ACCESS CONTROL DEVICE, COMMUNICATION SYSTEM, PROGRAM, AND METHOD FOR CONTROLLING ACCESS
First Claim
1. An access control device for controlling an access by a communication terminal to an application, the access control device comprising:
- an authentication method management means configured to manage each of the application in association with authentication information, which indicates an effective authentication method effective for authenticating an access request source of an access request to access the application;
an authenticating means configured to authenticate the access request source using a usable authentication method, which can be used in the communication terminal, based on the access request;
an access request receiving means configured to receive the access request to access an intended application from the communication terminal; and
an access control means configured to control the communication terminal so thatthe communication terminal does not access the intended application in a case where the authentication method management means does not manage the authentication information, which indicates the authentication method used for the authentication, andthe communication terminal accesses the intended application in a case where the authentication method management means manages the authentication information, which indicates the authentication method used for the authentication.
1 Assignment
0 Petitions
Accused Products
Abstract
An access control device for controlling an access by a communication terminal to an application includes an authentication method management means configured to manage each of the application in association with authentication information, which indicates an effective authentication method effective for authenticating an access request source of an access request to access the application, an authenticating means configured to authenticate the access request source using a usable authentication method, which can be used in the communication terminal, based on the access request, an access request receiving means configured to receive the access request to access an intended application from the communication terminal, and an access control means configured to control the communication terminal so that the communication terminal does not access the intended application in a case where the authentication method management means does not manage the authentication information, which indicates the authentication method used for the authentication.
5 Citations
8 Claims
-
1. An access control device for controlling an access by a communication terminal to an application, the access control device comprising:
-
an authentication method management means configured to manage each of the application in association with authentication information, which indicates an effective authentication method effective for authenticating an access request source of an access request to access the application; an authenticating means configured to authenticate the access request source using a usable authentication method, which can be used in the communication terminal, based on the access request; an access request receiving means configured to receive the access request to access an intended application from the communication terminal; and an access control means configured to control the communication terminal so that the communication terminal does not access the intended application in a case where the authentication method management means does not manage the authentication information, which indicates the authentication method used for the authentication, and the communication terminal accesses the intended application in a case where the authentication method management means manages the authentication information, which indicates the authentication method used for the authentication. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory recording medium storing a program causing a processor of an access control device for controlling an access by a communication terminal to an application to execute:
-
authenticating an access request source using a usable authentication method, which can be used in the communication terminal, based on an access request; receiving the access request to access an intended application from the communication terminal; and controlling the communication terminal so that the communication terminal does not access the intended application in a case where an authentication method management means does not manage the authentication information, which indicates the authentication method used for the authentication, and the communication terminal accesses the intended application in a case where the authentication method management means manages the authentication information, which indicates the authentication method used for the authentication.
-
-
8. A method for controlling an access causing a processor of an access control device for controlling the access by a communication terminal to an application, the method comprising:
-
authenticating an access request source using a usable authentication method, which can be used in the communication terminal, based on an access request; receiving the access request to access an intended application from the communication terminal; and controlling the communication terminal so that the communication terminal does not access the intended application in a case where an authentication method management means does not manage the authentication information, which indicates the authentication method used for the authentication, and the communication terminal accesses the intended application in a case where the authentication method management means manages the authentication information, which indicates the authentication method used for the authentication.
-
Specification