AUTHENTICATION METHOD
First Claim
1. An authentication method for a terminal in an authentication system which authenticates the terminal, the authentication method comprising:
- collecting power usage of each of one or more devices belonging to a group at prescribed intervals;
receiving, from the terminal, an authentication request including group identification information for identification of the group to be authenticated;
providing a notification for determining a device as a manipulation target in the group and details of a manipulation on the device and providing notification to the terminal, upon receipt of the authentication request;
judging, on a basis of a change in the power usage of each of the devices belonging to the group, whether the device designated by the notification is manipulated; and
authenticating the terminal for transmitting authentication information to the terminal if the device designated by the notification is judged to be manipulated.
1 Assignment
0 Petitions
Accused Products
Abstract
Power usage of each of one or more devices belonging to a group is collected at prescribed intervals, and an authentication request including group identification information for identification of the group to be authenticated is received from a terminal. Upon receipt of the authentication request, a device as a manipulation target in the group and details of a manipulation on the device are determined, and notification is provided to the terminal. Whether the device designated by the notification is manipulated is judged on the basis of a change in the power usage of each of the devices belonging to the group. If the device designated by the notification is judged to be manipulated, authentication information is transmitted to the terminal.
-
Citations
11 Claims
-
1. An authentication method for a terminal in an authentication system which authenticates the terminal, the authentication method comprising:
-
collecting power usage of each of one or more devices belonging to a group at prescribed intervals; receiving, from the terminal, an authentication request including group identification information for identification of the group to be authenticated; providing a notification for determining a device as a manipulation target in the group and details of a manipulation on the device and providing notification to the terminal, upon receipt of the authentication request; judging, on a basis of a change in the power usage of each of the devices belonging to the group, whether the device designated by the notification is manipulated; and authenticating the terminal for transmitting authentication information to the terminal if the device designated by the notification is judged to be manipulated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification