摘要 |
PROBLEM TO BE SOLVED: To provide authentication techniques in which security is improved so as to hold out against a brute force attack. SOLUTION: In an authentication processing method for authenticating a user by processing inputted information by means of a computer, the computer generates a key for first information to be used for authenticating the user, calculates a first hash value using this key and third information (e.g., random number), stores the first hash value into a storage section, generates image information using the third information, encrypts the image information and stores it into the storage section. When authenticating the user, the computer generates a key from the first information inputted from an input device, uses the key to decrypt the image information stored in the storage section, and displays the image on a display. The user inputs from the input device second information recognized from the displayed image. The computer uses the inputted second information and the key to calculate a second hash value. The computer then collates first hash value stored in the storage section with the second hash value to perform the authentication. COPYRIGHT: (C)2007,JPO&INPIT |