发明名称 AUTHENTICATING METHOD
摘要 <p>Communication interception, monitoring, look-stealing, all-out attack, and spoofing by leak, copy and counterfeit of authentication information out of the user control and outside the system are prevented by performing an “authenticating method capable of coping with any problems in authentication except the monitoring problem” and an “authenticating method that may let the authenticating part spoof but not let it monitor and may let a false person spoof by stealing authentication information from an authenticating device, and that involves individual problems in the contents of authentication” in two stages by one authentication. In addition, in the latter authenticating method, all possible problems regarding authentication can be coped with at least individually by “providing a collatable, irreversible relationship between authentication information given by a user and authentication information registered in the authentication device to prevent spoofing by the authenticating part and spoofing by stealing authentication information from the authentication device”.</p>
申请公布号 WO2003069489(P1) 申请公布日期 2003.08.21
申请号 JP2002001256 申请日期 2002.02.14
申请人 发明人
分类号 主分类号
代理机构 代理人
主权项
地址