Authentication System
a technology of authentication system and authentication card, applied in the field of authentication system, can solve the problems of unfavorable authentication, electronic information is easily tampered, leaked out and stolen, and the vulnerability of authentication is undeniable, so as to facilitate the detection of unauthorized acts
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
first embodiment
[0396]Hereinafter, the flow to the use start by a person who uses the present authentication system for the first time is explained separately in first stage to third stage.
[0397](Initial Registration of Unregistered Person: First Stage: Information Registration)
[0398]FIG. 22 is a sequence chart showing an action example of the authentication system when a person to be registered registers its own history information for the first time to the end side terminal 160 and sub servers, in a first embodiment of the present invention.
[0399]Hereinafter, with reference to this figure, registration processing of individual information by a person who wants to use this authentication system is explained.
[0400]In order to use the present authentication system, first, it is necessary to register individual information of the person who uses the system. This is because by registration of individual information, hereinafter, by comparing the registered information and read information, it is possi...
second embodiment
[0572](Repeated Registration Processing 1 of Existing Registered Person)
[0573]In the present embodiment, the flow in the case when the registered person who has registered its individual information once, in the first embodiment, registers information to other terminal than the terminal used for the registration is explained.
[0574]FIG. 33 is a sequence chart showing an action example of the authentication system when the registered person registers its own history information for the first time to other end side terminal than the terminal to which the registered person registered once, in the second embodiment of the present invention.
[0575]In the same manner as in the first embodiment, first, the end side terminal 160 inputs / reads the individual information of the registered person, and when the input / read individual information is not yet registered in the databases 161, 166, 167, it stores the individual information to the temporary storage DB 167 (steps S71 to S74).
[0576]Next, t...
third embodiment
[0583](Repeated Registration Processing 2 of Existing Registered Person)
[0584]Herein, “unit” is explained. A unit means a structure rate unit including one upper level terminal and one lower level terminal or more managed by the terminal.
[0585]That is, “terminals of the same unit” means terminals under management of the same terminal, and “terminals of other unit” means terminals under management of respectively different terminals.
[0586]Meanwhile, “use a unit” means for registered person to receive various services such as opening and closing the key and the like from any terminal structuring the unit.
[0587]FIG. 34 is a sequence chart showing an action example of the authentication system when the registered person registers its own history information for the first time to an end side terminal structuring other unit than the unit to which the registered person registered, in the third embodiment.
[0588]In the second embodiment, registered person registers its individual information...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com