摘要 |
PROBLEM TO BE SOLVED: To continue operation of an authentication system without changing an authentication method even when data stored in a database is stolen.SOLUTION: An authentication system includes an authentication information generation device 100 and an authentication device. An authentication key generation part 103 of the authentication information generation device 100 generates an authentication key constituted of authentication ID and a search SQL sentence generated by a search SQL generation part 102. An authentication information generation part 104 generates authentication information constituted of authentication ID included in the authentication key and search result information acquired by the search of a search database 101 with the search SQL sentence. The authentication device holds the authentication information generated by the authentication information generation part 104, and determines whether or not the search result information included in the authentication information is completely coincident with the search information acquired by the search of the search database 101 with the authentication ID and the search SQL sentence included in the authentication key 105 input for authentication, and when those pieces of information are completely coincident with each other, determines that authentication is successful. |