摘要:
In order to prevent without fail the abuse of certificate information which are exchanged on a network, an orderer inputs the certificate information to a certificate terminal when placing an order for a commodity, the certificate terminal encrypts the certificate information to send it to an order receiver and holds the certificate information and a decryption key. A deliveryman, at the time of commodity delivery, inputs the encrypted certificate information to the certificate terminal, and the orderer inputs data of terminal certification to the certificate terminal. The certificate terminal, when it certifies by the data that the orderer is the valid owner of the certificate terminal, decrypts the encrypted certificate information input by the deliveryman, by the decryption key in the certificate terminal, verifies decrypted certificate information with the certificate information in the certificate terminal, and the deliveryman hands over the commodity to the orderer when the certificate information match.
摘要:
In order to prevent without fail the abuse of certificate information which are exchanged on a network, an orderer inputs the certificate information to a certificate terminal when placing an order for a commodity, the certificate terminal encrypts the certificate information to send it to an order receiver and holds the certificate information and a decryption key. A deliveryman, at the time of commodity delivery, inputs the encrypted certificate information to the certificate terminal, and the orderer inputs data of terminal certification to the certificate terminal. The certificate terminal, when it certifies by the data that the orderer is the valid owner of the certificate terminal, decrypts the encrypted certificate information input by the deliveryman, by the decryption key in the certificate terminal, verifies decrypted certificate information with the certificate information in the certificate terminal, and the deliveryman hands over the commodity to the orderer when the certificate information match.
摘要:
In order to cause effective function when a system adopting a conventional settlement card is shifted to a system adopting a settlement card of IC card type and to enable a significant contribution to proliferation of the settlement card of IC card type, when a person who has input authentication data is authenticated as a user of a card by an authentication section, transaction data read by a magnetic stripe reader and transaction authentication data read by a memory reader are transmitted to a host server from transaction terminal equipment. The host server conducts a transaction through use of the transaction data and the transaction authentication data, both being output from the transaction terminal equipment. When the transaction is conducted, a memory writer writes data into memory of the card or rewrites data recorded in the memory.
摘要:
In order to prevent without fail the abuse of certificate information which are exchanged on a network, an orderer inputs the certificate information to a certificate terminal when placing an order for a commodity, the certificate terminal encrypts the certificate information to send it to an order receiver and holds the certificate information and a decryption key. A deliveryman, at the time of commodity delivery, inputs the encrypted certificate information to the certificate terminal, and the orderer inputs data of terminal certification to the certificate terminal. The certificate terminal, when it certifies by the data that the orderer is the valid owner of the certificate terminal, decrypts the encrypted certificate information input by the deliveryman, by the decryption key in the certificate terminal, verifies decrypted certificate information with the certificate information in the certificate terminal, and the deliveryman hands over the commodity to the orderer when the certificate information match.
摘要:
In order to cause effective function when a system adopting a conventional settlement card is shifted to a system adopting a settlement card of IC card type and to enable a significant contribution to proliferation of the settlement card of IC card type, when a person who has input authentication data is authenticated as a user of a card by an authentication section, transaction data read by a magnetic stripe reader and transaction authentication data read by a memory reader are transmitted to a host server from transaction terminal equipment. The host server conducts a transaction through use of the transaction data and the transaction authentication data, both being output from the transaction terminal equipment. When the transaction is conducted, a memory writer writes data into memory of the card or rewrites data recorded in the memory.
摘要:
In relation to a system which effects one-to-many authentication using biometric information; e.g., a fingerprint, an iris, voice, a facial image, a vascular pattern, a dynamic signature, or a keystroke, in order to significantly shorten the time required to verify registered feature information against input feature information, there is performed extraction of verification-purpose feature information and a plurality of types of verification-purpose attribute information from the biometric information about an object of authentication; computation of verification priority levels of a plurality of registration-purpose feature information items on the basis of registration-purpose attribute information and the verification-purpose attribute information, both being associated with the registration-purpose feature information items; and sequential verification of the verification-purpose feature information against registration-purpose feature information in accordance with a computed verification priority level, thereby specifying registration-purpose feature information matching said verification-purpose feature information from said plurality of registration-purpose feature information items.
摘要:
In relation to a system which effects one-to-many authentication using biometric information; e.g., a fingerprint, an iris, voice, a facial image, a vascular pattern, a dynamic signature, or a keystroke, in order to significantly shorten the time required to verify registered feature information against input feature information, there is performed extraction of verification-purpose feature information and a plurality of types of verification-purpose attribute information from the biometric information about an object of authentication; computation of verification priority levels of a plurality of registration-purpose feature information items on the basis of registration-purpose attribute information and the verification-purpose attribute information, both being associated with the registration-purpose feature information items; and sequential verification of the verification-purpose feature information against registration-purpose feature information in accordance with a computed verification priority level, thereby specifying registration-purpose feature information matching said verification-purpose feature information from said plurality of registration-purpose feature information items.
摘要:
When predetermined information is input into an input field and an OK button is pressed on a user authentication screen displayed on a monitor screen by a browser at entry time, the input predetermined information, the input predetermined information, the positional information about the input field and the OK button, and the identification information on the user authentication screen are obtained by the input unit and entered in an external storage device through a storage unit. When the authentication screen detection unit detects the user authentication screen by the authentication screen detection unit at input time, the input/press unit automatically inputs the predetermined information read from the external storage device into the position of the input field obtained according to the positional information read from the external storage device through the storage unit, and the position of the OK button is automatically pressed.
摘要:
In relation to a system which effects one-to-many authentication using biometric information; e.g., a fingerprint, an iris, voice, a facial image, a vascular pattern, a dynamic signature, or a keystroke, in order to significantly shorten the time required to verify registered feature information against input feature information, there is performed extraction of verification-purpose feature information and a plurality of types of verification-purpose attribute information from the biometric information about an object of authentication; computation of verification priority levels of a plurality of registration-purpose feature information items on the basis of registration-purpose attribute information and the verification-purpose attribute information, both being associated with the registration-purpose feature information items; and sequential verification of the verification-purpose feature information against registration-purpose feature information in accordance with a computed verification priority level, thereby specifying registration-purpose feature information matching said verification-purpose feature information from said plurality of registration-purpose feature information items.
摘要:
In relation to a system which effects one-to-many authentication using biometric information; e.g., a fingerprint, an iris, voice, a facial image, a vascular pattern, a dynamic signature, or a keystroke, in order to significantly shorten the time required to verify registered feature information against input feature information, there is performed extraction of verification-purpose feature information and a plurality of types of verification-purpose attribute information from the biometric information about an object of authentication; computation of verification priority levels of a plurality of registration-purpose feature information items on the basis of registration-purpose attribute information and the verification-purpose attribute information, both being associated with the registration-purpose feature information items; and sequential verification of the verification-purpose feature information against registration-purpose feature information in accordance with a computed verification priority level, thereby specifying registration-purpose feature information matching said verification-purpose feature information from said plurality of registration-purpose feature information items.