Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication System

a technology of authentication system and authentication card, applied in the field of authentication system, can solve the problems of unfavorable authentication, electronic information is easily tampered, leaked out and stolen, and the vulnerability of authentication is undeniable, so as to facilitate the detection of unauthorized acts

Inactive Publication Date: 2009-07-30
IHC CORP
View PDF6 Cites 152 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0037]The authentication system according to the present invention is a system that has a plurality of terminals, and on the basis of individual information of registered people input via the terminals, performs authentication of registered people, wherein in response to physical transfer of registered people, the storage positions of individual information of registered people transfer in the authentication system, and it is difficult for other third party than registered people to identify storage positions of individual information of the registered person, and accordingly, it is possible to prevent the individual information of registered people from being tampered, leaked out and stolen by such a third party, and easily find an unauthorized act to improve the security in a system by performing authentication.

Problems solved by technology

However, in the case of the driver's certificate and employee ID card, they are easily copied or forged, and unauthorized acts using unauthorized identification cards show no sign of significant decline.
Furthermore, in the authentication method using electronic information, the electronic information is easily tampered, leaked out and stolen, and in particular, in the case of authentication via internet, since it is difficult to check up the other side, the vulnerability of the authentication has been undeniable.
This biometrics information means peculiar information inhered to a person biometrically, including fingerprint and vocal print and the like, and since it is the information peculiar to the person that others cannot be have, it has been thought difficult to tamper the biometrics information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication System
  • Authentication System
  • Authentication System

Examples

Experimental program
Comparison scheme
Effect test

first embodiment

[0396]Hereinafter, the flow to the use start by a person who uses the present authentication system for the first time is explained separately in first stage to third stage.

[0397](Initial Registration of Unregistered Person: First Stage: Information Registration)

[0398]FIG. 22 is a sequence chart showing an action example of the authentication system when a person to be registered registers its own history information for the first time to the end side terminal 160 and sub servers, in a first embodiment of the present invention.

[0399]Hereinafter, with reference to this figure, registration processing of individual information by a person who wants to use this authentication system is explained.

[0400]In order to use the present authentication system, first, it is necessary to register individual information of the person who uses the system. This is because by registration of individual information, hereinafter, by comparing the registered information and read information, it is possi...

second embodiment

[0572](Repeated Registration Processing 1 of Existing Registered Person)

[0573]In the present embodiment, the flow in the case when the registered person who has registered its individual information once, in the first embodiment, registers information to other terminal than the terminal used for the registration is explained.

[0574]FIG. 33 is a sequence chart showing an action example of the authentication system when the registered person registers its own history information for the first time to other end side terminal than the terminal to which the registered person registered once, in the second embodiment of the present invention.

[0575]In the same manner as in the first embodiment, first, the end side terminal 160 inputs / reads the individual information of the registered person, and when the input / read individual information is not yet registered in the databases 161, 166, 167, it stores the individual information to the temporary storage DB 167 (steps S71 to S74).

[0576]Next, t...

third embodiment

[0583](Repeated Registration Processing 2 of Existing Registered Person)

[0584]Herein, “unit” is explained. A unit means a structure rate unit including one upper level terminal and one lower level terminal or more managed by the terminal.

[0585]That is, “terminals of the same unit” means terminals under management of the same terminal, and “terminals of other unit” means terminals under management of respectively different terminals.

[0586]Meanwhile, “use a unit” means for registered person to receive various services such as opening and closing the key and the like from any terminal structuring the unit.

[0587]FIG. 34 is a sequence chart showing an action example of the authentication system when the registered person registers its own history information for the first time to an end side terminal structuring other unit than the unit to which the registered person registered, in the third embodiment.

[0588]In the second embodiment, registered person registers its individual information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

[Problems] To provide an authentication system improving authentication accuracy of existence of a registered person and easily find an unauthorized act to improve the security in a system by performing authentication using coincidence / non-coincidence of biometrics information and temporal / spatial authentication when performing individual authentication via a network by using electronic information which is easily tampered, easily leaks out, and is easily stolen.[Means for Solving Problems] An authentication server (1) includes a database for managing individual information on a registered person to be authenticated. Moreover, the authentication server (1) is connected to a plurality of management servers (2) via a communication network and correlates the individual information transmitted from an individual information input device (3) via the management server (2) with the individual information in the database, thereby authenticating the existence of the registered person.

Description

BACKGROUND OF THE INVENTION[0001]1. Field of the Invention[0002]The present invention relates to an authentication system, in particular to an authentication system for performing collation of individual information of a user and thereby performing authentication.[0003]2. Description of the Related Art[0004]In the prior art, at the moment of important procedures and transactions such as concluding an insurance agreement, opening a bank account, and the like, in order to prove the existence of an individual person, an identification card such as a driver's certificate or an employee ID card has been presented.[0005]Further, along with the development of recent electronic technologies, in the case to use electronic money and the like, individual authentication methods have been mainly performed where an input password is collated, peculiar individual information is read out from a magnetic card or an IC card and collation is performed.[0006]However, in the case of the driver's certifi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G05B19/00G06F21/31G06F21/32G06F21/34
CPCG06F21/32G06F2221/2111G06F2221/2137G06F2221/2151H04L63/107G07C9/00087G07C2209/08H04L63/0861G07B15/00G07C9/257
Inventor HAYASHI, HITOSHI
Owner IHC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products