US20010034832A1 - Terminal device and method for requesting user certification from host computer - Google Patents

Terminal device and method for requesting user certification from host computer Download PDF

Info

Publication number
US20010034832A1
US20010034832A1 US09/116,921 US11692198A US2001034832A1 US 20010034832 A1 US20010034832 A1 US 20010034832A1 US 11692198 A US11692198 A US 11692198A US 2001034832 A1 US2001034832 A1 US 2001034832A1
Authority
US
United States
Prior art keywords
password
terminal device
certification
host computer
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/116,921
Other versions
US6425085B2 (en
Inventor
Hideki Hashikura
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Canon Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Assigned to CANON KABUSHIKI KAISHA reassignment CANON KABUSHIKI KAISHA ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HASHIKURA, HIDEKI
Publication of US20010034832A1 publication Critical patent/US20010034832A1/en
Application granted granted Critical
Publication of US6425085B2 publication Critical patent/US6425085B2/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Definitions

  • the present invention relates to a terminal device and method for requesting user certification from a host computer when accessing the host computer.
  • a terminal device capable of accessing a host computer which performs user certification based on a certification code received from the terminal device, including: input means for inputting a password assigned to a user; storage means for holding unique information about the terminal device; generating means for generating a certification code based on the password and the unique information; and transmitting means for transmitting the certification code to the host computer.
  • the foregoing objects have been achieved through provision of a method for a terminal device to request user certification from a host computer which performs user certification based on a certification code received from the terminal device, the method including the steps of: inputting a password assigned to a user; reading unique information stored in the terminal device; generating a certification code based on the password and the unique information; and transmitting the certification code to the host computer.
  • a user certification system including a host computer and a plurality of terminal devices capable of accessing the host computer, in which the plurality of terminal devices each include: input means used to input a password assigned to a user; storage means for holding unique information about the terminal device; generating means for generating a certification code based on the password and the unique information; and transmitting means for transmitting the certification code to the host computer, and the host computer includes: receiving means for receiving the certification code; and certification means for performing user certification based on the received certification code.
  • a computer-readable storage medium holding an information processing program for controlling a computer in a terminal device to request user certification from a host computer, the program including codes for causing the computer to perform the steps of: inputting a password assigned to a user; reading unique information stored in the terminal device; generating a certification code based on the password and the unique information; and transmitting the certification code to the host computer.
  • FIG. 1 is a functional block diagram showing a terminal device according to an embodiment of the present invention.
  • FIG. 2 is a hardware block diagram showing the terminal device shown in FIG. 1.
  • FIG. 2 is a hardware block diagram showing the terminal device shown in FIG. 1.
  • FIG. 3 is an example of an image displayed when a password is requested.
  • FIG. 4 is a drawing showing an example of a certification code.
  • FIG. 5 is a flowchart showing a process for password combining.
  • FIG. 6 is an example of the format of an identification code.
  • FIG. 7 is a flowchart showing a process for detecting a password request.
  • FIG. 8 is an example of the format of a password request command.
  • FIG. 9 is another example of the format of a password request command.
  • An outline of the embodiment is that, with unique identification codes (e.g., serial numbers) assigned to terminal devices, each terminal device sends one identification code together with a password input by a user in response to a password request from a host computer, and the host computer uses the sent identification code and password to perform user certification.
  • unique identification codes e.g., serial numbers
  • each terminal device sends one identification code together with a password input by a user in response to a password request from a host computer, and the host computer uses the sent identification code and password to perform user certification.
  • unique identification codes e.g., serial numbers
  • FIG. 1 shows a block diagram of a terminal device 10 according to the embodiment.
  • a display unit 1 displays information such as a message.
  • a keyboard 2 is used to input ordinary character strings, commands and passwords.
  • a password request detector 3 detects a password request from information received from a host computer 11 .
  • An identification code memory 5 holds as non-volatile information an identification code unique to the terminal device 10 .
  • a password combining unit 4 combines a password input from the keyboard 2 and the identification code stored in the identification code memory 5 .
  • a communication unit 6 receives the password request etc. from the host computer 11 , and transmits a communication request and a password to the host computer 11 .
  • FIG. 2 shows a hardware block diagram of the terminal device 10 .
  • a central processing unit (CPU) 21 controls the units of the terminal device 10 , and executes various programs stored in a read only memory (ROM) 23 and a hard disk drive (HDD) 25 .
  • the CPU 21 realizes the functions of the password request detector 3 and the password combining unit 4 .
  • a communication interface (I/F) 22 realizes communication with the communication unit 6 between the terminal device 10 and the host computer 11 .
  • the ROM 23 holds fixed data and programs so that they cannot be rewritten, and includes an area to be used as the identification code memory 5 .
  • a random access memory (RAM) 24 is used as a work area for the CPU 21 , and temporarily holds data such as an input password.
  • the HDD 25 holds various data and programs as non-volatile information. Also programs corresponding to processes (described below with flowcharts) are stored in either the ROM 23 or the HDD 25 . In place of the HDD 25 as a non-volatile storage unit, a floppy disk drive or the like may be provided, or all necessary programs may be stored in the ROM 23 without particularly providing a non-volatile storage unit like the HDD 25 .
  • a user certification process will be described below. Initially, when the communication between the terminal device 10 and the host computer 11 is established in response to an access request from the user of the terminal 10 , the host computer 11 transmits an input request to the terminal device 10 for a user name and a password.
  • the password request issued from the host computer 11 is input to the password request detector 3 via the communication unit 6 .
  • the password request detector 3 sends ordinary characters unchanged to the display unit 1 when receiving them, while the password request detector 3 sends a password request message to the display unit 1 for setting a password mode and informs the password combining unit 4 of a password request when the request is received.
  • An example of an image displayed on the display unit 1 in accordance with the password request is shown in FIG. 3.
  • the password combining unit 4 reads an identification code from the identification code memory 5 , and combines the identification code and the password.
  • FIG. 4 One example of password combining is shown in FIG. 4.
  • a composite password is formed by adding the input password to the end of the identification code.
  • the composite password formed by the password combining unit 4 is transmitted to the host computer 11 via the communication unit 6 .
  • the host computer 11 performs user certification, based on the composite password.
  • passwords formed in the above manner by combining the identification codes of terminal devices and the passwords of the terminal devices' users have been registered beforehand.
  • FIG. 5 shows a flowchart illustrating a password combining process.
  • step S 1 a character string input from the keyboard 2 by the user is acquired.
  • step S 2 it is determined whether or not the present mode is a password mode. If the present mode is not a password mode, the process proceeds to step S 5 . If the present mode is a password mode, the process proceeds to step S 3 , in which the identification code stored in the identification code memory 5 is read.
  • step S 4 the acquired character string and the identification code are combined.
  • step S 5 the composite character string formed in the password mode, or a character string input in non-password mode is transmitted by the communication unit 6 .
  • FIG. 6 shows one example of the format of the identification code stored in the identification code memory 5 .
  • the terminal device 11 can be uniquely identified based on the identification code.
  • the identification code memory 5 is formed at specific addresses of the ROM 23 etc.
  • FIG. 7 shows a flowchart illustrating a process for detecting a password request.
  • Data characters transmitted from the host computer 11 are received by the communication unit 6 , and the data are sent to the password request detector 3 .
  • the communication unit 6 is used to acquire data from the host computer 11 .
  • the password request detector 3 determines whether the received data are a password request or ordinary data. If the received data is ordinary data, the password mode is released in step S 13 . If the received data is a password request, the process proceeds to step S 12 , in which the password mode is set.
  • FIG. 8 shows one example of the format of a password request command. Based on the format, the password request detector 3 determines whether the data from the host computer 11 are password data or ordinary data.
  • the character string has at its start a code (“03” in hexadecimal) that is different from a character code, which allows the character string to be discriminated from ordinary data.
  • FIG. 9 shows another example of the format of the password request command. In FIG. 9, “03” in hexadecimal represents the start of a password request command, and “04” in hexadecimal represents the end of the password request command.
  • a user's password and a code unique to each terminal device are used to form a composite password, and the composite password is used for user certification.
  • the composite password is used for user certification.
  • the type of the terminal device 10 is not limited to a desktop type but may be-a portable type. Concerning the portable type of terminal device 10 , when it is carried by its user, a person other than the user cannot access the host computer 11 , even if that person knows the password.
  • the terminal device 10 combines an input password and a read identification code to generate a new password, and transmits it to the host computer 10 .
  • the password and the identification code transmitted to the host computer 11 they may be combined by the host computer 11 .
  • the host computer 11 may perform user certification by independently verifying the password and the identification code.
  • password combining is performed by simply combining an input password and a read identification code.
  • logical operations such as a logical sum and an exclusive OR, a transpose, and a permutation may be properly combined.
  • a type of combining process may be stored as a unique process in the ROM 23 of each terminal device. In this case, without using the identification code, only the password may be processed by the unique process.
  • a user inputs a password from a keyboard whenever a host computer transmits a password request.
  • the user's terminal device cannot be used by a person other than the user, in order that time for inputting the password may be omitted, by once inputting the password from the keyboard so that the password can be stored in the hard disk drive of the terminal device, the stored password may be read in response to the password request.
  • main necessary units are realized by software, whereby they can be inexpensively formed.
  • the present invention may be applied to a system composed of plurality of apparatuses (e.g., main computer unit, interface unit, and display) and to a one-unit apparatus as far as the functions of the embodiment are realized.
  • apparatuses e.g., main computer unit, interface unit, and display
  • the present invention includes also a system in which, in order that each unit may operate to realize the functions of the embodiment, a software program code that realizes the functions of the embodiment is supplied to a computer (CPU or microprocessor unit) in an apparatus or system connected to each unit, and each unit is controlled to operate by the computer in the apparatus or system in accordance with the supplied code.
  • a computer CPU or microprocessor unit
  • the program code read from a storage medium realizes the functions of the embodiment.
  • the program code, means for supplying the program code to the computer such as a storage medium holding the program, constitute the present invention.
  • the storage medium for supplying the program code for example, a floppy disk, a hard disk, an optical disk, a magneto-optical disk, a CD-ROM, a CD-R, a magnetic tape, a non-volatile memory card, a ROM, and so forth, may be used.
  • the present invention includes a system in which a program code read from a storage medium is written in a memory of a feature expansion board provided on a computer or feature expansion unit connected to the computer, and based on the program code, all or part of actual processing is performed by a CPU provided on the feature expansion board or feature expansion unit, whereby realizing the functions of the embodiment.

Abstract

A terminal device generates and transmits to a host computer a user certification code formed by combining a unique password input by a user and a unique code stored in the terminal device when the host computer requests a password from the terminal device. The host computer uses the certification code to perform user certification. Thereby, if a password assigned to one user is used, the host computer cannot be accessed by a terminal device other than the user's terminal device. Thus, security can be maintained, even if another person knows the password.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention [0001]
  • The present invention relates to a terminal device and method for requesting user certification from a host computer when accessing the host computer. [0002]
  • 2. Description of the Related Art [0003]
  • According to conventional user certification used when a server host computer is accessed from a terminal device, it is common for the host computer to request a user to input a password and to identify the user as authentic if the input password is the same as a registered password. [0004]
  • Therefore, there is a serious problem in that, if another person knows the user's password, the person can use it to access the host computer. [0005]
  • SUMMARY OF THE INVENTION
  • Accordingly, it is-an object of the present invention to provide a user certification system for preventing a host computer from being accessed by a person other than a user, even if the person knows the user's password, and a terminal device for requesting user certification from the host computer. [0006]
  • In addition, it is another object of the present invention to provide a user certification system capable of preventing access to a host computer from a terminal device other than that of the user operated by a person impersonating the user, and a terminal device for use with the system. [0007]
  • To these ends, according to an aspect of the present invention, the foregoing objects have been achieved through provision of a terminal device capable of accessing a host computer which performs user certification based on a certification code received from the terminal device, including: input means for inputting a password assigned to a user; storage means for holding unique information about the terminal device; generating means for generating a certification code based on the password and the unique information; and transmitting means for transmitting the certification code to the host computer. [0008]
  • According to another aspect of the present invention, the foregoing objects have been achieved through provision of a method for a terminal device to request user certification from a host computer which performs user certification based on a certification code received from the terminal device, the method including the steps of: inputting a password assigned to a user; reading unique information stored in the terminal device; generating a certification code based on the password and the unique information; and transmitting the certification code to the host computer. [0009]
  • According to a further aspect of the present invention, the foregoing objects have been achieved through provision of a user certification system including a host computer and a plurality of terminal devices capable of accessing the host computer, in which the plurality of terminal devices each include: input means used to input a password assigned to a user; storage means for holding unique information about the terminal device; generating means for generating a certification code based on the password and the unique information; and transmitting means for transmitting the certification code to the host computer, and the host computer includes: receiving means for receiving the certification code; and certification means for performing user certification based on the received certification code. [0010]
  • According to yet another aspect of the present invention, the foregoing objects have been achieved through provision of a computer-readable storage medium holding an information processing program for controlling a computer in a terminal device to request user certification from a host computer, the program including codes for causing the computer to perform the steps of: inputting a password assigned to a user; reading unique information stored in the terminal device; generating a certification code based on the password and the unique information; and transmitting the certification code to the host computer.[0011]
  • Other objects and advantages besides those discussed above shall be apparent to those skilled in the art from the description of a preferred embodiment of the invention which to follows. In the description, reference is made to accompanying drawings, which form a part thereof, and which illustrate an example of the invention. Such example, however, is not exhaustive of the various embodiments of the invention, and therefore reference is made to the claims which follow the description for determining the scope of the invention. [0012]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a functional block diagram showing a terminal device according to an embodiment of the present invention. [0013]
  • FIG. 2 is a hardware block diagram showing the terminal device shown in FIG. 1.FIG. [0014]
  • FIG. 3 is an example of an image displayed when a password is requested. FIG. [0015]
  • FIG. 4 is a drawing showing an example of a certification code. [0016]
  • FIG. 5 is a flowchart showing a process for password combining. [0017]
  • FIG. 6 is an example of the format of an identification code. [0018]
  • FIG. 7 is a flowchart showing a process for detecting a password request. [0019]
  • FIG. 8 is an example of the format of a password request command. [0020]
  • FIG. 9 is another example of the format of a password request command.[0021]
  • DESCRIPTION OF THE PREFERRED EMBODIMENT
  • One preferred embodiment of the present invention will be described below, with reference to the attached drawings. [0022]
  • An outline of the embodiment is that, with unique identification codes (e.g., serial numbers) assigned to terminal devices, each terminal device sends one identification code together with a password input by a user in response to a password request from a host computer, and the host computer uses the sent identification code and password to perform user certification. In this manner, if a certain user's password was leaked to another person, the person cannot be authenticated unless the person inputs the user's password from the user's terminal device to the host computer. In other words, access to the host computer using the leaked password is impossible. [0023]
  • FIG. 1 shows a block diagram of a [0024] terminal device 10 according to the embodiment. A display unit 1 displays information such as a message. A keyboard 2 is used to input ordinary character strings, commands and passwords. A password request detector 3 detects a password request from information received from a host computer 11. An identification code memory 5 holds as non-volatile information an identification code unique to the terminal device 10. A password combining unit 4 combines a password input from the keyboard 2 and the identification code stored in the identification code memory 5. A communication unit 6 receives the password request etc. from the host computer 11, and transmits a communication request and a password to the host computer 11.
  • FIG. 2 shows a hardware block diagram of the [0025] terminal device 10. A central processing unit (CPU) 21 controls the units of the terminal device 10, and executes various programs stored in a read only memory (ROM) 23 and a hard disk drive (HDD) 25. In particular, the CPU 21 realizes the functions of the password request detector 3 and the password combining unit 4. A communication interface (I/F) 22 realizes communication with the communication unit 6 between the terminal device 10 and the host computer 11. The ROM 23 holds fixed data and programs so that they cannot be rewritten, and includes an area to be used as the identification code memory 5. A random access memory (RAM) 24 is used as a work area for the CPU 21, and temporarily holds data such as an input password. The HDD 25 holds various data and programs as non-volatile information. Also programs corresponding to processes (described below with flowcharts) are stored in either the ROM 23 or the HDD 25. In place of the HDD 25 as a non-volatile storage unit, a floppy disk drive or the like may be provided, or all necessary programs may be stored in the ROM 23 without particularly providing a non-volatile storage unit like the HDD 25.
  • A user certification process will be described below. Initially, when the communication between the [0026] terminal device 10 and the host computer 11 is established in response to an access request from the user of the terminal 10, the host computer 11 transmits an input request to the terminal device 10 for a user name and a password.
  • The password request issued from the [0027] host computer 11 is input to the password request detector 3 via the communication unit 6. As described below, the password request detector 3 sends ordinary characters unchanged to the display unit 1 when receiving them, while the password request detector 3 sends a password request message to the display unit 1 for setting a password mode and informs the password combining unit 4 of a password request when the request is received. An example of an image displayed on the display unit 1 in accordance with the password request is shown in FIG. 3. When a password is input from the keyboard 2 in response to the password request, the password combining unit 4 reads an identification code from the identification code memory 5, and combines the identification code and the password.
  • One example of password combining is shown in FIG. 4. In this example, a composite password is formed by adding the input password to the end of the identification code. The composite password formed by the [0028] password combining unit 4 is transmitted to the host computer 11 via the communication unit 6. The host computer 11 performs user certification, based on the composite password. In the host computer 11, passwords formed in the above manner by combining the identification codes of terminal devices and the passwords of the terminal devices' users have been registered beforehand.
  • FIG. 5 shows a flowchart illustrating a password combining process. In-step S[0029] 1, a character string input from the keyboard 2 by the user is acquired. In step S2, it is determined whether or not the present mode is a password mode. If the present mode is not a password mode, the process proceeds to step S5. If the present mode is a password mode, the process proceeds to step S3, in which the identification code stored in the identification code memory 5 is read. In step S4, the acquired character string and the identification code are combined. In step S5, the composite character string formed in the password mode, or a character string input in non-password mode is transmitted by the communication unit 6.
  • FIG. 6 shows one example of the format of the identification code stored in the [0030] identification code memory 5. The terminal device 11 can be uniquely identified based on the identification code. The identification code memory 5 is formed at specific addresses of the ROM 23 etc.
  • FIG. 7 shows a flowchart illustrating a process for detecting a password request. Data (characters) transmitted from the [0031] host computer 11 are received by the communication unit 6, and the data are sent to the password request detector 3. In step S10, the communication unit 6 is used to acquire data from the host computer 11. In step S11, the password request detector 3 determines whether the received data are a password request or ordinary data. If the received data is ordinary data, the password mode is released in step S13. If the received data is a password request, the process proceeds to step S12, in which the password mode is set.
  • FIG. 8 shows one example of the format of a password request command. Based on the format, the [0032] password request detector 3 determines whether the data from the host computer 11 are password data or ordinary data. In FIG. 8, the character string has at its start a code (“03” in hexadecimal) that is different from a character code, which allows the character string to be discriminated from ordinary data. FIG. 9 shows another example of the format of the password request command. In FIG. 9, “03” in hexadecimal represents the start of a password request command, and “04” in hexadecimal represents the end of the password request command.
  • As described above, according to this embodiment, a user's password and a code unique to each terminal device are used to form a composite password, and the composite password is used for user certification. Thus, if a person other than the user knows the user's password, that person cannot access a host computer unless using the user's terminal device, thereby preventing serious damage and security breaches. [0033]
  • The type of the [0034] terminal device 10 is not limited to a desktop type but may be-a portable type. Concerning the portable type of terminal device 10, when it is carried by its user, a person other than the user cannot access the host computer 11, even if that person knows the password.
  • In the case where an identical user uses a plurality of terminal devices, composite passwords formed by combining the identification codes of the terminal devices and the user's password are registered in a host computer, whereby the user can use the plurality of terminal devices with the same password, and the host computer cannot be accessed from the other terminal devices, using the same password. Thus, if the password was leaked to a person other than the user, the host computer cannot be accessed by the person. [0035]
  • In the foregoing embodiment, the [0036] terminal device 10 combines an input password and a read identification code to generate a new password, and transmits it to the host computer 10. However, with the password and the identification code transmitted to the host computer 11, they may be combined by the host computer 11. Otherwise, the host computer 11 may perform user certification by independently verifying the password and the identification code.
  • In the foregoing embodiment, password combining is performed by simply combining an input password and a read identification code. However, logical operations such as a logical sum and an exclusive OR, a transpose, and a permutation may be properly combined. In addition, such a type of combining process may be stored as a unique process in the [0037] ROM 23 of each terminal device. In this case, without using the identification code, only the password may be processed by the unique process.
  • In the foregoing embodiment, a user inputs a password from a keyboard whenever a host computer transmits a password request. However, in the case where the user's terminal device cannot be used by a person other than the user, in order that time for inputting the password may be omitted, by once inputting the password from the keyboard so that the password can be stored in the hard disk drive of the terminal device, the stored password may be read in response to the password request. [0038]
  • According to the foregoing embodiment, if a person other than a user knows the user's password, a host computer cannot be accessed with the password by a terminal device other than the user's device, whereby serious damage and security breaches are prevented. [0039]
  • According to the present invention, main necessary units are realized by software, whereby they can be inexpensively formed. [0040]
  • The present invention may be applied to a system composed of plurality of apparatuses (e.g., main computer unit, interface unit, and display) and to a one-unit apparatus as far as the functions of the embodiment are realized. [0041]
  • In addition, the present invention includes also a system in which, in order that each unit may operate to realize the functions of the embodiment, a software program code that realizes the functions of the embodiment is supplied to a computer (CPU or microprocessor unit) in an apparatus or system connected to each unit, and each unit is controlled to operate by the computer in the apparatus or system in accordance with the supplied code. In this case, the program code read from a storage medium realizes the functions of the embodiment. Accordingly, the program code, means for supplying the program code to the computer, such as a storage medium holding the program, constitute the present invention. [0042]
  • Concerning the storage medium for supplying the program code, for example, a floppy disk, a hard disk, an optical disk, a magneto-optical disk, a CD-ROM, a CD-R, a magnetic tape, a non-volatile memory card, a ROM, and so forth, may be used. [0043]
  • In a system in which a computer executes a read program code, whereby the functions of the embodiment are realized and based on the program code, the functions of the embodiment are realized in association with an operating system or application software functioning in the computer, needless to say, the program code is included in the scope of the present invention. [0044]
  • Needless to say, the present invention includes a system in which a program code read from a storage medium is written in a memory of a feature expansion board provided on a computer or feature expansion unit connected to the computer, and based on the program code, all or part of actual processing is performed by a CPU provided on the feature expansion board or feature expansion unit, whereby realizing the functions of the embodiment. [0045]
  • When the present invention is applied to the storage medium, a program code corresponding to the above-described flowcharts may be stored in the storage medium. [0046]
  • Although the present invention has been described in its preferred form with a certain degree of paricularity, many apparently widely different embodiments of the invention can be made without departing from the spirit and the scope thereof. It is to be understood that the invention is not limited to the specific embodiment thereof except as defined in the appended claims. [0047]

Claims (18)

What is claimed is:
1. A terminal device capable of accessing a host computer which performs user certification based on a certification code received from said terminal device, comprising:
input means for inputting a password assigned to a user;
storage means for holding unique information about said terminal device;
generating means for generating a certification code based on said password and said unique information; and
transmitting means for transmitting said certification code to the host computer.
2. A terminal device according to
claim 1
, wherein said unique information is an identification code for said terminal device.
3. A terminal device according to
claim 2
, wherein said generating means combines said password and said identification code to generate said certification code.
4. A terminal device according to
claim 2
, wherein said generating means generates said certification code by using a predetermined computation for processing said password and said identification code.
5. A terminal device according to
claim 2
, wherein said generating means generates as said certification code a combination of said password and said identification code.
6. A terminal device according to
claim 1
, wherein said unique information is a process for processing said password, and said generating means generates said certification code by processing said password based on the process.
7. A terminal device according to
claim 1
, wherein said terminal device further comprises detection means for detecting a password request from the host computer, and when said password request is detected by said detection means, said generating means generates said certification code.
8. A terminal device according to
claim 7
, wherein said detection means detects said password request by detecting a predetermined code from information received from the host computer.
9. A method for a terminal device to request user certification from a host computer which performs user certification based on a certification code received from said terminal device, said method comprising the steps of:
inputting a password assigned to a user;
reading unique information stored in said terminal device;
generating a certification code based on said password and said unique information; and
transmitting said certification code to the host computer.
10. A method according to
claim 9
, wherein said unique information is an identification code for said terminal device.
11. A method according to
claim 10
, wherein, in the generating step, said password and said identification code are combined to generate said certification code.
12. A method according to
claim 10
, wherein, in the generating step, said password and said identification code are processed by a predetermined computation to generate said certification code.
13. A method according to
claim 10
, wherein, in the generating step, a combination of said password and said identification code is generated as said certification code.
14. A method according to
claim 9
, wherein said unique information means a process for processing said password, and in the generating step said password is processed based on the process to generate said certification code.
15. A method according to
claim 9
, wherein said method further comprises the step of detecting a password request from the host computer, and when said password request is detected in the detecting step, the generating step is performed.
16. A method according to
claim 15
, wherein, in the detecting step, said password request is detected by detecting a predetermined code from information received from the host computer.
17. A user certification system comprising a host computer and a plurality of terminal devices capable of accessing the host computer,
in which said plurality of terminal devices each include: input means used to input a password assigned to a user; storage means for holding unique information about said terminal device; generating means for generating a certification code based on said password and said unique information; and transmitting means for transmitting said certification code to the host computer, and
the host computer includes: receiving means for receiving said certification code; and certification means for performing user certification based on the received certification code.
18. A computer-readable storage medium holding an information processing program for controlling a computer in a terminal device to request user certification from a host computer, said program comprising codes for causing the computer to perform the steps of: inputting a password assigned to a user; reading unique information stored in said terminal device; generating a certification code based on said password and said unique information; and transmitting said certification code to the host computer.
US09/116,921 1997-07-17 1998-07-17 Terminal device and method for requesting user certification from host computer Expired - Lifetime US6425085B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
JP192465/19977 1997-07-17
JP9-192465 1997-07-17
JP9192465A JPH1139260A (en) 1997-07-17 1997-07-17 User authenticating system, host computer, terminal device, authentication code generating method, recording medium

Publications (2)

Publication Number Publication Date
US20010034832A1 true US20010034832A1 (en) 2001-10-25
US6425085B2 US6425085B2 (en) 2002-07-23

Family

ID=16291756

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/116,921 Expired - Lifetime US6425085B2 (en) 1997-07-17 1998-07-17 Terminal device and method for requesting user certification from host computer

Country Status (2)

Country Link
US (1) US6425085B2 (en)
JP (1) JPH1139260A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030038707A1 (en) * 2000-03-17 2003-02-27 Avner Geller Method for secured identification of user's id
US20030144959A1 (en) * 2002-01-31 2003-07-31 Fujitsu Limited Access control method, storage apparatus and information processing apparatus
US20040255115A1 (en) * 2000-06-27 2004-12-16 Microsoft Corporation Method and system for binding enhanced software features to a persona
US20060106606A1 (en) * 1999-02-25 2006-05-18 Labaton Isaac J Method and apparatus for the secure identification of the owner of a portable device
US20080065776A1 (en) * 2006-08-07 2008-03-13 Nokia Corporation Method of connecting a first device and a second device
CN100466088C (en) * 2002-10-15 2009-03-04 Lg电子株式会社 Method and device for managing password in optical disc apparatus
US8739264B1 (en) * 2011-12-29 2014-05-27 Sprint Communications Company L.P. Managing access to secured data

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3376311B2 (en) 1999-04-14 2003-02-10 キヤノン株式会社 Information providing method and information providing system
JP3747133B2 (en) 1999-04-14 2006-02-22 キヤノン株式会社 Portable terminal, control method thereof, and storage medium thereof
JP3368237B2 (en) * 1999-04-14 2003-01-20 キヤノン株式会社 Code processing method, terminal device, and storage medium
JP3327877B2 (en) 1999-04-14 2002-09-24 キヤノン株式会社 Information providing method, information providing system, terminal device, and storage medium storing information providing program
US7062566B2 (en) * 2002-10-24 2006-06-13 3Com Corporation System and method for using virtual local area network tags with a virtual private network
US7272728B2 (en) * 2004-06-14 2007-09-18 Iovation, Inc. Network security and fraud detection system and method
JP3998013B2 (en) 2004-09-21 2007-10-24 コニカミノルタビジネステクノロジーズ株式会社 Command processing apparatus authentication system, image forming apparatus, authentication control method, and authentication control program
US8141142B2 (en) * 2005-02-14 2012-03-20 International Business Machines Corporation Secure authentication of service users of a remote service interface to a storage media
JP4775011B2 (en) * 2006-02-06 2011-09-21 パナソニック株式会社 Information processing device with password function
US8751815B2 (en) * 2006-10-25 2014-06-10 Iovation Inc. Creating and verifying globally unique device-specific identifiers
US8676684B2 (en) 2010-04-12 2014-03-18 Iovation Inc. System and method for evaluating risk in fraud prevention

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4196310A (en) * 1976-04-09 1980-04-01 Digital Data, Inc. Secure SCA broadcasting system including subscriber actuated portable receiving terminals
US5261070A (en) * 1986-07-24 1993-11-09 Meiji Milk Product Co., Ltd. Method and apparatus for forming unique user identification data at remote terminal for secure transmission of data from host terminal
US5887140A (en) * 1995-03-27 1999-03-23 Kabushiki Kaisha Toshiba Computer network system and personal identification system adapted for use in the same
US5721780A (en) * 1995-05-31 1998-02-24 Lucent Technologies, Inc. User-transparent security method and apparatus for authenticating user terminal access to a network
FR2745136B1 (en) * 1996-02-15 1998-04-10 Thoniel Pascal SECURE IDENTIFICATION METHOD AND DEVICE BETWEEN TWO TERMINALS
JP3937475B2 (en) 1996-06-14 2007-06-27 キヤノン株式会社 Access control system and method
KR100213188B1 (en) * 1996-10-05 1999-08-02 윤종용 Apparatus and method for user authentication
US6084977A (en) * 1997-09-26 2000-07-04 Dew Engineering And Development Limited Method of protecting a computer system from record-playback breaches of security

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8645708B2 (en) 1999-02-25 2014-02-04 Cidway Technologies, Ltd. Method and apparatus for the secure identification of the owner of a portable device
US20160241549A1 (en) * 1999-02-25 2016-08-18 Bouyant Holdings Limited Method and apparatus for the secure authentication of a web site
US9325701B2 (en) 1999-02-25 2016-04-26 Bouyant Holdings Limited Method and apparatus for the secure authentication of a web-site
US20060106606A1 (en) * 1999-02-25 2006-05-18 Labaton Isaac J Method and apparatus for the secure identification of the owner of a portable device
US9231944B2 (en) 1999-02-25 2016-01-05 Bouyant Holdings Limited Method and apparatus for the secure authentication of a web site
US20080077799A1 (en) * 1999-02-25 2008-03-27 Labaton Isaac J Method and apparatus for the secure identification of the owner of a portable device
US8132012B2 (en) 1999-02-25 2012-03-06 Cidway Technologies, Ltd. Method and apparatus for the secure identification of the owner of a portable device
US20090100508A1 (en) * 1999-02-25 2009-04-16 Cidway Technologies, Ltd Method and apparatus for the secure identification of the owner of a portable device
US20090113205A1 (en) * 1999-02-25 2009-04-30 Cidway Technologies, Ltd Method and apparatus for the secure identification of the owner of a portable device
US7565297B2 (en) * 1999-02-25 2009-07-21 Cidway Technologies Ltd Method and apparatus for the secure identification of the owner of a portable device
US20090217046A1 (en) * 1999-02-25 2009-08-27 Cidway Technologies, Ltd Method and apparatus for the secure identification of the owner of a portable device
US20090265768A1 (en) * 1999-02-25 2009-10-22 Cidway Technologies, Ltd Method and apparatus for the secure identification of the owner of a portable device
US20030038707A1 (en) * 2000-03-17 2003-02-27 Avner Geller Method for secured identification of user's id
US7823208B2 (en) * 2000-06-27 2010-10-26 Microsoft Corporation Method and system for binding enhanced software features to a persona
US20040255115A1 (en) * 2000-06-27 2004-12-16 Microsoft Corporation Method and system for binding enhanced software features to a persona
US20030144959A1 (en) * 2002-01-31 2003-07-31 Fujitsu Limited Access control method, storage apparatus and information processing apparatus
CN100466088C (en) * 2002-10-15 2009-03-04 Lg电子株式会社 Method and device for managing password in optical disc apparatus
US20080065776A1 (en) * 2006-08-07 2008-03-13 Nokia Corporation Method of connecting a first device and a second device
US8739264B1 (en) * 2011-12-29 2014-05-27 Sprint Communications Company L.P. Managing access to secured data

Also Published As

Publication number Publication date
US6425085B2 (en) 2002-07-23
JPH1139260A (en) 1999-02-12

Similar Documents

Publication Publication Date Title
US6425085B2 (en) Terminal device and method for requesting user certification from host computer
US6553492B1 (en) Client-server system, server access authentication method, memory medium stores server-access authentication programs, and issuance device which issues the memory medium contents
US7114075B1 (en) User authentication apparatus, method of user authentication, and storage medium therefor
US7092915B2 (en) PDA password management tool
US20110083012A1 (en) Printing device capable of authorizing printing limitedly according to user level, printing system using the same and printing method thereof
EP1811412A1 (en) Computer control method using externally connected device and computer control system
US20050021992A1 (en) Client terminal, software control method and control program
US20060036953A1 (en) User identification and password field determination
KR100443478B1 (en) Computer system identification
JP2003517683A (en) Data processing system for credential applications for programs or services
EP1542135B1 (en) A method which is able to centralize the administration of the user registered information across networks
WO2005050436A1 (en) Information processing device, information processing system, and program
JP2008191942A (en) Authentication device, authentication method and program
JP3402247B2 (en) Security integrated management device, security integrated management method, and recording medium recording security integrated management program
JP2002370425A (en) Printing controller, printing system, method of controlling printing, program and recording medium
JP4342326B2 (en) Database controller
JP2830514B2 (en) Security calculator
JP2000339274A (en) Terminal system, authentication method and external storage device
JP2006059280A (en) Electronic equipment
JPH11175335A (en) User authentication method in plural job environments
KR930008055B1 (en) Method of user management for pc with ic card
JPH09311917A (en) Identity confirming method and ic card system using the same
JP2007011791A (en) Authentication method and server device
JPH11143707A (en) Certification system and recording medium
JPH1196121A (en) Certification device and certification system

Legal Events

Date Code Title Description
AS Assignment

Owner name: CANON KABUSHIKI KAISHA, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HASHIKURA, HIDEKI;REEL/FRAME:009446/0873

Effective date: 19980903

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12