TOP > 外国特許検索 > Authentication method, authentication apparatus, and computer product

Authentication method, authentication apparatus, and computer product 新技術説明会

外国特許コード F160008875
整理番号 H27010
掲載日 2016年10月12日
出願国 台湾
出願番号 95106973
公報番号 200709639
公報番号 I312632
出願日 平成18年3月2日(2006.3.2)
公報発行日 平成19年3月1日(2007.3.1)
公報発行日 平成21年7月21日(2009.7.21)
優先権データ
  • 特願2005-246506 (2005.8.26) JP
発明の名称 (英語) Authentication method, authentication apparatus, and computer product 新技術説明会
発明の概要(英語) In a server (3) for authenticating a user (2), an acquiring unit (41) acquires current authentication information that is created using an arbitrary value and that is used for a current authentication process, from user (2).
A receiving unit (42) receives first transmission information in which next authentication information to be used for a next authentication process is hidden using the current authentication information, and second transmission information in which the arbitrary value is hidden using the next authentication information, from the user (2).
A calculating unit (43) calculates the next authentication information based on the first transmission information and the current authentication information, and the arbitrary value based on calculated next authentication information and the second transmission information.
A determining unit (44) determines whether to authenticate the user (2) based on the arbitrary value and the current authentication information.
特許請求の範囲(英語) [claim1]

(Claims machine translated from Chinese)
[claim2]
1. 1 authentication processing method, Yu Dui is authenticated the installment to carry on authentication of installment the authentication, its characteristic lies in includes: By fore-mentioned is authenticated the installment to obtain the use random value to produce it to use in foundation of authentication information this authentication processing obtaining the step;
By fore-mentioned is authenticated the installment receive: Uses the fore-mentioned this authentication information, will use in 1st delivering the news information which next time authentication processing the next time authentication information hides;
As well as the use fore-mentioned next time authentication information, the fore-mentioned random value will hide 2nd delivers news information the reception step;
The use receives fore-mentioned from the fore-mentioned reception step 1st delivers the news information with by to obtain the fore-mentioned this authentication information fore-mentioned which the step obtains to calculate the fore-mentioned next time authentication information, uses this next time authentication information and fore-mentioned 2nd delivers the news information to figure out fore-mentioned random value the computation step;
As well as the basis the fore-mentioned random value which figures out by the fore-mentioned computation step with by fore-mentioned obtains the fore-mentioned this authentication information which the step obtains, judges whether to fore-mentioned to be authenticated the installment to carry on the authentication.
[claim3]
2. like application patent scope 1st authentication processing method, fore-mentioned obtains the step is obtains regarding the fore-mentioned random value, carries on this authentication information because of the unidirectional transfer function which the operation produces;
The fore-mentioned judgment step is the judgment regarding the fore-mentioned random value, carries on the operation because of the unidirectional transfer function, but results in value whether with fore-mentioned this authentication information consistent.
[claim4]
3. like application patent scope 1st or 2 authentication processing method, the fore-mentioned reception step is the receive regarding the fore-mentioned next time authentication information and the fore-mentioned this authentication information, carries on the operation obtained value because of the shade function, takes 1 to deliver the news information, and receives regarding the fore-mentioned random value and the fore-mentioned next time authentication information, carries on the operation obtained value because of the fore-mentioned shade function, takes 2 to deliver the news information;
The fore-mentioned computation step is regarding fore-mentioned 1st delivers the news information and the fore-mentioned this authentication information, carries on the operation because of the fore-mentioned shade function, but calculates the fore-mentioned next time authentication information, and fore-mentioned 2nd delivers the news information regarding the fore-mentioned next time authentication information, carries on the operation because of the fore-mentioned shade function, but calculates the fore-mentioned random value.
[claim5]
4. like application patent scope 1st or 2 authentication processing method, duplicate contains obtains fore-mentioned is authenticated the installment to authenticate unique key's authentication key to obtain the step;
The fore-mentioned reception step is the receive because of regarding the fore-mentioned next time authentication information, the use fore-mentioned authentication key carries on the predetermined operation obtained value, but the fore-mentioned random value will hide the value, takes 2 to deliver the news information;
The fore-mentioned computation step is the use fore-mentioned authentication key and the fore-mentioned next time authentication information and fore-mentioned 2nd delivers the news information, calculates the fore-mentioned random value.
[claim6]
5. like application patent scope 1st or 2 authentication processing method, duplicate contains obtains fore-mentioned is authenticated the installment to authenticate unique key's authentication key to obtain the step;
The fore-mentioned reception step receives the use fore-mentioned this authentication information, regarding the fore-mentioned next time authentication information, the use fore-mentioned authentication key will carry on the value which the predetermined operation obtained value hides, takes 1 to deliver the news information;
The fore-mentioned computation step is the use fore-mentioned authentication key and fore-mentioned 1st delivers the news information and the fore-mentioned this authentication information, calculates the fore-mentioned next time authentication information.
[claim7]
6. like application patent scope 1st or 2 authentication processing method, duplicate includes: Obtained before stated the next time authentication information to encrypt the key, but the fore-mentioned random value will encrypt the encryption information's encryption information obtained the step;
The fore-mentioned judgment step is as encrypts the key take the fore-mentioned next time authentication information, but decodes the fore-mentioned encryption information, according to passes through the decoding the encryption information, judges whether to fore-mentioned to be authenticated the installment to carry on the authentication.
[claim8]
7. like application patent scope 6th authentication processing method, fore-mentioned obtains the step is obtains regarding the fore-mentioned random value carries on this authentication information which 2 unidirectional transfer functions the operation produces;
The fore-mentioned judgment step is the judgment carries on 2 time fore-mentioned unidirectional transfer functions regarding the fore-mentioned random value the operation, but results in value whether with fore-mentioned this authentication information consistent, according to its judgment result, judges whether to fore-mentioned to be authenticated the installment to carry on the authentication.
[claim9]
8. 1 authentication processing method, Yu Dui authenticates the installment request authentication to authenticate the installment, its characteristic lies in includes: Use random value, but produces uses in foundation of authentication information this authentication processing production step;
By fore-mentioned will have this authentication information transmission which the step produces to the fore-mentioned authentication installment forwarding step;
Carries on the computation: Uses the fore-mentioned this authentication information, will use in 1st delivering the news information which next time authentication processing the next time authentication information hides;
As well as the use fore-mentioned next time authentication information, the fore-mentioned random value will hide 2nd delivers news information the computation step;
As well as will calculate based on the fore-mentioned computation step fore-mentioned 1st delivers the news information and fore-mentioned 2nd delivers the news information transmission to deliver the news step to the fore-mentioned authentication installment.
[claim10]
9. like application patent scope 8th authentication processing method, fore-mentioned has the step is carries on operation of the unidirectional transfer function regarding the fore-mentioned random value, takes advantage of this has the fore-mentioned this authentication information.
[claim11]
10. like application patent scope 8th or 9 authentication processing method, the fore-mentioned computation step is regarding the fore-mentioned next time authentication information and the fore-mentioned this authentication information, after calculating carries on operation of the shade function value, takes 1 to deliver the news information, and regarding the fore-mentioned random value and the fore-mentioned next time authentication information, after calculating carries on operation of the fore-mentioned shade function value, takes 2 to deliver the news information.
[claim12]
11. like application patent scope 8th or 9 authentication processing method, duplicate includes: Produces fore-mentioned is authenticated the installment to authenticate unique key's authentication key to produce the step;
As well as fore-mentioned authentication key transmission to fore-mentioned authentication installment authentication key forwarding step;
The fore-mentioned computation step is calculates because of uses the fore-mentioned authentication key in the fore-mentioned next time authentication information to carry on the predetermined operation obtained value, the fore-mentioned random value will hide value.
[claim13]
12. like application patent scope 8th or 9 authentication processing method, duplicate includes: Produces fore-mentioned is authenticated the installment to authenticate unique key's authentication key to produce the step;
As well as fore-mentioned authentication key transmission to fore-mentioned authentication installment authentication key forwarding step;
The fore-mentioned computation step calculates the use fore-mentioned this authentication information, will use the fore-mentioned authentication key in the fore-mentioned next time authentication information to carry on the value which the predetermined operation obtained value hides, takes 1 to deliver the news information.
[claim14]
13. like application patent scope 8th or 9 authentication processing method, duplicate includes: Produces as encrypts the key take the fore-mentioned next time authentication information, but the fore-mentioned random value will encrypt the encryption information's encryption information has the step;
As well as fore-mentioned encryption information transmission to fore-mentioned authentication installment encryption information forwarding step.
[claim15]
14. like application patent scope 13th authentication processing method, fore-mentioned has the step is carries on operation of the 2 unidirectional transfer function regarding the fore-mentioned random value, but has the fore-mentioned this authentication information.
[claim16]
15. 1 kind of authentication.
The processing formula, its characteristic lies in: Causes the computer execution application patent scope 1st or 8 authentication processing method.
[claim17]
16. 1 kind of computers may of recording medium the read, the record have the application patent scope 15th authentication processing formula.
[claim18]
17. 1 kind of authentication treating plant, its characteristic lies in includes: Obtains the method, by is authenticated the installment to obtain the use random value to produce it to use in foundation of authentication information this authentication processing;
The reception method, by fore-mentioned is authenticated the installment receive: Uses the fore-mentioned this authentication information, will use in 1st delivering the news information which next time authentication processing the next time authentication information hides;
As well as the use fore-mentioned next time authentication information, the fore-mentioned random value will hide 2nd delivers the news information;
The computation method, uses from the fore-mentioned reception method receives fore-mentioned 1st delivers the news information with by to obtain the fore-mentioned this authentication information fore-mentioned which the method obtains to calculate the fore-mentioned next time authentication information, uses this next time authentication information and fore-mentioned 2nd delivers the news information to figure out the fore-mentioned random value;
As well as the judgment method, according to the fore-mentioned random value which figures out by the fore-mentioned computation method with by fore-mentioned obtains the fore-mentioned this authentication information which the method obtains, judges whether to fore-mentioned to be authenticated the installment to carry on the authentication.
[claim19]
18. 1 kind of authentication treating plant, its characteristic lies in includes: Has the method, the use random value, but produces uses in foundation of authentication information this authentication processing;
The transmission method, by fore-mentioned will have this authentication information transmission which the method produces to by itself to install the request authentication another installment;
The computation method, with calculates: Uses the fore-mentioned this authentication information, will use in next time authentication processing the next time authentication information hideaway 1st delivering the news information;
As well as the use fore-mentioned next time authentication information the fore-mentioned random value will hide 2nd delivers the news information;
As well as delivers the news method, will calculate based on the fore-mentioned computation method fore-mentioned 1st delivers the news information and fore-mentioned 2nd delivers the news information transmission to the fore-mentioned another installment.
  • 出願人(英語)
  • AKIHIRO SHIMIZU
  • KOCHI UNIVERSITY OF TECHNOLOGY
  • 発明者(英語)
  • AKIHIRO SHIMIZU
  • TAKASUKE TSUJI
国際特許分類(IPC)

PAGE TOP

close
close
close
close
close
close