Method of authenticating user and system for authenticating user
First Claim
1. A method of authenticating a portable data-communication terminal user in a system comprising a host, a portable data-communication terminal and a user authenticating device for authenticating a user, the portable data-communication terminal and said user authenticating device each including a transceiver for making radio-communication to each other, said method comprising:
- (a) transmitting and receiving user-authentication data between said portable data-communication terminal and said user-authenticating device to thereby carry out check as to whether said portable data-communication terminal is far away from said user-authenticating device by a distance equal to or smaller than a first distance within which said transceiver can make radio-communication between said portable data-communication terminal and said user-authenticating device; and
(b) allowing said portable data-communication terminal to carry out a predetermined operation only when said portable data-communication terminal is authenticated to be located within said first distance from said user-authenticating device.
1 Assignment
0 Petitions
Accused Products
Abstract
There is provided a method of authenticating a portable data-communication terminal user in a system comprising a portable data-communication terminal and a device for authenticating a user both including a transceiver for making radio-communication to each other, the method including the steps of (a) transmitting and receiving user-authentication data between the portable data-communication terminal and the user-authenticating device to thereby carry out check as to whether the portable data-communication terminal is far away from the user-authenticating device by a distance equal to or smaller than a first distance within which the transceiver can make radio-communication between the portable data-communication terminal and the user-authenticating device, and (b) allowing the portable data-communication terminal to carry out a predetermined operation only when the portable data-communication terminal is authenticated to be located within the first distance from the user-authenticating device. In accordance with the method, only when an authorized user having both the portable data-communication terminal and the user-authenticating device uses the portable data-communication terminal, the portable data-communication terminal is allowed to carry out a certain operation. Hence, it is possible to prevent a third party from using the portable data-communication terminal without permission of the user.
105 Citations
20 Claims
-
1. A method of authenticating a portable data-communication terminal user in a system comprising a host, a portable data-communication terminal and a user authenticating device for authenticating a user, the portable data-communication terminal and said user authenticating device each including a transceiver for making radio-communication to each other, said method comprising:
-
(a) transmitting and receiving user-authentication data between said portable data-communication terminal and said user-authenticating device to thereby carry out check as to whether said portable data-communication terminal is far away from said user-authenticating device by a distance equal to or smaller than a first distance within which said transceiver can make radio-communication between said portable data-communication terminal and said user-authenticating device; and
(b) allowing said portable data-communication terminal to carry out a predetermined operation only when said portable data-communication terminal is authenticated to be located within said first distance from said user-authenticating device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for authenticating a user, comprising:
-
(a) a portable terminal which makes data-communication including a memory to store authentication data of itself therein, and a radio-transceiver to make radio-communication for transmitting and receiving said authentication data; and
(b) a device which authenticates a user including a memory to store authentication data of itself therein, and a radio-transceiver to make radio-communication for transmitting and receiving said authentication data, said portable data-communication terminal and said user-authenticating device transmitting and receiving said authentication data therebetween to thereby carry out check as to whether said portable data-communication terminal is far away from said user-authenticating device by a distance equal to or smaller than a first distance within which said radio-transceivers can make radio-communication between said portable data-communication terminal and said user-authenticating device, said portable data-communication terminal being allowed to carry out a communication with a host only when said portable data-communication terminal is authenticated to be located within said first distance from said user-authenticating device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
(a) a random number generator;
(b) a comparative data producer which produces comparative data, based on said authentication data received from said memory and a random number transmitted from said random number, and transmits the thus produced comparative data to said comparator.
-
-
17. The system as set forth in claim 12, wherein said radio-transmitter of said user-authentication device transmits a random output for making radio-communication with said portable data-communication terminal.
-
18. The system as set forth in claim 11, wherein said portable data-communication terminal has a function of logging in a host device by transmitting log-in data to said host device, and includes a memory storing said long-in data therein, and an access controller transmitting said log-in data to said host device.
-
19. The system as set forth in claim 18, wherein said portable data-communication terminal includes a second timer measuring a certain period of time after said portable data-communication terminal has been allowed to log in to said host device, said check being carried out in every said certain period of time.
-
20. The system as set forth in claim 19, wherein said certain period of time is variable.
Specification