AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM
First Claim
Patent Images
1. An authentication system comprising:
- a processor configured to perform;
generating an image including first identification information for identifying a user and second identification information for identifying a terminal device;
extracting the first identification information and the second identification information from image information acquired by reading the image using a reading device;
authenticating the first identification information extracted by the extraction unit; and
connecting the terminal device to a device via a network based on the extracted second identification information when authentication of the performed first identification information has been successful.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentication system includes a processor configured to perform: generating an image including first identification information for identifying a user and second identification information for identifying a terminal device; extracting the first identification information and the second identification information from image information acquired by reading the image using a reading device; authenticating the first identification information extracted by the extraction unit; and connecting the terminal device to a device via a network based on the extracted second identification information when authentication of the performed first identification information has been successful.
29 Citations
15 Claims
-
1. An authentication system comprising:
a processor configured to perform; generating an image including first identification information for identifying a user and second identification information for identifying a terminal device; extracting the first identification information and the second identification information from image information acquired by reading the image using a reading device; authenticating the first identification information extracted by the extraction unit; and connecting the terminal device to a device via a network based on the extracted second identification information when authentication of the performed first identification information has been successful. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. An authentication method comprising:
-
generating an image including first identification information for identifying a user and second identification information for identifying a terminal device; reading the image using a reading device; extracting the first identification information and the second identification information from image information acquired by reading at the reading; authenticating the first identification information extracted at the extracting; and connecting the terminal device to a device via a network based on the second identification information extracted at the extracting when authentication of the first identification information performed at the performing authentication has been successful. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable recording medium that contains an authentication program for causing a computer to execute:
-
extracting, from image information acquired by reading an image including first identification information for identifying a user and second identification information for identifying a terminal device using a reading device, the first identification information and the second identification information, and authenticating the first identification information extracted at the extracting, and when the authentication has been successful, transferring the second identification information extracted at the extracting to a device management unit that controls connection from the terminal device to a device via a network based on the second identification information.
-
Specification