US 12,277,204 B2
Authentication system and authentication method
Sotaro Moriwaki, Himeji (JP); Shigenobu Nishida, Himeji (JP); Yuichi Fujita, Himeji (JP); Ayumi Kokubun, Himeji (JP); and Koji Tanaka, Himeji (JP)
Assigned to GLORY LTD., Himeji (JP)
Filed by Glory Ltd., Himeji (JP)
Filed on Sep. 28, 2021, as Appl. No. 17/486,961.
Application 17/486,961 is a continuation of application No. PCT/JP2020/013959, filed on Mar. 27, 2020.
Claims priority of application No. 2019-067039 (JP), filed on Mar. 29, 2019.
Prior Publication US 2022/0012323 A1, Jan. 13, 2022
Int. Cl. G06F 21/32 (2013.01)
CPC G06F 21/32 (2013.01) 16 Claims
OG exemplary drawing
 
1. An authentication system for authentication of a user, comprising:
authentication information acquisition circuitry configured to acquire from the user pieces of authentication information corresponding to a plurality of types of authentication;
comprehensive authentication circuitry configured to
obtain a comprehensive authentication result from results of the plurality of types of authentication performed by using the pieces of authentication information, wherein the plurality of types of authentication respectively output evaluation values as authentication results, and the comprehensive authentication circuitry adds up the evaluation values to calculate a comprehensive evaluation value without averaging the evaluation values, and
on a condition that an evaluation value of a predetermined type of authentication, among the plurality of types of authentication, exceeds a threshold that is set for the evaluation value, apply weights to the evaluation values of the plurality of types of authentication and add up weighted evaluation values to calculate the comprehensive evaluation value; and
operation control circuitry configured to control stepwise a range of operations to be permitted for the user, based on the comprehensive evaluation value obtained by the comprehensive authentication circuitry, wherein the operation control circuitry is configured to:
permit all operations including a high security operation when the comprehensive evaluation value exceeds a first threshold,
permit only a part of the operations excluding the high security operation when the comprehensive evaluation value is lower than or equal to the first threshold but higher than a second threshold, and
prohibit all operations when the comprehensive evaluation value is lower than or equal to the second threshold.