operation or automatically input by a program (that is, whether it is input by the above-mentioned intelligent program or the like). ). Specifically, in the case of writing a review (review) of a product or a hotel, etc., writing a comment on a web blog, or downloading various files, etc., it is necessary to authenticate whether these operations are to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31H04L9/32H04L29/06G06F21/30G06F21/36
CPCG06F2221/2133H04L9/32G06F21/31H04L63/08G06F21/316G06F21/32G06F21/36
Inventor 高见真也
Owner RAKUTEN GRP INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products