17911768. AUTHENTICATION SYSTEM, AUTHENTICATION METHOD AND PROGRAM simplified abstract (Rakuten Group, Inc.)

From WikiPatents
Jump to navigation Jump to search

AUTHENTICATION SYSTEM, AUTHENTICATION METHOD AND PROGRAM

Organization Name

Rakuten Group, Inc.

Inventor(s)

Sachiko Fukushima of Minato-ku, Tokyo (JP)

Yeongnam Chae of Setagaya-ku, Tokyo (JP)

AUTHENTICATION SYSTEM, AUTHENTICATION METHOD AND PROGRAM - A simplified explanation of the abstract

This abstract first appeared for US patent application 17911768 titled 'AUTHENTICATION SYSTEM, AUTHENTICATION METHOD AND PROGRAM

The abstract describes an authentication system that performs first authentication for a user at a specific location and then determines if another user is scheduled to be present at the same location at the same time, based on schedule information.

  • The system executes first authentication for a user at a specific location.
  • It checks the schedule information to see if another user is scheduled to be at the same location at the same time.
  • If another user is scheduled to be present, the system processes the first user based on the authentication.

Potential Applications: - Access control systems - Security systems - Attendance tracking systems

Problems Solved: - Ensuring accurate authentication of users at specific locations - Preventing unauthorized access to restricted areas

Benefits: - Improved security measures - Enhanced user authentication processes - Efficient scheduling and tracking of user presence

Commercial Applications: Title: "Enhanced Authentication System for Secure Access Control" This technology can be used in various industries such as: - Corporate offices - Government facilities - Educational institutions

Questions about the technology: 1. How does this authentication system improve security measures at specific locations? - This system enhances security by accurately verifying the presence of users at designated places. 2. What are the potential implications of using this technology in access control systems? - The technology can streamline access control processes and improve overall security measures.


Original Abstract Submitted

An authentication system, comprising at least one processor configured to: execute first authentication for a first user when the first user is present at or arrives at a first place; determine, based on schedule information about scheduled visits to the first place, whether a second user who has a possibility of being authenticated as the first user by the first authentication is scheduled to be present at the first place, or whether the second user is scheduled to arrive at the first place at a first scheduled date or a first scheduled date/time, which is when the first user is scheduled to be present at or arrive at the first place; and execute first processing for the first user based on the first authentication.