发明名称 SURROGATE AUTHENTICATION METHOD, RESPECTIVE DEVICES THEREFOR, PROCESSING METHOD FOR THE SAME AND PROGRAM RECORDING MEDIUM
摘要 PROBLEM TO BE SOLVED: To disable the illegal resource utilization of a surrogate user and to simplify a configuration. SOLUTION: A user receives a session IDn from an authentication device, data an=hn-1(s) to be authenticated are generated by operating a unidirectional hash function for n-1 times in respect to secret information S of the user, authentication data vn=hh(s) are generated, vn are sent to the authentication device and the authentication device investigates whether that hash value h(vn) is equal with registered data hn-1(s) or not. When they are equal, vn are saved. The user authenticates the legality of the surrogate user, sends an to the surrogate user and when the authentication of legality is received from the authentication device, the surrogate user sends an to the authentication device. When the hash value h(an) is equal with vn, the utilization of resources is permitted to the authentication device an. The an=hn-1(s) are saved as next verification data.
申请公布号 JP2002132722(A) 申请公布日期 2002.05.10
申请号 JP20000330163 申请日期 2000.10.30
申请人 NIPPON TELEGR & TELEPH CORP <NTT> 发明人 YAMAMOTO KANA;HORIOKA TSUTOMU;SANO MUTSUO
分类号 G06F21/20;G06F15/00;H04L9/32;(IPC1-7):G06F15/00 主分类号 G06F21/20
代理机构 代理人
主权项
地址