Method for automatic identification control and management
First Claim
1. A method for automatic identification control and management, including an installation process of an identity equipment, a login process to log in a host, and an auto-logout process of a host, the method comprising:
- installing the identity equipment for generating a connection verification data and an identity value;
logging in the host to decode the connection verification data and the identity value for verifying an identification value;
cyclically checking a connection condition between the identity equipment and the host after successful login; and
logging out the system automatically if the connection between the identity equipment and the host fails.
4 Assignments
0 Petitions
Accused Products
Abstract
An automatic control and management method for identification by using an identity equipment is proposed. The method includes using a login system to generate an identity certificate code; using a password to encode the identity certificate code and a unique random variable to generate an identity value; and generating an on-line connection verification data by using the identity certificate code and then storing the same into the login system. The process for logging in the login system includes using a portable identity equipment and inputting a password for identification so as to read out the encoded data. If disconnection occurs the login system automatically logs out to protect the confidential data. Thus, the identity equipment used in the present invention can be easily carried away.
28 Citations
19 Claims
-
1. A method for automatic identification control and management, including an installation process of an identity equipment, a login process to log in a host, and an auto-logout process of a host, the method comprising:
-
installing the identity equipment for generating a connection verification data and an identity value;
logging in the host to decode the connection verification data and the identity value for verifying an identification value;
cyclically checking a connection condition between the identity equipment and the host after successful login; and
logging out the system automatically if the connection between the identity equipment and the host fails. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An method for installing an identity equipment, which is a process for installing the identity equipment into a host, the method including:
-
inputting a first identity code;
reading out a first identity value generated by a login process of the host;
decoding the first identity value generated by the login process of the host by using the first identity code to obtain an identity certificate code;
inputting a second identity code to replace the first identity code;
encoding a first identification value by using the second identity code to generate a second identity value;
encoding a second identification value by using the identity certificate code to generate on-line connection verification data, wherein the second identification value is one element of the first identification value;
storing the connection verification data in the identity equipment; and
storing the second identity value in the host. - View Dependent Claims (12, 13, 14)
-
-
15. A process for logging into a host, the process including:
-
connecting to a host by using an identity equipment;
inputting an identity code;
decoding an identity value read out from the host by using the identity code to obtain a first identification value;
decoding a connection verification data stored inside the identity equipment by using an identity certificate code to obtain a second identification value;
comparing variables of the first identification value and the second identification value; and
inputting a login password to log into the host if comparison is consistent. - View Dependent Claims (16, 17, 18)
-
-
19. An auto-logout process, which starts as a process for logging into a host is finished, the auto-logout process including:
-
cyclically checking an identity value to determine whether a connection condition between an identity equipment and the host fails; and
logging out instantly if the connection between the identity equipment and the host fails.
-
Specification