18602068. NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING AUTHENTICATION PROGRAM, AUTHENTICATION DEVICE, AND AUTHENTICATION METHOD simplified abstract (Fujitsu Limited)

From WikiPatents
Jump to navigation Jump to search

NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING AUTHENTICATION PROGRAM, AUTHENTICATION DEVICE, AND AUTHENTICATION METHOD

Organization Name

Fujitsu Limited

Inventor(s)

Takayoshi Nakayama of Kawasaki (JP)

Takeshi Kawasaki of Kawasaki (JP)

NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING AUTHENTICATION PROGRAM, AUTHENTICATION DEVICE, AND AUTHENTICATION METHOD - A simplified explanation of the abstract

This abstract first appeared for US patent application 18602068 titled 'NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING AUTHENTICATION PROGRAM, AUTHENTICATION DEVICE, AND AUTHENTICATION METHOD

The abstract describes a non-transitory computer-readable recording medium storing an authentication program that allows a computer to accept a service usage request from a user along with certification information from one or more authentication sources. The user is permitted to use the service if a predetermined number of accepted certification pieces meet the required threshold.

  • Acceptance of service usage requests and certification information
  • Certification information issued by authentication sources
  • Permitting service usage based on the number of accepted certification pieces
  • Non-transitory computer-readable recording medium storing the authentication program
  • Predetermined number threshold for accepted certification pieces

Potential Applications: - Secure access control systems - Online banking and financial transactions - E-commerce platforms - Government services and portals - Healthcare information systems

Problems Solved: - Ensuring secure access to services - Preventing unauthorized usage - Streamlining authentication processes - Enhancing user data protection - Mitigating identity theft risks

Benefits: - Improved security measures - Enhanced user privacy - Streamlined authentication procedures - Reduced risk of unauthorized access - Enhanced user experience

Commercial Applications: Title: Secure Access Control System for Enhanced User Authentication This technology can be utilized in various industries such as finance, e-commerce, government services, and healthcare to enhance security measures and protect user data. The market implications include increased trust from users, reduced risks of data breaches, and improved regulatory compliance.

Questions about Secure Access Control System for Enhanced User Authentication: 1. How does this technology improve user data protection?

  - This technology enhances user data protection by requiring a predetermined number of accepted certification pieces for service usage, ensuring only authenticated users can access the service.

2. What are the potential applications of this technology in the healthcare industry?

  - This technology can be applied in healthcare information systems to secure patient data, streamline access control, and enhance overall data security measures.


Original Abstract Submitted

A non-transitory computer-readable recording medium storing an authentication program for causing a computer to perform processing including: accepting a service usage request of a user and one or more pieces of certification information indicating that the user is authenticated, each piece of the one or more pieces of certification information being information issued by each of one or more authentication sources; and permitting the user to use the service in a case where a number of the accepted one or more pieces of certification information is no less than a predetermined number.