CN1917423A - Target apparatus, certification device, and certification method - Google Patents

Target apparatus, certification device, and certification method Download PDF

Info

Publication number
CN1917423A
CN1917423A CNA2006101148976A CN200610114897A CN1917423A CN 1917423 A CN1917423 A CN 1917423A CN A2006101148976 A CNA2006101148976 A CN A2006101148976A CN 200610114897 A CN200610114897 A CN 200610114897A CN 1917423 A CN1917423 A CN 1917423A
Authority
CN
China
Prior art keywords
authentication
target device
authenticate
authenticate device
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2006101148976A
Other languages
Chinese (zh)
Inventor
今西将之
小笠原好一
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sony Corp
Original Assignee
Sony Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sony Corp filed Critical Sony Corp
Publication of CN1917423A publication Critical patent/CN1917423A/en
Pending legal-status Critical Current

Links

Images

Abstract

The present invention has a target apparatus that provides a predetermined service by certifying a certification device when said certification device enters a predetermined certification area. The target apparatus includes a controller configured to control the changing of contents of a service to be provided in accordance with a certification status of a plurality of certification devices located inside said certification area.

Description

Target device, authenticate device and authentication method
The cross reference of related application
The present invention comprises Japanese patent application JP 2005-235611 that proposes to Japan Patent office with the Japanese patent application JP 2005-235613 that proposes to Japan Patent office on August 16th, 2005, on August 16th, 2005 and the relevant theme of Japanese patent application JP 2005-235612 that proposes to Japan Patent office on August 16th, 2005, the full content of described application is contained in this, as a reference.
Technical field
The present invention relates to carry out to use the target device of restriction, carry out the authenticate device of authentication processing and the authentication method of reservation service is provided according to the authentication of target device by considering user authentication information and positional information according to authentication.
Background technology
In correlation technique, if the authenticate device of person identification (for example UIM (subscriber identification module) is used as the jockey that connects particular station, and the user can be from the such website of any terminal access so, and and location independent; If authenticating device mainly is used in the Telnet operation, even the user is in the urban district so, the user also can browse secret company data, mail etc.
More particularly, usually, when user's confidential data in office, during such as personal information, the user uses the particular terminal in the particular office.But the use of above mentioned authenticate device allows any terminal access data of user from the restricted area that is arranged in wherein visit and is allowed to.Japan Patent No.2931276 (below be called patent documentation 1) and Japan Patent No.3498633 disclose the authentication techniques based on radiolink.
In general, utilize the user name and password to carry out the personal authentication of user's operating terminal.Recently, begun to be employed, wherein automatically performed authentication during near terminal installation as wireless UIM, thereby simplified the personal authentication based on the authentication method of wireless UIM.
In patent documentation 1, disclose a kind of and equipment and used the relevant technology of restraint device, wherein when the identification signal transmitter unit leaves use restriction clearing cell preset distance, be stopped from the use restricting signal that uses the output of restriction clearing cell, thereby make destination apparatus unavailable.
Summary of the invention
But, under the situation about authenticating one to one of terminal installation and wireless UIM, following problems can appear.That is, when the Authorized operation personnel on the terminal installation such as personal computer during the processor confidential information, confidential information can expose to the open air to the prier who stands in described operating personnel back, thereby causes information leakage.Correlation technique is difficult to prevent that information from being revealed to the prier.
Visual plant is being set, under the situation such as the server of installing for banking, for security consideration, is using usually when carrying out setting operation, two or more people must configuration on the scene.In this case, by based on everyone the user name and password of on the terminal installation that carries out setting operation, importing, the perhaps authentication of the password of the smart card of holding based on a people and another people input can be examined two people in the setting operation or more people's participation.
But, use the method for password to bring and allow the third party to change the risk that server is provided with, if that people who enters password leaves terminal installation, and there not be the words of cancellation.Wherein smart card also can bring similar risk by the method that a people holds, because may be left in the card reader as the smart card of non-contact type safety device, thereby gives the chance of third party's operating terminal device.
In addition, the relevant authentication technology is difficult to be independent of about the authentication of using, and according to the scope of wherein arranging device to be used, the personnel that subscribe special services is carried out restrict access and information provides.When use is used for the authenticate device of individual identification, carry out the usage license by utilizing input of PIN (person identfication number) code or biostatistics.But because user's processing mistake, such as unintentionally authenticate device being retained in the reader, so correlation technique is difficult to avoid authenticate device to be used by the third party.If authenticate device is lost, if the authenticate device of then losing is used by the third party, correlation technique is difficult to trace back to the source of connection so.
In order to overcome above mentioned problem, a kind of system has been proposed, wherein between sender's terminal and recipient's terminal, be used for the communication of individual identification, when having only near recipient's terminal is positioned at sender's terminal, just allow to use.But if use target device to enter the use constrained state, this system is difficult to consider and the franchise accordingly and management work daily record with the scope that is used so.
In order to solve problem described above, the present invention has been proposed.According to one embodiment of present invention, provide a kind of target device, when authenticate device entered predetermined authentication region, described target device provided predetermined service by authenticate device is authenticated.Described target device has and is configured to according to being positioned at the authentication state of a plurality of authenticate devices of authentication region, controls the controller of change of the content of service to be supplied.
The authentication method that authenticate device is authenticated by the target device that uses for the user according to another embodiment of the present invention, is provided under a kind of situation of the authentication region that is positioned at target device at authenticate device.Described authentication method has according to the authentication state that is positioned at a plurality of authenticate devices of authentication region, the step of the content of the service that the change target device will provide.
Thereby just when authenticate device was positioned at the authentication region of target device, target device provided reservation service, and the content of service to be supplied is changed according to the authentication state that is positioned at a plurality of authenticate devices of authentication region.Provide by the service under the predetermined authentication state, this configuration has improved the simplification of login target device, and fail safe.
For example, if carry out control, if so that a plurality of predetermined authenticate devices are positioned at authentication region and certified, providing of service is provided so, if when a plurality of predetermined authenticate devices are positioned near target device, what begin to serve provides, and can realize reliable and easy register so.In addition, if predetermined arbitrarily authenticate device leaves authentication region, what stop so serving provides, thereby fail safe is provided.
Be positioned at predetermined authentication region and certified at predetermined authenticate device, and provide in view of the above under the situation of reservation service, if unscheduled authenticate device enters in the authentication region, what stop so serving provides, thereby prevents that any third party from spying upon.
According to another embodiment of the present invention, provide a kind of will by with the target device that uses for the user be connected to come certified, thereby determine the authenticate device that target device is whether available.Described authenticate device has and is configured under authenticate device and situation that target device is connected, according to the positional information collection block that obtains the positional information of target device from the position information providing device signal supplied, determine according to the positional information of registration whether the user has usufructuary authentication processing piece by utilizing positional information that the positional information collection block obtains and user's authentication information with being configured to.
According to another embodiment of the present invention, provide a kind of authentication method, described authentication method comes authenticate device is authenticated by the target device that connects authenticate device and use for the user, thereby determines whether target device is available.Described authentication method has following step: under authenticate device and situation that target device is connected, by authenticate device according to from the position information providing device signal supplied, obtain the positional information of target device, with by utilizing positional information that authenticate device obtains and user's authentication information, determine according to the positional information of record whether the user has the right to use by authenticate device.
In the configuration of mentioning in the above, when authenticate device is connected with the target device that uses for the user, authenticate device obtains user authentication information and target device positional information, according to described user authentication information and target device positional information, whether determines usufructuary existence.Thereby, except authentification of user, the location-based right to use can be set.
By using an authenticate device different, can improve level of security with authenticate device according to the present invention.For example, authenticate device according to an embodiment of the invention can be divided into two authenticate devices (1) and (2).If under authenticate device (1) and the situation of using target device to be connected, authenticate device (2) enters the authentication region of being set by authenticate device (1), authenticated mutually on the communication path that these two authenticate devices are encrypted where necessary so, and the acquisition positional information.By with reference in advance to the information of authenticate device (1) registration (encrypted and be kept at positional information and rights of using table in the chip of user's inaccessible), authenticate, if have and the user of the authenticate device (2) of authenticate device (1) pairing be positioned at use target device near, and allow therein describedly to use and serve in the zone that provides, authentication is successful so, thus, use target device to be unlocked, can use for the user.Authenticate device (1) can be included in the use target device or externally be attached to the use target device.
If after the release of using target device, access server side, such as service providing device as linking objective equipment, so when authentication success, the positional information that authenticate device (1) obtains is transmitted together with authentication information, thereby can realize representing whose just management of information from where visiting.This configuration can realize that the service that the definition with zone or certification level adapts provides, and for example according to the zone authentication restriction to linking objective equipment side is set.
If authenticate device (1) externally is connected under the situation of using target device and is used, the Operation Log of record is managed when authenticate device (1) is connected with the use target device so.When authenticate device is removed, when perhaps authenticate device (2) leaves the usage license scope of authenticate device (1),, thereby prevent that Operation Log from being revealed to any third party from the daily record of use target device deletion action.
After authentication success, keep the session between authenticate device (1) and the authenticate device (2), and regularly between authenticate device (1) and (2), transmit message " keep-alive " (Keep Alive).This configuration allows to realize the management of authenticate device (2), no matter whether it is in the Free Region that authenticate device (1) allows.
According to the communication between form execution authenticate device of encrypting (1) and the authenticate device (2), the encrypted session key that these devices of regular update use mutually.
If use authenticate device under the situation without separating into two authenticate devices, the mutual authentication between two devices of this of Fa Shenging can be omitted so.In order to give the right to use of authenticate device self, change into and can use alternative authentication, such as PIN (person identfication number) input or biostatistics.In this case, authenticate device can be included in and use in the target device, perhaps externally is attached to the use target device.
According to one embodiment of present invention, provide a kind of target device, when authenticate device when the described target device, described target device authenticates described authenticate device.Described target device has and is configured to by transmitting and receiving prearranged signals, detect described authenticate device and whether entered communication block in the predetermined authentication zone, be positioned under the situation of described authentication region at described authenticate device with being configured to, by described communication block, reception is from the authentication information of described authenticate device, mate the authentication information of described reception and the authentication information of registration, and the authentication result that is obtained by described coupling is sent to the controller of described authenticate device by described communication block.
According to another embodiment of the present invention, provide a kind of when the time near target device, will be by the authenticate device of the target device authentication of using for the user.Described authenticate device has and is configured to authentication information is sent to target device, and receives the communication block of authentication result and be configured to preserve the memory that can not rewrite of authentication information from target device.
According to another embodiment of the present invention, provide a kind of, the authentication method that authenticate device is authenticated by the target device that uses for the user when authenticate device during near target device.Described method has following step: determine by target device whether authenticate device has entered predetermined authentication region; If find that authenticate device is positioned at predetermined authentication region, so by the authentication information of target device reception from authenticate device, the authentication information that coupling receives and the authentication information of registration, and an authentication result that obtains by described coupling sends authenticate device to; With the authentication result that receives by authenticate device from target device.
In the scheme of mentioning in the above, when authenticate device entered preset range, target device authenticated authenticate device according to the information of supplying with from authenticate device.This configuration near target device, realizes automated validation by authenticate device.
In addition, according in preset range, how far authenticate device has from target device, can change certification level and the service of authentication back on the target device.
For example, when the user with authenticate device near target device, in the time of its several meters, the user begins by target device authentication so that sign in on the target device, thereby providing of any required service is provided.Be positioned within the preset range if having the user of authenticate device, but break away from above mentioned several meters scopes, after by the target device success identity, the user can obtain the service of a part so.
As mentioned above, provide service according to the distance between user with authenticate device and the target device, thus realize concerning described distance must and the providing of enough service.
In a concrete example application, if target device is an e-mail terminal, so as the user with authenticate device during near this terminal, authentication success, the user can visit the Email on this terminal.The necessity of input the user name and password has been eliminated in this configuration, thereby has improved user friendly.In addition, if subscriber station is in the presumptive area of e-mail terminal, but some distances are arranged from e-mail terminal, so after success identity, the user can check display screen, seek expression send this user Email information and check the display screen of authenticate device, seek the information whether the expression e-mail terminal is used by another user.
So, according to embodiments of the invention, by utilizing authenticate device, can examine the authentication state of authenticate device automatically for target device, if so that do not have the Any user of access right near target device, service provides and is stopped so, thereby avoids spying upon of display screen, thereby prevents information leakage reliably.System with regard to the authentication that requires a plurality of users can easily carry out authentification of user, and if arbitrarily the user leave authentication region, authentication is removed automatically, thereby avoids under the authentic situation of user, system is used by any third party.
In addition, according to embodiments of the invention, if a target device (perhaps terminal) is shared by a plurality of users, can obtain to represent the information whether this terminal is used by another user at present so, perhaps represent the information whether self-addressed message has arrived, thereby realize the user to the efficient use of shared terminal and the efficient use of time, and needn't the incoming terminal front.In addition, have only by carrying authenticate device just to allow easily to sign in on the terminal, thereby improved the availability of system near terminal.
Description of drawings
Fig. 1 is the schematic diagram of the illustration structure of the graphic extension Verification System of using the target device be practiced as one embodiment of the present of invention;
Fig. 2 is the block diagram that graphic extension is practiced as the illustration structure of the target device of one embodiment of the present of invention and authenticate device;
Fig. 3 is the wireless UIM during near target device that unauthenticated is worked as in graphic extension, prevents the precedence diagram of the sequence of spying upon;
Fig. 4 is graphic extension when there not being authentication function, and the wireless UIM that has only radio communication function is during near target device, prevents the precedence diagram of the sequence of spying upon;
Fig. 5 is the precedence diagram that the sequence of multiple user authentications is carried out in graphic extension;
Fig. 6 is the precedence diagram that the sequence of multiple user authentications is withdrawed from graphic extension;
Fig. 7 is the schematic diagram of the summary of the graphic extension Verification System that is practiced as one embodiment of the present of invention;
Fig. 8 is the block diagram of the illustration structure of graphic extension target device and wireless UIM;
Fig. 9 is graphic extension when using the SSL client authentication, with the precedence diagram of the identification sequences carried out;
Figure 10 is that wherein mail terminal and facsimile terminal are used as the schematic diagram of the example of target device in graphic extension;
Figure 11 is the schematic diagram that graphic extension is practiced as the illustration structure of the Verification System that the authenticate device of one embodiment of the present of invention is applicable to;
Figure 12 is the functional-block diagram of graphic extension authenticate device;
Figure 13 is the precedence diagram of the sequence of graphic extension operation summary.
Embodiment
Below with reference to the accompanying drawings, by embodiments of the invention, illustrate in greater detail the present invention.In the first embodiment of the present invention, utilize a plurality of wireless UIM to carry out a plurality of personal authentications operation, described a plurality of wireless UIM are authenticate devices, thereby according to the result of these authentication operations, change service to be supplied.
Referring now to Fig. 1,, Fig. 1 has represented to use the illustration structure of the Verification System of the target device that is practiced as one embodiment of the present of invention.More particularly, when entering authentication region for the wireless UIM of authenticate device 2, target device 1 is carried out authentication, and target device 1 has according to a plurality of authenticate devices 2 (example shown in Fig. 1 in authentication region, wireless UIM (1) that represents by 2-1 and the wireless UIM (2) that represents by 2-2) authentication state, change the controller of service content.
The controller executive control operation, such as have only the control that reservation service just is provided when authentic two or more predetermined authentication devices 2 are positioned at authentication region, with be arranged in authentication region at predetermined authenticate device, and provide under the situation of reservation service, when detecting unscheduled authenticate device and enter in the service range, change the control of the state of the service that provides.
In the control example of mentioning in the above, (for example, wireless UIM (1) and (2) during the authentication region of) user's target approach equipment 1, automatically perform login when having a plurality of predetermined authenticate devices 2, thus, these users can obtain predetermined service from target device 1.All entered authentication region unless should note all a plurality of predetermined authenticate devices (for example, wireless UIM (1) and (2)), otherwise predetermined service can not be provided.
In one example of back, if be positioned at authentication region, login and receiving under the situation about providing of reservation service the user's (authorized user) who has predetermined authenticate device 2 (for example wireless UIM (1)), the user who has unscheduled (or unwarranted) authenticate device 2 (for example wireless UIM (2)) enters authentication region, provide condition by changing service so, can take to take precautions against the action of spying upon, for example remind authorized user, carry out automatically and nullify, perhaps make the screen deepening.
Referring to Fig. 2, represented to be practiced as the illustration structure of the target device and the authenticate device of one embodiment of the present of invention among the figure.Authenticate device 2 is the wireless UIM that are used for person identification, has authentication block and radio communication function.More particularly, authenticate device 2 has the memory block that can not rewrite (for example smart card IC) 23 that is used to preserve authentication information, host CPU 21 and as the communication block 22 of the radio communication function element in the authentication block.Authenticate device 2 also has in case of necessity, shows the monitoring of information device (not shown) of supplying with from target device 1.
Target device 1 is to have the mail of being used for, login, the authentification of user function of facsimile transmission and phone termination and the equipment of radio communication function.More particularly, target device 1 has the host CPU 11 of these functions of control and has the communication block 12 of radio communication function.Target device 1 also has the timer 13 for the overtime timing of authentication counting.
By communication block 12 and communication block 22, target device 1 and authenticate device 2 be radio communication mutually.Signal between target device 1 and the authenticate device 2 transmits and receives can be based on radio wave or optical instrument, such as infrared radiation.Target device 1 can receive radio signals from authenticate device 2, and detects its level, thus the approximate distance between measurement target equipment 1 and the authenticate device 2.
When the preset range around the authenticate device 2 target approach equipment 1,1 pair of authenticate device 2 of target device authenticates.The method of authentication can be based on for example Digest Authentication or the checking of SSL (security socket layer) client computer.
In the present embodiment, the authentication state according to the authenticate device 2 of the authentication region that is positioned at target device 1 provides various services.
The following describes the concrete authentication method that is practiced as one embodiment of the present of invention.Should note and by way of example wireless UIM to be described below as authenticate device.
<1. prevent to spy upon
Referring to Fig. 3, when having represented among the figure that wireless UIM when unauthenticated is near target device, take to prevent the sequence of the action spied upon.At first, when predetermined wireless UIM (1) near target device, during the authentication region of target approach equipment, target device detects wireless UIM (1), if the certified processing checking of the wireless UIM (1) that detects, so wireless UIM (1) becomes authenticated state.Under this authenticated state, the owner of wireless UIM (1) can utilize target device, and the service of acquisition provides.
Subsequently, when wireless UIM (2) near target device, when entering its authentication region, target device detects wireless UIM (2), and wireless UIM (2) is carried out essentially identical authentication processing.If wireless UIM (2) does not have the authority of access destination equipment, authentication processing failure so.At this moment, target device is announced the approaching of wireless UIM (2) by the wireless UIM of kick out (1) or at target device or the last display alarm message of wireless UIM (2) to the user of wireless UIM (1).Making the display monitor deepening of target device, also is feasible thereby make the screen of display monitor invisible.Thereby the user of wireless UIM (1) can prevent in advance that the user of wireless UIM (2) from spying upon the display monitor of wireless UIM (1).
Referring to Fig. 4, represented among the figure when there not being an authentication function, but the wireless UIM (3) with radio communication function prevents the sequence of spying upon during near target device.At first, when target device predetermined radio UIM (1) near target device, when entering its authentication region, target device detects wireless UIM (1), if wireless UIM (1) is verified, so wireless UIM (1) enters authenticated state.Under authenticated state, the owner of wireless UIM (1) can utilize target device to receive service and provide.
Subsequently, when wireless UIM (3) near target device, when entering its authentication region, wireless UIM (3) is detected by target device, and enters the authentication request state.Target device has timer, if in a period of time, there is not any authentication request from wireless UIM (3), so it is considered as not having wireless UIM approaching of access rights, thereby the wireless UIM (1) that uses at present by kick out or on the display monitor of target device or wireless UIM (1) display alarm message, announce user approaching of wireless UIM (3) to the user of wireless UIM (1).In addition, making the display monitor deepening of target device, also is feasible thereby make the screen of this display monitor invisible.Thereby, can prevent from not have the user of access rights to spy upon.
<2. many users' authentication 〉
Referring to Fig. 5, represented to authenticate a plurality of users' sequence among the figure.At first, when in advance to the wireless UIM (1) of target device registration near target device, when entering its authentication region, target device detects wireless UIM (1), and wireless UIM (1) is carried out authentication processing.If authentication success, the user of so wireless UIM (1) enters logging status.But, unless because a plurality of users with access rights login, otherwise target device can not be used, so target device can be only because of wireless UIM (1) near not becoming available.
Subsequently, when in advance to the wireless UIM (2) of target device registration near target device, when entering its authentication region, target device detects wireless UIM (2), and wireless UIM (2) is carried out authentication processing.If authentication success, the user of so wireless UIM (2) also enters logging status.Thereby the wireless UIM (1) of registration and a plurality of users of (2) enter logging status, so that the user can utilize target device, obtain and service that the authentication state of wireless UIM (1) and (2) adapts provides.As mentioned above, when having only user when wireless UIM (1) and (2), can dispose a plurality of users' logging status, thereby, be easy to realize for security reasons, monitor two or more people's system for the user all near target device.
Referring to Fig. 6, represented to carry out the sequence of cancellation of a plurality of users' authentication among the figure.Measure the user's who logins at present the wireless UIM (1) and the distance of (2) between target device at regular intervals.If target device is found the distance of measuring arbitrarily and is surpassed predetermined value, perhaps in predetermined a period of time, do not measure any response of asking from adjusting the distance of wireless UIM (1) and (2), target device signs in to the user that this situation is considered as more than the neither one in the target device so, thereby makes it lay oneself open to the state that inaccessible uses.Thereby if any user of wireless UIM (1) and (2) leaves target device, this user can be nullified automatically so, still is in logging status thereby prevent any wireless UIM, the situation of the risk that the generation third party uses without permission.
According to above mentioned embodiments of the invention, if the Any user that does not have access rights is near target device 1, utilize authenticate device 2 so, automatically examining authentication state with target device 1 can be by providing by reporting to the police or stopping service, prevent that the user with access rights from spying upon display screen, avoids information leakage reliably.In addition, the system with regard to the authentication that requires a plurality of users can easily carry out authentification of user, and when the user left authentication region, authentication can be eliminated, thereby avoid under the authentic state of authorized user, third-partyly used without authorization.
Below with reference to the description of drawings second embodiment of the present invention.In a second embodiment, when as the wireless UIM of authenticate device during near target device, the wireless UIM of target device automated validation.If authentication success, so according to distance from target device to wireless UIM, the service that changes certification level and will provide by target device.
Referring to Fig. 7, represented to be practiced as the summary of the Verification System of the second embodiment of the present invention among the figure.More particularly, can power each user of sub-mail terminal of the target device 1 of carrying out authentication processing uses.If be that the wireless UIM 2 of authenticate device is positioned at target device 1 presumptive area on every side, target device 1 uses the authentication information execution authentication processing of supplying with from wireless UIM 2 so.
Best, wireless UIM 2 is mobile phones, employee ID card, perhaps any other wearable device.Wireless UIM 2 is kept at authentication information in its memory block that can not rewrite.The use of authentication information is convenient to realize reliable authentication processing on target device.
In the example shown in Fig. 7,, arrange the authentication region of two-stage according to the distance between target device 1 and the wireless UIM 2; For example, from the farther certification level (1) of target device 1 with from the nearer certification level (2) of target device 1.Thereby, can change the service that provides according to distance.
In this example, certification level (2) based on distance in several meters (for example 1-2 rice) of target device 1, certification level (1) based on distance be a scope (for example 10-20 rice), in this scope, outside several meters (for example 1-2 rice), target device 1 is visible.The type of the service that will provide according to target device 1 should be provided, set these authentication regions rightly.
Referring to Fig. 8, represented the illustration structure of target device and wireless UIM among the figure.Wireless UMI2 is used to person identification, and has authentication function and radio communication function.More particularly, wireless UIM 2 has the memory block that can not rewrite (for example smart card IC) that is used to preserve authentication information, as the host CPU 21 of authentication function with as the communication block 22 of radio communication function.Wireless UIM 2 also has where necessary, shows the monitoring of information device of supplying with from target device 1 24.
Target device 1 is to have the authentification of user function, such as mail, and login, facsimile transmission and phone termination, and the equipment of radio communication function.More particularly, target device 1 has the host CPU 11 of these functions of control and has the communication block 12 of radio communication function.
By communication block 12 and communication block 22, target device 1 and wireless UIM 2 be radio communication mutually.Signal between target device 1 and the wireless UIM 2 transmits and receives can be based on radio wave or optical instrument, such as infrared radiation.Target device 1 can receive the radio signal from wireless UIM 2, and detects its level, thus the approximate distance between measurement target equipment 1 and the wireless UIM 2.
When the preset range around the wireless UIM 2 target approach equipment 1, target device 1 authenticate wireless UIM 2.Certificate scheme can be based on for example Digest Authentication or the checking of SSL (security socket layer) client computer.
Referring to Fig. 9, represented among the figure when using the checking of SSL client computer the identification sequences of carrying out.At first, between target device and wireless UIM, transmit and receive signal.When target device was found the position of wireless UIM in authentication region, target device was carried out authentication processing.In authentication, wireless UIM obtains information signature and authentication by using smart card IC, and smart card IC is included in the memory block among the wireless UIM.
Subsequently, if target device is successful to the authentication of wireless UIM, the state of so wireless UIM is changed and is verified status.At this moment, according to distance, set certification level from target device to wireless UIM.
When certification level was divided into two ranks, the result as shown in Figure 7.Provide a plurality of certification levels that the service that will provide by target device according to the distance change of target device is provided.
For example, if the distance from target device to wireless UIM is quite long, notify the current state of target device wireless UIM to allow the user to obtain whether to use the information of this target device.If the distance from target device to wireless UIM is shorter, the owner of so wireless UIM can use this target device.
The following describes the distance to target device, change service method to be supplied according to wireless UIM.Referring to Figure 10, represented among the figure that wherein mail terminal and facsimile terminal are used as the example of target device.With regard to mail terminal 101, if to the distance of wireless UIM 2 in predetermined value, its indication certification level (1) so, whether mail has been arrived wireless UIM 2 to mail terminal 101 and mail terminal 101 is notified wireless UIM 2 by the information of another people's use at present.
As wireless UIM 2 during near mail terminal 101, it indicates certification level (2), and wherein wireless UIM 2 signs in to mail terminal 101, thereby allows the user of wireless UIM 2 to use mail terminal 101.That is, if the user of wireless UIM 2 can only obtain to express the information of the arrival of the mail of sending this user, even he can not read this mail so, wireless UIM 2 also can be remotely logged into mail terminal 101.
With regard to facsimile terminal 102, carry out following operation.That is, if quite long to the distance of facsimile terminal 102, its indicates certification level (1) so, and in certification level (1), authenticating device is apprised of the arrival of the fax of issuing it.As wireless UIM 102 during near facsimile terminal 102, it indicates certification level (2), and wherein when entering certification level (2), the fax of issuing the user of wireless UIM 2 is printed.Thereby,, therefore can avoid revealing the risk of fax to any unwarranted third party owing to before the user who sends fax to it is near facsimile terminal 102, do not carry out the printing of fax.
If the shared target device of a plurality of users, so above mentioned authentication method based on above-mentioned target device and authenticate device (perhaps wireless UIM) allows the wireless UIM of each user by his on hand, whether be used at present about target device from the long-range acquisition of target device, perhaps send the information whether his mail has arrived, thereby realize effective use of effective use of target device and each user's time.This method also allows each user only by carrying wireless UIM near target device, easily signs in on the target device, thereby guarantees fail safe and improve availability.
Among second embodiment that mentions, two kinds of certification levels have been used in the above according to the distance between target device and the authenticate device (perhaps wireless UIM).But the present invention is not limited to this embodiment.More certification level is provided, and also is practicable thereby correspondingly change service to be supplied.In addition, whenever go up the size of authentication region according to the number and the change of service change certification level to be supplied, thereby the service provisioning of carrying out more refinement also is practicable.
Below with reference to the description of drawings third embodiment of the present invention.
<system configuration 〉
Referring to Figure 11, represented illustration structure among the figure based on the Verification System of the authenticate device that is practiced as one embodiment of the present of invention.Promptly, this Verification System has authenticate device (1) and (2), use target device 30, linking objective equipment 40, certificate server 50 and position information providing device 60, and, carry out authentication so that utilize and use target device 30 according to positional information from authenticate device (1) and (2) and position information providing device 60 acquisitions.
If the linking objective equipment 40 that exists the necessary circuit of the supply that needs the user to receive service to connect, authenticate device (1) provides authentication information and positional information to linking objective equipment 40 so, thereby execution authentication processing, according to described authentication processing, linking objective equipment 40 and use target device 40 are interconnected, thereby allow the user to conduct interviews, and the providing of the information of reception according to user right.
For the equipment (that is, position information providing device) that positional information is provided to authenticating device (1), use GPS (global positioning system) equipment or wireless aps (access point) equipment.When authenticating device (1) is connected with use target device 30, authenticating device (1) is carried out authentification of user (promptly, authentification of user based on the authentication information of registering), and according to the signal acquisition positional information that transmits from position information providing device 60, thereby by positional information according to registration, with reference to the rights of using table, determine whether the user has the right to use of the positional information of acquisition.
Should note because positional information is obtained by authenticate device (1), so positional information is actually the information of the position of expression authenticate device (1); But because authenticate device (1) is connected (directly or by cable or be included in use in the target device 30) with using target device 30, therefore, positional information is equal to the information of the position of representing use target device 30.
If the user has the right to use authentification of user and positional information, use target device by utilizing so, providing of service can be provided the user.Especially, in the 3rd embodiment, can pass through the use location information setting right to use, thus can realization with the people with use the regional information that adapts that service is provided.
In addition, in the 3rd embodiment, authenticate device (1) has the ability that obtains positional information, is general use target devices if consequently use target device 30, and the regional limited service based on user and positional information can be provided so.
In addition, except the usufructuary setting based on authentification of user and positional information, the 3rd embodiment can (authenticate device (1) and authenticate device (2) be carried out authentication, so that improve level of security by utilizing two authenticate devices.That is, authenticate device (1) determines whether authenticate device (2) is positioned at the Free Region of authenticate device (1) permission, if find authenticate device (2) in this scope, so to using target device to send unlocking request.
Thereby, have only the user of working as to have authenticate device (2), and when being positioned at the Free Region of authenticate device (1), use target device just to become available, if consequently the user leaves this position, authenticate device (1) still keeps being connected with user target device unintentionally simultaneously, has only authenticate device (2) so outside Free Region, use target device just to be held locking, thereby prevent that any third party from illegally utilizing the use target device.
The configuration of<authenticate device 〉
Referring to Figure 12, represented the functional block of authenticate device among the figure.Authenticate device (1) has the authentication information 11 in the zone of managing according to cipher mode, authentication processing piece 12, and positional information rights of using table 13, and authentication-time location information keeps district 14.In addition, authenticate device (1) has use target device communication block 15, positional information collection block 16 and the radio communication piece 17 as the communication block of communicating by letter with relevant device.
In the functional block of mentioning in the above, authentication information 11 is authentification of user information necessary, and it is the identifying information such as the PIN code of registration.Correlation between positional information rights of using table 13 expression zone (positional information) and each certified user's the rights of using, and provide which kind of rights of using of expression will be given the data of which scope.
When authenticate device (1) is connected with use target device 30, authentication processing piece 12 is by utilizing the authentication information authenticated user, and positional information by utilizing positional information collection block 16 to obtain from position information providing device 60, with positional information rights of using table 13, determine whether the user has the rights of using with the current region correspondence.
It is the memory blocks of wherein preserving the positional information that obtains when authenticate device (1) authenticates the user who is connected with use target device 30 that authentication-time location information keeps district 14.
The collection of positional information is carried out according to predetermined timing relation by positional information collection block 16.If be kept at the positional information that obtains when authentication-time location information keeps authentication in the district 14 and concern that according to predetermined timing location of capture information is identical, do not give rights of using with not making any change so; If there are differences between these information, reference position information rights of using table 13 determines whether to exist the right to use of this positional information so, thereby upgrades the content that authentication-time location information keeps district 14, preserves to be used for described definite positional information.
So, using target device 30 if in the scope of rights of using, utilize, the user can continue described use steadily so; But, if use target device 30 to break away from the zone of rights of using, make rights of using invalid so, use target device 30 no longer can be used.
Authenticate device (2) has authentication information 21 and the authentication processing piece 22 in the zone of managing according to cipher mode.In addition, authenticate device (2) has the radio communication piece 23 as communication block.Authentication information 21 be be kept at authenticate device (1) in the identical information of authentication information 11.Authentication processing piece 22 is by utilizing the authentication processing of authentication information 21 execution and authenticate device (1).When authentication success, authenticate device (2) by utilizing positional information, determines whether to exist the right to use by authenticate device (1).
Between authenticate device (1) and (2),, carry out authentication processing by radio communication piece 17 and 23 by transmitting the authentication information of encrypting.In this was handled, the comunication area in the radio communication piece 17 of authenticate device (1) provided the Free Region of authenticate device (1) permission.When these authenticate devices at this Free Region, that is, and authenticate device (2) can with the zone of authenticate device (1) radio communication in the time, carry out authentication.If authentication success obtains positional information so, and, determine whether to exist the right to use according to the positional information and the user profile that obtain.
So when the authenticate device (2) that the user has and authenticate device (1) is paired, and when entering the Free Region of authenticate device (1), the user can utilize this use target device 30.If user and authenticate device (2) withdraw from the Free Region of authenticate device (1) together, authentification failure uses target device 30 locked so.Thereby, if the user leaves this Free Region, make authenticate device (1) keep being connected simultaneously unintentionally, so as long as authenticate device (2) is positioned at outside the Free Region with using target device 30, use target device 30 just locked, use without authorization thereby avoid third-party arbitrarily.
If authenticate device (1) and (2) (for example are not used alone as mentioned above like that, if authenticate device (2) directly is connected with authenticate device (1)), authentication information 11 and authentication information 21 so, authentication processing piece 12 and authentication processing piece 22 are shared by these authenticate devices.So, under the situation of the authentication processing part of not arranging to carry out the authentication between the authenticate device, carry out the authentication (for example PIN input or biostatistics) of appointment and can replace other processing sequence.
<operation and authentication method 〉
Referring to Figure 13, represented to describe the sequence of operation summary among the figure.Use in the following description, but Reference numeral not shown in Figure 13 is referring to Figure 11 and 12.Just operate summary, if authenticate device (2) is positioned at the Free Region that authenticate device (1) provides, authenticate device (1) sends its authentication information 11 to authenticate device (2) by radio communication piece 17 so, and requires authentication request.The authentication information that authenticate device (2) inspection is received if do not find any problem in authentication information 11, sends the authentication information 21 of authenticate device (2) to authenticate device (1) so.
Subsequently, receiving under the situation of authentication information 21 from authenticate device (2), authenticate device (1) is examined the authentication information of receiving 21, obtain positional information from position information providing device 60, and the authentication information 21 of comparison authenticate device (2) and the positional information rights of using table 13 that remains in the authenticate device (1), thereby determine whether to exist the right to use.If the right to use of finding determines that so authentication is successful, in view of the above, authenticate device (1) sends authentication result to authenticate device (2), and and the unlocking request that adapts of the right to use send use target device 30 to.Thereby, use target device 30 to become available.
Subsequently, keep the session between the authenticate device (1) and (2), authenticate device (1) enters the state that monitors the existence of authenticate device (2) by " keep-alive " message all the time.
If without any responding from authenticate device (2) (withdrawing from Free Region), perhaps obtain positional information all the time, and use target device 30 to be brought to outside the scope of application (usufructuary zone), authenticate device (1) sends locking request to and uses target device 30 so.Thereby, use target device 30 to enter lock-out state, become unavailable.
Subsequently, attempt using target device 30 to be connected with linking objective equipment 40 by utilizing.On the other hand, if providing of solicited message transmits connection request from use target device 30 to linking objective equipment so.Receiving under the situation of connection request that linking objective equipment 40 asks that authentication and positional information transmission send use target device 30 to together with the authentication information of linking objective equipment 40.
After the above-mentioned request of receiving, use target device 30 that above mentioned information is sent to authenticate device (1) from linking objective equipment 40.The positional information that authenticate device (1) provides authentication information 11 and obtains.Subsequently, use target device 30 that this information is sent to linking objective equipment 40.Linking objective equipment 40 sends authentication request the certificate server 50 of upper strata to, and receives authentication result.If authentication success, linking objective equipment 40 sends Free Region information to and uses target device 30 so.Thereby and the corresponding access right of the right to use, perhaps the providing of service (reception of information) becomes available using on the target device 30.
The message that receives goes up at authenticate device (1) and is managed.Subsequently, go up the existence whether information of continuous management position information and expression authenticate device (2) at authenticate device (1).If find that the authentication of one of these items of information is unsuccessful, use target device 30 to enter lock-out state immediately so, thereby use target device 30 unavailable.
According to the common authentication sequence, for example SSL (security socket layer) carries out the authentication between the authenticate device (1) and (2), and the authentication between linking objective equipment 40 and the use target device 30.Go up the management expression at authenticate device (1) and be locked into the Operation Log information that locks performed operation again of using target device from using separating of target device.If owing to withdraw from the Free Region of authenticate device (2) or authenticate device (1), perhaps use target device 30 to break away from the zone of rights of using, authentification failure is perhaps when using end, from using target device 30 these log informations of deletion.This configuration prevents that any unwarranted third party uses Operation Log information after target device 30 is used in the authorized user utilization.
As mentioned above, above mentioned sequence allows to want to use the user of special services that authenticate device is connected with the use target device 30 that is positioned at the specific region, thereby, provide based on authentification of user and provide for information about restrict access and the information of using target device 30 present positions according to user and described zone.In addition, above mentioned sequence can be avoided using target device 30 to be used by any unauthorized party owing to leave behind the authenticate device that is contained on the use target device 30 unintentionally.In addition, use restriction,, thereby prevent that any unwarranted third party from using Operation Log information so from use target device 30 deletion action log informations if on use target device 30, be provided with.
<to the application of video telephone 〉
When sending video telephone call or call, also whether uncertain required callee is at the other end, and perhaps the third party may reply this calling.Thereby,, authenticate according to distance from terminal (telephone set of the other end in this case) in order to guarantee required callee's answering call.For example,, do not authenticate so, represent that required callee is not positioned near the information that exists and is transmitted to calling party if the callee is positioned at the place with a certain distance from described terminal.On the other hand, if the callee is positioned at the preset range of described terminal, so wireless UIM authentication success represents that so the information that exists that required callee is positioned at the other end is transmitted to calling party.
With a certain distance from described terminal, suppose a scope for above mentioned, in this scope, in the house, can hear ringing tone.When video telephone call finishes, when its during near the video telephone terminal, the callee can reply.This configuration can avoid any third party to reply video telephone call.
Under the situation of communicating by letter on the video telephone, the third party may see the screen of television telephone set.For fear of this problem, detection is utilizing video telephone (corresponding to the target device of embodiments of the invention) when calling out the user of wireless UIM (1), and the third party user of wireless UIM (for example wireless UIM (2)) is to interior the entering of authentication region of video telephone.If the wireless UIM that enters is not the wireless UIM that is scheduled to, and is invisible by the screen that makes video telephone so, perhaps the user to wireless UIM (1) sends warning message, prevents any third-party spying upon.
For above mentioned authentication region, suppose a scope, in this scope, the screen of video telephone is discernible.This configuration can prevent that any third party from seeing the screen of video telephone.
Though utilize specific term that the preferred embodiments of the present invention have been described, such explanation just illustrate of the present invention, under the situation of the spirit or scope that do not break away from following claim, can make variations and modifications.

Claims (26)

1, a kind of when authenticate device enters predetermined authentication region, by authenticating described authenticate device, provide the target device of reservation service, described target device comprises:
Be configured to according to being positioned at the authentication state of a plurality of authenticate devices of described authentication region, control the control device of change of the content of service to be supplied.
2, according to the described target device of claim 1,
Wherein when the described a plurality of authenticate devices that are positioned at described authentication region were certified, described control device was provided by providing of reservation service.
3, according to the described target device of claim 1,
Wherein at the described predetermined authentication device that is positioned at described authentication region by success identity, and provide under the situation of reservation service, when unscheduled authenticate device entered described authentication region, described control device was controlled the change of the state that described reservation service provides.
4, under a kind of situation of the authentication region that is positioned at target device at authenticate device, by the authentication method that the target device that uses for the user authenticates authenticate device, described authentication method comprises the steps:
According to the authentication state of a plurality of authenticate devices that are positioned at described authentication region, change the content of the service that described target device will provide.
5, according to the described authentication method of claim 4,
Wherein when the described a plurality of authenticate devices that are arranged in described authentication region were certified, described target device provided predetermined service.
6, according to the described authentication method of claim 4,
Wherein certified and provide under the situation of reservation service at the described predetermined authentication device that is positioned at described authentication region, when unscheduled authenticate device entered in the described authentication region, the state that provides of described reservation service was provided described target device.
7, a kind of target device, when authenticate device when the described target device, described target device authenticates described authenticate device, described target device comprises:
Be configured to detect the communicator whether described authenticate device has entered predetermined authentication region by transmitting and receiving prearranged signals; With
Be configured to be positioned under the situation of described authentication region at described authenticate device, by the authentication information of described communicator reception from described authenticate device, mate the authentication information of described reception and the authentication information of registration, and send the control device of described authenticate device by the authentication result that described communicator obtains described coupling to.
8, according to the described target device of claim 7,
Wherein said control device is according in described authentication region, and how far described authenticate device has from described target device, changes certification level by described communicator.
9, a kind of authenticate device, described authenticate device will be when being authenticated by described target device near the target device that uses for the user time, and described authenticate device comprises:
Be configured to authentication information is sent to described target device, and receive the communicator of authentication result from described target device; With
Be configured to preserve the storage device that can not rewrite of described authentication information.
10, according to the described authenticate device of claim 9, also comprise:
Be configured to show the display unit of the described authentication result that receives by described communicator.
11, a kind of when authenticate device near for the target device of user use the time, authenticate the authentication method of described authenticate device by described target device, described method comprises the steps:
Determine by described target device whether described authenticate device has entered predetermined authentication region;
Be positioned at described predetermined authentication region if find described authenticate device, so by the authentication information of described target device reception from described authenticate device, mate the authentication information of described reception and the authentication information of registration, and the authentication result that obtains by described coupling is sent to described authenticate device; With
By the described authentication result of described authenticate device reception from described target device.
12, according to the described authentication method of claim 11,
Wherein said target device is according in described authentication region, and how far described authenticate device has from described target device, changes certification level.
13, according to the described authentication method of claim 11,
Wherein said target device is according in described authentication region, and how far described authenticate device has from described target device, changes available service.
14, according to the described authentication method of claim 11,
Wherein said authenticate device shows the described authentication result that receives from described target device.
15, according to the described authentication method of claim 14,
Wherein said authenticate device is carried out described demonstration according to the certification level that described target device is provided with.
16, according to the described authentication method of claim 14,
Wherein said authenticate device is carried out described demonstration according to the available service that described target device is provided with.
17, a kind of will by with the authenticate device that authenticates being connected of the target device that uses for the user to determine that described target device is whether available, described authenticate device comprises:
Be configured under described authenticate device and situation that described target device is connected, according to the positional information collection block that obtains the positional information of described target device from the position information providing device signal supplied; With
Be configured to determine according to the positional information of registration whether described user has usufructuary authentication processing piece by utilizing described positional information that described positional information collection block obtains and described user's authentication information.
18, according to the described authenticate device of claim 17,
Wherein said authentication processing piece is regularly gathered described positional information, when carrying out described collection, by utilizing described positional information and described user authentication information, determines whether to exist the described right to use at every turn.
19, according to the described authenticate device of claim 17, also comprise:
Be configured to transition table and be shown in the communication block that whether has the information of another authenticate device in the preset range,
If wherein described communication block detects another authenticate device, so described authentication processing piece authenticates described detected authenticate device, if authentication success according to described user's authentication information and described positional information, determines whether to have the right to use so.
20, a kind ofly authenticate described authenticate device by the target device that connects authenticate device and use for the user, thus the whether available method of definite described target device, and described authentication method comprises the steps:
Under described authenticate device and situation that described target device is connected, according to from the position information providing device signal supplied, obtain the positional information of described target device by described authenticate device; With
By utilizing described positional information that described authenticate device obtains and described user's authentication information, determine according to the positional information of registration whether described user has the right to use by described authenticate device.
21, according to the described authentication method of claim 20,
If wherein in the preset range that described authenticate device is set, detect another authenticate device, if and described detected authenticate device is certified, so described authenticate device determines whether to exist the described right to use according to described positional information and described user's authentication information.
22, according to the described authentication method of claim 20, also comprise the steps:
If find described user's the right to use, so described user's authentication information and described positional information are sent to external service from described target device equipment is provided; With
According to described user's authentication information and described positional information, determine whether that the service that starts described service providing device provides.
23, according to the described authentication method of claim 20, also comprise the steps:
If described authenticate device is found the described right to use, and the described right to use is invalid after described user uses described target device, so from the usage log of described target device deletion by described user record.
24, a kind of when entering predetermined authentication region when authenticate device, authenticate the target device that described authenticate device provides reservation service, described target device comprises:
Be configured to according to being positioned at the authentication state of a plurality of authenticate devices of described authentication region, control the controller of change of the content of service to be supplied.
25, a kind of target device, when authenticate device when the described target device, described target device authenticates described authenticate device, described target device comprises:
Be configured to detect the communication block whether described authenticate device has entered predetermined authentication region by transmitting and receiving prearranged signals; With
Be configured to be positioned under the situation of described authentication region at described authenticate device, by the authentication information of described communication block reception from described authenticate device, mate the authentication information of described reception and the authentication information of registration, and send the controller of described authenticate device by the authentication result that described communication block obtains described coupling to.
26, a kind of authenticate device when described authenticate device during near the target device that uses for the user, will be authenticated by described target device, and described authenticate device comprises:
Be configured to authentication information is sent to described target device, and receive the communication block of authentication result from described target device; With
Be configured to preserve the memory that can not rewrite of described authentication information.
CNA2006101148976A 2005-08-16 2006-08-16 Target apparatus, certification device, and certification method Pending CN1917423A (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JP2005235613 2005-08-16
JP2005235611A JP2007052513A (en) 2005-08-16 2005-08-16 Target device, authentication device, and authentication method
JP2005235611 2005-08-16
JP2005235612 2005-08-16

Publications (1)

Publication Number Publication Date
CN1917423A true CN1917423A (en) 2007-02-21

Family

ID=37738322

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2006101148976A Pending CN1917423A (en) 2005-08-16 2006-08-16 Target apparatus, certification device, and certification method

Country Status (2)

Country Link
JP (1) JP2007052513A (en)
CN (1) CN1917423A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102404110A (en) * 2011-12-08 2012-04-04 宇龙计算机通信科技(深圳)有限公司 Method and device for obtaining keys
CN102694946A (en) * 2011-03-23 2012-09-26 柯尼卡美能达商用科技株式会社 Image forming apparatus
CN101488956B (en) * 2008-01-18 2013-01-16 索尼株式会社 Connection authentication system, terminal device, connection authentication server, connection authentication method
CN101355556B (en) * 2007-07-26 2013-06-05 富士施乐株式会社 Authentication information processing device, authentication information processing method
CN105027131A (en) * 2012-12-27 2015-11-04 罗文有限公司 System and method for secure login, and apparatus for same
CN106030339A (en) * 2014-02-27 2016-10-12 株式会社电装 Navigation message reception device
CN109901533A (en) * 2014-08-11 2019-06-18 费希尔-罗斯蒙特系统公司 For the method and apparatus used in Process Control System
CN111581612A (en) * 2020-04-26 2020-08-25 支付宝(杭州)信息技术有限公司 Login state data processing method, device, equipment and system of applet application
US11385608B2 (en) 2013-03-04 2022-07-12 Fisher-Rosemount Systems, Inc. Big data in process control systems
US11886155B2 (en) 2015-10-09 2024-01-30 Fisher-Rosemount Systems, Inc. Distributed industrial performance monitoring and analytics

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009276866A (en) * 2008-05-13 2009-11-26 Ricoh Co Ltd Information processor, image forming apparatus, information processing system, method for controlling information processor, program, and recording medium
JP5702627B2 (en) * 2011-02-25 2015-04-15 理想科学工業株式会社 Inkjet printer
JP2012051376A (en) * 2011-10-11 2012-03-15 Ricoh Co Ltd Apparatus, authentification method and program
US9942750B2 (en) * 2013-01-23 2018-04-10 Qualcomm Incorporated Providing an encrypted account credential from a first device to a second device
JP2017069903A (en) * 2015-10-02 2017-04-06 キヤノン株式会社 Log-in processing execution method, program, and portable terminal
JP6540966B2 (en) * 2016-09-28 2019-07-10 京セラドキュメントソリューションズ株式会社 Electronic device and function execution program

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1539216A (en) * 2001-08-03 2004-10-20 诺基亚有限公司 System and method for managing network service auess and enrollment
CN1647063A (en) * 2002-04-04 2005-07-27 空气磁体公司 Detecting an unauthorized station in a wireless local area network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1539216A (en) * 2001-08-03 2004-10-20 诺基亚有限公司 System and method for managing network service auess and enrollment
CN1647063A (en) * 2002-04-04 2005-07-27 空气磁体公司 Detecting an unauthorized station in a wireless local area network

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101355556B (en) * 2007-07-26 2013-06-05 富士施乐株式会社 Authentication information processing device, authentication information processing method
CN101488956B (en) * 2008-01-18 2013-01-16 索尼株式会社 Connection authentication system, terminal device, connection authentication server, connection authentication method
CN102694946A (en) * 2011-03-23 2012-09-26 柯尼卡美能达商用科技株式会社 Image forming apparatus
CN102404110A (en) * 2011-12-08 2012-04-04 宇龙计算机通信科技(深圳)有限公司 Method and device for obtaining keys
US9876785B2 (en) 2012-12-27 2018-01-23 Rowem, Inc. System and method for safe login, and apparatus therefor
CN105229655A (en) * 2012-12-27 2016-01-06 罗文有限公司 For the system of secure log, method and equipment thereof
CN105027131A (en) * 2012-12-27 2015-11-04 罗文有限公司 System and method for secure login, and apparatus for same
US9882896B2 (en) 2012-12-27 2018-01-30 Rowem Inc. System and method for secure login, and apparatus for same
CN105229655B (en) * 2012-12-27 2018-05-08 罗文有限公司 System, method and its equipment for secure log
CN105027131B (en) * 2012-12-27 2018-07-17 罗文有限公司 System, method and its equipment for secure log
US11385608B2 (en) 2013-03-04 2022-07-12 Fisher-Rosemount Systems, Inc. Big data in process control systems
CN106030339A (en) * 2014-02-27 2016-10-12 株式会社电装 Navigation message reception device
CN106030339B (en) * 2014-02-27 2017-11-10 株式会社电装 Navigation message reception device
CN109901533A (en) * 2014-08-11 2019-06-18 费希尔-罗斯蒙特系统公司 For the method and apparatus used in Process Control System
CN109901533B (en) * 2014-08-11 2022-04-01 费希尔-罗斯蒙特系统公司 Method and apparatus for use in a process control system
US11886155B2 (en) 2015-10-09 2024-01-30 Fisher-Rosemount Systems, Inc. Distributed industrial performance monitoring and analytics
CN111581612A (en) * 2020-04-26 2020-08-25 支付宝(杭州)信息技术有限公司 Login state data processing method, device, equipment and system of applet application

Also Published As

Publication number Publication date
JP2007052513A (en) 2007-03-01

Similar Documents

Publication Publication Date Title
CN1917423A (en) Target apparatus, certification device, and certification method
TWI539838B (en) Method and apparatus for access credential provisioning
AU2002226231B2 (en) Method and system for securing a computer network and personal identification device used therein for controlling access to network components
CN1225711C (en) Digital content issuing system and digital content issuing method
CN102685103B (en) Quarantine network system and quarantine client
CN102084370A (en) System for mitigating the unauthorized use of a device
CN102084372A (en) System for monitoring the unauthorized use of a device
US20070043950A1 (en) Target apparatus, certification device, and certification method
CN107071775B (en) Mobile terminal and method and device for redirecting access to base station
KR100748034B1 (en) Apparatus and method for bluetooth control in portable terminal
JP5167835B2 (en) User authentication system, method, program, and medium
CN101444119A (en) System for implementing security police on mobile communication equipment
JP2007293834A (en) Attendance management system
CN1968095A (en) Method and apparatus for login local machine
CN1536807A (en) Document safety transfer system and method
US20080198410A1 (en) Print Management Device and Print Management Method
JP2010199997A (en) Access authentication system, information processing apparatus, access authentication method, program, and recording medium
CN1700227A (en) Consumer authentication system, consumer authentication method and service provide equipment
JP4836499B2 (en) Network printing system
WO2018151392A1 (en) Smart login method using messenger service and apparatus therefor
CN102291237A (en) Information protection apparatus, information protection method, and storage medium
CN1695362A (en) Secure access to a subscription module
US9648495B2 (en) Method and device for transmitting a verification request to an identification module
JP2005293151A (en) Terminal validity assurance system and terminal validity assurance method
JP2015001765A (en) Mobile terminal, server device, information terminal, and shared terminal management system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20070221