Access authentication system, access authentication method, and program storing medium storing programs thereof
First Claim
1. An access authentication system comprising:
- a client computer for transmitting a decryption-key request requesting for a decryption key which enables decryption of an encrypted file;
a network apparatus for adding to the decryption-key request first authentication information for authenticating the decryption-key request, and transferring the decryption-key request; and
a management server for authenticating the decryption-key request on the basis of the first authentication information, and transmitting the decryption key to the client computer upon successful authentication of the decryption-key request.
1 Assignment
0 Petitions
Accused Products
Abstract
When a decryption-key request is transmitted from a client computer to a management server via a network apparatus, the network apparatus instead of the client computer adds location information to the decryption-key request. When the decryption-key request reaches the management server, location information stored therein is compared with location information associated with the decryption-key request. When the two pieces of the location information are the same, a decryption key is transmitted to the client computer. Thus, only when the management server receives the decryption-key request via the network apparatus which adds the specific location information to the decryption-key request, the management server transmits the decryption key to the client computer. This allows the encrypted data to be accessed within a specific area.
22 Citations
19 Claims
-
1. An access authentication system comprising:
-
a client computer for transmitting a decryption-key request requesting for a decryption key which enables decryption of an encrypted file; a network apparatus for adding to the decryption-key request first authentication information for authenticating the decryption-key request, and transferring the decryption-key request; and a management server for authenticating the decryption-key request on the basis of the first authentication information, and transmitting the decryption key to the client computer upon successful authentication of the decryption-key request. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An access authentication method executed by an access authentication system including a network apparatus, said access authentication system authenticating a decryption-key request transmitted from a client computer, said decryption-key request requesting for a decryption key which enables decryption of an encrypted file, said access authentication method comprising the steps of:
-
receiving the decryption-key request; adding to the decryption-key request first authentication information for authenticating the decryption-key request; transferring the decryption-key request; authenticating the decryption-key request on the basis of the first authentication information; and transmitting the decryption key upon successful authentication of the decryption-key request. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A program storage medium readable by a computer, said program storage medium storing programs of instructions for a first computer and a second computer for executing an access authentication method, said first computer authenticating a decryption-key request transmitted from a client computer, said decryption-key request requesting for a decryption key which enables decryption of an encrypted file, said access authentication method comprising the steps of:
-
receiving the decryption-key request; adding to the decryption-key request first authentication information for authenticating the decryption-key request; transferring the decryption-key request; authenticating the decryption-key request on the basis of the first authentication information; and transmitting the decryption key upon successful authentication of the decryption-key request. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification