Access authentication method, information processing unit, and computer product
First Claim
1. An access authentication method for performing access authentication using a recording medium that is detachably connected to an information processing unit and authentication information provided by a user, the access authentication method comprising:
- encrypting the authentication information from the user with a predetermined key to generate encrypted authentication information when access authentication based on the authentication information is successful, and storing the encrypted authentication information in the recording medium; and
authenticating the encrypted authentication information stored in the recording medium using the predetermined key, and, when the encrypted authentication information is authenticated, determining that access authentication is successful without receiving authentication information from the user.
2 Assignments
0 Petitions
Accused Products
Abstract
An input personal identification number (PIN) is encrypted, identification information to identify a computer that has generated an encrypted PIN is associated with the encrypted PIN, and the associated information is sent to a recording medium. When the recording medium is again connected to the computer, it is checked whether the identification information is present in the recording medium. If the identification information is present in the recording medium, the encrypted PIN associated with the identification information is decrypted. These processes can be performed on both computer side and recording medium side.
-
Citations
29 Claims
-
1. An access authentication method for performing access authentication using a recording medium that is detachably connected to an information processing unit and authentication information provided by a user, the access authentication method comprising:
-
encrypting the authentication information from the user with a predetermined key to generate encrypted authentication information when access authentication based on the authentication information is successful, and storing the encrypted authentication information in the recording medium; and
authenticating the encrypted authentication information stored in the recording medium using the predetermined key, and, when the encrypted authentication information is authenticated, determining that access authentication is successful without receiving authentication information from the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-readable recording medium that stores therein an access authentication program for implementing an access authentication method in which access authentication is performed by an information processing unit being a computer with a recording medium that is detachably connected to the information processing unit and authentication information provided by a user, the access authentication program causing the computer to perform:
-
encrypting the authentication information from the user with a predetermined key to generate encrypted authentication information when access authentication based on the authentication information is successful, and storing the encrypted authentication information in the recording medium; and
authenticating the encrypted authentication information stored in the recording medium using the predetermined key, and, when the encrypted authentication information is authenticated, determining that access authentication is successful without receiving authentication information from the user. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer-readable recording medium that stores therein an access authentication program for implementing an access authentication method in which access authentication is performed by a recording medium being a computer that is detachably connected to an information processing unit with authentication information provided by a user, the access authentication program causing the computer to perform:
-
encrypting the authentication information from the user with a predetermined key to generate encrypted authentication information when access authentication based on the authentication information is successful, and storing the encrypted authentication information in the recording medium; and
authenticating the encrypted authentication information stored in the recording medium using the predetermined key, and, when the encrypted authentication information is authenticated, determining that access authentication is successful without receiving authentication information from the user. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27)
-
-
28. An information processing unit for performing access authentication using a recording medium that is detachably connected thereto and authentication information provided by a user, the information processing unit comprising:
-
an encrypting unit that encrypts the authentication information from the user with a predetermined key to generate encrypted authentication information when access authentication based on the authentication information is successful, and stores the encrypted authentication information in the recording medium; and
an authenticating unit that authenticates the encrypted authentication information stored in the recording medium using the predetermined key, and, when the encrypted authentication information is authenticated, determining that access authentication is successful without receiving authentication information from the user.
-
-
29. A recording medium that is detachably connected to an information processing unit for performing access authentication using authentication information provided by a user, the recording medium comprising:
-
an encrypting unit that encrypts the authentication information from the user with a predetermined key to generate encrypted authentication information when access authentication based on the authentication information is successful, and stores the encrypted authentication information in the recording medium; and
an authenticating unit that authenticates the encrypted authentication information stored in the recording medium using the predetermined key, and, when the encrypted authentication information is authenticated, determining that access authentication is successful without receiving authentication information from the user.
-
Specification