throbber
(19) Japan Patent Office (JP)
`(12) Published Unexamined Patent Application (A)
`
`(11) Publication No. of Unexamined Application:
`
`Kokai No. 2000-10927
`(P2000-10927A)
`January 14, 2000
`(43) Date of Publication of Unexamined Application:
`Theme Code (Reference)
`(51) Int. Cl.7
` ID
`FI
`5B085
`G06F 15/00 330
`G06F 15/00 330 B
`5J104
`H04Q 7/38
`H04M 1/66
`B
`5K027
`H04L 9/32
` 11/00 303
`5K033
` 12/28
`H04B 7/26 109 S
`5K067
`H04M 1/66
`H04L 9/00
`673 A
`Request for Examination:
`Number of Claims:
`Method of Filing:
`Total Number of Pages:
`
`Requested
`6
`OL (Online)
`7
`Continued on last page
`
`(21) Patent Application No.:
`(22) Filing Date:
`(71) Applicant:
`
`(72)
`
`Inventor:
`
`(74) Agent:
`
`H10-178410
`June 25, 1998
`000240617
`NEC Yonezawa Ltd.
`6-80, Shimohanazawa 2-chome, Yonezawa-shi, Yamagata Prefecture
`Masaru KATOU
`c/o NEC Yonezawa Ltd.
`6-80, Shimohanazawa 2-chome, Yonezawa-shi, Yamagata Prefecture
`100085235
`Patent Attorney Kaneyuki MATSUURA
`
`Continued on last page
`
`(54) Title of Invention
`AUTHENTICATION SYSTEM AND
`AUTHENTICATION DEVICE
`(57) Abstract
`Problem
`
`Conventional authentication systems have not reached
`large-scale usage because devices (one-time-password generating
`cards and authentication devices) that generate and manage
`changing passwords are very expensive.
`Solution
`An authentication device 3 performs: management of a
`"user-password request/notification function" of the user; issuance
`of a "temporary password" in response to a connection request from
`the user; and notification of the "temporary password" to a PHS
`terminal 1 and to a remote-connection device 4. Based on the
`"temporary password," the remote-connection device 4 accepts the
`connection request from a user PC 2 and remotely connects a proper
`user or an inquiring user to the authentication device 3. Based on
`the "temporary password," the user PC 2 connects to the remote-
`connection device 4. A network service 5 is a network resource
`wherein each user receives service.
`
`Page 1 of 8
`
`EXPERIAN EXHIBIT 1008
`IPR2023-01406
`
`

`

`(2)
`
`1
`
`CLAIMS
`1. An authentication system, which, after verifying the validity
`of a user, permits usage of a resource of a network service
`from the user personal computer, comprising:
`the user simplified, mobile-telephone terminal;
`an authentication device that: preregisters a telephone
`number, a password, and a remote-connection ID of the
`simplified, mobile-telephone terminal; notifies the user of
`the password and the remote-connection ID; receives the
`telephone number and the password from the user
`simplified, mobile-telephone terminal; compares such with
`the preregistered telephone number and password; and,
`when they match, issues a temporary password to the user
`simplified, mobile-telephone terminal; and
`a remote-connection device that: receives a connection
`request, which, owing to the simplified, mobile-telephone
`terminal being notified of the temporary password, is
`performed by the user using the personal computer;
`inquires with the authentication device as to whether the
`password and the remote-connection ID are correct; and
`connects the personal computer and the network service
`only when being notified by the authentication device that
`they are correct.
`2. The authentication system according to claim 1, wherein the
`user uses the personal computer to make a connection request
`to the remote-connection device using the remote-connection
`ID and the temporary password for which notification was
`given by the authentication device.
`3. The authentication system according to claim 1, wherein, in
`response to the inquiry from the remote-connection device, the
`authentication device determines whether the information
`issued to the user and the information from the remote-
`connection device match and notifies the remote-connection
`device of the determination result thereof.
`4. The authentication system according to claim 1, wherein the
`power of the mobile-telephone terminal is turned off prior to
`the notification of the temporary password from the
`authentication device.
`5. An authentication device used in an authentication system,
`which, after verifying the validity of a user, permits usage of a
`resource of a network service from the user personal
`computer, wherein:
`a telephone number, a password, and a remote-connection
`ID of the user simplified, mobile-telephone terminal are
`preregistered; the user is notified of the password and the
`remote-connection ID; the telephone number and the
`password are received from the user simplified, mobile-
`telephone terminal; such is compared with the
`preregistered telephone number and password; and, when
`they match, a temporary password is issued to the user
`simplified, mobile-telephone terminal; and when it has
`been determined that it is proper with respect to the
`inquiry from a remote-connection device, the personal
`computer and the network service are connected using the
`remote-connection device.
`6. The authentication device according to claim 5, wherein, in
`response to the inquiry from the remote-connection device,
`determines whether the information issued to the user and the
`
`Japanese Kokai 2000-10927
`2
`information from the remote-connection device match and
`notifies the remote-connection device of the determination
`result thereof.
`DETAILED DESCRIPTION OF THE INVENTION
`[0001]
`FIELD OF THE INVENTION
`The present invention relates to an authentication
`system and an authentication device, and particularly relates to
`an authentication system and an authentication device that
`permits the provision of a local area network (LAN) service
`only to proper users.
`[0002]
`RELATED ART
`As an example of a network-service function that
`uses services among computers in a LAN, there is an
`authentication function that checks the usage rights of a
`remote resource, generally, using a transmitted user identifier
`(ID, password) of a logged-in computer. In a network-
`connected computer system, when usage of each computer is
`started, a user identifier is provided by system software, which
`runs on each computer, using a user-registration list of all
`computers that constitutes the network-computer system. In
`addition, in an international telephone utilization system in
`which Personal Handy-phone System (PHS) terminals are
`used, a system is also known (Japanese Laid-open Patent
`Publication H9-135295) in which the system is called using an
`ID number and a password, and a callback function is used
`from the system side after validity verification.
`[0003] However, with this method, there is a risk that, if a
`user ID or a password is stolen by a third party, the
`unauthorized third party can penetrate the network service.
`Accordingly, in recent years, authentication systems in which
`passwords that change at fixed time intervals are used have
`been proposed and are already in practical use. In these
`conventional authentication systems, misappropriation of a
`password by a third party can be made difficult because the
`password changes at fixed time intervals.
`[0004]
`PROBLEMS SOLVED BY THE INVENTION
`Nevertheless, the above-mentioned conventional
`authentication systems have a problem in that they have not
`reached large-scale diffusion because devices (one-time-
`password generating cards and authentication devices) that
`generate and manage changing passwords are very expensive.
`[0005] The present invention was conceived considering
`the above problem, and an object of the present invention is to
`provide a high-speed, high-reliability authentication system
`and a low-cost authentication device.
`[0006]
`In addition, another object of the present invention is
`to provide an authentication system and an authentication
`device that excels in manufacturability, maintainability, and
`resource reusability.
`[0007] Furthermore, another object of the present invention
`is to provide an authentication device that is compact and
`lightweight.
`[0008]
`MEANS FOR SOLVING THE PROBLEMS
`To achieve the above-mentioned objects, an authentication
`system of the present invention, which, after verifying the
`validity of a user, permits usage of a resource of a network
`service from the user personal computer, comprises: the user
`simplified, mobile-telephone terminal; an authentication
`device that: preregisters a telephone
`
`Page 2 of 8
`
`

`

`(3)
`
`3
`number, a password, and a remote-connection ID of the
`simplified, mobile-telephone terminal; notifies the user of the
`password and the remote-connection ID; receives the
`telephone number and the password from the user simplified,
`mobile-telephone terminal; compares such with the
`preregistered telephone number and password; and, when they
`match, issues a temporary password to the user simplified,
`mobile-telephone terminal; and a remote-connection device
`that: receives a connection request, which, owing to the
`simplified, mobile-telephone terminal being notified of the
`temporary password, is performed by the user using the
`personal computer; inquires with the authentication device as
`to whether the password and the remote-connection ID are
`correct; and connects the personal computer and the network
`service only when being notified by the authentication device
`that they are correct.
`[0009]
`In addition, regarding the authentication system of
`the present invention, to achieve the above-mentioned objects,
`in an authentication device used in an authentication system,
`which, after verifying the validity of a user, permits usage of a
`resource of a network service from the user personal
`computer: a telephone number, a password, and a remote-
`connection ID of the user simplified, mobile-telephone
`terminal are preregistered; the user is notified of the password
`and the remote-connection ID; the telephone number and the
`password are received from the user simplified, mobile-
`telephone terminal; such is compared with the preregistered
`telephone number and password; and, when they match, a
`temporary password is issued to the user simplified, mobile-
`telephone terminal; and when it has been determined that it is
`proper with respect to the inquiry from a remote-connection
`device, the personal computer and the network service are
`connected using the remote-connection device.
`[0010] According to the present invention, it is possible to
`provide security that combines: security whereby the
`authentication device has only registered mobile-telephone
`terminals; security wherein the user manages their password to
`their mobile-telephone terminal; and security wherein the
`authentication device sends a temporary password to a
`determined mobile-telephone terminal of a user.
`[0011]
`In addition, according to the present invention,
`authentication permission is obtained using a commercially
`available simplified, mobile-telephone terminal, such as a PHS
`terminal.
`[0012]
`EMBODIMENTS OF THE INVENTION
`Next, embodiments of the present invention will be explained,
`together with the drawings. FIG. 1 is a block diagram of one
`embodiment of an authentication system that constitutes the
`present invention. In the same drawing are configured: a user
`Personal Handy-phone System (PHS) terminal 1; a user
`personal computer (PC) 2; an authentication device 3, which is
`connected to the PHS terminal 1 via a PHS public line; a
`remote-connection device 4, which is connected to the user PC
`2 and the authentication device 3; and a network service 5,
`which is provided by the remote-connection device 4. The
`configuration on the remote-LAN connection side comprises
`the authentication device 3, the remote-connection device 4,
`and the network 5.
`
`.
`
`Japanese Kokai 2000-10927
`4
`[0013] The authentication device 3 is a device that verifies
`the validity of a user and performs: management of a "user-
`password request/notification function" of the user; issuance
`of a "temporary password" in response to a connection request
`from the user; and notification of the "temporary password" to
`the user PHS terminal 1, which has the user-password
`request/notification function, and to the remote-connection
`device 4, which has a remote-connection function.
`[0014] Based on the "temporary password" issued by the
`authentication device 3, the remote-connection device 4
`accepts the connection request from the user PC 2, which is a
`computer system for user connection, and remotely connects a
`proper user or an inquiring user to the authentication device 3.
`The user PHS terminal 1 is a commercially available
`simplified mobile telephone having a user-password
`request/notification function; if a user makes a request to the
`authentication device 3 for a "temporary password" and the
`user is properly authenticated, then the authentication device
`gives notification of a "temporary password." A "temporary
`password" is not a predetermined specific password but rather
`is a password that is set as appropriate for each request.
`[0015] Based on a "temporary password" for which the
`authentication device has given notification to the user PHS
`terminal 1, the user PC 2, which is the computer system for
`user connection, connects to the remote-connection device 4.
`The network service 5 is a network resource wherein each user
`receives service.
`[0016] Next, the operation of this embodiment will be
`explained, with reference to the flowchart in FIG. 2. First, the
`PHS number, the authentication-device password, and the
`remote-connection ID of the user PHS terminal 1 are
`registered in the authentication device 3 (step 11). Continuing,
`the user is notified in advance of the authentication-device
`password and the remote-connection ID (step 12). Continuing,
`the user places a call (TEL) from the user PHS terminal 1 to
`the authentication device 3 (step 13). The method of placing a
`call is, for example, the numeric string: "authentication-device
`telephone number#authentication-device password." For
`example, 0238211234#ABCD.
`[0017] Next, the authentication device 3 receives the call
`from the user PHS terminal 1 and verifies the user PHS
`number and the authentication-device password (step 14),
`determines whether those values match the registration
`information in step 11, and, if they do match, replies to the
`user PHS terminal 1 with a voice message such as "A
`password will now be issued. Please disconnect power and
`wait." (step 15). It is noted that, other than a voice message, a
`character message and other methods are also possible.
`[0018] Next, in accordance with the above-mentioned voice
`message, the user turns off the power to the user PHS terminal
`1 (step 16). Continuing, the authentication device 3 issues a
`"temporary password" to the user PHS terminal 1 and notifies
`the user PHS terminal 1 of the character message (step 17). In
`this situation, a service, such as Chara-Mail, is used. It is
`assumed that the temporary password is, for example,
`VWXYZ.
`
`Page 3 of 8
`
`

`

`
`
`(4)
`
`5
`[0019] The user PHS terminal 1 is notified of the above-
`mentioned temporary password VWXYZ (step 18), and the
`user issues a network-connection request to the remote-
`connection device 4 (step 19). That is, the user PC 2 is used to
`dial up the remote-connection device 4. In this situation, the
`ID obtained in step 11 is used as the ID, and the "temporary
`password" obtained in step 18 is used as the password. For
`example, the ID is "SUZUKI," and the temporary password is
`"VWXYZ."
`[0020] Continuing, when the remote-connection device 4
`receives the connection request from the user PC 2 (step 20),
`an inquiry is made to the authentication device 3 regarding
`whether the user ID and the password are correct (step 21).
`Thereupon, in response to the inquiry from the remote-
`connection device 4, the authentication device 3 determines
`whether they match the information issued to the user (step
`22). In the situation in which the authentication device 3 has
`determined in step 22 that they do match, the remote-
`connection device 4 is notified of the determination result
`thereof, and thereby the remote-connection device 4 gives
`permission to the user for usage of the network service 5 and
`connects the user PC 2 and the network service 5 (step 23).
`[0021] Thereby, the resource of the network service 5
`becomes available from the user PC 2 (step 24). It is noted
`that, in the situation in which the authentication device 3 has
`obtained a mismatched determination result in step 22, the
`remote-connection device 4 receives that determination result
`and denies the provision of the network service 5 to the user.
`[0022] Thus, in this embodiment, by authenticating only the
`PHS terminal 1, which the user has registered in the
`authentication device 3 utilizing the fact that the PHS terminal
`1 has a function that gives notification of its own PHS
`number, it is possible to make it extremely difficult for a third
`party to improperly use the network service 5 because it has
`extremely strong security through the combination of: security
`in that it is difficult for another PHS terminal to masquerade as
`the PHS terminal 1; security in that, even in an unfortunate
`situation such as, for example, the theft of the user PHS
`terminal 1, the PHS terminal 1 cannot connect to the
`authentication device 3 without knowing the password, and
`consequently the user can manage their password on the PHS
`terminal 1; and security in that the authentication device 3
`issues a temporary password to the proper PHS terminal 1.
`[0023]
`In addition, the user PHS terminal 1 is a
`
`Japanese Kokai 2000-10927
`6
`commercially available PHS terminal; a terminal that is
`compact, lightweight, and has low power consumption can be
`used for the user PHS terminal 1; operation is easy; in
`addition, in this embodiment, because the infrastructure of the
`PHS public line is used, it is high speed, the transmission
`efficiency is increased, and data transfer can be performed
`with high reliability; and, furthermore, the cost of the overall
`system can also be reduced. In addition, a service in which a
`PHS high-speed communication function (PIAFS) is used also
`becomes possible. Furthermore, in this embodiment, by
`utilizing a commercially available PHS terminal, it also
`becomes possible to set the price low because of the mass-
`production effect; manufacturability and maintainability are
`also excellent; and it also becomes possible to reuse resources
`by utilizing unused PHS terminals.
`[0024]
`EFFECTS OF THE INVENTION
`
`As explained above, according to the present
`invention, it is possible to improve security such that it is
`extremely strong compared with conventional security
`because it has been provided with security that combines:
`security whereby the authentication device has only registered
`mobile-telephone terminals; security wherein the user
`manages their password to their mobile-telephone terminal;
`and security wherein the authentication device sends a
`temporary password to a determined mobile-telephone
`terminal of a user.
`[0025]
`In addition, according to the present invention,
`because authentication permission is obtained using a
`commercially available simplified, mobile-telephone terminal,
`such as a PHS terminal, the infrastructure of a PHS public line
`can be used, and thereby it is high speed, transmission
`efficiency is improved, and data can be transferred with high
`reliability. Furthermore, according to the present invention,
`because commercially available simplified, mobile-telephone
`terminals, such as PHS terminals, are used: terminals that are
`compact, lightweight, and have low power consumption,
`terminals having excellent manufacturability and
`maintainability and that are also easy to use, or the like can be
`used as the terminals; resources are also reusable owing to the
`use of unused PHS terminals; and, in turn, the cost of the
`overall system can be reduced and services that utilize high-
`speed communication functions can be accepted.
`BRIEF DESCRIPTION OF THE DRAWINGS
`FIG. 1 is a block diagram of one embodiment of the
`
`present invention.
`
`FIG. 2 is a flowchart of one embodiment of the
`present invention.
`EXPLANATION OF SYMBOLS
`1
`User PHS terminal
`2
`User personal computer (PC)
`3
`Authentication device
`4
`Remote-connection device
`5
`Network service
`
`Page 4 of 8
`
`

`

`(5)
`
`FIG. 1
`
`Japanese Kokai 2000-10927
`
`USER-SIDE CONFIGURATION
`
`REMOTE-LAN-CONNECTION-
`SIDE CONFIGURATION
`
`USER PHS
`TERMINAL
`
`USER PC
`
`PHS PUBLIC LINE
`
`AUTHENTICATION
`DEVICE
`
`REMOTE-CONNECTION
`DEVICE
`
`NETWORK SERVICE
`
`Page 5 of 8
`
`

`

`
`
`USER SIDE
`USER PHS TERMINAL
`USER PC
`
`(6)
`FIG. 2
`REMOTE-CONNECTION SIDE
`AUTHENTICATION DEVICE
`REMOTE-CONNECTION DEVICE
`
`Japanese Kokai 2000-10927
`
`Register the "user PHS number," the
`"authentication-device password,"
`and the "remote-connection ID" of the
`user in the authentication device.
`
`The user places a call from the
`user PHS to the authentication
`device. The method of placing
`the call is the "authentication
`device telephone
`number#authentication device
`password."
`For example: 0238211234#ABCD
`
`The user turns off power
`to the "user PHS
`terminal."
`
`Notification of a
`temporary password is
`made to the user PHS
`terminal.
`
`Notify the user in advance of the
`"authentication-device
`password" and the "remote-
`connection ID."
`
`Accept the call from the user and
`verify the "user PHS number" and the
`"authentication-device password."
`
`If they match the registration information in
`step 11, respond to the user PHS terminal
`with a voice message such as "A password
`will now be issued. Please turn off power
`and wait."
`* Notification methods other than by voice
`are also possible.
`
`The authentication device issues a
`temporary password to the user and
`notifies the user PHS terminal via a
`character message (e.g., using a
`service such as Chara-Mail).
`Example: VWXYZ
`
`A connection request
`arrives at the remote-
`connection device from
`the user PC.
`
`Inquire with the
`authentication device
`whether the user ID and the
`password are correct.
`
`The user makes a network-connection
`request to the remote-connection device
`(dials up the remote-connection device).
`The ID obtained in step 11 is used as the ID,
`and the temporary password obtained in
`step 18 is used as the password.
`Example:
`ID
`SUZUKI
`
`PASSWORD VWXYZ
`
`In response to an inquiry from the
`remote connection device,
`determine whether they match the
`information issued to the user.
`
`The resource of the
`network service becomes
`available from the user
`PC.
`
`In the situation in which the
`authentication device
`determines them to be
`correct, permit usage of the
`network service and connect
`the user PC and the network
`service.
`
`
`
`Page 6 of 8
`
`

`

`
`
`Continuation of front page
`
` ID
`(51) Int. Cl.7
`H04M 11/00 303
`
`(7)
`
`Japanese Kokai 2000-10927
`
`FI
`H04L 11/00 310 Z
`
`Theme Code (Reference)
`5K101
`
`5B085 AA01 AC01 AE01 AE15 AE21
` AE23 BG07 CE08
`5J104 AA03 AA07 EA01 EA03 EA20
` KA01 NA21 PA07
`5K027 AA11 BB09 BB14 CC08
`5K033 AA08 BA04 CB01 DB12 DB14
` DB20 EC03
`5K067 AA35 BB32 FF00 KK13
`5K101 LL12
`
` F
`
` Terms (Reference)
`
`
`Page 7 of 8
`
`

`

`I, Harold Abilock, declare as follows:
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`I am over 21 years of age and am competent to make this declaration.
`
`I am a native speaker of English.
`
`I am fluent in Japanese.
`
`I have over 35 years of experience translating Japanese to English.
`
`I translated the attached patent document "JPA 2000010927" from
`
`Japanese to English.
`
`6.
`
`I certify that the translation of the document "JPA 2000010927" is, to
`
`the best of my knowledge, a true and accurate translation from Japanese to English.
`
`7.
`
`In signing this declaration, I understand that the translation and this
`
`declaration may be filed as evidence in a contested case. I acknowledge that I may
`
`be subject to cross-examination within the United States.
`
`8.
`
`I declare under penalty of perjury that all statements made herein are
`
`true and accurate to the best of my knowledge and belief, and that these statements
`
`were made with the knowledge that willful false statements and the like so made
`
`are punishable by fine or imprisonment, or both, under Section 1001 of Title 18 of
`
`the United States Code.
`
`Executed: December 20, 2022 B y : ~ ~
`
`Harold Abilock
`
`Page 8 of 8
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket