Authentication apparatus, authentication method, and non-transitory computer readable medium
First Claim
Patent Images
1. An authentication apparatus comprising:
- a memory that stores information regarding a device and an other device located in the vicinity of the device in association with each other; and
a processor programmed to;
in a case where there is an authentication request from the device, receive other device information at a time of the authentication request; and
authenticate the device based on the information regarding the other device stored in the memory and the other device information that is received at the time of the authentication request, wherein;
the information regarding the other device and the other device information include information regarding operation of the other device; and
the operation of the other device includes at least one of a remaining charge amount of a battery, an operation record, an access log of an operating system, a security log, and a sensor log of the other device.
2 Assignments
0 Petitions
Accused Products
Abstract
An authentication apparatus includes a memory that stores information regarding a device and other device located in the vicinity of the device in association with each other; a receiving unit that, in a case where there is an authentication request from the device, receives information regarding other device located in the vicinity of the device at a time of the authentication request; and an authentication unit that authenticates the device based on the information regarding the other device stored in the memory and the information regarding the other device that is received by the receiving unit at the time of the authentication request.
12 Citations
14 Claims
-
1. An authentication apparatus comprising:
-
a memory that stores information regarding a device and an other device located in the vicinity of the device in association with each other; and a processor programmed to; in a case where there is an authentication request from the device, receive other device information at a time of the authentication request; and authenticate the device based on the information regarding the other device stored in the memory and the other device information that is received at the time of the authentication request, wherein; the information regarding the other device and the other device information include information regarding operation of the other device; and the operation of the other device includes at least one of a remaining charge amount of a battery, an operation record, an access log of an operating system, a security log, and a sensor log of the other device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An authentication method comprising:
-
storing information regarding a device and an other device located in the vicinity of the device in association with each other in a memory; receiving, in a case where there is an authentication request from the device, other device information at a time of the authentication request; and authenticating the device based on the information regarding the other device stored in the memory and the other device information that is received at the time of the authentication request, wherein; the information regarding the other device and the other device information include information regarding operation of the other device; and the operation of the other device includes at least one of a remaining charge amount of a battery, an operation record, an access log of an operating system, a security log, and a sensor log of the other device. - View Dependent Claims (12)
-
-
13. A non-transitory computer readable medium storing a program causing a computer to:
-
store, in a memory, information regarding a device and an other device located in the vicinity of the device in association with each other; in a case where there is an authentication request from the device, receive other device information at a time of the authentication request; and authenticate the device based on the information regarding the other device stored in the memory and the other device information that is received at the time of the authentication request, wherein; the information regarding the other device and the other device information include information regarding operation of the other device; and the operation of the other device includes at least one of a remaining charge amount of a battery, an operation record, an access log of an operating system, a security log, and a sensor log of the other device. - View Dependent Claims (14)
-
Specification