Authentication Proxy Method, Distribution Management Device, And Authentication Proxy Method Program
First Claim
1. An authentication proxy method characterized by including the steps of:
- determining whether a transmission request for a signal including authentication data has been made from a contents providing server to a terminal device or not; and
creating a signal including the authentication data for the terminal device and transmitting the created signal to the contents providing server when it is concluded that the transmission request has been made.
3 Assignments
0 Petitions
Accused Products
Abstract
[Problem] To obtain an authentication proxy method, a distribution management device to be proxy for authentication, etc. in which a user does not have to be aware of authentication in distribution of contents needing authentication.
[Means for Resolution] A distribution management device 22 for managing distribution of signals including data of contents to a mobile communication network 10 determines whether a contents providing server 31 on another communication network 30 has made a transmission request for a signal including authentication data in response to a distribution request for a signal including data of contents which request has been sent from a mobile terminal device 11 through the mobile communication network 10. When it is concluded that the transmission request has been made, the distribution management device 22 creates a signal including the authentication data for the mobile terminal device 11 and transmits the created signal to the contents providing server 31.
15 Citations
17 Claims
-
1. An authentication proxy method characterized by including the steps of:
-
determining whether a transmission request for a signal including authentication data has been made from a contents providing server to a terminal device or not; and
creating a signal including the authentication data for the terminal device and transmitting the created signal to the contents providing server when it is concluded that the transmission request has been made.
-
-
2. An authentication proxy method characterized in that a distribution management device for managing distribution of signals including data of contents to one communication network performs:
-
determining whether a transmission request for a signal including authentication data has been made from a contents providing server on another communication network in response to a distribution request for a signal including data of contents from a terminal device through the one communication network or not; and
creating a signal including the authentication data for the terminal device and transmitting the created signal to the contents providing server when it is concluded that the transmission request has been made. - View Dependent Claims (3)
-
-
4. A distribution management device characterized in that:
-
the distribution management device is provided between one communication network and another communication network; and
when a transmission request for a signal including authentication data for a terminal device on the one communication network has been made from a contents providing server on the other communication network, the distribution management device creates a signal including the authentication data for the terminal device and transmits the created signal to the contents providing server. - View Dependent Claims (7, 8, 15)
-
-
5. A distribution management device characterized in that:
-
the distribution management device is provided between one communication network and another communication network; and
the distribution management device comprises;
a storage means for storing authentication data about one or plural terminal devices;
a data processing means for searching the storage means so as to acquire authentication data corresponding to one of the terminal devices, and creating a signal including the acquired authentication data, when the terminal device makes a distribution request for a signal including data of contents and a contents server makes a transmission request for a signal including the authentication data for the terminal device in response to the distribution request; and
a communication means for transmitting the signal including the authentication data to the contents providing server. - View Dependent Claims (6, 11, 12, 13, 14, 16, 17)
-
-
9. An authentication proxy method program characterized by making a computer execute the steps of:
-
determining whether a signal indicating a request for authentication data for a terminal device has been transmitted from a contents providing server or not in response to a distribution request from the terminal device for a signal including data of contents; and
creating a signal including the authentication data for the terminal device and transmitting the created signal to the contents providing server through a communication means when it is concluded that the signal indicating the request for the authentication data has been transmitted. - View Dependent Claims (10)
-
Specification