摘要 |
<p><P>PROBLEM TO BE SOLVED: To prevent the leakage of authentication information even when someone steals a glance at an operation for inputting the authentication information by a data logger with a screen shot, or the like. <P>SOLUTION: In this authentication apparatus 100, a hash value generating part 170a generates a hash value character string from biological information. An authentication processing part 170c rearranges the hash value character string of the biological information, and subsequently associates each block identification information obtained by mixing the rearranged character string with a dummy character string with each numerical value and outputs a display picture. Then, the authentication processing part 170c determines whether a character string corresponding to a numerical string input by a user is equal to an encrypted character string, and executes authentication of a person himself/herself on the basis of a determination result. <P>COPYRIGHT: (C)2011,JPO&INPIT</p> |