US 12,425,217 B2
Authentication system, user terminal, authentication method, and program
Takeaki Makino, Tokyo (JP)
Assigned to ID HOLDINGS CORPORATION, Tokyo (JP)
Appl. No. 18/725,252
Filed by ID HOLDINGS CORPORATION, Tokyo (JP)
PCT Filed Aug. 18, 2023, PCT No. PCT/JP2023/029831
§ 371(c)(1), (2) Date Jun. 28, 2024,
PCT Pub. No. WO2024/070315, PCT Pub. Date Apr. 4, 2024.
Claims priority of application No. 2022-156298 (JP), filed on Sep. 29, 2022.
Prior Publication US 2025/0062900 A1, Feb. 20, 2025
Int. Cl. H04L 9/32 (2006.01); H04L 9/00 (2022.01)
CPC H04L 9/32 (2013.01) [H04L 9/50 (2022.05)] 11 Claims
OG exemplary drawing
 
1. An authentication system comprising:
a first decentralized network equipped with a plurality of first nodes, the plurality of first nodes sharing a first decentralized ledger, the plurality of first nodes being accessible to first information about a user;
a second decentralized network equipped with a plurality of second nodes, the plurality of second nodes sharing a second decentralized ledger, the plurality of second nodes being accessible to second information about the user; and
a user terminal used by the user, the user terminal having a user terminal control part, wherein
each of the plurality of first nodes has a first control part,
each of the plurality of second nodes has a second control part,
a first wallet of the first decentralized ledger stores a URI of the first information, and first specification information for specifying a second wallet of the second decentralized ledger, the first specification information is stored as a first non-fungible token serving as a token having non-fungibility,
the second wallet of the second decentralized ledger stores a URI of the second information, and second specification information for specifying the first wallet, the second specification information is stored as a second non-fungible token serving as a token having non-fungibility,
in response to a first request from the user terminal control part, the second control part requests the first node to perform first authentication to authenticate the second node for the user based on the first non-fungible token, by specifying the first wallet using the second specification information, and
in response to a second request from the user terminal control part, the first control part requests the second node to perform second authentication to authenticate the first node for the user based on the second non-fungible token, by specifying the second wallet using the first specification information.