AUTHENTICATION DEVICE, LINE CONCENTRATOR, AUTHENTICATION METHOD, AND AUTHENTICATION PROGRAM

PROBLEM TO BE SOLVED: To provide an authentication device and the like capable of preventing illegal access even when a password is acquired illegally. SOLUTION: A control board 3 is provided with a password transformation table management part 10, which operates in receipt of an access request from...

Full description

Saved in:
Bibliographic Details
Main Author YUI MASATOSHI
Format Patent
LanguageEnglish
Published 08.11.2007
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:PROBLEM TO BE SOLVED: To provide an authentication device and the like capable of preventing illegal access even when a password is acquired illegally. SOLUTION: A control board 3 is provided with a password transformation table management part 10, which operates in receipt of an access request from a monitor control terminal 4 and generates a password transformation table 17 defining a transformation rule for transforming characters constituting a password previously decided for each user of the monitor control terminal 4 into other characters to store the password transformation table in an authentication data storage part 9, a mail transmission processing part 10 transmitting the password transformation table to a mail monitor terminal 12, which is previously decided in association with the monitor control terminal, via an electronic mail, and a password authentication processing part 8, which inversely transforms the transformed password generated according to the password transformation table and transmitted from the monitor control terminal by using the password transformation table read from the authentication data storage part to generate an inverse transformation character string and determines success of authentication when the inverse transformation character string agrees with the password. COPYRIGHT: (C)2008,JPO&INPIT
Bibliography:Application Number: JP20060120150