WO2005038661A1 - 端末認証装置および方法 - Google Patents
端末認証装置および方法 Download PDFInfo
- Publication number
- WO2005038661A1 WO2005038661A1 PCT/JP2004/015862 JP2004015862W WO2005038661A1 WO 2005038661 A1 WO2005038661 A1 WO 2005038661A1 JP 2004015862 W JP2004015862 W JP 2004015862W WO 2005038661 A1 WO2005038661 A1 WO 2005038661A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- data
- client
- server
- generating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/231—Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers, prioritizing data for deletion
- H04N21/23109—Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers, prioritizing data for deletion by placing content in organized collections, e.g. EPG data repository
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25808—Management of client data
- H04N21/25816—Management of client data involving client authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/426—Internal components of the client ; Characteristics thereof
- H04N21/42684—Client identification by a unique number or address, e.g. serial number, MAC address, socket ID
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/65—Transmission of management data between client and server
- H04N21/658—Transmission by the client directed to the server
- H04N21/6582—Data stored in the client, e.g. viewing habits, hardware capabilities, credit card number
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/81—Monomedia components thereof
- H04N21/8166—Monomedia components thereof involving executable data, e.g. software
- H04N21/8193—Monomedia components thereof involving executable data, e.g. software dedicated tools, e.g. video decoder software or IPMP tool
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/84—Generation or processing of descriptive data, e.g. content descriptors
- H04N21/8402—Generation or processing of descriptive data, e.g. content descriptors involving a version number, e.g. version number of EPG data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/173—Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
- H04N7/17309—Transmission or handling of upstream communications
- H04N7/17318—Direct or substantially direct transmission and handling of requests
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99941—Database schema or data structure
- Y10S707/99942—Manipulating data structure, e.g. compression, compaction, compilation
Definitions
- the present invention relates to authentication of a device by a terminal ID in a client server system that performs terminal authentication on a communication network.
- a server system In a server system, it is widely used to identify a user by using BASIC authentication, which sends a user name or pass-word as authentication information, or Digest authentication, which encrypts and sends the authentication information. It has been done.
- BASIC authentication which sends a user name or pass-word as authentication information
- Digest authentication which encrypts and sends the authentication information. It has been done.
- the technology described in Japanese Patent Application Laid-Open No. 2002-269052 realizes stricter authentication by combining a mobile phone number, a terminal-specific ID number, and a user's fingerprint. ing.
- televisions compatible with the Internet hereinafter referred to as “netTV”) also perform authentication by transmitting unique IDs to servers based on device-specific values.
- digital broadcast television receivers, etc. can rewrite the software of the receiver and upgrade the version using an on-air download mechanism. Also, it is possible to upgrade the software version of the netTV with digital broadcast reception function by downloading it. Disclosure of the invention
- the terminal authentication device The terminal authentication device
- Terminal ID generation means for generating unique IDs from device-specific values
- Terminal ID storage means for storing the terminal ID generated by the terminal ID generation means
- Header information combining means for combining the terminal ID stored in the terminal ID storage means
- a client data transmitting means for transmitting the client data to the server
- Server data receiving means for receiving data transmitted from the server
- a client device comprising:
- Client data receiving means for receiving data transmitted from the client
- Terminal ID extracting means for extracting the terminal ID from the data received by the client data overnight receiving means
- Terminal ID comparing means for comparing the ID extracted by the terminal ID extracting means with the registered information
- Data reading means for reading data from the database
- data writing means for writing data to the database
- terminal authentication means for authenticating the terminal based on the ID compared by the terminal ID comparing means
- a server device comprising
- a terminal ID generation step that generates a unique ID from device-specific values
- a terminal ID storage step for storing the terminal ID generated in the terminal ID generation step
- a server data receiving step for receiving the data transmitted from the server For example,
- a data read step for reading data from the database a data write step for writing data to the database, a terminal authentication step for authenticating the terminal with the ID compared in the terminal ID comparison step,
- a server data transmission step for transmitting server data to the client
- FIG. 1 is a block diagram showing a configuration of a terminal authentication device according to an embodiment of the present invention.
- FIG. 2 is a flowchart showing processing on the client side in the embodiment of the present invention.
- FIG. 3 is a flowchart showing processing on the server side in the embodiment of the present invention.
- BEST MODE FOR CARRYING OUT THE INVENTION In the conventional method described above, when the ID generation method is changed between the old version software and the new version software, the ID is authenticated with the old version by upgrading the version. Authentication may fail as soon as the terminal that has been replaced with the new version.
- IPv6 When IPv6 is operated in the future, work to register information for authentication registered in IPv4 again will occur due to expansion of the address space that can be managed.
- An object of the present invention is to provide a method capable of correctly authenticating a terminal device even when the ID generation method is changed by the old and new versions of software.
- FIG. 1 is a block diagram showing a configuration of a terminal authentication device according to Embodiment 1 of the present invention.
- the terminal authentication device 10 includes a client device 20 and a server device 30.
- the client device 20 includes terminal ID generation means 101, terminal ID storage processing means 102, header information synthesis processing means 103, client data transmission means 104, and server data reception means 1 05 and display processing means 1 13.
- the server device 30 includes client data receiving means 106, terminal ID extracting means 107, terminal ID comparing means 108, data reading means 109, and data writing means 110.
- the terminal ID generating means 101 generates a unique terminal ID from a device-specific value and supplies the terminal ID storing processing means 102 to the terminal ID storage processing means 102.
- the terminal ID storage processing means 102 temporarily stores the received terminal ID.
- the header ⁇ S report synthesis processing means 103 receives the terminal ID stored in the terminal ID storage processing means 102 as necessary, and processes the terminal ID and other information in a predetermined manner. To synthesize header information.
- the header information includes, for example, HTP header information.
- the client data transmitting means 104 receives the header information synthesized by the header information synthesizing processing means 103 and transmits it together with other information.
- this transmitted signal has a predetermined bucket structure, and is a data sequence conforming to a predetermined syntax. For example, a packet includes a header, a payload, and information for error control P. Then, this data sequence may be subjected to predetermined modulation.
- the information transmitted from the client data transmitting means 104 of the client device 20 is received by the client data receiving means 106 of the server device 30.
- the client data receiving means 106 performs a process substantially opposite to the process executed by the client data transmitting means 104. That is, based on the received information, the header information generated by the header information combining processing means 103 is restored and supplied to the terminal ID extracting means 107.
- the terminal ID extracting means 107 executes a process substantially opposite to the process executed by the header information synthesizing means 103. That is, the terminal ID output from the terminal ID storage processing means 102 is restored on the basis of the received header information, and supplied to the terminal ID comparison means 108.
- step S201 a terminal ID is generated. This process is thus t corresponds to the operation of the terminal ID generation unit 1 0 1 1 proceeds to step S 2 0 2.
- step S202 the generated terminal ID is stored in the terminal ID storage buffer. Then, it proceeds to step S203.
- step S203 it is determined whether a plurality of terminal IDs have been generated.
- step S204 the generated terminal IDs are combined with the header information.
- the composition to the header information is, for example, the composition to the HTTP header information. This processing corresponds to the operation of the header information combining means 103 in FIG. Then, the process proceeds to step S205.
- step S205 the HTTP request information including the terminal ID is transmitted to the server device 30.
- step S206 the data transmitted from server device 30 is received.
- step S207 the received data is displayed on the display device 114, and the process ends.
- a plurality of terminal IDs are generated in the client device 20.
- the operation to generate multiple terminal IDs by the terminal ID generation method in the new version and the terminal ID generation method in the old version is executed, so that the terminal ID in the old version must be executed. Is also produced.
- the terminal ID generated by the terminal ID generation method in the new version is transmitted, but also the terminal ID generated by the terminal ID generation method in the old version.
- the terminal ID information generated by the old and new version generation methods is used.
- terminal devices can be correctly authenticated. The details will be described in more detail in the description of FIG.
- step S301 the client data transmitted from the client is received. That is, the server device 30 receives the client data from the client data overnight transmission means 104 of the client device 20. Then, the process proceeds to step S302.
- step S302 the terminal ID is extracted from the field of the terminal ID included in the received data, and the flow advances to step S303.
- Step 302 corresponds to the operation of the terminal ID extraction processing means 107.
- step S303 terminal information registered in the database is read out. That is, the terminal information registered in the data reading means 109 and the database 115 is read. Then, the process proceeds to step S304.
- step S304 the terminal ID extracted in step S302 is compared with the terminal information read in step S303. That is, the terminal ID comparing means 108 compares the terminal information read by the data reading means 109 with the terminal ID extracted by the terminal ID extracting processing means 107. At this time, even if the value of the terminal ID field in the new version is not registered in the database, if the value of the terminal ID field in the old version exists, that is, if the terminal ID field is If there is more than one, whether or not each ID value is registered in the database is also compared, and the result is transferred to step S305 and transmitted.
- step S305 authentication is performed based on the comparison result in step S304. Will be implemented.
- Step 305 corresponds to the operation of the terminal authentication processing means 111. If the authentication fails, that is, if it is determined that the authentication is denied, the process moves to step S306. Conversely, if the authentication is successful, the process moves to step S307.
- step S306 data notifying that the authentication is rejected is transmitted to the client, and the process ends.
- step 303 corresponds to the operation of the server data transmitting means 112.
- step S307 it is determined whether there is a plurality of terminal IDs. If there are two or more terminal IDs, the process moves to step S308, and if there is only one, the process moves to step S309.
- step S308 the old terminal information is rewritten with the new terminal information.
- the terminal ID is compared with the registered terminal ID, and if it matches any of the values of the terminal ID field of the old version, the terminal ID field of the new version is used.
- the field value is registered in the server as a new terminal ID.
- Step S308 is executed by the data writing means 110 and the database 115. Then, control goes to step S309.
- step S309 a request message is transmitted to the client. That is, in response to a request from the client device 20, the data server transmitting means 112 transmits the corresponding desired data. Then, the process ends.
- the client device 20 transmits the terminal ID generated by the old version generation method and the terminal ID generated by the new version generation method.
- the server device 30 recognizes and certifies the two terminal IDs by using the ID field of the old version and the ID field of the new version, and updates the terminal ID of the new version. Processing.
- step S306 when a message indicating that the authentication is rejected is transmitted to the client side, in step 206 of FIG. 2, a message indicating that the authentication is rejected is received. It is. That is, the client The server data receiving means 105 of the client device 20 receives the data indicating that the authentication is rejected. In this case, the client device 20 cannot receive the data itself requested by the client device 20.
- step S309 when the request data is transmitted to the client in step S309, desired request data is received in step 206 in FIG. That is, the client device 20 can receive the data requested by the client device 20.
- the data server transmitting means 112 transmits the corresponding desired data in response to the request from the client device 20.
- the server data receiving means 105 of the client device 20 receives desired data transmitted from the data server transmitting means 112.
- the authentication terminal device of the present invention includes the client device and the server device.
- the client device of the present invention comprises: a terminal ID generating means for generating a unique ID from a value unique to the client device; and a terminal ID storing means for storing the terminal ID generated by the terminal ID generating means.
- Header information combining means for combining the terminal IDs stored in the terminal ID storage means, client data transmitting means for transmitting client data to the server, and server data receiving for receiving data transmitted from the server.
- display processing means for displaying the received data.
- the super apparatus comprises: client data receiving means for receiving the data transmitted from the client; and terminal ID extracting means for extracting the terminal ID from the data received by the client data receiving means.
- Terminal ID comparison means for comparing the ID retrieved by the terminal ID retrieval means with the registered information; data reading means for reading the data from the data base; and data reading to the database.
- Write Data writing means a terminal authentication means for authenticating the terminal by the ID compared by the terminal ID comparing means, and a server data transmitting means for transmitting server data to the client.
- the terminal ID generation means of the terminal authentication device is a terminal ID generation means for generating a unique ID from a device-specific value, It is possible to generate a unique ID.
- the terminal ID comparing means of the present invention is a terminal ID comparing means for comparing the ID extracted by the terminal ID extracting means with the registered information, and is registered when there are a plurality of extracted IDs. If one ID is compared with the existing ID, the other ID can be registered as a new ID.
- a unique ID is a unique symbol string or number that can have only one attribute value, and identifies each of multiple devices.
- the terminal authentication device and method of the present invention can correctly authenticate a terminal device even when the ID generation method is changed between the old and new versions of software. It becomes.
- the terminal authentication device of the present invention can correctly authenticate a terminal device even when the method of generating a terminal ID is changed between an old version and a new version, and can be used for a net TV, a mobile phone, a bank ATM online network. It is useful as an authentication device for networks and the like.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Power Engineering (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Graphics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP04792978A EP1677205A4 (en) | 2003-10-22 | 2004-10-20 | DEVICE AND METHOD FOR AUTHENTICATING A TERMINAL |
| JP2005514886A JP4453656B2 (ja) | 2003-10-22 | 2004-10-20 | 端末認証装置および方法 |
| US10/572,168 US7603369B2 (en) | 2003-10-22 | 2004-10-20 | Terminal authentication apparatus and method |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2003-361689 | 2003-10-22 | ||
| JP2003361689 | 2003-10-22 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2005038661A1 true WO2005038661A1 (ja) | 2005-04-28 |
Family
ID=34463497
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2004/015862 Ceased WO2005038661A1 (ja) | 2003-10-22 | 2004-10-20 | 端末認証装置および方法 |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US7603369B2 (ja) |
| EP (1) | EP1677205A4 (ja) |
| JP (1) | JP4453656B2 (ja) |
| CN (1) | CN100492335C (ja) |
| WO (1) | WO2005038661A1 (ja) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103520908A (zh) * | 2012-07-02 | 2014-01-22 | 京乐产业.株式会社 | 一种游戏机装置 |
Families Citing this family (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7665147B2 (en) * | 2004-02-05 | 2010-02-16 | At&T Mobility Ii Llc | Authentication of HTTP applications |
| NL1033397C2 (nl) * | 2007-02-15 | 2008-08-18 | Commodore Internat B V | Mediaweergavesysteem. |
| JP5372813B2 (ja) * | 2010-03-16 | 2013-12-18 | Kddi株式会社 | コンテンツ管理システム、認証装置およびコンピュータプログラム |
| JP4932047B1 (ja) * | 2011-06-30 | 2012-05-16 | 楽天株式会社 | コンテンツ又はアプリケーションの提供システム、コンテンツ又はアプリケーションの提供システムの制御方法、端末装置、端末装置の制御方法、認証装置、認証装置の制御方法、プログラム、及び情報記憶媒体 |
| CN105337941B (zh) * | 2014-08-04 | 2019-01-15 | 阿里巴巴集团控股有限公司 | 一种设备标识提供方法及装置 |
| CN105574041B (zh) | 2014-10-16 | 2020-07-21 | 阿里巴巴集团控股有限公司 | 一种数据重组方法和装置 |
| CN105630345B (zh) | 2014-11-06 | 2019-02-19 | 阿里巴巴集团控股有限公司 | 一种控制显示方向的方法和设备 |
| US11153305B2 (en) * | 2018-06-15 | 2021-10-19 | Canon U.S.A., Inc. | Apparatus, system and method for managing authentication with a server |
| US11368462B2 (en) * | 2018-09-06 | 2022-06-21 | Servicenow, Inc. | Systems and method for hypertext transfer protocol requestor validation |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH06203032A (ja) * | 1993-01-07 | 1994-07-22 | Fujitsu Ltd | ゲート装置及び入退室管理装置 |
| WO2001071515A1 (en) * | 2000-03-24 | 2001-09-27 | Kabushikikaisha I-Broadcast | Method for preventing unauthorized simultaneous access to network and server system used therefor |
| JP2003244124A (ja) * | 2002-02-15 | 2003-08-29 | Promenade:Kk | セキュリティ管理システム |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5719941A (en) * | 1996-01-12 | 1998-02-17 | Microsoft Corporation | Method for changing passwords on a remote computer |
| JP2002269052A (ja) | 2001-03-14 | 2002-09-20 | Sharp Corp | 携帯端末認証システム、携帯端末認証方法ならびに携帯端末認証プログラムおよび該プログラムを記憶したコンピュータ読み取り可能な記録媒体 |
| US20030147369A1 (en) * | 2001-12-24 | 2003-08-07 | Singh Ram Naresh | Secure wireless transfer of data between different computing devices |
| CN100394754C (zh) * | 2002-01-01 | 2008-06-11 | 哈尔滨万博信息技术有限公司 | 专门用于移动电话联网接入服务的身份认证方法 |
| US7386889B2 (en) * | 2002-11-18 | 2008-06-10 | Trusted Network Technologies, Inc. | System and method for intrusion prevention in a communications network |
-
2004
- 2004-10-20 EP EP04792978A patent/EP1677205A4/en not_active Ceased
- 2004-10-20 JP JP2005514886A patent/JP4453656B2/ja not_active Expired - Fee Related
- 2004-10-20 CN CNB2004800312099A patent/CN100492335C/zh not_active Expired - Fee Related
- 2004-10-20 US US10/572,168 patent/US7603369B2/en active Active
- 2004-10-20 WO PCT/JP2004/015862 patent/WO2005038661A1/ja not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH06203032A (ja) * | 1993-01-07 | 1994-07-22 | Fujitsu Ltd | ゲート装置及び入退室管理装置 |
| WO2001071515A1 (en) * | 2000-03-24 | 2001-09-27 | Kabushikikaisha I-Broadcast | Method for preventing unauthorized simultaneous access to network and server system used therefor |
| JP2003244124A (ja) * | 2002-02-15 | 2003-08-29 | Promenade:Kk | セキュリティ管理システム |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103520908A (zh) * | 2012-07-02 | 2014-01-22 | 京乐产业.株式会社 | 一种游戏机装置 |
| CN103520908B (zh) * | 2012-07-02 | 2017-03-01 | 京乐产业.株式会社 | 一种游戏机装置 |
Also Published As
| Publication number | Publication date |
|---|---|
| EP1677205A1 (en) | 2006-07-05 |
| JPWO2005038661A1 (ja) | 2007-01-18 |
| CN1871593A (zh) | 2006-11-29 |
| US7603369B2 (en) | 2009-10-13 |
| JP4453656B2 (ja) | 2010-04-21 |
| EP1677205A4 (en) | 2010-11-24 |
| US20060184533A1 (en) | 2006-08-17 |
| CN100492335C (zh) | 2009-05-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10432593B2 (en) | Secure software updates | |
| US7124297B2 (en) | Information providing apparatus and method, information processing apparatus and method, and program storage medium | |
| US6983367B2 (en) | Information providing apparatus and method, information processing apparatus and method, and program storage medium | |
| CN100527080C (zh) | 软件程序同步的方法 | |
| CN109495874B (zh) | Profile下载的方法和装置 | |
| JP4453656B2 (ja) | 端末認証装置および方法 | |
| CN111695098A (zh) | 多分布式集群访问方法及装置 | |
| CN109309655B (zh) | 无状态通信安全签名方法、终端及服务器端 | |
| JP2003242054A (ja) | サーバ装置、通信機器、通信機器設定情報管理方法、プログラム及び記録媒体 | |
| US20030074570A1 (en) | Address management system, interface ID setting processor, communication terminal, address management method, and computer program | |
| US8638932B2 (en) | Security method and system and computer-readable medium storing computer program for executing the security method | |
| JP5616156B2 (ja) | ワンタイム認証システム | |
| CN119312372B (zh) | 一种设备资源解密方法、装置、电子设备及存储介质 | |
| CN110796446B (zh) | 密钥注入方法、装置、电子设备及计算机可读存储介质 | |
| CN110769065A (zh) | 一种远程管理方法、系统、终端设备及服务器 | |
| JP4610651B2 (ja) | 装置管理におけるブートストラップメッセージ保安送信方法及び装置 | |
| JP4543789B2 (ja) | トランザクションに基づく証明書検証情報管理方法 | |
| US8543657B2 (en) | Data communication system and method using a wireless terminal | |
| US8635160B2 (en) | Information providing apparatus and method, information processing apparatus and method, program storage medium, program, and information providing system | |
| WO2004061691A1 (ja) | パスワード管理装置 | |
| KR100987769B1 (ko) | 개인용 컴퓨터의 인증키를 이용하여 전용 인증키를생성하는 인증키 생성 장치 및 방법 | |
| HK40009197B (en) | Data processing method, system and related device | |
| HK40009197A (en) | Data processing method, system and related device | |
| JP2001186109A (ja) | 通信機器、通信システム、通信方法及び記憶媒体 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 200480031209.9 Country of ref document: CN |
|
| AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| WWE | Wipo information: entry into national phase |
Ref document number: 2005514886 Country of ref document: JP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2006184533 Country of ref document: US Ref document number: 10572168 Country of ref document: US |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2004792978 Country of ref document: EP |
|
| WWP | Wipo information: published in national office |
Ref document number: 2004792978 Country of ref document: EP |
|
| WWP | Wipo information: published in national office |
Ref document number: 10572168 Country of ref document: US |