The present invention relates to a service providing system, a service delivery system, a service providing method, and a non-transitory recording medium.
A system with which, in a case where a service is provided to a user through the Internet, the service is actually provided to the user after terminal identification information is determined as authorized information through a process where the user is authenticated with the use of the terminal identification information (an ID or the like) or a password sent from the user's communication terminal, is widely used (see Patent document 1).
According to one aspect of the present invention, when providing a service to a communication terminal, a service providing system causes an authentication system to perform authentication of a user of the communication terminal. The service providing system includes a processor configured to receive, from the communication terminal, terminal identification information to identify the communication terminal, the terminal identification information including a to-be-authenticated section to be used for the authentication of the user and a not-to-be-authenticated section not to be used for the authentication of the user; and transmit, to the authentication system, only the to-be-authenticated section out of the received terminal identification information.
In the above-described system, in a case where the user uses a plurality of own communication terminals to receive respective services, sets of terminal identification information and passwords will be respectively registered for services, and therefore, the user may experience troublesomeness.
According to embodiments of the present invention, terminal identification information includes a to-be-authenticated section and a not-to-be-authenticated section. As a result, once a user performs registration with the use of a to-be-authenticated section, the user need not perform a plurality of registrations even for a case of using a plurality of pieces of terminal identification information having different not-to-be-authenticated sections. Therefore, troublesomeness to the user can be avoided.
Now, with the use of the drawings, the embodiment will be described.
<<Overall Configuration of Embodiments>>
The photographing apparatus 10 is, for example, a digital camera, captures an image of a scene, for example, to generate a full spherical panoramic image. The communication terminal 3a is, for example, a smartphone. The communication terminal 3a performs communication with the photographing apparatus 10 with the use of short-range wireless communication technology such as Bluetooth (registered trademark). For example, as a result of the communication terminal 3a transmitting to the photographing apparatus 10 an instruction to start a photographing operation, the photographing apparatus 10 transmits to the communication terminal 3a various data obtained from a photographing operation such as image data and sound data. The photographing apparatus 10 cannot use the communication network 9 by itself, and therefore, transmits through the communication terminal 3a various data to the communication network 9. The communication terminal 3b is, for example, a personal computer. The communication terminal 3c is, for example, a car navigation apparatus.
Note that, in
Further, the service providing systems 5 and the authentication systems 7 may be single computers, or each of the service providing systems 5 and the authentication systems 7 may include a plurality of computers. The photographing apparatus 10 may be also a common digital camera that does not have a function to generate a full spherical panorama image.
Further, a communication terminal 3 may be a smartphone, a personal computer, or a car navigation apparatus, as an example of a mobile terminal. Further, examples of a communication terminal 3 are not limited to these devices. For example, a communication terminal 3 may be an information processing terminal, a business machine, a home appliance, an electric component, a medical device, an industrial device, or the like. Examples of the mobile terminal include, in addition to the above-mentioned devices, a smart watch, a head mount display, a video conference terminal, a camera, a handy terminal, and a drone. Examples of the information processing terminal include a desktop PC, a tablet PC, and a server. Examples of the business machine include a copier, a facsimile machine, a MFP (Multifunction Peripheral) that has functions of a copier and a facsimile machine, an electronic blackboard, a video conference terminal, and a projector. Examples of the home appliance include a television, an air conditioner, a refrigerator, a recorder, and a microwave oven. Examples of the electric component include an electronic component such as an image pickup device. Examples of the medical device include a MRI (Magnetic Resonance Imaging) device, an EEG (Electroencephalography) device, a MEG (Magnetoencephalography) device, and an endoscope. Examples of the industrial device include a construction machine and a working robot.
<How to Use Photographing Apparatus>
With the use of
With the use of
As illustrated in
Next, with the use of
<<Hardware Configuration of Embodiments>>
Next, with the use of
<Hardware Configuration of Photographing Apparatus>
With the use of
As illustrated in
The image pickup unit 101 includes wide-angle lenses (so-called fish-eye lenses) 102a and 102b, each of which has a field angle greater than or equal to 180° for forming a hemispherical image, and the two image pickup devices 103a and 103b corresponding to the wide-angle lenses 102a and 102b, respectively. The image pickup devices 103a and 103b include image sensors such as CMOS (Complementary Metal Oxide Semiconductor) sensors or CCD (Charge Coupled Device) sensors converting optical images obtained through the fish-eye lenses into electric image data signals; timing circuits generating horizontal or vertical synchronization signals, pixel clocks, and so forth; and a group of registers in which various commands and parameters required for operating the image pickup devices are set.
The respective image pickup devices 103a and 103b of the image pickup unit 101 are connected with the image processing unit 104 through a parallel I/F bus. The image pickup devices 103a and 103b of the image pickup unit 101 are connected also with the image pickup control unit 105 through a serial I/F bus (an I2C bus or the like). The image processing unit 104 and the image pickup control unit 105 are connected with the CPU 111 through a bus 110. Further, to the bus 110, also the ROM 112, the SRAM 113, the DRAM 114, the operation part 115, the network I/F 116, the communication part 117, an electromagnetic compass 118, and so forth are connected.
The image processing unit 104 performs a predetermined process on image data output from the image pickup devices 103a and 103b through the parallel I/F bus, and combines the processed image data to generate Mercator image data.
Generally speaking, the image pickup control unit 105 acts as a master device, the image pickup devices 103a and 103b act as slave devices, and the image pickup control unit 105 sets commands and so forth to the group of registers of the image pickup devices 103a and 103b through the I2C bus. The commands and so forth are received from the CPU 111. Further, the image pickup control unit 105 uses also the I2C bus to receive status data and so forth of the group of registers of the image pickup devices 103a and 103b, and sends the status data and so forth to the CPU 111.
Further, in response to the shutter button of the operation part 115 being pressed, the image pickup control unit 105 sends an instruction to the image pickup devices 103a and 103b to output image data. Depending on the photographing apparatus, a preview display function or a function to display a moving picture by using a display may be implemented. In this case, the image pickup devices 103a and 103b output image data continuously at a predetermined frame rate (frames/second).
Further, as will be described later, the image pickup control unit 105 also functions as a synchronization control part in cooperation with the CPU 111 to synchronize output timing of image data from the image pickup devices 103a and 103b. Note that, according to the embodiments, the photographing apparatus 10 does not have a display part. However, the photographing apparatus 10 may have a display part.
The microphone 108 converts sound into sound (signal) data. The sound processing unit 109 receives sound data from the microphone 108 through an I/F bus, and performs a predetermined process on the sound data.
The CPU 111 performs overall control of the photographing apparatus 10 and performs required processes. The ROM 112 stores various programs for the CPU 111. The SRAM 113 and the DRAM 114 are work memories, and store a program executed by the CPU 111, data that is being processed by the CPU 111, and so forth. Especially, the DRAM 114 stores image data that is being processed by the image processing unit 104 and Mercator image data that has been processed.
As the operation part 115, various operation buttons, a power switch, a shutter button, a touch panel having both a display function and an operation function, and so forth are generally referred to. The user operates the operation buttons to input various photographing modes, photographing conditions, and so forth.
As the network I/F 116, interfaces (USB I/F and so forth) for external media such as a SD card, a personal computer, and so forth are generally referred to. The network I/F 116 may be a network interface usable for both wired communication and wireless communication. Mercator image data stored in the DRAM 114 is recorded in an external medium through the network I/F 116 or is transmitted to an external apparatus such as a communication terminal 3 through the network I/F 116 as the occasion demands.
The communication part 117 performs communication with an external apparatus such as a communication terminal 3 through the antenna 117a installed at the photographing apparatus 10 according to short-range wireless communication technology such as WiFi (wireless fidelity), NFC, or the like. It is possible to transmit Mercator image data also through the communication part 117 to an external apparatus such as a communication terminal 3.
The electromagnetic compass 118 uses terrestrial magnetism to calculate the orientation of the photographing apparatus 10 and outputs orientation information. The orientation information is one example of related information (metadata) according to Exif, and is used for image processing such as image correction on a photographed image. Note that the related information includes various data such as date and time when an image is photographed and the data size of image data.
<Hardware Configuration of Smartphone>
The CPU 301 controls the entirety of the smartphone. The ROM 302 stores a program such as an IPL for driving the CPU 301. The RAM 303 is used as a work area for the CPU 301. The EEPROM 304 reads and writes various data such as the program for the smartphone under the control of the CPU 301. The CMOS sensor 305 captures an image of a subject (mainly, an image of the user himself or herself) to obtain image data under the control of the CPU 301. The acceleration and orientation sensor 306 includes various sensors such as an electromagnetic compass to detect geomagnetism, a gyrocompass, and an acceleration sensor. The medium I/F 308 controls reading data from and writing (storing) data to a recording medium 307 such as a flash memory. The GPS receiving part 309 receives GPS signals from GPSs.
Further, the smartphone includes a telecommunication circuit 311, a camera 312, an image pickup device I/F 313, a microphone 314, a speaker 315, a sound input and output I/F 316, a display 317, an external apparatus connection I/F 318, a short-range communication circuit 319, an antenna 319a for the short-range communication circuit 319, and a touch panel 321.
The telecommunication circuit 311 performs communication with another apparatus through the communication network 9. The camera 312 is a type of a built-in-type image pickup part for capturing an image of a subject to obtain image data under the control of the CPU 301. The image pickup device I/F 313 controls driving of the camera 312. The microphone 314 is a type of a built-in-type sound collecting part for inputting sound. The sound input and output I/F 316 performs processes to input a sound signal from the microphone 314 and to output a sound signal to the speaker 315 under the control of the CPU 301. The display 317 is a type of a liquid crystal or organic EL display part to display an image of a subject, various icons, and so forth. The external apparatus connection I/F 318 is an interface to connect to various external apparatuses. The short-range communication circuit 319 is a communication circuit that uses a NFC, Bluetooth (registered trademark), or the like. The touch panel 321 is a type of an input part for the user to touch the display 317 to operate the smartphone.
Further, the smartphone includes a bus line 310. The bus line 310 includes an address bus, a data bus, and so forth to electrically connect with various elements illustrated in
<Hardware Configuration of Each of PC, Car Navigation Apparatus, Service Providing Systems, and Authentication Systems>
With the use of
A service providing system 5 includes a CPU 501 to control the entirety of the service providing system 5, a ROM 502 to store a program such as an IPL to drive the CPU 501, a RAM 503 used as a work area of the CPU 501, a HD 504 to store various data such as the program for the service providing system 5, a HDD (Hard Disk Drive) 505 to control reading various data from and writing various data to the HD 504 under the control of the CPU 501, a medium I/F 507 to control reading data from and writing (storing) data to a recording medium 506 such as a flash memory, a display 508 to display various information such as a cursor, a menu, a window, characters, and an image, a network I/F 509 to perform data communication through the communication network 9, a keyboard 511 having a plurality of keys for the user to input characters, numerical values, various instructions, and so forth, a mouse for the user to select and cause various instructions to be executed, to select an object to process, to move the cursor, and so forth, a CD-ROM drive 514 to control reading various data from and writing various data to a CD-ROM (Compact Disc Read-Only Memory) 513 as a type of a detachable recording medium, and a bus line 510 such as an address bus, a data bus, and so forth to electrically connect the above-mentioned various elements as illustrated in
Note that recording media such as CD-ROMs to store the various programs according to the embodiments may be provided domestically or internationally in form of program products.
<<Functions of Embodiments>>
Next, functions of the embodiments will be described.
<Functions of Communication Terminals>
Hereinafter, with the use of the communication terminal 3a for which the hardware configuration is illustrated in
As illustrated in
Further, the communication terminal 3 includes a storage part 3000 implemented by the ROM 302, the RAM 303, and the EEPROM 304 illustrated in
(Various Functions of Communication Terminals)
Next, with the use of
The transmitting and receiving part 31 of the communication terminal 3 is implemented mainly by instructions from the CPU 301 illustrated in
The receiving part 32 is implemented mainly by instructions from the CPU 301 illustrated in
The display control part 33 is implemented mainly by instructions from the CPU 301 illustrated in
The short-range communication part 38 is implemented mainly by instructions from the CPU 301 illustrated in
The storing and reading part 39 is implemented mainly by instructions from the CPU 301 illustrated in
<Functions of Service Providing Systems>
Next, with the use of
Further, a service providing system 5 includes a storage part 5000 implemented by the RAM 503 and the HD 504 illustrated in
Further, with the use of the storage part 5000, a session management DB 5001 and an authentication system management DB 5002 are implemented. The session management DB 5001 has a form of a session management table that will now be described. The authentication system management DB 5002 has a form of an authentication system management table that will now be described. Below, these tables will be described in detail.
(Session Management Table)
According to a first pattern illustrated in
Further, also
Note that the terminal ID may be a terminal ID of a second pattern illustrated in
(Authentication System Management Table)
(Various Functions of Service Providing Systems)
Next, with the use of
The transmitting and receiving part 51 of a service providing system 5 is implemented mainly by instructions from the CPU 501 illustrated in
The determination part 52 is implemented mainly by instructions from the CPU 501 illustrated in
The extracting part 5 is implemented mainly by instructions from the CPU 501 illustrated in
The storing and reading part 59 is implemented mainly by instructions from the CPU 501 illustrated in
<Functions of Authentication Systems>
Next, with the use of
Further, an authentication system 7 includes a storage part 7000 implemented by the RAM 503 and the HD 504 illustrated in
Further, the storage part 5000 includes an authentication management DB 7001. The authentication management DB 7001 has a form of an authentication management table that will be described now. Below, the table will be described in detail.
(Authentication Management Table)
Each of the authentication management tables associates the user IDs (the to-be-authenticated sections) out of the terminal IDs with passwords, and stores and manages these items of information.
(Various Functions of Authentication Systems)
Next, with the use of
The transmitting and receiving part 71 of an authentication system 7 is implemented mainly by instructions from the CPU 501 illustrated in
The authentication part 72 is implemented mainly by instructions from the CPU 501 illustrated in
The storing and reading part 79 is implemented mainly by instructions from the CPU 501 illustrated in
<<Process and Operation of Embodiments>>
Next, with the use of
As illustrated in
Next, the determination part 52 of the service providing system 5 determines whether, in the session management table (see
The transmitting and receiving part 51 of the service providing system 5 transmits to the communication terminal 3 data of an authentication agent selection screen page (step S23). As a result, the transmitting and receiving part 31 of the communication terminal 3 receives the data of an authentication agent selection screen page.
Next, the display control part 33 of the communication terminal 3 displays the authentication agent selection screen page s1 illustrated in
Next, the storing and reading part 59 of the service providing system 5 searches the authentication system management table (see
Next, the extracting part 57 extracts the user ID (to-be-authenticated section) out of the terminal ID received in step S26 (step S28). The transmitting and receiving part 51 then transmits to the authentication system 7 identified by the URL retrieved in step S27 an authentication request for the ID (step S29). The authentication request for the ID includes the user ID (the to-be-authenticated section) extracted in step S28, the password received in step S26, and the URL of the communication terminal 3 received in step S26. Thus, the transmitting and receiving part 71 of the authentication system 7 receives the authentication request for the user.
Next, the storing and reading part 79 of the authentication system 7 searches the authentication management table (see
Note that, in step S28, the extracting part 57 extracts from the terminal ID the to-be-authenticated section. However, an embodiment is not limited to this configuration. For example, it is also possible that the service providing system 5 does not include the extracting part 57, and, in step S29, the transmitting and receiving part 51 may transmit, in addition to the password and the URL, only the user ID (the to-be-authenticated section) out of the terminal ID.
Next, as illustrated in
Note that, if the user is not authorized, i.e., if the authentication result in step S30 is negative, the authentication system 7 for example performs an error output, for example, through the service providing system 5 to the communication terminal 3 that transmitted the display request in step S21.
The transmitting and receiving part 31 of the communication terminal 3 transmits to the service providing system 5 a request to establish a session (step S43). This request includes the terminal ID, and the encrypted token received in step S42. As a result, the transmitting and receiving part 51 of the service providing system 5 receives the request to establish a session.
Next, in order for the service providing system 5 to determine that the communication terminal 3 that has transmitted the request to establish a session has been determined as an authorized communication terminal in step S30, the transmitting and receiving part 51 transmits to the authentication system 7 an authentication request for the token (step S44). This request includes the encrypted token received in step S43. As a result, the transmitting and receiving part 71 of the authentication system 7 receives the authentication request for the token.
Next, the authentication part 72 of the authentication system 7 decrypts the encrypted token received in step S44 (step S45). Then, the authentication part 72 compares the token before being encrypted in step S41 with the token decrypted in step S45, to authenticate the token (step S46). Then, the transmitting and receiving part 71 of the authentication system 7 transmits to the service providing system 5 the authentication result of step S46 (step S47). As a result, the transmitting and receiving part 51 of the service providing system 5 receives the authentication result. Hereinafter, a description will be made assuming that, in step S46, the token is authorized.
Note that, if, in step S46, the token is not authorized, the authentication system 7 for example performs an error output, for example, through the service providing system 5 to the communication terminal 3 that transmitted the request to establish a session in step S43.
Next, the storing and reading part 59 of the service providing system 5 assigns a new session ID in the session management table (see
Next, the display control part 33 of the communication terminal 3 displays on the display 317 the service providing screen page s2 illustrated in
Note that, if, in the above-described step S22, in the session management table, the terminal ID received in step S21 has been already associated with a certain session ID and has been already managed, the subsequent steps S23-S48 will be omitted, and the process directly proceeds to step S49.
Next, with the use of
As illustrated in
Next, the storing and reading part 59 of the service providing system 5 searches the session management table (see
Next, the short-range communication part 38 of the communication terminal 3a transmits an instruction to start capturing an image of an object, a scene, or the like to the photographing apparatus 10 (step S65). The photographing apparatus 10 captures an image in response to the instruction to start capturing an image, and transmits the result of capturing an image to the communication terminal 3a where the short-range communication part 38 receives the result of capturing an image. Then, the transmitting and receiving part 31 of the communication terminal 3a transmits to the service providing system 5 a result of remote control (i.e., the result of capturing an image) (step S66). Thus, the transmitting and receiving part 51 of the service providing system 5 receives the result of remote control. Hereinafter, a case where the result of remote control indicates that the remote control has been successfully implemented will be described.
The transmitting and receiving part 51 of the service providing system 5 transmits the result of remote control to the communication terminal 3b that is the transmission source of the request in step S62 to start remote control (step S67). Thus, the transmitting and receiving part 31 of the communication terminal 3b receives the result of remote control.
Next, the display control part 33 of the communication terminal 3b displays an operation result display screen page s3 illustrated in
Note that, if the result of remote control transmitted in step S66 indicates a failure of remote control, the communication terminal 3a for example performs through the service providing system 5 an error output, for example, to the communication terminal 3a that transmitted the request to start remote control in step S62.
<<Main Advantageous Effects of Embodiments>>
According to the embodiments, as described above, a terminal ID includes a user ID (a to-be-authenticated section) and a not-to-be-authenticated section. As a result, once a user registers a set of a to-be-authenticated section and a password, the user need not perform a plurality of registrations even for using a plurality of communication terminals having different not-to-be-authenticated sections, respectively. Thus, troublesomeness to the user can be avoided.
Thus, the service providing systems, the service delivery systems, the service providing methods, and the non-transitory recording media have been described in the embodiments. However, the present invention is not limited to the embodiments, and various modifications and improvements can be made within the scope of the present invention.
[First Variant]
With the use of
In the above-described embodiments, a service providing system 5 extracts a to-be-authenticated section from a terminal ID in step S28. According to the first variant, a communication terminal 3′ extracts a to-be-authenticated section from a terminal ID in step S124.
As illustrated in
Next, with the use of
As illustrated in
Next, in the same way as step S27, the storing and reading part 59 of the service providing system 5′ searches the authentication system management table (see
Thus, the first variant provides the same advantageous effects as the advantageous effects of the above-described embodiments.
Note that, in step S124, the extracting part 37 extracts from the terminal ID the to-be-authenticated section. However, an embodiment is not limited to this configuration. For example, it is also possible that the communication terminal 3′ does not include the extracting part 37, and in step S127, the transmitting and receiving part 31 may transmit only the to-be-authenticated section out of the terminal ID in addition to the password, the selection, and the URL.
[Second Variant]
With the use of
According to the above-described embodiments, the service providing system 5 extracts in step S28 a to-be-authenticated section from a terminal ID. According to the second variant, an authentication system 7′ extracts in step S229 a to-be-authenticated section from a terminal ID.
As illustrated in
Next, with the use of
As illustrated in
Next, the storing and reading part 59 of the service providing system 5′ searches the authentication system management table (see
Next, the transmitting and receiving part 51 transmits to the authentication system 7 identified by the URL retrieved in step S227 an authentication request for the user (step S228). The authentication request for the user includes the terminal ID, the password, and the URL of the communication terminal 3 received in step S226. As a result, the transmitting and receiving part 71 of the authentication system 7′ receives the authentication request for the user.
Next, the extracting part 77 of the authentication system 7′ extracts the to-be-authenticated section from the terminal ID received in step S228 (step S229). Then, in the same way as step S30, the storing and reading part 79 of the authentication system 7′ searches the authentication management table (see
Thus, the second variant provides the same advantageous effects as the advantageous effects of the above-described embodiments.
[Third Variant]
According to the above-described embodiments, in step S25, the user inputs the terminal ID and the password. However, an embodiment is not limited to this configuration. For example, in such a case where a communication terminal is an electric component and has no screen page displayed for the user to input information, the terminal ID and the password previously stored in the communication terminal are transmitted in step S26 to the service providing system. As a specific method to thus previously store in a communication terminal a terminal ID and a password, a method of transmitting the terminal ID and the password from another PC to the communication terminal through a communication network; a method of inserting a recording medium (such as a SIM card) where the terminal ID and the password are stored into the communication terminal and the terminal ID and the password are sent to the communication terminal; and so forth can be cited.
Number | Date | Country | Kind |
---|---|---|---|
JP2016-050019 | Mar 2016 | JP | national |
The present patent application is a continuation of international application No. PCT/JP2017/009995, filed Mar. 13, 2017, which is based on and claims priority to Japanese application No. 2016-050019, filed Mar. 14, 2016. The contents of these applications are incorporated herein by reference in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
6640301 | Ng | Oct 2003 | B1 |
7120928 | Sheth et al. | Oct 2006 | B2 |
7437457 | Eisendrath et al. | Oct 2008 | B1 |
7908647 | Polis et al. | Mar 2011 | B1 |
7979912 | Roka | Jul 2011 | B1 |
8023927 | Coleman et al. | Sep 2011 | B1 |
8281372 | Vidal | Oct 2012 | B1 |
8347093 | Ahmed | Jan 2013 | B1 |
8959234 | Lee et al. | Feb 2015 | B2 |
8959650 | Richards | Feb 2015 | B1 |
9210375 | Asai | Dec 2015 | B2 |
9270942 | Asai | Feb 2016 | B2 |
9350947 | Asai | May 2016 | B2 |
9391996 | Chin et al. | Jul 2016 | B1 |
9432623 | Nagase et al. | Aug 2016 | B2 |
9906570 | Hinohara et al. | Feb 2018 | B2 |
20030216143 | Roese | Nov 2003 | A1 |
20040054735 | Daniell et al. | Mar 2004 | A1 |
20040088424 | Park | May 2004 | A1 |
20040148500 | Olkin et al. | Jul 2004 | A1 |
20040187018 | Owen | Sep 2004 | A1 |
20040243832 | Wilf et al. | Dec 2004 | A1 |
20050055547 | Kawamura | Mar 2005 | A1 |
20050108520 | Yamamoto | May 2005 | A1 |
20050144279 | Wexelblat | Jun 2005 | A1 |
20060015609 | Hagale et al. | Jan 2006 | A1 |
20060109839 | Hino et al. | May 2006 | A1 |
20060206616 | Brown | Sep 2006 | A1 |
20080235768 | Walter | Sep 2008 | A1 |
20090070858 | Hiraide et al. | Mar 2009 | A1 |
20090187979 | Sever | Jul 2009 | A1 |
20100121954 | Yang et al. | May 2010 | A1 |
20100250929 | Schultz et al. | Sep 2010 | A1 |
20110004919 | Chawla et al. | Jan 2011 | A1 |
20110016322 | Dean et al. | Jan 2011 | A1 |
20110145907 | Chua | Jun 2011 | A1 |
20120036364 | Yoneda | Feb 2012 | A1 |
20120174196 | Bhogavilli | Jul 2012 | A1 |
20130031359 | Laidlaw et al. | Jan 2013 | A1 |
20130055368 | Bauckman et al. | Feb 2013 | A1 |
20130061298 | Longobardi | Mar 2013 | A1 |
20130139234 | Inbaraj et al. | May 2013 | A1 |
20130185230 | Zhu et al. | Jul 2013 | A1 |
20140007209 | Zucker | Jan 2014 | A1 |
20140077937 | Kato et al. | Mar 2014 | A1 |
20140172708 | Chrapko et al. | Jun 2014 | A1 |
20140189058 | Asai | Jul 2014 | A1 |
20140282963 | Wildermuth et al. | Sep 2014 | A1 |
20140282979 | Andon | Sep 2014 | A1 |
20150040188 | Takeuchi | Feb 2015 | A1 |
20150074615 | Han et al. | Mar 2015 | A1 |
20150106732 | Kandori et al. | Apr 2015 | A1 |
20150128240 | Richards et al. | May 2015 | A1 |
20150173501 | Scott | Jun 2015 | A1 |
20150282233 | Homma et al. | Oct 2015 | A1 |
20150319100 | Asai | Nov 2015 | A1 |
20150341298 | Blinn et al. | Nov 2015 | A1 |
20150379302 | Smith | Dec 2015 | A1 |
20160071407 | Toebes et al. | Mar 2016 | A1 |
20160092947 | Nagase et al. | Mar 2016 | A1 |
20160099947 | Asai et al. | Apr 2016 | A1 |
20160267260 | Jiang et al. | Sep 2016 | A1 |
20160269390 | Endo et al. | Sep 2016 | A1 |
20160277930 | Li et al. | Sep 2016 | A1 |
Number | Date | Country |
---|---|---|
103973874 | Aug 2014 | CN |
104765990 | Jul 2015 | CN |
2765753 | Aug 2014 | EP |
2849436 | Mar 2015 | EP |
3068154 | Sep 2016 | EP |
2007-110377 | Apr 2007 | JP |
2009-070020 | Apr 2009 | JP |
2010-068294 | Mar 2010 | JP |
2011-133951 | Jul 2011 | JP |
2013-235434 | Nov 2013 | JP |
2014-057221 | Mar 2014 | JP |
2014-060552 | Apr 2014 | JP |
2014-134978 | Jul 2014 | JP |
2014-155128 | Aug 2014 | JP |
2015-018318 | Jan 2015 | JP |
2015-049609 | Mar 2015 | JP |
2015-201827 | Nov 2015 | JP |
Entry |
---|
U.S. Office Action for corresponding U.S. Appl. No. 16/142,403 dated Nov. 22, 2019. |
Japanese Office Action for Japanese Application No. 2018-505916 dated Dec. 3, 2019. |
Anonymous: “Personal area network”, Wikipedia, Feb. 27, 2016, XP055550441, https://en.wikipedia.org/w/index.php?title=Personal_area_network&oldid=707172489 [retrieved on Feb. 2, 2019], pp. 2, line 20-p. 2, line 27. |
Extended Search Report for corresponding European Application No. 17774774.8 dated Feb. 13, 2019. |
Extended Search Report for corresponding European Application No. 17774772.2 dated Feb. 14, 2019. |
Extended European Search Report dated Feb. 27, 2019 issued in corresponding European Application No. 17774792.0. |
International Search Report dated Jun. 6, 2017 in PCT/JP2017/009995 filed on Mar. 13, 2017 (with English translation). |
International Search Report dated Jun. 6, 2017 in PCT/JP2017/012042 filed on Mar. 24, 2017 (with English translation). |
International Search Report dated Jun. 6, 2017 in PCT/JP2017/012040 filed on Mar. 24, 2017 (with English translation). |
International Search Report dated Jun. 27, 2017 in PCT/JP2017/012103 filed on Mar. 24, 2017 (with English translation). |
Butkus, P.,“Identity Management in M2M Networks,” https://pdfs.semanticscholar.org/8a37/108bd92287650722ad8953f87c77d04f33.pdf, Jun. 26, 2014. |
Anonymous, “Social login—Wikipedia,” https://en.wikipedia.org/w/index.php?title=Social_login&oldid=697290822, Dec. 29, 2015. |
Anonymous, “Session Management Cheat Sheet—OWASP,” https://web/archive.org/web/20160119164955/https://ww.w.owasp.org/index.php/Session_Management_Cheat_Sheet, Jan. 8, 2016. |
Extended European Search Report dated Dec. 19, 2018 issued in corresponding European Patent Application 17766619. |
Final Office Action dated Apr. 27, 2020 for corresponding U.S. Appl. No. 16/142,403. |
U.S. Office Action for corresponding U.S. Application No. 16/136,337 dated Jul. 21, 2020. |
U.S. Office Action for corresponding U.S. Appl. No. 16/142,403 dated Jul. 28, 2020. |
U.S. Office Action for corresponding U.S. dated No. 16/138,144 dated Jul. 30, 2020. |
Final Office Action for corresponding U.S. Appl. No. 16/142,403 dated Dec. 15, 2020. |
U.S. Office Action for corresponding U.S. Appl. No. 16/136,337 dated Feb. 1, 2021. |
European Patent Office Communication pursuant to Article 94(3) EPC dated Nov. 18, 2020 for European Patent Application No. 17 774 772.2. |
Analysis of Netflix's security framework for ‘Watch Instantly’ service, Pomelo, LLC Tech Memo, Mar.-Apr. 2009. |
U.S. Final Office Action for corresponding U.S. Appl. No. 16/138,144 dated Feb. 5, 2021. |
Number | Date | Country | |
---|---|---|---|
20190020644 A1 | Jan 2019 | US |
Number | Date | Country | |
---|---|---|---|
Parent | PCT/JP2017/009995 | Mar 2017 | US |
Child | 16125930 | US |