×

Method for protecting secret information in a system for reporting an emergency when secret information is accessed

  • US 8,577,807 B2
  • Filed: 03/30/2007
  • Issued: 11/05/2013
  • Est. Priority Date: 07/25/2000
  • Status: Active Grant
First Claim
Patent Images

1. A method for reporting an emergency such as theft or confinement based upon authentication data recorded in a user authentication data recording medium in a user authentication system comprising:

  • recording a user authentication data recording medium with authentication data so that when matching data inputted by an input operation of an authenticated person matches between an authentication terminal unit having said user authentication data recording medium therein and an authentication control side unit, then authentication is completed,interspersing a plurality of matching data comprised of plural items of true data and plural items of false data, said true and false data comprising two dimensional code data, said matching data is selected from the group consisting of symbols, graphics pictures and photos;

    upon recording said plurality of matching data on said recording medium, a person to be authenticated determines true data by way of selecting plural items of locations or characteristics and orders out of the plurality of matching data and selects from remaining items of the plurality of matching data to be false data and further determines a part of the false data to be confinement informing data; and

    executing using an authentication computer following actions of;

    upon inputting data from the user authentication data recording medium, if plural items of true data are selected from the user authentication data recording medium in a correct order, then determining that true authentication data is selected and then validating the user authentication;

    upon inputting data from the user authentication data recording medium, if a selected number of items of false data is less than a predetermined number, permitting another authentication access to be made; and

    if the selected number of items of false data is equal to or more than the predetermined number, determining that a theft-causing unauthorized access is attempted, invalidating the user authentication, and generating a theft alarm, and further by means of a control center which detects the generated theft alarm preventing subsequent use of said user authentication data recording medium; and

    upon inputting data from the user authentication data recording medium, if plural items of true data are selected from the user authentication data recording medium in a correct order, and if at least one confinement informing data is included in the selection, then determining that true matching data are selected, thus validating user authentication, and further by means of said control center, determining that the user is placed under a control of an unauthorized person and generating a confinement informing alarm, and further, with a false data counter and a true data counter provided in said authentication computer,upon failure of authentication, if the selected number of items of false data among inputted authentication data is less than a predetermined number, permitting another authentication access to be made,thus determining, based upon presence of true and correct data including selection order error, high probability of user authentication.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×