The present invention relates to a user verification device and a user verification method.
In recent years, communication devices that switch between a plurality of networks to perform communication have been known. For example, a wireless terminal device described in Patent Literature 1 switches to communication on PHS in the case where the signal strength during communication in a wireless LAN has fallen below a threshold value.
[Patent Literature 1] Japanese Patent Application Laid-Open Publication No. 2004-242058
Generally, in cases where a communication device switches between a plurality of networks to perform communication, user verification of a user of the communication device is performed when the communication is performed in each network. Herein, user information or a verification method utilized for the user verification differs for each network environment. Thus, unless the user information or the verification method utilized for the user verification is changed in accordance with the network environment, appropriate user verification cannot be performed due to lack of information for the user verification or information for the user verification being utilized more than is necessary.
Therefore, in order to solve the problem described above, it is an object of the present invention to provide a user verification device and a user verification method that perform appropriate user verification in accordance with a network environment.
In order to solve the problem described above, a user verification device of the present invention is a user verification device that processes user verification of a communication device switching between at least two types of networks to perform communication, including storage means for storing a verification method and user information utilized for user verification, receiving means for receiving a request for user verification, network type determining means for determining a network type that the communication device uses for communication when the request for user verification is received by the receiving means, location information acquiring means for acquiring location information of the communication device when the request for user verification is received by the receiving means, verification method extracting means for extracting the verification method stored in the storage means based on the network type determined by the network type determining means, user information extracting means for extracting the user information stored in the storage means based on the network type determined by the network type determining means and the location information acquired by the location information acquiring means, and processing means for processing user verification based on the verification method extracted by the verification method extracting means and the user information extracted by the user information extracting means.
A user verification method of the present invention includes a storing step in which a user verification device that processes user verification of a communication device switching between at least two types of networks to perform communication stores a verification method and user information utilized for user verification, a receiving step in which the user verification device receives a request for user verification, a network type determining step in which the user verification device determines a network type that the communication device uses for communication when the request for user verification is received in the receiving step, a location information acquiring step in which the user verification device acquires location information of the communication device when the request for user verification is received in the receiving step, a verification method extracting step in which the user verification device extracts the verification method stored in the storing step based on the network type determined in the network type determining step, a user information extracting step in which the user verification device extracts the user information stored in the storing step based on the network type determined in the network type determining step and the location information acquired in the location information acquiring step, and a processing step in which the user verification device processes user verification based on the verification method extracted in the verification method extracting step and the user information extracted in the user information extracting step.
According to this invention, the user verification device that processes user verification of the communication device switching between at least two types of networks to perform communication stores the verification method and the user information utilized for user verification. Upon receiving the request for user verification, the user verification device determines the network type that the communication device uses for communication and acquires the location information of the communication device. The user verification device extracts the stored verification method based on the determined network type and extracts the stored user information based on the determined network type and the acquired location information. The user verification device processes user verification, based on the extracted verification method and user information. Accordingly, the user verification device of the present invention can process user verification of the communication device using the verification method and the user information that are based on the network type that the user verification device uses for communication, the location information of the communication device, and the like. That is, the user verification device of the present invention can perform appropriate user verification in accordance with the network environment.
In the user verification device of the present invention, it is preferable that the user information extracting means change the type or the number of pieces of the user information to be extracted, based on the network type determined by the network type determining means and the location information acquired by the location information acquiring means.
According to this invention, the type or the number of pieces of the user information to be extracted is changed, based on the determined network type and the acquired location information. Accordingly, the user verification device of the present invention can perform appropriate user verification in accordance with the network environment.
In the user verification device of the present invention, it is preferable that the user verification device be a mobile phone and the user information stored in the storage means include any one of a subscriber identifier, a production number of the mobile phone, verification information provided by a mobile phone carrier, and verification information that a user sets for network connection.
According to this invention, the user verification device is a mobile phone, and the stored user information includes any one of the subscriber identifier, the production number of the mobile phone, the verification information provided by a mobile phone carrier, and the verification information that a user sets for network connection. Accordingly, the user verification device of the present invention can perform appropriate user verification using the information described above concerning verification of the mobile phone in accordance with the network environment.
In the user verification device of the present invention, it is preferable that the verification method extracting means change a communication protocol utilized for user verification, based on the network type determined by the network type determining means.
According to the present invention, the communication protocol utilized for user verification is changed, based on the determined network type. Accordingly, the user verification device of the present invention can perform appropriate user verification in accordance with the network environment.
With the present invention, appropriate user verification in accordance with the network environment can be performed.
[
[
[
[
[
[
An embodiment of the present invention will be described below with reference to the accompanying drawings. In cases where possible, the same portions are denoted by the same reference signs, and redundant descriptions are omitted.
The user verification device 1 is configured of hardware such as a CPU.
Each function block of the user verification device 1 will be described below based on the function block shown in
The reception module 11 receives a request for user verification from the network side. For example, when the user verification device 1 is to perform communication with the public communication network 4 via the 3G base station 2, the user verification device 1 receives the request for user verification for communication connection from the 3G base station 2.
The network type determination module 12 determines a network type that the user verification device 1 uses for communication, when the request for user verification is received by the reception module 11. For example, when the user verification device 1 is to perform communication with the public communication network 4 via the 3G base station 2 and the request for user verification for communication connection from the 3G base station 2 is received by the reception module 11, the network type determination module 12 determines the network type that the user verification device 1 uses for communication to be the 3G network. Also, for example, when the user verification device 1 is to perform communication with the public communication network 4 via the wireless LAN access point 3 and the request for user verification for communication connection from the wireless LAN access point 3 is received by the reception module 11, the network type determination module 12 determines the network type that the user verification device 1 uses for communication to be the wireless LAN. Note that other examples of the network type include Bluetooth and infrared communication.
In the case where the network type that the user verification device 1 uses for communication is designated in the request for user verification received by the reception module 11, the network type determination module 12 may determine the network type that the user verification device 1 uses for communication to be the designated network type. For example, it is assumed that, when the user verification device 1 is performing communication with the public communication network 4 via the wireless LAN access point 3, the reception module 11 receives the request for user verification for communication connection from the wireless LAN access point 3, and the 3G network has been designated in the request as the network type that the user verification device 1 uses for communication. In that case, the network type determination module 12 determines the network type that the user verification device 1 uses for communication to be the 3G network. Note that, in order to perform user verification in the case where verification is performed with a network other than a network that the user verification device 1 is currently communicating through in this manner, the verification is performed after the network that is currently being communicated through is switched to the requested network in a communication device included in the user verification device 1.
The location information acquisition module 13 acquires location information of the user verification device 1, when the request for user verification is received by the reception module 11. For example, the location information acquisition module 13 acquires the location information (latitude and longitude on the ground) of the user verification device 1 utilizing a GPS function of the user verification device 1.
The verification method extraction module 14 extracts the verification method utilized for user verification that is stored in the storage module 17, based on the network type determined by the network type determination module 12. Examples of the verification method include combining user information utilized for user verification and communication protocol.
The verification method extraction module 14 may change the communication protocol utilized for user verification, based on the network type determined by the network type determination module 12. For example, in the case where the network type determined by the network type determination module 12 is a network that is maintaining a certain degree of security, the verification method extraction module 14 extracts HTTP as the communication protocol utilized for user verification. On the other hand, in the case where the network type determined by the network type determination module 12 is a network that is not maintaining a certain degree of security, the verification method extraction module 14 extracts HTTPS of which the degree of security is higher than that of HTTP as the communication protocol utilized for user verification.
The user information extraction module 15 extracts the user information utilized for user verification that is stored in the storage module 17, based on the network type determined by the network type determination module 12 and the location information acquired by the location information acquisition module 13. Examples of the user information include a subscriber identifier (International Mobile Subscriber Identity or IMSI), a production number of a mobile phone (International Mobile Equipment Identifier or IMEI), verification information (user ID) provided by a mobile phone carrier, and verification information (personal identification number or PIN) that a user sets for network connection. Note that the user ID and PIN are similar as being the verification information that a user utilizes, but the user ID is verification information that a mobile phone carrier assigns, whereas the PIN is verification information that a user sets on one's own.
The user information extraction module 15 may change the type or the number of pieces of the user information to be extracted, based on the network type determined by the network type determination module 12 and the location information acquired by the location information acquisition module 13. For example, in the case where the network type determined by the network type determination module 12 is a wireless LAN open to general users and the location information acquired by the location information acquisition module 13 indicates premises in which wireless LAN communication is permitted by a provider providing the wireless LAN, the user information extraction module 15 extracts user information designated by the provider providing the wireless LAN.
The processing module 16 processes user verification, based on the verification method extracted by the verification method extraction module 14 and the user information extracted by the user information extraction module 15. Processing of the user verification refers to, for example, the processing module 16 transmitting the user information according to the verification method to the 3G base station 2 that is a verification server and receiving a user verification result from the 3G base station 2.
The storage module 17 stores the verification method and the user information utilized for user verification. The user information stored in the storage module 17 may include any one of the subscriber identifier, the production number of a mobile phone, the verification information provided by a mobile phone carrier, and the verification information that a user sets for network connection.
For example, in the case where the network type is determined to be a 3G network by the network type determination module 12, the user information extraction module 15 extracts the user information utilized for user verification out of “IMSI,” “IMEI,” “user ID,” and “PIN” that are the user information shown in the first row in
For example, in the case where the network type is determined to be a wireless LAN by the network type determination module 12, the user information extraction module 15 extracts the user information utilized for user verification out of “IMEI,” “user ID,” and “PIN” that are the user information shown in the first row in
Next, a process of the user verification device 1 configured in this manner will be described.
Next, the verification method extraction module 14 extracts the verification method stored in the storage module 17 in step S1, based on the network type determined in step S3 (S5: verification method extracting step). Next, the user information extraction module 15 extracts the user information stored in the storage module 17 in step S1, based on the network type determined in step S3 and the location information acquired in step S4 (S6: user information extracting step). Next, the processing module 16 processes user verification, based on the verification method extracted in step S5 and the user information extracted in step S6 (S7: processing step).
The order in the flowchart described above is not limiting. For example, the order of step S3 and step S4 may be reversed. Also, the order of step S5 and step S6 may be reversed. Also, step S5 may be executed immediately after step S3.
Next, an effect of the user verification device 1 configured in this manner will be described. The user verification device 1 of this embodiment processes the user verification of the user verification device 1 that switches between at least two types of networks to perform communication, and stores the verification method and the user information utilized for user verification. Upon receiving the request for user verification, the user verification device 1 determines the network type that the user verification device 1 uses for communication and acquires the location information of the user verification device 1. The user verification device 1 extracts the stored verification method based on the determined network type and extracts the stored user information based on the determined network type and the acquired location information. The user verification device 1 processes user verification, based on the extracted verification method and user information. Accordingly, the user verification device 1 can process user verification of the user verification device 1 using the verification method and the user information that are based on the network type that the user verification device 1 uses for communication, the location information of the user verification device 1, and the like. That is, the user authentication device 1 can perform appropriate user verification in accordance with the network environment.
The user authentication device 1 changes the type or the number of pieces of the user information to be extracted, based on the determined network type and the acquired location information. Accordingly, the user verification device 1 can perform appropriate user verification in accordance with the network environment.
The user information stored in the user verification device 1 includes any one of the subscriber identifier, the production number of a mobile phone, the verification information provided by a mobile phone carrier, and the verification information that a user sets for network connection. Accordingly, the user verification device 1 can perform appropriate user verification using the information described above concerning the verification of the user verification device 1 in accordance with the network environment.
The user verification device 1 changes the communication protocol utilized for user verification, based on the determined network type. Accordingly, the user verification device 1 can perform appropriate user verification in accordance with the network environment.
By changing the verification method or the user information based on the network type or the location information, the user verification device 1 can not only perform appropriate user verification in accordance with the network environment but also increase the security in user verification. For example, it is assumed that a malicious third party has stolen a PIN that is one piece of the user information in
Although the user verification device 1 has been described to have a function of a mobile phone as a communication device that switches between at least two types of networks to perform communication in the embodiment described above, this is not limiting. For example, it may be such that the user verification device 1 and a mobile phone as a communication device that switches between at least two networks to perform communication are each independent devices, and the user verification device 1 processes user verification of the mobile phone through input and output of various instructions via communication between the user verification device 1 and the mobile phone.
Although the user verification device 1 has been described to process user verification utilizing one particular network type in the embodiment described above, this is not limiting. For example, it may be such that, in a first stage of verification, an IMEI is transmitted to the verification server from the user verification device 1, the verification server transmits (through a 3G network) an SMS message including a pass code in an IMSI corresponding to the IMEI to the user verification device 1, the user verification device 1 sends the pass code via a wireless LAN to the verification server, and the verification server matches the IMEI received earlier and the pass code for verification to perform verification.
Although the user verification device 1 has been described to process user verification utilizing one particular network type in the embodiment described above, this is not limiting. For example, in the case where the user verification device 1 can communicate simultaneously with a plurality of networks, it may be such that the user verification device 1 processes user verification with the networks so that the user verification device 1 can communicate with the networks simultaneously.
1 . . . User verification device, 11 . . . Reception module, 12 . . . Network type determination module, 13 . . . Location information acquisition module, 14 . . . Verification method extraction module, 15 . . . User information extraction module, 16 . . . Processing module, 17 . . . Storage module.
Number | Date | Country | Kind |
---|---|---|---|
2010-249771 | Nov 2010 | JP | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/JP11/71527 | 9/21/2011 | WO | 00 | 4/2/2013 |