摘要 |
<P>PROBLEM TO BE SOLVED: To protect an authentication token connected to a computer from being hijacked by a malicious program. <P>SOLUTION: In order to authenticate a transaction between a host and a server, a token is connected to the host. The host receives an identification certificate of a user. The identification certificate is then verified by the token and/or the server. When the token detects an artificial specified operation, the token generates token authentication data, and the host transmits the token authentication data to the server. Upon receiving the authentication data, the server authenticates the transaction. <P>COPYRIGHT: (C)2012,JPO&INPIT |