Access control device, communication system, program, and method for controlling access
First Claim
1. An access control device for controlling an access by a communication terminal to an application, the access control device comprising:
- a central processing unit (CPU) configured to;
manage the application in association with authentication information, which indicates an effective authentication method effective for authenticating an access request source of an access request to access the application;
authenticate the access request source using a usable authentication method, which can bo is used in the communication terminal, based on the access request;
receive the access request to access an intended application from the communication terminal;
control the communication terminal so thatthe communication terminal does not access the intended application when the CPU does not manage the authentication information, which indicates the effective authentication method used for authenticating the access request source, in association with the intended application, andthe communication terminal accesses the intended application when the CPU manages the authentication information, which indicates the effective authentication method used for authenticating the access request source, in association with the intended application; and
manage each access request source to the application in association with application information, which indicates the application used in the access request source, whereinthe CPU controls the communication terminal so that the communication terminal is prevented from accessing the intended application when the CPU does not manage the application information indicative of the intended application in association with the access request source to the intended application, andthe communication terminal accesses the intended application when the CPU manages the application information indicative of the intended application in association with the access request source, andthe CPU manages in association with period information, which indicates a period while the application is used, for each of the access request source and for each of the application information.
1 Assignment
0 Petitions
Accused Products
Abstract
An access control device for controlling an access by a communication terminal to an application includes an authentication method management means configured to manage each of the application in association with authentication information, which indicates an effective authentication method effective for authenticating an access request source of an access request to access the application, an authenticating means configured to authenticate the access request source using a usable authentication method, which can be used in the communication terminal, based on the access request, an access request receiving means configured to receive the access request to access an intended application from the communication terminal, and an access control means configured to control the communication terminal so that the communication terminal does not access the intended application in a case where the authentication method management means does not manage the authentication information, which indicates the authentication method used for the authentication.
-
Citations
6 Claims
-
1. An access control device for controlling an access by a communication terminal to an application, the access control device comprising:
-
a central processing unit (CPU) configured to; manage the application in association with authentication information, which indicates an effective authentication method effective for authenticating an access request source of an access request to access the application; authenticate the access request source using a usable authentication method, which can bo is used in the communication terminal, based on the access request; receive the access request to access an intended application from the communication terminal; control the communication terminal so that the communication terminal does not access the intended application when the CPU does not manage the authentication information, which indicates the effective authentication method used for authenticating the access request source, in association with the intended application, and the communication terminal accesses the intended application when the CPU manages the authentication information, which indicates the effective authentication method used for authenticating the access request source, in association with the intended application; and manage each access request source to the application in association with application information, which indicates the application used in the access request source, wherein the CPU controls the communication terminal so that the communication terminal is prevented from accessing the intended application when the CPU does not manage the application information indicative of the intended application in association with the access request source to the intended application, and the communication terminal accesses the intended application when the CPU manages the application information indicative of the intended application in association with the access request source, and the CPU manages in association with period information, which indicates a period while the application is used, for each of the access request source and for each of the application information. - View Dependent Claims (2, 3, 4)
-
-
5. A non-transitory recording medium storing a program which, when executed by a processor of an access control device for controlling an access by a communication terminal to an application, causes the access control device to:
-
manage the application in association with authentication information, which indicates an effective authentication method effective for authenticating an access request source of an access request to access the application; authenticate the access request source using a usable authentication method, which is used in the communication terminal, based on the access request; receive the access request to access an intended application from the communication terminal; control the communication terminal so that the communication terminal does not access the intended application when the authentication information, which indicates the effective authentication method used for authenticating the access request source, is not managed in association with the intended application, and the communication terminal accesses the intended application when the authentication information, which indicates the effective authentication method used for authenticating the access request source, is managed in association with the intended application; manage each access request source to the application in association with application information, which indicates the application used in the access request source; and control the communication terminal so that the communication terminal is prevented from accessing the intended application when the application information, indicative of the intended application, is not managed in association with the access request source to the intended application, and the communication terminal accesses the intended application when the application information, indicative of the intended application, is managed in association with the access request source, wherein each access request source is managed in association with each of the application information and with period information that indicates a period while the application is used.
-
-
6. A method, performed by a processor of an access control device for controlling an access by a communication terminal to an application, the method comprising:
-
managing the application in association with authentication information, which indicates an effective authentication method effective for authenticating an access request source of an access request to access the application; authenticating the access request source using a usable authentication method, which is used in the communication terminal, based on the access request; receiving the access request to access an intended application from the communication terminal; controlling the communication terminal so that the communication terminal does not access the intended application when the authentication information, which indicates the effective authentication method used for authenticating the access request source, is not managed in association with the intended application, and the communication terminal accesses the intended application when the authentication information, which indicates the effective authentication method used for authenticating the access request source, is managed in association with the intended application; managing each access request source to the application in association with application information, which indicates the application used in the access request source; and controlling the communication terminal so that the communication terminal is prevented from accessing the intended application when the application information, indicative of the intended application, is not managed in association with the access request source to the intended application, and the communication terminal accesses the intended application when the application information, indicative of the intended application, is managed in association with the access request source, wherein each access request source is managed in association with each of the application information and with period information that indicates a period while the application is used.
-
Specification