摘要:
A site check method is provided that enables a user to check, when the user accesses a predetermined site, whether the site is legitimate or not. The method includes a first display step in which, when the user accesses a first server managing the site from a first information terminal, the first server has the first information terminal display predetermined check information. The method further includes a second display step in which, when the user accesses a second server from a second information terminal, the second server has the second information terminal display the check information.
摘要:
A communication system preferable to a technique of allowing only an ISP (151) connecting a user terminal to the Internet to manage information about the charging for the service provided to the user by an ASP (132) in the Internet so as to prevent credit card information on the credit card of the user from leaking into the Internet and preferable to dial-up server for providing connection with access limit to a computer communication network such as the Internet to a terminal, a relay device, a service providing device, a relay method, a service providing method, and a program product for realizing them. The feasibility of the relay between a terminal (111) and an ASP (132)I by an ISP (151) is determined on the basis of the relay condition (for example, the condition determined by the IP address and the port number) correlated with the user using the terminal (111). The system inquires of the ISP (151) if the ASP (132) provides a service to the terminal (111). If the user of the terminal (111) is registered in the ISP (151), the ISP (151) carries out the charging of the service in place of the ASP (132), and the ASP (132) provides the service to the terminal (111) through the ISP (151).
摘要:
A site check method is provided that enables a user to check, when the user accesses a predetermined site, whether the site is legitimate or not. The method includes a first display step in which, when the user accesses a first server managing the site from a first information terminal, the first server has the first information terminal display predetermined check information. The method further includes a second display step in which, when the user accesses a second server from a second information terminal, the second server has the second information terminal display the check information.
摘要:
A receiver receives e-mails. In the case where an address of an e-mail is a user's e-mail address which is managed by another e-mail server device, a transfer unit transfers the e-mail to the another e-mail server device. In the case where an address of an e-mail is a user's e-mail address which is managed by an e-mail server device including an inquiry unit, this inquiry unit inquires of the corresponding user whether to accept the e-mail to be delivered from its e-mail addresser. In the case where the user does not accept the e-mail to be delivered, a notification unit sends a message for informing the addresser that there is no user having a public e-mail address. In the case where the conditions for delivering an e-mail are all satisfied, a delivery unit delivers the e-mail to a user having a public e-mail address.
摘要:
A simple, convenient and reliable method provided for identifying a user through a computer network. This method comprises the steps of sending a string of characters randomly selected from a table recording a set of characters from a central computer to a terminal computer, converting one or more characters from the string according to a conversion rule, sending one or more characters from the terminal computer to the central computer and identifying the user of the terminal computer based on the string of characters sent from the central computer, the conversion rule and the one or more characters sent by the user.
摘要:
The invention discloses a method and its device for acquiring swiftly and firmly the connectivity information of electric conductor cords for connecting a plurality of apparatus groups or switching boards in information wiring facilities. The unused extra cores of an electric plural core conductor cord for connecting every apparatuses of apparatus groups A and B with each other through switching boards are connected to a voltage applicator and a voltage (or current) detector through information collecting connectors and the electric connectivity restrictions between every apparatuses of the apparatus groups of the electric conductor cord described above are acquired depending on its electric conduction. According to the invention, the connectivity information of the electric conductor cords in information wiring facilities can be obtained accurately and firmly. Furthermore, the use of the extra cores enable to reduce the cost of the device and to easily apply the invention to the facilities already built.
摘要:
Provided is a communication apparatus (121) that securely manages passwords for utilizing a server apparatus. A generator (203) generates a random table having the same number of rows and the same number of columns as a password table associated with a server name specified in an authentication request received by a receiver (202). An acceptor (205) accepts a key from a user to whom the random table is presented by a presenter (204). An identification unit (206) identifies, from the key and the random table, the user's of selection order of elements in the table. An acquirer (207) selects and arranges elements in the password table in the identified selection order, thereby acquiring a password. An output unit (208) displays the acquired password on a display or transmits the acquired password to the server apparatus, thereby allowing the user to utilize the server apparatus.
摘要:
The present invention is a user verification method and a user verification system, in which a password derivation pattern for each user is pre-registered into a verification server, and when a user is to use the system, the verification server generates a presented pattern and presents this to the user, the user inputs a password corresponding to the user's own password derivation pattern for the presented pattern, the verification server performs verification of the inputted password based on the presented pattern and the user's own password derivation pattern that was registered, and a verification result is then notified to the usage target system.
摘要:
An authentication system by which character strings in squares are selected by a rule determined by a user out of a table in which character strings are assigned to obtain a one-time password. The user memorizes a rule of successively selecting three out of the positions of the squares in a table having five rows and five columns, for example. To each square (402) in the table (401) to be presented to the user, a randomly generated two-digit number is assigned. The table (401) is presented to the user, who arranges the numbers in the squares (402) on the basis of the user's own rule to generate a six-digit number used as a one-time password for authenticating the user. Therefore, the rule for obtaining a one-time password is easy for the user to memorize and a long one-time password can be obtained.
摘要:
A generating section generates a presentation symbol string for receiving a next authentication request to an authenticated ID, a storing section stores a transformation rule and a sending destination of the presentation symbol string to be associated with each ID, a sending section sends “the generated presentation symbol string” to a display terminal, which is “the sending destination of the presentation symbol string stored in the storing section to be associated with the authenticated ID”, an updating section causes the storing section to further store the presentation symbol string sent to be associated with the authenticated ID to perform update, a receiving section receives an authentication request that designates an ID and a transformed symbol string from an access terminal, and an authenticating section causes authentication of the ID to succeed when a condition is satisfied where “the received transformed symbol string matches a transformation result obtained by applying ‘the transformation rule stored to be associated with the ID designated by the received authentication request’ to ‘the presentation symbol string stored to be associated with the ID’.”