[go: up one dir, main page]

TW201701181A - Cloud service authentication method verifying the electronic apparatus is successfully authenticated or not on the basis of the authority authentication result - Google Patents

Cloud service authentication method verifying the electronic apparatus is successfully authenticated or not on the basis of the authority authentication result Download PDF

Info

Publication number
TW201701181A
TW201701181A TW104120579A TW104120579A TW201701181A TW 201701181 A TW201701181 A TW 201701181A TW 104120579 A TW104120579 A TW 104120579A TW 104120579 A TW104120579 A TW 104120579A TW 201701181 A TW201701181 A TW 201701181A
Authority
TW
Taiwan
Prior art keywords
data
authentication
service
server
account
Prior art date
Application number
TW104120579A
Other languages
Chinese (zh)
Other versions
TWI562005B (en
Inventor
Zong-Bao Chen
Yi-Tang You
Han-Yu Zhang
Guan-Xun Chen
Original Assignee
Hong Yue Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hong Yue Information Co Ltd filed Critical Hong Yue Information Co Ltd
Priority to TW104120579A priority Critical patent/TW201701181A/en
Application granted granted Critical
Publication of TWI562005B publication Critical patent/TWI562005B/zh
Publication of TW201701181A publication Critical patent/TW201701181A/en

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Disclosed is a cloud service authentication and access method, including the following steps: (A) upon receiving authentication data which comes from an electronic apparatus and includes apparatus data, an Internet address corresponding to a first authenticating end and account data, a server transmitting the account data to the first authentication end; (B) upon receiving reference account data from the first authenticating end, the server generating an account authentication result on the basis of the account data and the reference account data and transmitting the account authentication result and the apparatus data to the second authenticating end; and (C) upon receiving an authority authentication result from the second authenticating end, the server verifying if the electronic apparatus is successfully authenticated or not on the basis of the authority authentication result.

Description

雲端服務的認證及存取方法 Cloud service authentication and access method

本發明是有關於一種雲端服務的提供方法,特別是指一種雲端服務的認證及存取方法。 The present invention relates to a method for providing a cloud service, and more particularly to a method for authenticating and accessing a cloud service.

企業資源計劃(Enterprise Resource Planning,簡稱ERP)系統,是指建立在資訊技術基礎上,以系統化的管理思想,為企業決策層及員工提供決策運行手段的管理平臺。企業資源計劃也是實施企業流程再造的重要工具之一,世界500強企業中有80%的企業都在用ERP軟體作為其決策的工具和管理日常工作流程。 Enterprise Resource Planning (ERP) system refers to a management platform based on information technology, with systematic management ideas, and providing decision-making operational means for enterprise decision-making layers and employees. Enterprise resource planning is also an important tool for implementing enterprise process reengineering. 80% of the world's top 500 companies use ERP software as their decision-making tool and manage their daily workflow.

然而,對於中小企業而言,建立一套ERP系統來管理其日常的工作流程,所需支付的成本非常地高。截至2011年底台灣中小企業約有128萬家,從業人員約有1080萬人,因受限於經營成本,普遍缺乏資訊技術研發能量。 However, for SMEs, the cost of establishing an ERP system to manage their day-to-day workflow is very high. As of the end of 2011, there were about 1.28 million SMEs in Taiwan, and there were about 10.8 million employees. Due to the limited operating costs, there is a general lack of information technology research and development energy.

因此,如何延伸現有ERP服務範圍到雲端架構上,以協助中小或微型企業不限時地,更靈活地使用電子資源,以讓傳統ERP服務進入行動、雲端化時代遂成為一重要課題。然而,目前中小或微型企業對於儲存在雲端上的企業資料安全性仍感到憂慮,故如何於網際網路上創造 出安全、快速與可靠的資料流通環境亦受到中小或微型企業的重視。 Therefore, how to extend the scope of existing ERP services to the cloud architecture to help small and medium-sized enterprises or small enterprises to use electronic resources in an unlimited manner and to make traditional ERP services enter the mobile and cloud era becomes an important issue. However, at present, small and medium-sized enterprises or micro-enterprises are still worried about the security of enterprise data stored in the cloud, so how to create on the Internet A safe, fast and reliable data circulation environment is also valued by small and medium-sized enterprises.

因此,本發明之目的,即在提供一種透過網路認證以提升資料安全性之雲端服務的認證及存取方法。 Accordingly, it is an object of the present invention to provide an authentication and access method for a cloud service that enhances data security through network authentication.

於是本發明雲端服務的認證及存取方法,藉由一服務端來實施,該服務端經由一網路與至少一電子裝置、一第一認證端及一第二認證端連接,該雲端服務的認證及存取方法包含以下步驟:(A)藉由該服務端,在接收來自於該電子裝置,且包括相關與該電子裝置的裝置資料、一對應於該第一認證端的網際網路位址,及帳戶資料的認證資料時,將該帳戶資料傳送至該第一認證端;(B)藉由該服務端,在接收來自於該第一認證端參考帳戶資料時,根據該帳戶資料及該參考帳戶資料產生一帳戶認證結果,並將該帳戶認證結果及該裝置資料傳送至該第二認證端;及(C)藉由該服務端,在接收一來自於該第二認證端,且由該第二認證端根據該帳戶認證結果、該裝置資料,及預存於該第一認證端的參考裝置資料與對應於該參考裝置資料的使用權限資料之查找表而產生的一權限認證結果時,根據該權限認證結果,判定該電子裝置是否認證成功。 Therefore, the authentication and access method of the cloud service of the present invention is implemented by a server, and the server is connected to at least one electronic device, a first authentication terminal and a second authentication terminal via a network, and the cloud service is The authentication and access method includes the following steps: (A) receiving, by the server, an information from the electronic device and including device information related to the electronic device, and an internet address corresponding to the first authentication end And the account information is transmitted to the first authentication end; (B) by the server, when receiving the reference account information from the first authentication end, according to the account information and the Referring to the account information, generating an account authentication result, and transmitting the account authentication result and the device data to the second authentication end; and (C) receiving, by the server, a second authentication end, and receiving The second authentication end is generated according to the account authentication result, the device data, and a lookup table of the reference device data pre-stored in the first authentication end and the usage authority data corresponding to the reference device data. When the permission authentication result, according to the permission authentication result, the electronic device determines whether the authentication is successful.

本發明之功效在於,藉由該服務端分別傳送該 帳戶資料及該裝置資料至該第一認證端及該第二認證端,以進行該帳戶資料及該裝置資料之認證,進而確認利用該服務端來存取雲端服務之電子裝置的有效性。 The effect of the present invention is that the server transmits the same The account information and the device information are sent to the first authentication terminal and the second authentication terminal to perform authentication of the account data and the device data, thereby confirming the validity of the electronic device that accesses the cloud service by using the server.

1‧‧‧雲端服務系統 1‧‧‧Cloud Service System

11‧‧‧電子裝置 11‧‧‧Electronic devices

12‧‧‧第一認證端 12‧‧‧First authentication end

13‧‧‧第二認證端 13‧‧‧Second authentication end

14‧‧‧服務端 14‧‧‧ server

15‧‧‧記錄端 15‧‧‧ Recording end

16‧‧‧管理端 16‧‧‧Management

100‧‧‧網路 100‧‧‧Network

201~208‧‧‧步驟 201~208‧‧‧Steps

301~311‧‧‧步驟 301~311‧‧‧Steps

401~423‧‧‧步驟 401~423‧‧‧Steps

本發明之其他的特徵及功效,將於參照圖式的實施方式中清楚地呈現,其中:圖1是一方塊圖,說明實施本發明雲端服務的認證及存取方法的雲端服務系統;圖2是一流程圖,說明本發明雲端服務的認證及存取方法之實施例的一註冊程序;圖3是一流程圖,說明本發明雲端服務的認證及存取方法之實施例的一管理程序;圖4是一流程圖,說明本發明雲端服務的認證及存取方法之實施例的一服務資料存取程序中之判定連結數量是否大等於一預設數量的細部流程;圖5是一流程圖,說明本發明雲端服務的認證及存取方法之實施例的一服務資料存取程序中之產生一權限認證結果的細部流程;圖6是一流程圖,說明本發明雲端服務的認證及存取方法之實施例的一服務資料存取程序中之判定一電子裝置是否認證成功的細部流程;及圖7是一示意圖,說明一服務連結網頁。 Other features and effects of the present invention will be apparent from the embodiments of the present invention. FIG. 1 is a block diagram illustrating a cloud service system for implementing the authentication and access method of the cloud service of the present invention; Is a flowchart illustrating a registration procedure of an embodiment of the authentication and access method of the cloud service of the present invention; and FIG. 3 is a flowchart illustrating a management procedure of an embodiment of the authentication and access method of the cloud service of the present invention; 4 is a flow chart showing whether the number of determination links in a service data access procedure of an embodiment of the authentication and access method of the cloud service of the present invention is greater than a predetermined number of detailed processes; FIG. 5 is a flowchart A detailed flow of generating a privilege authentication result in a service data access procedure of an embodiment of the authentication and access method of the cloud service of the present invention; FIG. 6 is a flowchart illustrating the authentication and access of the cloud service of the present invention; a detailed process of determining whether an electronic device is successfully authenticated in a service data access program of an embodiment of the method; and FIG. 7 is a schematic diagram illustrating a service link page .

參閱圖1,本發明雲端服務的認證及存取方法之實施例,係藉由一雲端服務系統1來實施。該雲端服務系統1包括與一網路100連接的多個電子裝置11、一儲存有服務資料的第一認證端12、一第二認證端13、一服務端14、一記錄端15及一管理端16。 Referring to FIG. 1, an embodiment of a method for authenticating and accessing a cloud service of the present invention is implemented by a cloud service system 1. The cloud service system 1 includes a plurality of electronic devices 11 connected to a network 100, a first authentication terminal 12 storing service data, a second authentication terminal 13, a server 14, a recording terminal 15, and a management device. End 16.

在本實施例中,該等電子裝置11之實施態樣例如為一平板電腦、一筆記型電腦、一智慧型手機等之可攜式電子裝置11。此外,每一電子裝置11係配合執行一包含多個指令之應用程式以實施本發明之雲端服務的認證及存取方法。 In this embodiment, the implementation of the electronic device 11 is, for example, a portable electronic device 11 such as a tablet computer, a notebook computer, or a smart phone. In addition, each electronic device 11 cooperates with an application that includes a plurality of instructions to implement the authentication and access method of the cloud service of the present invention.

值得一提的是,該服務端14的一服務提供者與第一認證端12的一資料提供者間存在一合作關係。 It is worth mentioning that there is a cooperative relationship between a service provider of the server 14 and a data provider of the first authentication terminal 12.

以下將配合圖2~6流程圖來說明,本發明雲端服務的認證及存取方法之實施例及該雲端服務系統1中各元件的運作細節,並將步驟歸納成一註冊程序、一管理程序及一服務資料存取程序。 The embodiments of the authentication and access method of the cloud service of the present invention and the operation details of each component in the cloud service system 1 are described below, and the steps are summarized into a registration procedure, a management procedure, and A service data access program.

參閱圖1與圖2,在多個使用者欲分別利用該等電子裝置11存取該服務端14所提供之雲端服務前,需先針對每一電子裝置11本身的裝置資料進行註冊,值得一提的是,每一電子裝置11所進行之註冊程序皆相同,故以下僅就一台電子裝置11作說明,該註冊程序包含下列步驟。 Referring to FIG. 1 and FIG. 2, before a plurality of users want to use the electronic device 11 to access the cloud service provided by the server 14 respectively, it is necessary to register the device information of each electronic device 11 first, which is worth one. It is mentioned that the registration procedure performed by each electronic device 11 is the same, so only one electronic device 11 will be described below, and the registration procedure includes the following steps.

在步驟201中,該電子裝置11回應於該應用程式的執行,產生包括相關與該電子裝置11的該裝置資料、對應於該第一認證端12的一網際網路(Internet Protocol ,簡稱IP)位址,及對應於該第一認證端12的帳戶資料的註冊資料,並將該註冊資料經由該網路100傳送至該服務端14。在本實施例中,該裝置資料包含該電子裝置11之機碼、該電子裝置11所執行之該應用程式所產生的一代碼。 In step 201, the electronic device 11 generates an Internet (Internet Protocol) corresponding to the first authentication terminal 12, including the device data associated with the electronic device 11 in response to execution of the application. , referred to as the IP address, and the registration data corresponding to the account information of the first authentication terminal 12, and the registration data is transmitted to the server 14 via the network 100. In this embodiment, the device data includes a machine code of the electronic device 11 and a code generated by the application executed by the electronic device 11.

在步驟202中,該服務端14在接收來自於該電子裝置11的註冊資料時,將該帳戶資料傳送至該第一認證端12。 In step 202, the server 14 transmits the account data to the first authentication terminal 12 when receiving the registration data from the electronic device 11.

在步驟203中,該第一認證端12在接收到該帳戶資料時,將預存於該第一認證端12的參考帳戶資料經由該網路100傳送至該服務端14。 In step 203, the first authentication terminal 12 transmits the reference account data pre-stored in the first authentication terminal 12 to the server 14 via the network 100 when receiving the account information.

在步驟204中,該服務端14在接收到該參考帳戶資料時,根據該帳戶資料及該參考帳戶資料產生一帳戶判定結果,並將該帳戶判定結果及該裝置資料經由該網路100傳送至該第二認證端13。其中,該服務端14係藉由比對該帳戶資料是否匹配於該參考帳戶資料,以產生該帳戶判定結果。 In step 204, when receiving the reference account data, the server 14 generates an account determination result according to the account information and the reference account data, and transmits the account determination result and the device data to the device 100 via the network 100. The second authentication terminal 13. The server 14 generates the account determination result by comparing whether the account data matches the reference account data.

在步驟205中,該第二認證端13根據該帳戶判定結果判定是否儲存該裝置資料於一查找表中。當判定結果為是時,亦即該帳戶判定結果指示出該帳戶資料認證成功,進行步驟206,當判定結果為否時,亦即該帳戶判定結果指示出該帳戶資料認證失敗,進行步驟207。 In step 205, the second authenticating end 13 determines whether to store the device data in a lookup table based on the account determination result. When the determination result is YES, that is, the account determination result indicates that the account data authentication is successful, step 206 is performed. When the determination result is no, that is, the account determination result indicates that the account data authentication has failed, step 207 is performed.

在步驟206中,該第二認證端13儲存該裝置資料於該查找表中,且將儲存於該查找表中之該裝置資料視為該參考裝置資料,並經由該網路100傳送一指示出註冊 成功的註冊訊息至該服務端14。 In step 206, the second authentication end 13 stores the device data in the lookup table, and regards the device data stored in the lookup table as the reference device data, and transmits an indication via the network 100. registered A successful registration message to the server 14.

在步驟207中,該第二認證端13經由該網路100傳送一指示出註冊失敗的註冊訊息至該服務端14。 In step 207, the second authentication terminal 13 transmits a registration message indicating registration failure to the server 14 via the network 100.

在步驟208中,該服務端14在接收到該註冊訊息時,經由該網路100傳送該註冊訊息至該電子裝置11。 In step 208, the server 14 transmits the registration message to the electronic device 11 via the network 100 upon receiving the registration message.

參閱圖1與圖3,在該電子裝置11成功地完成註冊程序,亦即該電子裝置11收到指示出註冊成功的該註冊訊息後,一管理者可利用該管理端16來管理該電子裝置11對多個提供不同服務資料的服務連結之使用權限,該管理程序包含下列步驟。 Referring to FIG. 1 and FIG. 3, after the electronic device 11 successfully completes the registration process, that is, after the electronic device 11 receives the registration message indicating that the registration is successful, an administrator can use the management terminal 16 to manage the electronic device. 11 Use rights to multiple service links that provide different service materials. The management program includes the following steps.

在步驟301中,該管理端16經由該網路100傳送對應於該第一認證端12的該IP位址及登入資料至該服務端14。 In step 301, the management terminal 16 transmits the IP address and login data corresponding to the first authentication terminal 12 to the server 14 via the network 100.

在步驟302中,該服務端14在接收來自於該管理端16的該IP位址及該登入資料時,將該登入資料傳送至該第一認證端12。 In step 302, the server 14 transmits the login data to the first authentication terminal 12 when receiving the IP address and the login data from the management terminal 16.

在步驟303中,該第一認證端12在接收到該登入資料時,將預存於該第一認證端12的參考登入資料經由該網路100傳送至該服務端14。 In step 303, the first authentication end 12 transmits the reference login data pre-stored to the first authentication terminal 12 to the server 14 via the network 100 when receiving the login data.

在步驟304中,該服務端14在接收到該參考登入資料時,比對該登入資料是否匹配於該參考登入資料。當比對結果為是時,繼續進行步驟305,當比對結果為否時,繼續進行步驟306。 In step 304, the server 14 compares the login data with the reference login data when receiving the reference login data. When the comparison result is YES, proceed to step 305, and when the comparison result is no, proceed to step 306.

在步驟305中,該服務端14傳送一管理網頁至 該管理端16,以致該管理網頁被顯示在該管理端16上。 In step 305, the server 14 transmits a management webpage to The management terminal 16 is such that the management web page is displayed on the management terminal 16.

在步驟306中,該服務端14通知該管理端16登入失敗。 In step 306, the server 14 notifies the management terminal 16 that the login has failed.

在步驟307中,該服務端14將該登入資料傳送至該記錄端15。 In step 307, the server 14 transmits the login data to the record terminal 15.

在步驟308中,該記錄端15在接收到該登入資料時,記錄該登入資料及一目前時間。 In step 308, the recording terminal 15 records the login data and a current time when receiving the login data.

在步驟309中,該管理端16經由網路100利用該管理網頁傳送對應於該參考裝置資料的使用權限資料至該服務端14,該使用權限資料包含該參考裝置資料對該等提供不同服務資料的服務連結的存取權限。 In step 309, the management terminal 16 transmits the usage authority data corresponding to the reference device data to the server 14 via the network 100, and the usage authority data includes the reference device data to provide different service materials. Access to the service link.

在步驟310中,該服務端14在接收到該使用權限資料時,將該使用權限資料傳送至該第二認證端13。 In step 310, the server 14 transmits the usage authority data to the second authentication terminal 13 when receiving the usage authority data.

在步驟311中,該第二認證端13在接收到該使用權限資料時,將對應於該參考裝置資料的該使用權限資料儲存於該查找表中。 In step 311, the second authentication end 13 stores the usage authority data corresponding to the reference device data in the lookup table when receiving the usage authority data.

值得一提的是,在本實施例中,在該管理程序完成前,該查找表中所儲存之對應於該參考裝置資料的該使用權限資料皆預設為無法存取該等服務連結之任一者的狀態。此外,該資料提供者可作為該管理者,以管理對應於該電子裝置11之該參考裝置資料的使用權限資料,藉此可針對特定電子裝置11進行授權設定,進而達成限制特定電子裝置11存取該等服務連結的需求。 It is to be noted that, in this embodiment, before the management program is completed, the usage permission data stored in the lookup table corresponding to the reference device data is preset to be inaccessible to the service links. The state of one. In addition, the data provider can serve as the administrator to manage the usage authority data corresponding to the reference device data of the electronic device 11, thereby enabling authorization setting for the specific electronic device 11, thereby achieving limitation of the specific electronic device 11 Take the needs of these service links.

參閱圖1、圖4、圖5與圖6,當該使用者欲利 用該電子裝置11存取該服務資料時,該服務資料存取程序包含下列步驟。 Referring to Figures 1, 4, 5 and 6, when the user wants to benefit When the service data is accessed by the electronic device 11, the service data access program includes the following steps.

在步驟401中,該電子裝置11回應於該應用程式的執行,產生包括相關與該電子裝置11的該裝置資料、對應於該第一認證端12的該網際網路位址,及該帳戶資料的認證資料,並將該認證資料經由該網路100傳送至該服務端14。 In step 401, the electronic device 11 generates, in response to the execution of the application, the device information including the device and the electronic device 11, the internet address corresponding to the first authentication terminal 12, and the account data. The authentication data is transmitted to the server 14 via the network 100.

在步驟402中,該服務端14在接收到該認證資料時,判定目前與該第一認證端12連結之電子裝置11的數量是否大等於一預設數量。當判定結果為是時,進行步驟403,當判定結果為否時,進行步驟404。 In step 402, the server 14 determines whether the number of the electronic devices 11 currently connected to the first authentication terminal 12 is equal to a predetermined number when receiving the authentication data. When the determination result is YES, step 403 is performed, and when the determination result is no, step 404 is performed.

在步驟403中,該服務端14通知該電子裝置11,目前無法存取該服務資料。在本實施例中,該服務端14可傳送一指示出目前利用該服務端14以存取該第一認證端12的該服務資料之電子裝置11的數量已達上限之通知訊息至該電子裝置11。藉此,可有效控制利用該服務端14以存取該第一認證端12的該服務資料之電子裝置11的數量,。 In step 403, the server 14 notifies the electronic device 11 that the service data cannot be accessed at present. In this embodiment, the server 14 can transmit a notification message indicating that the number of the electronic devices 11 that currently use the server 14 to access the service data of the first authentication terminal 12 has reached a limit to the electronic device. 11. Thereby, the number of electronic devices 11 that utilize the server 14 to access the service data of the first authentication terminal 12 can be effectively controlled.

在步驟404中,該服務端14將該帳戶資料傳送至該第一認證端12。 In step 404, the server 14 transmits the account information to the first authentication terminal 12.

在步驟405中,該服務端14將該認證資料傳送至該記錄端15。 In step 405, the server 14 transmits the authentication material to the record terminal 15.

在步驟406中,該記錄端15在接收到該認證資料時,記錄該認證資料及一目前時間。 In step 406, the recording terminal 15 records the authentication data and a current time when receiving the authentication data.

在步驟407中,該第一認證端12在接收到該帳戶資料時,將預存於該第一認證端12的該參考帳戶資料及對應於該參考帳戶資料的權限資料,經由該網路100傳送至該服務端14。 In step 407, the first authentication terminal 12 transmits the reference account data pre-stored in the first authentication terminal 12 and the permission data corresponding to the reference account data via the network 100 when receiving the account information. To the server 14.

在步驟408中,該服務端14在接收到該參考帳戶資料及對應於該參考帳戶資料的權限資料時,根據該帳戶資料及該參考帳戶資料產生一帳戶認證結果,並將該帳戶認證結果及該裝置資料經由該網路100傳送至該第二認證端13。其中,該服務端14係藉由比對該帳戶資料是否匹配於該參考帳戶資料,以產生該帳戶認證結果。 In step 408, the server 14 generates an account authentication result according to the account information and the reference account data when receiving the reference account information and the authority data corresponding to the reference account data, and the account authentication result and The device data is transmitted to the second authentication terminal 13 via the network 100. The server 14 generates the account authentication result by comparing whether the account data matches the reference account data.

在步驟409中,該第二認證端13根據該帳戶認證結果判定該帳戶資料是否認證成功。當判定結果為是時,進行步驟410,當判定結果為否時,進行步驟411。 In step 409, the second authentication end 13 determines whether the account information is successfully authenticated according to the account authentication result. When the determination result is YES, step 410 is performed, and when the determination result is no, step 411 is performed.

在步驟410中,該第二認證端13根據該裝置資料與該查找表,判定該裝置資料是否匹配於該參考裝置資料,當判定結果為是時,進行步驟412,當判定結果為否時,進行步驟413。 In step 410, the second authenticating end 13 determines whether the device data matches the reference device data according to the device data and the lookup table. When the determination result is yes, step 412 is performed, and when the determination result is no, Go to step 413.

在步驟411中,該第二認證端13根據該帳戶認證結果產生一指示出該帳戶資料認證失敗的權限認證結果,並將該權限認證結果傳送至該服務端14。 In step 411, the second authenticating end 13 generates a rights authentication result indicating that the account data authentication failed according to the account authentication result, and transmits the rights authentication result to the server 14.

在步驟412中,該第二認證端13根據該匹配的參考裝置資料與該查找表,比對出該匹配的參考裝置資料的該使用權限資料。 In step 412, the second authenticating end 13 compares the usage authority data of the matched reference device data with the lookup table according to the matched reference device data.

在步驟413中,該第二認證端13產生一指示出 該裝置資料認證失敗的權限認證結果,並將該權限認證結果傳送至該服務端14。 In step 413, the second authentication terminal 13 generates an indication The device authentication fails the authentication result of the authorization, and transmits the authorization authentication result to the server 14.

在步驟414中,該第二認證端13根據步驟412中比對出的該使用權限資料,產生一包含該使用權限資料的權限認證結果,並將該權限認證結果傳送至該服務端14。 In step 414, the second authentication end 13 generates a rights authentication result including the usage rights data according to the used permission data in step 412, and transmits the rights authentication result to the server 14.

在步驟415中,當該服務端14接收到該權限認證結果時,該服務端14根據該權限認證結果,判定該電子裝置11是否認證成功。當判定結果為是時,進行步驟416,當判定結果為否時,進行步驟417。 In step 415, when the server 14 receives the authorization authentication result, the server 14 determines whether the electronic device 11 is successfully authenticated according to the authority authentication result. When the determination result is YES, step 416 is performed, and when the determination result is no, step 417 is performed.

在步驟416中,該服務端14根據該使用權限資料,傳送一服務連結網頁至該電子裝置11,以致該服務連結網頁被顯示在該電子裝置11上,其中該服務連結網頁包含該等服務連結中之至少一者。值得一提的是,當該裝置資料對該等服務連結之每一者皆具有存取的權限時,該服務連結網頁即包含該等服務連結之全部,當該裝置資料對該等服務連結之部分具有存取的權限時,該服務連結網頁即包含該部份的服務連結。在本實施例中,該等服務連結係以一如,按鍵的方式呈現於該服務連結網頁(見圖7),且該等服務連結包含一用以提供客戶資料的客戶查詢連結、一用以提供產品價錢資料的報價查詢連結、一用以提供維修站資料的叫修服務連結、一用以提供聯絡人資料的聯絡人連結、一用以提供訂單資料的訂單查詢連結、一用以提供拜訪記錄資料的拜訪記錄連結、一用以提供產品庫存 資料的庫存盤點連結,及一用以提供產品資料的產品查詢連結等其他用以提供ERP服務資料的ERP服務連結。 In step 416, the service terminal 14 transmits a service link webpage to the electronic device 11 based on the usage rights data, so that the service link webpage is displayed on the electronic device 11, wherein the service link webpage includes the service links. At least one of them. It is worth mentioning that when the device information has access to each of the service links, the service link page contains all of the service links, and the device information is linked to the service. When a part has access rights, the service link page contains the service link of the part. In the present embodiment, the service links are displayed on the service link webpage (see FIG. 7) in a button-like manner, and the service links include a customer query link for providing customer information, and Provide a quotation link for product price information, a service link for providing service station information, a contact link for providing contact information, an order inquiry link for providing order information, and one for providing a visit Record the visit record of the data, one is used to provide product inventory ERP service links for providing ERP service information, such as inventory checklists of data, and product inquiry links for providing product information.

在步驟417中,該服務端14根據該權限認證結果,產生一指示出該帳戶資料認證失敗的認證訊息,並將該認證訊息傳送至該電子裝置11。 In step 417, the server 14 generates an authentication message indicating that the account data authentication failed according to the authority authentication result, and transmits the authentication message to the electronic device 11.

在步驟418中,該電子裝置11回應於該應用程式的執行,產生與該服務連結相關的一連結請求,並將該連結請求經由該網路100傳送至該服務端14。 In step 418, the electronic device 11 generates a link request related to the service connection in response to execution of the application, and transmits the link request to the server 14 via the network 100.

在步驟419中,該服務端14在接收到該連結請求時,根據該帳戶資料,及在步驟408所接收到的對應於該參考帳戶資料的權限資料,判定是否傳送一對應於該服務連結所提供之該服務資料的資料請求至該第一認證端12。當判定結果為是時,進行步驟420,當判定結果為否時,進行步驟421。 In step 419, when receiving the connection request, the server 14 determines whether to transmit a service link corresponding to the service link according to the account information and the permission data corresponding to the reference account data received in step 408. The information of the service material provided is requested to the first authentication terminal 12. When the determination result is YES, step 420 is performed, and when the determination result is NO, step 421 is performed.

在步驟420中,該服務端14傳送該資料請求至該第一認證端12。 In step 420, the server 14 transmits the data request to the first authentication terminal 12.

在步驟421中,該服務端14經由該網路100傳送一指示出該帳戶資料不具該服務資料之存取權限的權限不足訊息至該電子裝置11。 In step 421, the server 14 transmits, via the network 100, an insufficient authority message indicating that the account information does not have access rights to the service data to the electronic device 11.

在步驟422中,該第一認證端12在接收到該資料請求時,經由該網路100傳送對應於該資料請求之該服務資料至該服務端14。 In step 422, the first authentication terminal 12 transmits the service data corresponding to the data request to the server 14 via the network 100 upon receiving the data request.

在步驟423中,該服務端14在接收到來自該第一認證端12的該服務資料時,傳送一包含該服務資料的服 務資料網頁至該電子裝置11,以致該服務資料網頁被顯示在該電子裝置11上。 In step 423, the server 14 transmits a service containing the service data when receiving the service data from the first authentication terminal 12. The service webpage is to the electronic device 11, so that the service profile webpage is displayed on the electronic device 11.

值得一提的是,在本實施例中,該服務資料網頁只有在該電子裝置11之該裝置資料對該服務資料的服務連結具有存取權限且同時該帳戶資料對該服務資料的權限資料也具有存取權限時,才會被傳送至該電子裝置11,藉此,用以提供該服務資料的該第一認證端12亦可針對不同帳戶資料進行該服務資料之存取權限的控管。然而,在本發明之其他實施例中,該服務資料網頁亦可在該電子裝置11之該裝置資料對該服務資料的服務連結具有存取權限時,即被傳送至該電子裝置11,此時,在步驟407中,該第一認證端12即不會傳送對應於該參考帳戶資料的權限資料至該服務端14,且步驟419及步驟421即不會被執行。 It is to be noted that, in this embodiment, the service data webpage only has access rights to the service link of the service data of the device information of the electronic device 11, and at the same time, the account data of the service data of the service data is also When the user has access rights, the first authentication terminal 12 for providing the service data can also control the access rights of the service data for different account materials. However, in other embodiments of the present invention, the service data webpage may be transmitted to the electronic device 11 when the device data of the electronic device 11 has access rights to the service link of the service data. In step 407, the first authentication terminal 12 does not transmit the authority data corresponding to the reference account data to the server 14, and steps 419 and 421 are not executed.

此外,在本實施例中,該服務端14係用以提供該服務連結網頁,及對應於不同服務連結的服務資料網頁,如一客戶資料查詢網頁、一產品報價查詢網頁、一叫修服務網頁、一聯絡人查詢網頁、一訂單查詢網頁、一拜訪記錄查詢網頁、一庫存盤點網頁及一產品資料查詢網頁等其他ERP服務網頁,然而,包含於各個服務資料網頁中之服務資料係由該第一認證端12自行提供。因此,該資料提供者僅需負責該服務資料的維護與管理,不須自行建置及維護網頁,而是將提供該服務資料的網頁委託該服務提供者建置及維護。 In addition, in the present embodiment, the server 14 is configured to provide the service link webpage and the service profile webpage corresponding to different service links, such as a customer profile inquiry webpage, a product quotation inquiry webpage, a repair service webpage, a contact inquiry webpage, an order inquiry webpage, a visit record inquiry webpage, a stock inventory webpage, and a product information inquiry webpage, and the like, but the service data included in each service material webpage is the first The authentication terminal 12 provides its own. Therefore, the data provider is only responsible for the maintenance and management of the service data. Instead of setting up and maintaining the website itself, the web page providing the service information is entrusted to the service provider for establishment and maintenance.

在本實施例中,該服務端14即為一雲端服務端 14,其可提供同一服務連結網頁及例如,同一客戶資料查詢網頁、同一產品報價查詢網頁、同一叫修服務網頁、同一聯絡人查詢網頁、同一訂單查詢網頁、同一拜訪記錄查詢網頁、同一庫存盤點網頁及同一產品資料查詢網頁等的同一服務資料網頁給多個不同的資料提供者運用,同一服務連結網頁對應不同的資料提供者可視資料提供者之需求顯示不同的服務連結,同一服務資料網頁中所包含的該服務資料即由不同的資料提供者所建置之第一認證端12來提供。此外,在本發明之其他實施例中,該服務連結網頁及該等服務資料網頁所提供之功能亦可使用如Android程式語言來實施,當利用Android程式語言來實施各個功能時,該服務連結網頁即為一服務連結表單、該等服務資料網頁之每一者即為一服務資料表單。利用Android程式語言實現該服務連結網頁及該等服務資料網頁所提供之功能係為熟知此技藝者所已知,故在此省略了他們的細節。 In this embodiment, the server 14 is a cloud server. 14. It can provide the same service link page and, for example, the same customer information inquiry page, the same product quotation inquiry page, the same repair service page, the same contact person inquiry page, the same order inquiry page, the same visit record inquiry page, the same inventory count The same service data page, such as the webpage and the same product data query page, is used by a number of different data providers. The same service link page displays different service links for different data providers' visual data providers. The same service data page The included service data is provided by the first authentication terminal 12 built by different data providers. In addition, in other embodiments of the present invention, the functions provided by the service link webpage and the service profile webpages may also be implemented using an Android programming language, and when the functions are implemented by using the Android programming language, the service link webpage is That is, a service link form, each of the service material pages is a service data form. The functions provided by the Android programming language for implementing the service link web page and the service material web pages are known to those skilled in the art, and their details are omitted here.

綜上所述,藉由該服務端14提供該服務連結網頁及該等服務資料網頁,以使得該第一認證端12僅需管理及維護該服務資料,藉此可大幅降低該資料提供者自行建置與維護網頁之成本,此外,該使用權限資料及該權限資料係分別由該管理端16及該第一認證端12來管理,而不經由該服務端14來管理,藉此,該資料提供者可更方便地進行該使用權限資料及該權限資料的控管,再者,為了因應員工利用個人的電子裝置11處理公務的情形(bring your own device,簡稱BYOD),藉由該第二認證端13對該裝置 資料進行認證,以判定該電子裝置11是否可進行該服務資料的存取,進而提高該服務資料的安全性,另外,藉由該第一認證端12對該帳戶資料進行認證,藉此還認證了該使用者的身分,以達成雙重認證的效果,此外,該服務端14能控制存取該第一認證端12所提供的服務資料之電子裝置11的數量,當該預設數量越大,即代表該服務提供者授權給該資料提供者越多台電子裝置11可同時利用該服務端14來存取該第一認證端12的該服務資料,故確實能達成本發明之目的。 In summary, the server 14 provides the service link webpage and the service profile webpages, so that the first authentication terminal 12 only needs to manage and maintain the service profile, thereby greatly reducing the profile provider. The cost of establishing and maintaining the webpage is further managed by the management terminal 16 and the first authentication terminal 12, respectively, and is not managed by the server 14, whereby the data is managed. The provider can more conveniently perform the usage permission data and the control of the permission data, and further, in order to respond to the employee's use of the personal electronic device 11 (bring your own device, referred to as BYOD), by the second Authentication terminal 13 for the device The data is authenticated to determine whether the electronic device 11 can access the service data, thereby improving the security of the service data, and further authenticating the account data by the first authentication terminal 12, thereby authenticating The user's identity is used to achieve the effect of the two-factor authentication. In addition, the server 14 can control the number of the electronic devices 11 that access the service data provided by the first authentication terminal 12, and the larger the preset number, That is, on behalf of the service provider, the more electronic devices 11 can use the server 14 to access the service data of the first authentication terminal 12 at the same time, so that the object of the present invention can be achieved.

惟以上所述者,僅為本發明之實施例而已,當不能以此限定本發明實施之範圍,即大凡依本發明申請專利範圍及專利說明書內容所作之簡單的等效變化與修飾,皆仍屬本發明專利涵蓋之範圍內。 However, the above is only the embodiment of the present invention, and the scope of the present invention is not limited thereto, that is, the simple equivalent changes and modifications made by the patent application scope and the patent specification of the present invention are still It is within the scope of the patent of the present invention.

415~423‧‧‧步驟 415~423‧‧‧Steps

Claims (10)

一種雲端服務的認證及存取方法,藉由一服務端來實施,該服務端經由一網路與至少一電子裝置、一第一認證端及一第二認證端連接,該雲端服務的認證及存取方法包含以下步驟:(A)藉由該服務端,在接收來自於該電子裝置,且包括相關與該電子裝置的裝置資料、一對應於該第一認證端的網際網路位址,及帳戶資料的認證資料時,將該帳戶資料傳送至該第一認證端;(B)藉由該服務端,在接收來自於該第一認證端參考帳戶資料時,根據該帳戶資料及該參考帳戶資料產生一帳戶認證結果,並將該帳戶認證結果及該裝置資料傳送至該第二認證端;及(C)藉由該服務端,在接收一來自於該第二認證端,且由該第二認證端根據該帳戶認證結果、該裝置資料,及預存於該第二認證端的參考裝置資料與對應於該參考裝置資料的使用權限資料之查找表而產生的一權限認證結果時,根據該權限認證結果,判定該電子裝置是否認證成功。 A method for authenticating and accessing a cloud service is implemented by a server, and the server is connected to at least one electronic device, a first authentication terminal and a second authentication terminal via a network, and the cloud service is authenticated and The access method includes the following steps: (A) receiving, by the server, an information from the electronic device, including device information related to the electronic device, an internet address corresponding to the first authentication end, and The account information is transmitted to the first authentication end; (B) by the server, when receiving the reference account information from the first authentication end, according to the account information and the reference account Generating an account authentication result, and transmitting the account authentication result and the device data to the second authentication end; and (C) receiving, by the server, a second authentication terminal from the server a permission generated by the authentication end according to the account authentication result, the device data, and the lookup table of the reference device data pre-stored in the second authentication terminal and the usage authority data corresponding to the reference device data When the authentication result, according to the results of the certification authority to determine whether the electronic device authentication is successful. 如請求項1所述的雲端服務的認證及存取方法,該服務端經由該網路與多個電子裝置連接,其中,在步驟(A)中包括以下子步驟:(A-1)藉由該服務端,在接收到該認證資料時,判定目前與該第一認證端連結之電子裝置的數量是否大於 等於一預設數量;及(A-2)當判定結果為否時,藉由該服務端,將該帳戶資料傳送至該第一認證端。 The authentication and access method of the cloud service according to claim 1, wherein the server is connected to the plurality of electronic devices via the network, wherein the step (A) includes the following substeps: (A-1) The server determines, when receiving the authentication data, whether the number of electronic devices currently connected to the first authentication end is greater than And equal to a preset quantity; and (A-2), when the determination result is no, the account information is transmitted to the first authentication end by the server. 如請求項1所述的雲端服務的認證及存取方法,其中,在該步驟(C)中,該權限認證結果係藉由該第二認證端先根據該帳戶認證結果判定該帳戶資料是否認證成功,當判定結果為是時,再根據該裝置資料與該查找表,比對出該裝置資料對應的該使用權限資料,並根據該使用權限資料而產生。 The authentication and access method of the cloud service according to claim 1, wherein in the step (C), the authority authentication result is determined by the second authentication terminal to determine whether the account data is authenticated according to the account authentication result. If the result of the determination is YES, the usage authority data corresponding to the device data is compared according to the device data and the lookup table, and generated according to the usage authority data. 如請求項3所述的雲端服務的認證及存取方法,在步驟(C)之後,還包含一步驟(D),當判定結果為是時,藉由該服務端,根據該權限認證結果,傳送一服務連結網頁至該電子裝置,以致該服務連結網頁被顯示在該電子裝置上,其中,該權限認證結果包含該裝置資料對多個提供不同服務資料的服務連結的存取權限,該服務連結網頁包含該等服務連結中之至少一者。 The method for authenticating and accessing the cloud service according to claim 3, after step (C), further comprising a step (D), when the determination result is yes, by the server, according to the authority authentication result, Transmitting a service link webpage to the electronic device such that the service link webpage is displayed on the electronic device, wherein the rights authentication result includes access rights of the device profile to a plurality of service links providing different service materials, the service The link page contains at least one of the service links. 如請求項4所述的雲端服務的認證及存取方法,在步驟(D)中,該服務資料係由該第一認證端所提供,在步驟(D)之後,還包含一步驟(E),當該服務端接收到來自該電子裝置且與該服務連結相關的一連結請求時,藉由該服務端根據該連結請求,傳送一包含對應於該服務連結之該服務資料的服務資料網頁至該電子裝置,以致該服務資料網頁被顯示在該電子裝置上。 The method for authenticating and accessing the cloud service according to claim 4, wherein in step (D), the service data is provided by the first authentication end, and after step (D), further comprising a step (E) When the server receives a connection request from the electronic device and is associated with the service connection, the server transmits a service data page including the service data corresponding to the service connection to the connection request to the server to The electronic device is such that the service material web page is displayed on the electronic device. 如請求項5所述的雲端服務的認證及存取方法,其中, 步驟(E)包括以下子步驟:(E-1)當該服務端接收到來自該電子裝置且與該服務連結相關的該連結請求時,藉由該服務端傳送一對應於該服務連結之該服務資料的資料請求至該第一認證端;及(E-2)當接收到來自該第一認證端的該服務資料時,藉由該服務端,傳送包含該服務資料的該服務資料網頁至該電子裝置。 The method for authenticating and accessing the cloud service according to claim 5, wherein Step (E) includes the following sub-steps: (E-1) when the server receives the connection request from the electronic device and is associated with the service connection, by the server transmitting a corresponding connection to the service connection The service data is requested to be sent to the first authentication end; and (E-2), when receiving the service data from the first authentication terminal, by the server, transmitting the service data webpage including the service data to the Electronic device. 如請求項5所述的雲端服務的認證及存取方法,其中,在步驟(B)中,該服務端還接收來自於該第一認證端之對應於該參考帳戶資料的權限資料,且步驟(E)包括以下子步驟:(E-1)當該服務端接收到來自該電子裝置且與該服務連結相關的該連結請求時,藉由該服務端根據該帳戶資料及該權限資料,判定是否傳送一對應於該服務連結所提供之該服務資料的資料請求至該第一認證端;(E-2)當判定結果為是時,藉由該服務端傳送該資料請求至該第一認證端;及(E-2)當接收到來自該第一認證端之對應於該資料請求的該服務資料時,藉由該服務端,傳送包含該服務資料的該服務資料網頁至該電子裝置。 The method for authenticating and accessing the cloud service according to claim 5, wherein in step (B), the server further receives the authority data corresponding to the reference account data from the first authentication terminal, and the step (E) comprising the following sub-steps: (E-1) when the server receives the connection request from the electronic device and is related to the service connection, the server determines, according to the account information and the permission data, Whether to transmit a data request corresponding to the service data provided by the service link to the first authentication end; (E-2) when the determination result is yes, the server transmits the data request to the first authentication And (E-2), when receiving the service data corresponding to the data request from the first authentication end, transmitting, by the server, the service data webpage including the service data to the electronic device. 如請求項1所述的雲端服務的認證及存取方法,該服務端還經由該網路與一記錄端連接,在該步驟(A)之後,還包含一步驟(F),藉由該服務端,將該認證資料傳送至 該記錄端,該認證資料使該記錄端能記錄該認證資料及一目前時間。 The method for authenticating and accessing the cloud service according to claim 1, wherein the server is further connected to a record terminal via the network, and after the step (A), further comprising a step (F) by using the service End, send the certification data to At the recording end, the authentication data enables the recording terminal to record the authentication data and a current time. 如請求項1所述的雲端服務的認證及存取方法,在該步驟(A)之前,還包含以下步驟:(G)藉由該服務端,在接收到來自於該電子裝置,且包括相關與該電子裝置的該裝置資料、對應於該第一認證端的該網際網路位址,及該帳戶資料的註冊資料時,將該帳戶資料傳送至該第一認證端;及(H)藉由該服務端,在接收來自於該第一認證端的參考帳戶資料時,根據該帳戶資料及該參考帳戶資料產生一帳戶判定結果,並將該帳戶判定結果及該裝置資料傳送至該第二認證端,該帳戶判定結果使該第二認證端能判定是否儲存該裝置資料於該查找表中,當判定結果為是時,儲存該裝置資料於該查找表以作為該參考裝置資料。 The method for authenticating and accessing the cloud service according to claim 1 further comprises, after the step (A), the following steps: (G) receiving, by the server, the electronic device, and including the related Transmitting the account data to the first authentication end with the device data of the electronic device, the Internet address corresponding to the first authentication end, and the registration data of the account information; and (H) The server, when receiving the reference account data from the first authentication end, generates an account determination result according to the account information and the reference account data, and transmits the account determination result and the device data to the second authentication end The account determination result enables the second authenticating end to determine whether to store the device data in the lookup table. When the determination result is yes, the device data is stored in the lookup table as the reference device data. 如請求項9所述的雲端服務的認證及存取方法,該服務端還經由該網路與一管理端連接,在該步驟(H)及步驟(A)之間,還包含以下步驟:(I)藉由該服務端,在接收來自於該管理端,且對應於該參考裝置資料的該使用權限資料時,將該使用權限資料傳送至該第二認證端,該使用權限資料使該第二認證端能將對應於該參考裝置資料的該使用權限資料儲存於該查找表中。 The method for authenticating and accessing the cloud service according to claim 9, wherein the server is further connected to a management terminal via the network, and between the step (H) and the step (A), the following steps are further included: I), by the server, transmitting the usage right data to the second authentication end when receiving the usage permission data from the management terminal and corresponding to the reference device data, the usage permission data making the first The second authentication end can store the usage authority data corresponding to the reference device data in the lookup table.
TW104120579A 2015-06-25 2015-06-25 Cloud service authentication method verifying the electronic apparatus is successfully authenticated or not on the basis of the authority authentication result TW201701181A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW104120579A TW201701181A (en) 2015-06-25 2015-06-25 Cloud service authentication method verifying the electronic apparatus is successfully authenticated or not on the basis of the authority authentication result

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW104120579A TW201701181A (en) 2015-06-25 2015-06-25 Cloud service authentication method verifying the electronic apparatus is successfully authenticated or not on the basis of the authority authentication result

Publications (2)

Publication Number Publication Date
TWI562005B TWI562005B (en) 2016-12-11
TW201701181A true TW201701181A (en) 2017-01-01

Family

ID=58227312

Family Applications (1)

Application Number Title Priority Date Filing Date
TW104120579A TW201701181A (en) 2015-06-25 2015-06-25 Cloud service authentication method verifying the electronic apparatus is successfully authenticated or not on the basis of the authority authentication result

Country Status (1)

Country Link
TW (1) TW201701181A (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114757682A (en) * 2022-03-25 2022-07-15 深圳市莱帝亚软件有限公司 Digital certificate authentication method and corresponding terminal, system and storage device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8756660B2 (en) * 2008-04-17 2014-06-17 Microsoft Corporation Enabling two-factor authentication for terminal services
US8584221B2 (en) * 2009-10-23 2013-11-12 Microsoft Corporation Authenticating using cloud authentication
TWM410262U (en) * 2011-01-20 2011-08-21 Shao-Jie Xu Electronic medical record system
TW201232495A (en) * 2011-01-31 2012-08-01 Shao-Jie Xu Cloud electronic medical record system and operation method thereof

Also Published As

Publication number Publication date
TWI562005B (en) 2016-12-11

Similar Documents

Publication Publication Date Title
US11924247B1 (en) Access control policy simulation and testing
US10764290B2 (en) Governed access to RPA bots
US10484385B2 (en) Accessing an application through application clients and web browsers
US20200285978A1 (en) Model training system and method, and storage medium
US9407615B2 (en) Single set of credentials for accessing multiple computing resource services
US9288213B2 (en) System and service providing apparatus
US10397213B2 (en) Systems, methods, and software to provide access control in cloud computing environments
CN103034530B (en) Provide services on the Internet exchange time use method and system
CN103023893B (en) Access online resources using the resource transfer platform
US10375177B1 (en) Identity mapping for federated user authentication
US20220255914A1 (en) Identity information linking
JP6064636B2 (en) Information processing system, information processing apparatus, authentication method, and program
CN108293045A (en) Single sign-on identity management between local and remote systems
US20170235936A1 (en) Secure credential service for cloud platform applications
US11050740B2 (en) Third party multi-factor authentication with push notifications
WO2013099065A1 (en) Authentication coordination system and id provider device
US20140122349A1 (en) System, information management method, and information processing apparatus
US10225152B1 (en) Access control policy evaluation and remediation
CN103986584A (en) Double-factor identity verification method based on intelligent equipment
US20140380426A1 (en) Method, device and system for logging in through a browser application at a client terminal
US10003592B2 (en) Active directory for user authentication in a historization system
JP6575052B2 (en) Access control system and program
JP5991143B2 (en) Information processing apparatus, system, and information registration method
JP6848275B2 (en) Program, authentication system and authentication cooperation system
US11316843B1 (en) Systems for authenticating users from a separate user interface

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees