18373728. TERMINAL AND AUTHENTICATION METHOD simplified abstract (NEC Corporation)

From WikiPatents
Jump to navigation Jump to search

TERMINAL AND AUTHENTICATION METHOD

Organization Name

NEC Corporation

Inventor(s)

Jia Hao of Tokyo (JP)

TERMINAL AND AUTHENTICATION METHOD - A simplified explanation of the abstract

This abstract first appeared for US patent application 18373728 titled 'TERMINAL AND AUTHENTICATION METHOD

Simplified Explanation

The patent application abstract describes a terminal system that sends an authentication request to another terminal, receives an authentication result, and reclaims credit information after authentication.

  • Memory to store instructions
  • Processor to perform instructions and handle authentication process
  • Sends authentication request to another terminal
  • Receives authentication result from another terminal
  • Reclaims credit information after authentication

Potential Applications

This technology could be applied in various industries such as banking, e-commerce, and cybersecurity for secure authentication processes.

Problems Solved

This technology helps in ensuring secure authentication and credit information transfer between terminals, reducing the risk of unauthorized access and fraud.

Benefits

The benefits of this technology include enhanced security, efficient authentication processes, and protection of sensitive credit information.

Potential Commercial Applications

One potential commercial application of this technology could be in the development of secure payment systems for online transactions, ensuring safe and reliable authentication processes.

Possible Prior Art

Prior art in this field may include existing authentication systems and methods used in various industries for secure data transfer and verification processes.

What are the technical specifications of the memory and processor used in the terminal system described in the patent application?

The technical specifications of the memory and processor used in the terminal system are not provided in the abstract. Further details on the memory capacity, type, and speed, as well as the processor's architecture and processing power, would be necessary to fully understand the system's capabilities.

How does the terminal system handle potential errors or failures during the authentication process with another terminal?

The abstract does not mention how the terminal system handles potential errors or failures during the authentication process with another terminal. It would be important to know if there are any fail-safe mechanisms, error handling protocols, or backup procedures in place to address such situations and ensure the reliability of the authentication process.


Original Abstract Submitted

A terminal according to one aspect includes: at least one memory configured to store an instruction; and at least one processor configured to perform the instruction, wherein the processor performs the instruction, and thus provides, to another terminal, an authentication request related to data being an authentication target, authentication information about an own terminal, and credit information about the own terminal, acquires, from the another terminal, an authentication result of the another terminal for the authentication request, and reclaims the credit information from the another terminal or an authentication server after the another terminal accesses the authentication server and thus validity of the authentication information is authenticated.