Authentication method and device
First Claim
1. An authentication method comprising the steps of:
- sending an address of a registration screen to a communication device of a user, the address including a registration identifier for identifying the user and/or the communication device;
authenticating the user based on the registration identifier and a first password that is entered in the registration screen and returned when the address is accessed;
sending a login screen to the user when the authenticating step succeeds, the login screen including a field into which a second password is entered, and a login identifier for identifying the user and/or the communication device; and
authenticating the user based on the login identifier included in the login screen, and the second password that are returned by the user.
0 Assignments
0 Petitions

Accused Products

Abstract
[PROBLEM] Person authentication and authentication device of the present invention aims at providing a user with services of easy, inexpensive, highly secure, and reliable person authentication.
[MEANS TO SOLVE THE PROBLEMS] Authentication method adopted by the present invention comprises: a step that forwards to a communication device of a user a registration identifier that identifies the user and/or the communication device by including the identifier in an address of registration screen peculiar to the user and/or the communication device; and a step that, when the address is accessed, and a first password is entered and replied to the registration screen, authenticates the user based on the registration identifier and the first password; and a step that sends a login screen display to the user when the authentication step is successful, which the step is comprised of a step where the login screen display comprises a field for entering a second password, and a login identifier to identify the user and/or the communication device; and a step that authenticates the user based on the login identifier contained in the login screen display replied by the user, and the second password.
164 Citations
Information providing system, information providing device, appropriateness judgment information generation method and appropriateness judgment information generation process program | ||
Patent #
US 7,925,934 B2
Filed 02/13/2008
|
Current Assignee
Rakuten Inc.
|
Original Assignee
Rakuten Inc.
|
System and method for distributing protected information | ||
Patent #
US 7,962,417 B2
Filed 09/30/2004
|
Current Assignee
SL Patent Holdings LLC
|
Original Assignee
SL Patent Holdings LLC
|
Flexible billing architecture | ||
Patent #
US 8,010,082 B2
Filed 10/19/2005
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
System, method and program product for authenticating an e-mail and/or attachment | ||
Patent #
US 8,055,729 B2
Filed 05/21/2004
|
Current Assignee
International Business Machines Corporation
|
Original Assignee
International Business Machines Corporation
|
Managing user-to-user contact with inferred presence information | ||
Patent #
US 8,069,166 B2
Filed 02/27/2006
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks Inc
|
Multiple data store authentication | ||
Patent #
US 8,064,583 B1
Filed 09/21/2006
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks Inc
|
SYSTEM AND METHOD FOR REDISTRIBUTING AND LICENSING ACCESS TO PROTECTED INFORMATION AMONG A PLURALITY OF DEVICES | ||
Patent #
US 20100263056A1
Filed 06/23/2010
|
Current Assignee
SL Patent Holdings LLC
|
Original Assignee
SL Patent Holdings LLC
|
Connectivity function for forwarding e-mail | ||
Patent #
US 7,769,400 B2
Filed 08/11/2008
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks International Oy
|
SYSTEM AND METHOD FOR SIMPLIFIED LOGIN USING AN IDENTITY MANAGER | ||
Patent #
US 20100024015A1
Filed 12/21/2007
|
Current Assignee
Sxipper Incorporated
|
Original Assignee
Sxip Identity Corp.
|
PRINT SYSTEM, PRINT SERVER, CONTROL METHOD THEREOF, AND PROGRAM | ||
Patent #
US 20100171973A1
Filed 12/21/2009
|
Current Assignee
Canon Kabushiki Kaisha
|
Original Assignee
Canon Kabushiki Kaisha
|
Connectivity function for forwarding e-mail | ||
Patent #
US 20090075683A1
Filed 08/11/2008
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks International Oy
|
System and method for selectively changing parameter settings based on lineage analysis of digital information | ||
Patent #
US 7,555,463 B2
Filed 11/13/2006
|
Current Assignee
SL Patent Holdings LLC
|
Original Assignee
SL Patent Holdings LLC
|
PASSWORD INPUT DEVICE, COMPUTER SECURITY SYSTEM USING THE SAME AND METHOD THEREOF | ||
Patent #
US 20090328201A1
Filed 06/25/2009
|
Current Assignee
Gold Charm Limited
|
Original Assignee
Hong Fu Jin Precision Industry Shenzhen Co. Ltd., Hon Hai Precision Industry Co. Ltd.
|
Information providing system, information providing device, appropriateness judgment information generation method and appropriateness judgment inforamtion generation process program | ||
Patent #
US 20080320341A1
Filed 02/13/2008
|
Current Assignee
Rakuten Inc.
|
Original Assignee
Rakuten Inc.
|
SECURE ELECTRONIC MAIL SYSTEM | ||
Patent #
US 20070005713A1
Filed 06/30/2006
|
Current Assignee
Appriver Canada ULC
|
Original Assignee
Cirius Messaging Inc.
|
System and Method for Selectively Changing Parameter Settings Based on Lineage Analysis of Digital Information | ||
Patent #
US 20070106615A1
Filed 11/13/2006
|
Current Assignee
SL Patent Holdings LLC
|
Original Assignee
SL Patent Holdings LLC
|
Authenticating a login | ||
Patent #
US 20060095788A1
Filed 11/03/2004
|
Current Assignee
Astav Incorporated
|
Original Assignee
Astav Incorporated
|
Service use method and management method | ||
Patent #
US 20060168651A1
Filed 05/18/2004
|
Current Assignee
Sony Corporation
|
Original Assignee
Sony Corporation
|
Database synchronization | ||
Patent #
US 20060149794A1
Filed 12/08/2005
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks International Oy
|
Database synchronization via a mobile network | ||
Patent #
US 20060184591A1
Filed 12/28/2005
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks International Oy
|
System, method and program product for authenticating an e-mail and/or attachment | ||
Patent #
US 20050015457A1
Filed 05/21/2004
|
Current Assignee
International Business Machines Corporation
|
Original Assignee
International Business Machines Corporation
|
System and method for processing protected text information | ||
Patent #
US 20050102238A1
Filed 11/04/2004
|
Current Assignee
SL Patent Holdings LLC
|
Original Assignee
SL Patent Holdings LLC
|
Secure end-to-end transport through intermediary nodes | ||
Patent #
US 8,127,342 B2
Filed 09/23/2010
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Provisioning applications for a mobile device | ||
Patent #
US 8,078,158 B2
Filed 06/26/2008
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Provisioning of e-mail settings for a mobile terminal | ||
Patent #
US 8,116,214 B2
Filed 11/30/2005
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Mobile virtual network operator | ||
Patent #
US 8,107,921 B2
Filed 01/11/2008
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Password input device, computer security system using the same and method thereof | ||
Patent #
US 8,112,631 B2
Filed 06/25/2009
|
Current Assignee
Gold Charm Limited
|
Original Assignee
Hong Fu Jin Precision Industry Shenzhen Co. Ltd., Hon Hai Precision Industry Co. Ltd.
|
System and method for processing protected text information | ||
Patent #
US 8,140,435 B2
Filed 11/04/2004
|
Current Assignee
SL Patent Holdings LLC
|
Original Assignee
SL Patent Holdings LLC
|
Application and network-based long poll request detection and cacheability assessment therefor | ||
Patent #
US 8,166,164 B1
Filed 10/14/2011
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks Inc
|
Authenticating a login | ||
Patent #
US 8,171,303 B2
Filed 11/03/2004
|
Current Assignee
Astav Incorporated
|
Original Assignee
Astav Incorporated
|
Cache defeat detection and caching of content addressed by identifiers intended to defeat cache | ||
Patent #
US 8,190,701 B2
Filed 11/01/2011
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks Inc
|
Service use method and management method | ||
Patent #
US 8,271,797 B2
Filed 05/18/2004
|
Current Assignee
Sony Corporation
|
Original Assignee
Sony Corporation
|
Application and network-based long poll request detection and cacheability assessment therefor | ||
Patent #
US 8,291,076 B2
Filed 03/05/2012
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks Inc
|
Social caching for device resource sharing and management | ||
Patent #
US 8,316,098 B2
Filed 04/19/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Digital Signatures for Communications Using Text-Independent Speaker Verification | ||
Patent #
US 20120296649A1
Filed 07/31/2012
|
Current Assignee
Nuance Communications Inc.
|
Original Assignee
ATT Intellectual Property I LP
|
Distributed management of keep-alive message signaling for mobile network resource conservation and optimization | ||
Patent #
US 8,326,985 B2
Filed 11/01/2011
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks Inc
|
System and method for redistributing and licensing access to protected information among a plurality of devices | ||
Patent #
US 8,332,328 B2
Filed 06/23/2010
|
Current Assignee
SL Patent Holdings LLC
|
Original Assignee
SL Patent Holdings LLC
|
System and method for a mobile device to use physical storage of another device for caching | ||
Patent #
US 8,356,080 B2
Filed 07/20/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Electronic-mail filtering for mobile devices | ||
Patent #
US 8,364,181 B2
Filed 12/10/2007
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Context aware data presentation | ||
Patent #
US 8,412,675 B2
Filed 02/24/2006
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Aligning data transfer to optimize connections established for transmission over a wireless network | ||
Patent #
US 8,417,823 B2
Filed 11/18/2011
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks LLC
|
Flexible real-time inbox access | ||
Patent #
US 8,438,633 B1
Filed 12/18/2006
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Publishing data in an information community | ||
Patent #
US 8,468,126 B2
Filed 12/14/2005
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Distributed caching in a wireless network of content delivered for a mobile application over a long-held request | ||
Patent #
US 8,484,314 B2
Filed 10/14/2011
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Provisioning applications for a mobile device | ||
Patent #
US 8,494,510 B2
Filed 12/06/2011
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Mobile network background traffic data management with optimized polling intervals | ||
Patent #
US 8,539,040 B2
Filed 02/28/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Secure end-to-end transport through intermediary nodes | ||
Patent #
US 8,549,587 B2
Filed 02/14/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
System and method for executing commands that are non-native to the native environment of a mobile device | ||
Patent #
US 8,561,086 B2
Filed 05/17/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Print system, print server, control method thereof, and program capable of registering printer configuration information in a service provider in an environment in which a service for providing the printing function is utilized | ||
Patent #
US 8,576,422 B2
Filed 12/21/2009
|
Current Assignee
Canon Kabushiki Kaisha
|
Original Assignee
Canon Kabushiki Kaisha
|
Database synchronization via a mobile network | ||
Patent #
US 8,620,858 B2
Filed 12/28/2005
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks International Oy
|
Detecting and preserving state for satisfying application requests in a distributed proxy and cache system | ||
Patent #
US 8,621,075 B2
Filed 04/27/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks LLC
|
Cache state management on a mobile device to preserve user experience | ||
Patent #
US 8,635,339 B2
Filed 08/22/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Secure electronic mail system | ||
Patent #
US 8,682,979 B2
Filed 06/30/2006
|
Current Assignee
Appriver Canada ULC
|
Original Assignee
Email2 SCP Solutions Inc.
|
Polling | ||
Patent #
US 8,693,494 B2
Filed 03/31/2008
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Cache defeat detection and caching of content addressed by identifiers intended to defeat cache | ||
Patent #
US 8,700,728 B2
Filed 05/17/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Cross-platform event engine | ||
Patent #
US 8,209,709 B2
Filed 07/05/2010
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Distributed system for cache defeat detection and caching of content addressed by identifiers intended to defeat cache | ||
Patent #
US 8,204,953 B2
Filed 11/01/2011
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks Inc
|
Secure Electronic Mail System | ||
Patent #
US 20140115084A1
Filed 12/20/2013
|
Current Assignee
Appriver Canada ULC
|
Original Assignee
Email2 SCP Solutions Inc.
|
Secure Electronic Mail System | ||
Patent #
US 20140122883A1
Filed 12/20/2013
|
Current Assignee
Appriver Canada ULC
|
Original Assignee
Email2 SCP Solutions Inc.
|
Electronic-mail filtering for mobile devices | ||
Patent #
US 8,738,050 B2
Filed 01/07/2013
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network | ||
Patent #
US 8,750,123 B1
Filed 07/31/2013
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks Inc
|
Digital signatures for communications using text-independent speaker verification | ||
Patent #
US 8,751,233 B2
Filed 07/31/2012
|
Current Assignee
Nuance Communications Inc.
|
Original Assignee
ATT Intellectual Property I LP
|
Print system, print server, control method thereof, and program | ||
Patent #
US 8,755,065 B2
Filed 08/12/2013
|
Current Assignee
Canon Kabushiki Kaisha
|
Original Assignee
Canon Kabushiki Kaisha
|
Maintaining an IP connection in a mobile network | ||
Patent #
US 8,761,756 B2
Filed 09/13/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks International Oy
|
Integrated messaging | ||
Patent #
US 8,774,844 B2
Filed 04/08/2011
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications | ||
Patent #
US 8,775,631 B2
Filed 02/25/2013
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Timing of keep-alive messages used in a system for mobile network resource conservation and optimization | ||
Patent #
US 8,782,222 B2
Filed 09/05/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks LLC
|
Application discovery on mobile devices | ||
Patent #
US 8,787,947 B2
Filed 06/18/2008
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks Inc
|
Content delivery to a mobile device from a content service | ||
Patent #
US 8,793,305 B2
Filed 12/13/2007
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks Inc
|
System and method of a relay server for managing communications and notification between a mobile device and a web access server | ||
Patent #
US 8,799,410 B2
Filed 04/13/2011
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Maintaining mobile terminal information for secure communications | ||
Patent #
US 8,805,334 B2
Filed 09/05/2008
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Integrated messaging | ||
Patent #
US 8,805,425 B2
Filed 01/28/2009
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Mobile device power management in data synchronization over a mobile network with or without a trigger notification | ||
Patent #
US 8,811,952 B2
Filed 05/05/2011
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Method and system for management of a virtual network connection without heartbeat messages | ||
Patent #
US 8,812,695 B2
Filed 04/03/2013
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks Inc
|
System and method for tracking billing events in a mobile wireless network for a network operator | ||
Patent #
US 8,831,561 B2
Filed 04/28/2011
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief | ||
Patent #
US 8,832,228 B2
Filed 04/26/2012
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks Inc
|
Distributed caching for resource and mobile network traffic management | ||
Patent #
US 8,838,783 B2
Filed 07/05/2011
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks Inc
|
Flexible real-time inbox access | ||
Patent #
US 8,839,412 B1
Filed 09/13/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Web-based access to data objects | ||
Patent #
US 8,838,744 B2
Filed 01/28/2009
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Mobile traffic categorization and policy for network use optimization while preserving user experience | ||
Patent #
US 8,843,153 B2
Filed 11/01/2011
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
System for providing policy based content service in a mobile network | ||
Patent #
US 8,849,902 B2
Filed 06/24/2011
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization | ||
Patent #
US 8,861,354 B2
Filed 12/14/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Policy based content service | ||
Patent #
US 8,862,657 B2
Filed 01/25/2008
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
System of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation | ||
Patent #
US 8,868,753 B2
Filed 12/06/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Provisioning of e-mail settings for a mobile terminal | ||
Patent #
US 8,873,411 B2
Filed 01/12/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols | ||
Patent #
US 8,874,761 B2
Filed 03/15/2013
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Mobile application traffic optimization | ||
Patent #
US 8,886,176 B2
Filed 07/22/2011
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Optimization of resource polling intervals to satisfy mobile device requests | ||
Patent #
US 8,903,954 B2
Filed 11/22/2011
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Mobile virtual network operator | ||
Patent #
US 8,909,192 B2
Filed 08/11/2011
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Bandwidth measurement | ||
Patent #
US 8,909,759 B2
Filed 10/12/2009
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Detection and management of user interactions with foreground applications on a mobile device in distributed caching | ||
Patent #
US 8,909,202 B2
Filed 01/07/2013
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
System and method for providing a network service in a distributed fashion to a mobile device | ||
Patent #
US 8,914,002 B2
Filed 08/11/2011
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Optimization of mobile traffic directed to private networks and operator configurability thereof | ||
Patent #
US 8,918,503 B2
Filed 08/28/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Method and apparatus for intercepting events in a communication system | ||
Patent #
US RE45,348 E1
Filed 03/16/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Application and network-based long poll request detection and cacheability assessment therefor | ||
Patent #
US 8,966,066 B2
Filed 10/12/2012
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks Inc
|
Mobile device and method to utilize the failover mechanism for fault tolerance provided for mobile traffic management and network/device resource conservation | ||
Patent #
US 8,977,755 B2
Filed 12/06/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Monitoring mobile application activities for malicious traffic on a mobile device | ||
Patent #
US 8,984,581 B2
Filed 07/11/2012
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks Inc
|
Connection architecture for a mobile network | ||
Patent #
US 8,989,728 B2
Filed 09/07/2006
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Predictive content delivery | ||
Patent #
US 9,002,828 B2
Filed 01/02/2009
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation | ||
Patent #
US 9,009,250 B2
Filed 12/07/2012
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks Inc
|
Mobile network reporting and usage analytics system and method aggregated using a distributed traffic optimization system | ||
Patent #
US 9,021,021 B2
Filed 12/10/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
3D mobile user interface with configurable workspace management | ||
Patent #
US 9,043,731 B2
Filed 03/30/2011
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Mobile network traffic coordination across multiple applications | ||
Patent #
US 9,043,433 B2
Filed 05/25/2011
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Print system, print server, control method thereof, and program | ||
Patent #
US 9,041,968 B2
Filed 05/29/2014
|
Current Assignee
Canon Kabushiki Kaisha
|
Original Assignee
Canon Kabushiki Kaisha
|
Intelligent rendering of information in a limited display environment | ||
Patent #
US 9,047,142 B2
Filed 12/16/2010
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Mobile network traffic coordination across multiple applications | ||
Patent #
US 9,049,179 B2
Filed 01/20/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Location-based operations and messaging | ||
Patent #
US 9,055,102 B2
Filed 08/02/2010
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Selective data compression by a distributed traffic management system to reduce mobile data traffic and signaling traffic | ||
Patent #
US 9,060,032 B2
Filed 05/09/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network | ||
Patent #
US 9,065,765 B2
Filed 10/08/2013
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks Inc
|
Distributed implementation of dynamic wireless traffic policy | ||
Patent #
US 9,077,630 B2
Filed 07/08/2011
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Device resources sharing for network resource conservation | ||
Patent #
US 9,084,105 B2
Filed 04/19/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Mobile network background traffic data management | ||
Patent #
US 9,100,873 B2
Filed 09/14/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Managing cache to prevent overloading of a wireless network due to user activity | ||
Patent #
US 9,131,397 B2
Filed 06/06/2013
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion | ||
Patent #
US 9,161,258 B2
Filed 03/15/2013
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks LLC
|
Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol | ||
Patent #
US 9,173,128 B2
Filed 03/06/2013
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks LLC
|
Dynamic categorization of applications for network access in a mobile network | ||
Patent #
US 9,203,864 B2
Filed 02/04/2013
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks LLC
|
Sharing Account Data Between Different Interfaces to a Service | ||
Patent #
US 20150350106A1
Filed 05/28/2014
|
Current Assignee
Apple Inc.
|
Original Assignee
Apple Inc.
|
Mobile device having content caching mechanisms integrated with a network operator for traffic alleviation in a wireless network and methods therefor | ||
Patent #
US 9,208,123 B2
Filed 12/07/2012
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks LLC
|
Mobile device with application or context aware fast dormancy | ||
Patent #
US 9,241,314 B2
Filed 03/15/2013
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks LLC
|
Automatic generation and distribution of policy information regarding malicious mobile traffic in a wireless network | ||
Patent #
US 9,239,800 B2
Filed 07/11/2012
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks LLC
|
Extending user relationships | ||
Patent #
US 9,251,193 B2
Filed 10/28/2007
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks LLC
|
Application or context aware fast dormancy | ||
Patent #
US 9,271,238 B2
Filed 03/15/2013
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks LLC
|
Request and response characteristics based adaptation of distributed caching in a mobile network | ||
Patent #
US 9,275,163 B2
Filed 10/17/2011
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks LLC
|
Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol | ||
Patent #
US 9,277,443 B2
Filed 12/07/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks LLC
|
Database synchronization | ||
Patent #
US 9,298,792 B2
Filed 12/08/2005
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks LLC
|
System and method for a mobile device to use physical storage of another device for caching | ||
Patent #
US 9,300,719 B2
Filed 01/14/2013
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks Inc
|
Systems and methods for application management of mobile device radio state promotion and demotion | ||
Patent #
US 9,307,493 B2
Filed 03/15/2013
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks LLC
|
System and method for reduction of mobile network traffic used for domain name system (DNS) queries | ||
Patent #
US 9,325,662 B2
Filed 01/09/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks LLC
|
User as an end point for profiling and optimizing the delivery of content and data in a wireless network | ||
Patent #
US 9,326,189 B2
Filed 02/04/2013
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks LLC
|
Wireless traffic management system cache optimization using http headers | ||
Patent #
US 9,330,196 B2
Filed 06/14/2012
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks LLC
|
Secure Electronic Mail System | ||
Patent #
US 20160142364A1
Filed 01/25/2016
|
Current Assignee
Appriver Canada ULC
|
Original Assignee
Cirius Messaging Inc.
|
Print system, print server, control method thereof, and program | ||
Patent #
US 9,354,828 B2
Filed 05/06/2015
|
Current Assignee
Canon Kabushiki Kaisha
|
Original Assignee
Canon Kabushiki Kaisha
|
Confidential-sender email addresses for printing | ||
Patent #
US 9,361,053 B2
Filed 01/31/2013
|
Current Assignee
Hewlett-Packard Development Company L.P.
|
Original Assignee
Hewlett-Packard Development Company L.P.
|
Device control method, device management system, and in-house server apparatus connected to device management system | ||
Patent #
US 9,380,055 B2
Filed 10/21/2015
|
Current Assignee
Airxed Technology Limited
|
Original Assignee
Panasonic Intellectual Property Corporation of America
|
Mobile application traffic optimization | ||
Patent #
US 9,407,713 B2
Filed 01/16/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks LLC
|
Digital signatures for communications using text-independent speaker verification | ||
Patent #
US 9,455,983 B2
Filed 06/09/2014
|
Current Assignee
Nuance Communications Inc.
|
Original Assignee
ATT Intellectual Property I LP
|
Secure electronic mail system | ||
Patent #
US 9,497,158 B2
Filed 12/20/2013
|
Current Assignee
Appriver Canada ULC
|
Original Assignee
Cirius Messaging Inc.
|
Secure electronic mail system | ||
Patent #
US 9,497,157 B2
Filed 12/20/2013
|
Current Assignee
Appriver Canada ULC
|
Original Assignee
Cirius Messaging Inc.
|
Secure electronic mail system | ||
Patent #
US 9,647,977 B2
Filed 01/25/2016
|
Current Assignee
Appriver Canada ULC
|
Original Assignee
Cirius Messaging Inc.
|
Secure Electronic Mail System | ||
Patent #
US 20170193234A1
Filed 01/25/2017
|
Current Assignee
Appriver Canada ULC
|
Original Assignee
Cirius Messaging Inc.
|
Mobile device configured for communicating with another mobile device associated with an associated user | ||
Patent #
US 9,712,986 B2
Filed 03/22/2012
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks LLC
|
Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic | ||
Patent #
US 9,832,095 B2
Filed 12/14/2012
|
Current Assignee
Seven Networks LLC
|
Original Assignee
Seven Networks LLC
|
Secure printing | ||
Patent #
US 9,858,516 B2
Filed 03/07/2013
|
Current Assignee
Hewlett-Packard Development Company L.P.
|
Original Assignee
Hewlett-Packard Development Company L.P.
|
Secure electronic mail system | ||
Patent #
US 9,864,865 B2
Filed 01/25/2017
|
Current Assignee
Appriver Canada ULC
|
Original Assignee
Cirius Messaging Inc.
|
Secure Electronic Mail System | ||
Patent #
US 20180054414A1
Filed 10/25/2017
|
Current Assignee
Appriver Canada ULC
|
Original Assignee
Cirius Messaging Inc.
|
Secure electronic mail system | ||
Patent #
US 10,021,062 B2
Filed 10/25/2017
|
Current Assignee
Appriver Canada ULC
|
Original Assignee
Cirius Messaging Inc.
|
Database synchronization via a mobile network | ||
Patent #
US 10,089,376 B2
Filed 08/30/2016
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks LLC
|
Secure electronics mail system | ||
Patent #
US 10,171,413 B2
Filed 05/24/2018
|
Current Assignee
Appriver Canada ULC
|
Original Assignee
Cirius Messaging Inc.
|
Enhanced customer service for mobile carriers using real-time and historical mobile application and traffic or optimization data associated with mobile devices in a mobile network | ||
Patent #
US 10,263,899 B2
Filed 04/10/2013
|
Current Assignee
Seven Networks Inc
|
Original Assignee
Seven Networks LLC
|
Sharing account data between different interfaces to a service | ||
Patent #
US 10,313,264 B2
Filed 05/28/2014
|
Current Assignee
Apple Inc.
|
Original Assignee
Apple Inc.
|
Secure electronic mail system | ||
Patent #
US 10,348,670 B2
Filed 08/22/2018
|
Current Assignee
Appriver Canada ULC
|
Original Assignee
ZixCorp Systems Inc.
|
Secure electronic mail system | ||
Patent #
US 10,601,764 B2
Filed 04/10/2019
|
Current Assignee
Appriver Canada ULC
|
Original Assignee
Appriver Canada ULC
|
Secure electronic mail system | ||
Patent #
US 10,608,980 B2
Filed 04/10/2019
|
Current Assignee
Appriver Canada ULC
|
Original Assignee
Appriver Canada ULC
|
Secure electronic mail system | ||
Patent #
US 10,713,367 B2
Filed 05/16/2016
|
Current Assignee
Appriver Canada ULC
|
Original Assignee
Appriver Canada ULC
|
Authentication system using network | ||
Patent #
US 6,108,790 A
Filed 02/20/1998
|
Current Assignee
Casio Computer Company Limited
|
Original Assignee
Casio Computer Company Limited
|
Method and apparatus enabling automatic login for wireless internet-capable devices | ||
Patent #
US 6,865,680 B1
Filed 10/31/2000
|
Current Assignee
Yodlee Inc.
|
Original Assignee
Yodlee.com Inc.
|
Secure authentication proxy architecture for a web-based wireless intranet application | ||
Patent #
US 6,732,105 B1
Filed 07/27/2001
|
Current Assignee
Qualcomm Inc.
|
Original Assignee
Palm Inc.
|
System for character-child interaction with adult character control | ||
Patent #
US 6,785,824 B1
Filed 09/03/1999
|
Current Assignee
Geoffrey J. Grassle
|
Original Assignee
Geoffrey J. Grassle
|
System, method, and article of manufacture for delivering information to a user through programmable network bookmarks | ||
Patent #
US 6,460,038 B1
Filed 09/24/1999
|
Current Assignee
NVIDIA Corporation
|
Original Assignee
Clickmarks Inc.
|
Server-side web summary generation and presentation | ||
Patent #
US 6,199,077 B1
Filed 06/01/1999
|
Current Assignee
Yodlee Inc.
|
Original Assignee
Yodlee.com Inc.
|
Method and system for authenticating identity on internet | ||
Patent #
US 20010056487A1
Filed 12/22/2000
|
Current Assignee
Link Plus Corporation
|
Original Assignee
Link Plus Corporation
|
Authentication method of portable terminal | ||
Patent #
US 20010056495A1
Filed 05/31/2001
|
Current Assignee
Net Village Co. Ltd.
|
Original Assignee
Net Village Co. Ltd.
|
Method and system for self-provisioning a rendezvous to ensure secure access to information in a database from multiple devices | ||
Patent #
US 6,065,120 A
Filed 12/09/1997
|
Current Assignee
Unwired Planet LLC
|
Original Assignee
Phone.com Incorporated
|
Providing a directory of frequently used hyperlinks on a remote server | ||
Patent #
US 5,895,471 A
Filed 12/22/1997
|
Current Assignee
Unwired Planet LLC
|
Original Assignee
Great Elm Capital Corp. fka Unwired Planet Inc.
|
9 Claims
-
1. An authentication method comprising the steps of:
-
sending an address of a registration screen to a communication device of a user, the address including a registration identifier for identifying the user and/or the communication device;
authenticating the user based on the registration identifier and a first password that is entered in the registration screen and returned when the address is accessed;
sending a login screen to the user when the authenticating step succeeds, the login screen including a field into which a second password is entered, and a login identifier for identifying the user and/or the communication device; and
authenticating the user based on the login identifier included in the login screen, and the second password that are returned by the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An authentication device comprising:
-
a storage part that stores user information, a registration identifier, a registration password verification information, login identifier, login password verification information while correlating them with one another;
a first control part that sends an address of a registration screen to a communication device of a user, the address including a registration identifier for identifying the user and/or the communication device;
a second control part that provides the communication device with the registration screen including a field into which a registration password is entered, and the registration identifier in response to a request for the registration screen from the communication device, and that authenticates the user with reference to the storage part when the user enters the login password in the registration screen and returns the same; and
a third control part that provides the communication device with the login screen including a field into which a login password is entered, and the login identifier when the authentication succeeds, and that authenticates the user with reference to the storage part when the user enters the login password in the login screen and returns the same.
-
1 Specification
1. Technical Field of the Invention
The present invention generally relates to the transmission of digital information and more particularly to the arrangement and/or handling of digital information for confidential or secured communication including the mechanism for verifying the identity or qualification of a system user. The present invention is well suited to an authentication method or device when a user (client) of such a small potable terminal as a cellular phone, a car phone, PHS (Personal Handy-phone System), PDA (Personal Digital Assistant), etc. uses a network like Internet to access a server which stores desired information.
2. Prior Art
Owing to IT technology innovation, the global world based on Internet has been evolved, and its convenience has been spotlighted by the public attention. The information society where information digitalization and Internet are combined has come to greatly impact human activities ranging from company activities down to private life. Users can simultaneously access various servers connected to Internet to obtain versatile data and services. And recently, it is not only desktop personal computers (PCs), but also small portable terminals such as cellular phones, PDA. etc. that can have an access to Internet.
As a result of Internet linking individuals and companies, it becomes increasingly necessary to safely distribute information (e.g., commercial information or musical information provided only with specific members, or customer information which companies don'"'"'t want to be leaked to any irrelevant third party) or electronic commercial transactions (e.g., online shopping which requires transmission of credit card information). The site that wants to limit users who have access to information typically employs a system that registers users online or outline and then admits access to information only by those registered users.
For safe communication, cryptograph is employed. Cryptograph consists of a secrets keeping mechanism and authentication. A secrets keeping mechanism consists of encryption that encodes plaintext into cipher text, and decryption that decodes encrypted cipher text into plaintext, and it is an algorithm (a cipher system) and a key that dictate encryption and decryption. Typically, a small information device cannot encrypt/decrypt electronic mail, but WWW (hereinafter, simply called “web”) has a secret communication environment that can perform encryption/decryption. Authentication can be roughly classified as person identification, message authentication, and digital signature depending on subject to be identified. Person identification is also called party authentication or user authentication, and thus, it is a technique to be used for a multi-user computer system or for a network system to verify that the party you are communicating with is real, where the simplest way is to use a password. Typically, person identification is done by using a combination of a user ID (or a user name) that a user presets and stores into (a storage for an access authority list in) a server in advance, and a password, in which case a user is required to enter his or her user ID and password when logging in a computer system or a network. When the user enters both data, it is authenticated by cross-checking the two to make sure whether it is the same as the one registered in (the storage for the access authority list in) the server, and only at the time of being authenticated, use of the system is allowed within the limits of the registration made in the access authority list. Here, the user ID is a user identification name in the system, and the password is a character string consisting of numbers and alphabetical letters that the user has arbitrarily chosen.
Problems to be Solved by the Invention
However, since a user using a small portable terminal usually makes a key entry with one finger, the conventional authentication method that requires many key entry operations for a user ID and a password, Internet URL, etc. becomes a burden to the user in terms of entering and managing them. On the other hand, there is a need to maintain security to be able to attain an authentication method that uses a user ID and a password for realization of secure communication. Also, unlike a PC, cipher codes available on a small portable terminal are limited in many cases. For example, a cellular phone cannot use a cipher for electronic mail enabled communication, but can use a cipher for WWW (hereinafter, simply called ‘web’) enabled communication. Sending to a small portable terminal a URL for e-mail login containing a user identification part can provide facilities for a user, but when electronic mail cannot be enciphered, there will arise a danger that the URL for the user may be furtively looked at.
On the contrary, in addition to, or in place of, a user ID and a password, biometrix (bio-authentication) that uses bodily features (such physical features as a finger print, a palm pattern, a vocal pattern, a retinal pattern, etc., handwriting, and key-entry habits) is proposed as a new candidate. Use of biometrix increases security, but a purchase of a device dedicated for reading bodily information (a finger print reader, for example) will become a burden to a user. In addition, it is only such bio-information as is supported by an authentication device that can be used.
Thus, a generalized object of the present invention is to propose a novel and useful authentication method and device that will help solve the conventional problems.
More specifically, an exemplified object of the present invention is to propose an authentication method and device that can authenticate a user easily, comparatively cheaply, and safely.
Further, another exemplified object of the present invention is to offer an authentication method and device that can help lighten a user'"'"'s burden by alleviating key entry operations of a user who uses a small portable terminal.
In order to achieve the above objects, an authentication method as one aspect of the present invention comprises the steps of: sending an address of a registration screen to a communication device of a user, the address including a registration identifier for identifying the user and/or the communication device; authenticating the user based on the registration identifier and a first password that is entered in the registration screen and returned when the address is accessed; sending a login screen to the user when the authenticating step succeeds, the login screen including a field into which a second password is entered, and a login identifier for identifying the user and/or the communication device; and authenticating the user based on the login identifier included in the login screen, and the second password that are returned by the user. According to the authentication method, which follows the steps using the registration screen and the first password, the user may circumvent the load of keying the identifier in the login screen and handling the identifier, and thus the user using a small portable terminal particularly benefits from the authentication method. Moreover, the authentication method may ensure the same level of security as the authenticating method using the identifier and the (second) password. Even if he address of the registration screen were sent without using encryption, and resultantly leaked, the first password would secure legitimateness of the user.
The registration identifier and the login identifier preferably differ from each other. The login identifier that could not be presumed from the registration identifier would prevent the address of the registration screen from providing a clue to an unauthorized login. The first and second passwords may either be the same or different. The same passwords could reduce the load of the user in handling the password.
The identifier in the login screen may be a device identifier that the communication device automatically sends for particularly identifying the communication device. Some of cellular phones, etc. send a notification of the device identifier (specific identifier for each cellular phone) to the server as part of communication services irrespective of the user'"'"'s operations. The device identifier is assigned individually even among the same models, and thus identifies both the model and the user who uses the model. Therefore, utilizing this identifier would allow the user to omit setting the identifier of the communication device independently from the login screen.
The above step of sending the login screen to the user enables the user to save contents of the login screen in the communication device. This is made possible when the communication device is capable of saving the login screen. Alternatively, the above step of sending the login screen to the user may enable the user to save an address of the login screen in the login screen, where the address of the login screen includes the identifier. In this instance, the communication device, for example, may bookmark a URL of the login screen including the identifier.
The authenticating step using the registration identifier and the first password may disable the registration screen to be accessed when the authenticating step succeeds. This would prevent someone who might attempt to cast a furtive glance at the address of the registration screen from succeeding in registration on the premise that the authorized user has completed the registration, thereby enhancing the security. On the other hand, even if the one who has cast a furtive glance had completed the registration, the authorized user would become aware of abnormal conditions from inaccessibility to the registration screen, and could take prompt measures such as retrying the registration.
The first password that has been entered in the registration screen and returned may be accepted only when the password is returned within a predetermined time. This would allow the user authentication using the first password to be implemented when the password is entered in the registration screen and returned within a predetermined time. Even if other than the authorized user could acquire the registration screen, time period would expire while seeking the first password, so as to enhance the security.
An authentication device as another aspect of the present invention comprises: a storage part that stores user information, a registration identifier, a registration password verification information, login identifier, login password verification information while correlating them with one another; a first control part that sends an address of a registration screen to a communication device of a user, the address including a registration identifier for identifying the user and/or the communication device; a second control part that provides the communication device with the registration screen including a field into which a registration password is entered, and the registration identifier in response to a request for the registration screen from the communication device, and that authenticates the user with reference to the storage part when the user enters the login password in the registration screen and returns the same; and a third control part that provides the communication device with the login screen including a field into which a login password is entered, and the login identifier when the authentication succeeds, and that authenticates the user with reference to the storage part when the user enters the login password in the login screen and returns the same. This authentication device controls the registration through the second control part, and the login through the third control part. The first, second, and third control parts may be the same component, or any two of the control parts may be the same. Since the login screen provided after the registration control includes the login identifier, the user may circumvent the load of keying the same in the login screen and handling the identifier, and thus the user using a small portable terminal particularly benefits from the authentication device. Even if the registration screen were sent or received without using encryption, the registration password would secure that the other party is an authorized user. The registration password and the login password may be either the same or different. Nonetheless, the registration identifier and the login identifier preferably differ from each other. The login identifier that could not be presumed from the registration identifier would prevent the address of the registration screen from providing a clue to an unauthorized login.
Other objects and further features of the present invention will become readily apparent from the following description of the embodiments with reference to accompanying drawings.
-
- 1 Authentication System
- 10A User (and/or his or her cellular phone)
- 10B Illegitimate user (and/or his or her cellular phone)
- 20 Information provider
- 30 Internet
- 100 Authenticator
- 110 Control
- 120 Communication port
- 130 Random number generator
- 140 Encryptor/decryptor
- 150 Memory
- 200 Storage
- 210 User management table
- 220 Registration screen saving table
- 230 Login screen management table
Preferred Embodiments of the Invention
Below, authentication system 1 of the present invention will be explained by referring to attached figures.
User 10 can be an individual or a company, and its installation place can be domestic or abroad, but typically, it refers to a platform operated by an individual or enterprise user or software stored on that platform, or it even refers to a user himself in this embodiment of the invention. As a machine that sends and receives, processes and stores information, the platform widely comprises not only a PC but also a digital TV, PDA, a car phone, a cellular phone, PHS, WAP (Wireless Application), a game machine, etc. However, user 10 in this embodiment of the present invention uses a cellular phone comprising a screen scribbling function and software stored in it. The screen scribbling function is a function that serves to capture and save an image, and is widely used in such cellular phones as the i-mode cellular phone manufactured by DoCoMo Co.
User 10 stores a browser needed for communication with information provider 20 and authenticator 100 via Internet 30. The browser enables user 10 to use e-mail. Thus, client 10 can communicate with information provider 2Q and authenticator 100 via wireless communication or can communicate with them over Internet. Such a browser as this can desirably bookmark the URL for information provider 20 and authenticator 100.
Information provider 20 stores information and/or services that user 10 desires. In order to admit information access only to a specific user for commercial reasons and/or from information security, information provider 20 generally needs user authentication when a user logs in. For example, the case is where a member alone is allowed to have access to specific information such as a stock forecast, a meeting, a horse-race forecast, etc., or where only an operator is allowed to access confidential information about his company. Information provider 20 can be organized with the function of authenticator 100 included in it, as discussed later, as a one piece or can be connected to it without using Internet 30. Information provider 20 generally comprises the hardware component of authenticator 100, and so, a detailed description of it will be omitted here.
Internet 30 is a typical example of a network, but the present invention does not prohibit itself from being applied for LAN (Local Area Network), MAN (Metropolitan Area Network), WAN (Wide Area Network), commercial exclusive lines (such as America Online), and other online networks.
Authenticator 100 comprises CPU 110, communication port 120, random number generator 130, memory 140, encryptor/decryptor 150, and storage (data storage) 200. In addition, authenticator 100 can also function as a mail server and a news server. CPU 110 comprises a wide selection of processing units such as MPU or whatever, thus controlling each part of authenticator 100. Authenticator 100 can comprise dedicated processing units which are controlled by CPU 110 and process various types of databases on data storage 200. Also, authenticator 100 comprises an input means not included in the illustration (such as a keyboard, a mouse or other pointing devices), a display, etc. Via an input means, the operator of authenticator 100 can enter various kinds of data into storage 200, and set up necessary software in memory 150 and storage 200.
It necessary, authenticator 100 can be connected to other computers through LAN and other network, and CPU 110 can communicate with such computers. In connection with the present invention, CPU 110 can build various types of databases (user managed table 210, registration screen management table 220 and login screen management table 230) stored in storage 200, and authenticate user 10 by use of a relevant database.
Communication port 120 includes USB port, IEEE 1394 port, etc., which can be connected, via a modem and a terminal adapter (TA), to various dedicated lines that, in turn, are connected to a public telephone line network and ISDN connectable to Internet (if necessary, through ISP—Internet Service Provider). Further, when authenticator 100 is linked to LAN, communication port 120 also can include a hub and a router.
Random number generator 130 comprises a program language having a function that generates random numbers. According to the present invention, ID is not determined by user 10, but CPU 110 allocates a random ID to user 10 based on a random number generated by random number generator 130.
When storing into storage 200 a password set up by user 10, and sending and receiving data over a network, encryptor/decryptor 140 converts (encrypt) data so that a third party may not understand it, and converts (decrypts) the encrypted password of user 10, extracted from storage 200, to be decipherable when authenticator 100 authenticates user 10. It is a procedure (an algorithm), and a key which is a parameter consisting of alphanumericals and symbols randomly lined up (a character string) that dictate encryption and decryption. The procedure is a fixed part of hardware and software, and the key is a convertible character string. The mechanism for a procedure (an encryption system) differs between an encryption key and a decryption key even in the secret key encryption where a sender and a receiver share the same key in confidence, and the encryption key can be made open, and the decryption key can be an open key encryption that is kept secret on the side of a receiver. Further, any encryption techniques known in the industry can be applied to the present invention, and so, detailed description of encryption will be omitted here.
Memory 150 contains RAM and ROM, thereby saving temporarily data read out from, and written to, storage 200. Memory 150 stores various kinds of software, firmware, and other software necessary for the operation of CPU 110.
Mailer 160 is software for sending e-mail to, and receiving e-mail from, user 10, and comprises a storage part, not illustrated in the figure, for a receiving tray to store mail received from user 10 and others, a sending tray to store mail bound for user 10 and others, an already sent tray to store mail already sent to others, an already deleted tray to store mail deleted from arbitrary trays, and a drafting tray to store mail on a drafting stage. In this embodiment of the present invention, the mail server for authenticator 100 is provided separately from the authentication device, but as stated above, authenticator 100 can act as a mail server. Mailer 160 sends to user 10 a message like a stereotyped phrase (e.g., “Thank you for accessing our URL. Please access the registration screen below (or the activation screen) within 3 hours.”), a registration screen URL peculiar to user terminal 10 (i.e., a URL including a registration identifier explained later) and other information. Here, the reason for writing ‘a registration screen peculiar to a user terminal’ is because since depending on its type, a cellular phone has a different format for a site from where information can be received, it is necessary to use one that fits to the user'"'"'s cellular phone type as explained later. However, the present invention does not essentially require that authenticator 100 comprise mailer 160.
Although storage 200 comprises databases for user management table 210, registration screen management 220 and login screen management table 230, it is not limited to this.
User management table 210 contains, by way of illustration, user 10'"'"'s name, address, sex, age, birthday, telephone number, e-mail address, machine type of the cellular phone used, authentication information for one or more passwords (it can be the password itself, but it should include all information necessary to authenticate them), type of a process corresponding to type of a cellular phone, bank account number, credit card number, key for encryption, and other ID information. Here, ‘type of a process corresponding to type of a cellular phone’ is not necessarily needed all the time, but when the format of the Web screen displayable depending on the type of a cellular phone changes or its preservation function changes (e.g., the content of a certain Web screen cannot be preserved, but its bookmark can be preserved), a process that fits for a pertinent cellular phone is performed (e.g., the Web screen is changed so that it fits for the cellular phone, and then, necessary ID is inserted in its URL). Registration of user 10 is performed offline in advance by authenticator 100 and its administrator using a relevant cellular phone, mail or fax, etc., and then later, upon online connection request from user 10, authenticator 100 will re-register user 10. Online registration operation is done by user 10 who completes and sends a specific form provided by CPU 110. By using his or her own terminal, user 10 can confirm his or her ID information at any time, and can change it if necessary.
By referencing user management table 210, CPU 110 authenticates user 10 when user 10 wants to access authenticator 100. In addition, when user 10 updates or deletes registered information, further additional authentication can be performed. Authenticator 100 can, if necessary, be provided with a voice authenticator that authenticates user 10 by his voiceprint, in which case the ID information should contain the voiceprint of user 10.
Registration screen management table 220 houses registration screen 221 which is a registration screen peculiar to a user and/or a communication device that the user uses (i.e., a cellular phone in this embodiment). As explained later, registration screen 221 is provided by CPU 110, via e-mail, to the e-mail address of the cellular phone of user 10 registered in advance. It is preferable that such provision of registration screen 221 be limited in terms of time. By so doing, even if non-legitimate users (false users) obtain the URL of registration screen 221, time-out state is brought in, as explained later, while they fumble for the password, thus improving security.
Registration screen 221 (reference number ‘221’ represents 221a, 221b, etc.) comprises a number of types and fields as shown in FIGS. 2 (a) through (d). Here.
First in reference to
In reference to
In reference to
In reference to
Login screen management table 230 houses login screen display 231 (reference number ‘231’ is to represent 231a, 231b, etc.) into which a login identifier identifying a user and/or communication device (i.e., a cellular phone in this embodiment) is planned to be imbedded (i.e., before the imbedding takes place) in a way hidden from user 10. Login screen 231 to be provided to user 10 has an identifier imbedded; therefore, user 10 need not enter this from the cellular phone, thus contributing to the alleviation of key operation. Even if an imprudent person peeks at the login screen display 231 on the cellular pone, he cannot recognize the identifier, thus improving security.
Login screen display 231 comprises, as shown in FIGS. 3 (a) and (b), a number of types and fields. Here,
First in reference to
Field 232 indicates an identifier that identifies a user and/or his communication device registered in user management table 210. A login identifier is imbedded in registration screen 221a so as to be confirmed by a user or, more preferably, in a way hidden, invisible from user 10 who receives login screen display 221a. It is preferable that login identifier 232 differs from registration identifier 222, because in this embodiment, as stated above, registration identifier 222 uses on as-is basis what is sent to user 10 by mailer 160, and registration identifier 222 is exposed to a danger of being seen furtively by an imprudent person since it is sent to user 10 in an unencrypted way via e-mail. Since login identifier 223 is already imbedded in login screen 231a, user 10 is relieved from the burden of entering and administering this login identifier. Field 233 is a field for entering a login password (of eight characters, for example) that user 10 has chosen and registered in user management table 210 in advance. A login password can be the same as a registration password, or it can be a different password. Field 234 is a field that is clicked to reply a registration password to authenticator 100 via Web enabled communication after the user has inputted the registration password.
In reference to
In reference to
At first, user 10A makes a user registration request to an administrator of authenticator 100 offline using a cellular phone, FAX, or mail (step 1002). If user 10 has a desktop PC besides a cellular phone, it is quite easy to make an input using a mouse or a keyboard, thus being able to directly make a user registration to authenticator 100 online. However, in the present case, a cellular phone, rather than a PC, is to be registered.
Authenticator 100 or its administrator that receives the request, makes an entry of user information requested by user 10 (i.e. user 10'"'"'s name, address, sex, age, birthday, telephone number, e-mail address, type of his cellular phone, authentication information for his password (for registration and login) (which can be the password itself but should include all information needed to authenticate this), types of services selected, necessary charge information (bank account, credit card, etc.), key for encryption, and other ID related information), and registers it in user management table 210 of storage 200 (step 1004). At the time of registration, CPU 110 encrypts user information via encryptor/decryptor 140, or merely stores the information in user management table 210 of storage 200 without encrypting it.
When authenticator 100 or its administrator completes the registration of the user information, CPU 110 sends URL of registration screen 221 to the e-mail address of cellular phone 10A via mailer 160 and communication port 120, as well as writing registration identifier 222 and effective period 225 into corresponding registration screen 221a (step 1006). Before sending URL of registration screen 221, CPU 110 refers to user management table 210 of storage 200 in advance, thus acquiring URL of accessible registration screen 221a into the type of cellular phone 10A, and randomly generating a registration identifier, by using random number generator 130, that identifies the cellular phone 10A, which is to be included in registration screen 221a. The timing with which CPU 110 gives e-mail can be at the time when registration of user information into authenticator 100 is completed or at the time user 10 makes a request.
Upon receipt of an e-mail that includes URL of registration screen 221a (step 1008), user 10A calls upon registration screen 221a (step 1010). At this point of time, as the URL is contained in the e-mail, user 10A need not use the key pad of his cellular phone to input the URL purposely. Instead, user 10A can reverse the URL of the e-mail to push ‘Decision’ key, usually equipped, and click/double-click the URL, thereby calling the URL of registration screen 221a.
In response to this, CPU 110 displays the corresponding registration screen 221a (step 1012). CPU 110 determines the type of the cellular phone, calling for the URL, based on the number, contained in the URL, which is peculiar to a machine type. Registration identifier 222, which is peculiar to cellular phone 10A, is written in registration screen 221a in a modifiable way. CPU 110 prompts user 10 to enter the registration password via registration screen 221a. Generally speaking, the browser for a PC can use encryption for Web enabled communication and e-mail enabled communication, but in the case of a cellular phone, encryption can be applied for Web enabled communication, while on the other hand it cannot be applied for e-mail enabled communication. Therefore, according to the embodiment of the present invention, when a URL containing a number specific to the machine type of a cellular phone is given via e-mail, since it is exposed to a danger of being furtively listened to, resulting in the URL being leaked, the password should be confirmed, and it should be verified that the request is from legitimate user 10A.
Later on, user 10A puts the registration password from registration screen 221a into field 223 to reply to authenticator 100 (step 1011). Communication at this time is changed from e-mail enabled communication to Web enabled communication, and the registration password is encrypted for transmission; thus, there is no danger for the password to be stolen and leaked.
If a wrong registration password is entered, registration screen display 221b is sent to user 10A, who is prompted to retry the registration password. At this time, considering a case where cellular phone 10A was forgotten somewhere or stolen, and the registration password is used by illegitimate user 10B, it is possible to make the registration screen 221a unusable if illegitimate user 10B makes as many errors consecutively in retrying the password as the times set up when the registration password was settled, even if the registration screen 221a is still within the effective period. If the effective period defined in field 225 has expired, registration screen 221c will be sent to user 10A to indicate this. In this case, user 10 still make an online or offline contact with authenticator 100 or its administrator afresh, requesting that URL of new registration screen 221a be sent. When illegal person 10B takes possession of the URL and registration password, and inputs the registration password to field 223 of registration screen 221a, and if cellular phone 10B of the illegal person sends its phone type identifier automatically, registration screen 221d will be sent to user 10B, thereby warning him that a machine type used is wrong.
If user 10A encrypts and sends a correct registration password to authenticator 100 within the effective period, CPU 110 will decrypt the received registration password via encryptor/decryptor 140, and authenticate it by referencing the authentication information of the registration password stored in user management table 210 of storage 200. If the authentication is successful and CPU 110 authenticates user 10A, control of the registration by CPU 110 will terminate (step 1016).
Next, when control of the registration ends and legitimate user 10A is authenticated, CPU 110 will write login identifier 232 into login screen 231a, and send it to user 10A (step 1018). As stated above, some machine types of cellular phones may send a machine identifier automatically; so, CPU 110 can use it for login identifier 232. But even if it is not used, no problems will arise, and thus it does not follow that the present invention will be restricted by whether or not the cellular phone itself can issue an identifier. In this embodiment of the present invention, CPU 110 imbeds login identifier into login screen 231a in a way hidden from user 10A, and sends login screen 231a to user 10A after encrypting it at encryptor/decryptor 140. Since login screen 231a is sent in an encrypted state, there is no danger that login identifier 232, which is imbedded in login screen 231a in a hidden state, will be furtively seen and leaked.
Then, user 10A will use the screen memo function of cellular phone 10A to save login screen 231a (step 1020). Such an action corresponds to the screen saving for a PC. CPU 110, by the way, takes step 1018, because referencing user management table 210, it is aware that user 10A can perform step 1020.
When user 10A wants to access authenticator 100, user 10A will call the login screen saved on the cellular phone (step 1022), and enter and send login password 233 to authenticator 100. Since the identifier for user 10 is imbedded in the login screen in advance, user need not enter identification information afresh on login screen 231a, thus making the key operation simple. As already stated above, login password 233 can be the same as, or different from, the registration password. Since the sending of the login screen from user 10 to authenticator 100 is done over Web, the content of login screen 231a will be encrypted, and so, there is no danger that ID information or login password for user 10 will be stealthily seen and get leaked.
If a wrong login password 233 is entered, login screen 231b will be sent to user 10A, thus prompting a retry of login password 233 to be made.
If user 10A encrypts and sends a correct login password 233 to authenticator 100, CPU 110 will decrypt received login password 233 via encryptor/decryptor 140, and verifies it against authentication information of the login password stored in user management table 210 of storage 200. If the verification is successful, and CPU 110 authenticates user 10A, control of the login by CPU 110 will end (step 1026). After that, CPU 110 will make it possible for user 10A to access information provider 20. As a result, user 10A will access information in information provider 20 by way of simple key operation.
So far, a description of a preferable embodiment of the present invention has been given, but a variety of variations and changes of the present invention are feasible in the scope of its application.
Effects of the Invention
The authentication method and device used for the present invention will assure an easy, inexpensive, highly secure, and sure authentication operation for a user in general, particularly for such a user as uses a communication device whose key operation is complicated.