摘要 |
<P>PROBLEM TO BE SOLVED: To protect an authentication token connected to a computer from being taken over by a malicious program. <P>SOLUTION: In order to authorize a transaction between a host and a server, a token is connected to the host, and the host receives an identification certificate of a user and verifies the identification certificate by the token and/or the server. When the token detects a prescribed action by a person, the token generates token authentication data and the host transmits the token authentication data to the server. When receiving the authentication data, the server authenticates a transaction. Devices performing authentication include a device interface, a connector and a controller which authenticates a transaction only once under the condition that a prescribed action by an anonymous person has been detected. As actions of a person, one or more inputs in a user interface at the host are provided, as being synchronized with outputs in a user interface of the devices. <P>COPYRIGHT: (C)2013,JPO&INPIT |