Authentication method for authenticating a terminal when a designated device is determined to be manipulated
First Claim
1. An authentication method for authenticating a terminal in an authentication system which includes a server and which authenticates the terminal, the authentication method comprising:
- collecting power usage information of each of one or more devices belonging to a group of the devices to be authenticated at prescribed intervals;
receiving, from the terminal, an authentication request including group identification information for identifying the group to be authenticated;
upon receipt of the authentication requestdesignating one of the devices as a manipulation target in the group of the devices to be authenticated, andproviding to the terminal a notificationidentifying the designated device that is designated as the manipulation target,and including details of instructions for manipulating the designated device;
determining, on a basis of a change in the power usage of at least one of the devices belonging to the group, whether the designated device designated as the manipulation target and identified in the notification is manipulated; and
authenticating the terminal and transmitting authentication information to the terminal when the designated device designated as the manipulation target and identified in the notification is determined to be manipulated in accordance with the instructions for manipulating the designated device,wherein the server designates the manipulation target.
1 Assignment
0 Petitions
Accused Products
Abstract
Power usage of each of one or more devices belonging to a group is collected at prescribed intervals, and an authentication request including group identification information for identification of the group to be authenticated is received from a terminal. Upon receipt of the authentication request, a device as a manipulation target in the group and details of a manipulation on the device are determined, and notification is provided to the terminal. Whether the device designated by the notification is manipulated is judged on the basis of a change in the power usage of each of the devices belonging to the group. If the device designated by the notification is judged to be manipulated, authentication information is transmitted to the terminal.
-
Citations
11 Claims
-
1. An authentication method for authenticating a terminal in an authentication system which includes a server and which authenticates the terminal, the authentication method comprising:
-
collecting power usage information of each of one or more devices belonging to a group of the devices to be authenticated at prescribed intervals; receiving, from the terminal, an authentication request including group identification information for identifying the group to be authenticated; upon receipt of the authentication request designating one of the devices as a manipulation target in the group of the devices to be authenticated, and providing to the terminal a notification identifying the designated device that is designated as the manipulation target, and including details of instructions for manipulating the designated device; determining, on a basis of a change in the power usage of at least one of the devices belonging to the group, whether the designated device designated as the manipulation target and identified in the notification is manipulated; and authenticating the terminal and transmitting authentication information to the terminal when the designated device designated as the manipulation target and identified in the notification is determined to be manipulated in accordance with the instructions for manipulating the designated device, wherein the server designates the manipulation target. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification