User authenticating system and method in wide area distributed environment
First Claim
1. A user authenticating system of a computer system storing original information corresponding to a user of the computer system, said user authenticating system comprising:
- certification authority means for issuing a certification to the user, the certification being determined by enciphering the original information including at least information identifying the user using a secret key;
authenticating means for authenticating the user based on the certification, said authenticating means comprising;
deciphering means for obtaining the original information by deciphering the certification using a public key, anddetermination means for authenticating the user by determining whether the user is an authorized user based on the original information obtained by the deciphering means; and
supply means, communicating with said authenticating means, for transmitting the certification issued by said certification authority to said authenticating means based on operations of the user.
1 Assignment
0 Petitions
Accused Products
Abstract
A user authenticating system includes a certification authority for issuing a certification to a user who desires to use a bulletin board system. The certification is obtained by enciphering original information including at least information identifying the user using a secret key. A computer is, provided in the bulletin board system, for authenticating the user based on the certification. The computer has a deciphering unit for deciphering the certification using a public key so as to obtain the original information and a determining knit for determining based on the original information obtained by the deciphering unit whether the user is a regular user. A result obtained by the determination unit, used to authenticate the user. A user support computer is provided in the bulletin board system for supplying, based on operations of the user, the certification issued by the certification authority to the computer for authenticating the user.
131 Citations
21 Claims
-
1. A user authenticating system of a computer system storing original information corresponding to a user of the computer system, said user authenticating system comprising:
-
certification authority means for issuing a certification to the user, the certification being determined by enciphering the original information including at least information identifying the user using a secret key; authenticating means for authenticating the user based on the certification, said authenticating means comprising; deciphering means for obtaining the original information by deciphering the certification using a public key, and determination means for authenticating the user by determining whether the user is an authorized user based on the original information obtained by the deciphering means; and supply means, communicating with said authenticating means, for transmitting the certification issued by said certification authority to said authenticating means based on operations of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 10, 11, 12)
-
- 8. The system as claimed in clam 7, wherein said timing decision means comprises a second random number generating means for generating random numbers, each random number having one of a first value corresponding to the first timing information and a second value corresponding to the second timing information.
-
13. A user authenticating system of a computer system storing original information corresponding to a user of the computer system said user authenticating system comprising:
-
certification authority means for issuing a certification to the user, the certification being determined by enciphering the original information including at least information identifying the user using a secret key; and a communicating system comprising; a first unit authenticating the user based on the certification, and a second unit transmitting the certification issued by said certification authority to said first unit, said communicating system operating in a mode selected from among one of three modes comprising; a first mode in which said second unit transmits the certification without modification, and said first unit obtains the original information by deciphering the certification and authenticates the user based on the original information; a second mode in which said second unit scrambles the certification and transmits data obtained by scrambling the certification to said first unit, and said first unit obtains the original information by descrambling and deciphering the data transmitted from the second unit and authenticates the user based on the original information; and a third mode in which said first unit transmits timing information to the second unit at random, said second unit scrambles the certification and transmits data obtained by scrambling the certification to said first unit each time the timing information is received, and said first unit obtains the original information each time the timing information is transmitted by descrambling and deciphering the data transmitted from the second unit and authenticates the user based on the original information.
-
-
14. A user authenticating method of a computer system storing original information corresponding to a user of the computer system, said method comprising the steps of:
-
(a) issuing a certification from certification authority means to the user, the certification being determined by enciphering original information including at least information identifying the user using a secret key; (b) supplying the certification from the user to an authenticating unit; and (c) authenticating the user in said authenticating unit based on the certification, said step (c) including steps of; (c-1) obtaining the original information by deciphering the certification using a public key and producing a result based on the original information; (c-2) determining based on the original information obtained by said step (c-1) whether the user is authorized to use the computer system, the result obtained by said step (c-2) being used to authenticate the user. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
Specification