Authentication system and authentication method

ABSTRACT

In order to prevent leakage of an authentication symbol string such as a credit card number, and enable a user to be authenticated: an ID issuance server  20  receives the first eight digits of the credit card number from a portable telephone device  10  of the user and issues a one-time ID to the portable telephone device  10 ; and a service provision server  30  receives the last eight digits of the credit card number and the one-time ID from a PC  11 , and transmits the one-time ID and those last eight digits to a number construction and authentication processing server  40  that receives the one-time ID and the last eight digits from the service provision server  30 , communicates with the ID issuance server  20  and acquires the first eight digits which correspond to the one-time ID, reconstructs the credit card number, and performs authentication.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of and claims prioritypursuant to 35 U.S.C. §120 to U.S. patent application No. 12/425839,filed on Apr. 17, 2009, which in turn claims priority pursuant to 35U.S.C. §119 to Japanese patent application no. 2008-184466, filed onJul. 16, 2008, the entire disclosures of which are hereby incorporatedby reference herein.

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

Not Applicable

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to an authentication system and anauthentication method for authenticating that a user is the properperson by using an authentication symbol string such as a credit cardnumber or the like, when he is performing, for example, payment bycredit card or logging on to a server or the like.

2. Description of the Related Art

When a user has performed payment by credit card at a internet shop overthe internet, it has been necessary for the user to input via a PC(personal computer) information such as his own credit card number, theperiod of validity of the credit card (which is used forauthentication), the name of the cardholder, and so on.

Due to this, this information such as the credit card number of theuser, the period of validity of the card, the name of the cardholder andso on comes to be transmitted to the server of the internet shop via theinternet, so that there has beers a problem of leakage of thisinformation from the internet or from the server of the internet shop.

By contrast, in the Published Japanese Translation No. 2005-521181 ofthe PCT International Publication (Patent Reference #1), there is also aper se known technique of inputting a portion of the credit card numberand attribute information such as the name of the user, his date ofbirth, or the like, and of performing authentication on the basis ofthis information.

Furthermore, in the Published Japanese Translation No. 2002-522775 ofthe PCT International Publication (Patent Reference #2), there is a perse known technique of separating the information into first data andsecond data, and of ensuring that all of the information is not storedupon any single device, by storing the first data upon a client systemwhile storing the second data upon a remote server.

Moreover, in the Japanese Laid-Open Patent Publication 2003-13229(Patent Reference #3), a per se known technique has been disclosed ofpreventing the leakage of information over a communication path byseparating electronic information, which is a product, into severalportions, and by transmitting the portions via different paths atdifferent times.

Yet further, in the Japanese Laid-Open Patent Publication 2007-41957(Patent Reference #4), there is a per se known technique of separatingcredit card information into two portions, and of storing one portion ofthis separated information upon a user terminal while storing the otherportion thereof in an information device of an storage center, so that;during payment, the settlement center acquires the separated informationportion which is stored in the user terminal and the separatedinformation portion which is stored in the storage center informationdevice, and restores the credit card by combining these two portions, soas to be able to perform credit approval and settlement processing.

With, for example, the technique of Patent Reference #1, although thereis no leakage of the entire credit card number, since the authenticationis not performed using the entire credit card number, there is apossibility that the authentication will not be sufficient. Moreoverthere is also the problem that, if the user of the PC is infected with avirus, then there is also a possibility that information which has beeninputted via the keyboard may undesirably be transmitted to the exteriorby the virus and thereby suffer leakage, and, in this case, a portion ofthe credit card number which has been inputted and other informationwhich may be used for authentication may leak out, so that improperauthentication may subsequently be performed using that information.Moreover, according to the technique of Patent Reference #2, althougheach of the devices individually cannot leak out all of the information,there is still the problem that, if the client system is used by a thirdparty whose intent is nefarious, then he may obtain authentication in asimilar manner to the legitimate user, which is undesirable.

Furthermore, with the technique of Patent Reference #3, while this isable to prevent leakage upon the communication path, since theelectronic information itself is present within the device upon thetransmission side, it is not possible to prevent it undesirably leakingout from this device upon the transmission side. Moreover, with thetechnique of Patent Reference #4, although there can be no leakage ofthe entire credit card information, from either the user terminal or thestorage center information device, it is necessary to store a separatedportion of the credit card information upon the storage centerinformation device, so that the user is not able to be completelyconfident, since the storage center is not an absolutely trustworthyinstitution. Moreover, if the user terminal is used by anill-intentioned third party, then there is the problem that he may beauthenticated in a similar manner to a legitimate user.

The present invention has been conceived in consideration of theproblems described above, and its object is to provide a technique whichcan appropriately prevent leakage of an authentication symbol stringsuch as, for example, a credit card number, while also appropriatelyauthenticating a user who is the right person.

BRIEF SUMMARY OF THE INTENTION

In order to attain the object described above, the authentication systemaccording to one aspect of the present invention includes anauthentication server which performs authentication using anauthentication symbol string, a one-time ID issuance server, and anauthentication symbol string construction server, wherein: the one-timeID issuance server includes: a first reception unit which receives, froma first terminal of a user, a first symbol string which is a portion ofthe authentication-symbol string; an ID issuance unit which issues aone-time ID to the first terminal; and a one-time ID storage unit whichstores the first symbol string and the one-time ID which has been issuedin mutual correspondence; and the authentication symbol stringconstruction server includes: a second reception unit which receives,from a second terminal, a second symbol string which is the remainingportion of the authentication symbol string other than the first symbolstring, and the one-time ID, a first symbol string acquisition unitwhich acquires the first symbol string which corresponds to the one-timeID by communication with the one-time ID issuance server; a constructionunit which reconstructs the authentication symbol string on the basis ofthe first symbol string which has been acquired and the second symbolstring which has been received; and an authentication symbol stringtransmission unit which transmits the authentication symbol string whichhas been reconstructed to the authentication server.

Here, the one-time ID is an ID which can be used temporarily and/or onlyonce. Moreover, the authentication symbol string is a symbol stringwhich is composed of numerals, letters, symbols, or a combination of twoor more of these types of characters, and may be something that is usedfor authentication in some other manner as well, such as, for example, acredit card number, or a number which is used for services on thenetwork of a financial institution such as a bank or a securitiescompany or the like (for example, an account number or a member numberor the like), or a log-in password to a network service, or a usernumber which is issued by a public institution, or a telephone number,an address, a name, a pass word, or a combination of these. Moreover,reception from the second terminal of the second symbol string which isthe remaining portion of the authentication symbol string other than thefirst symbol string, and of the one-time ID, both includes directreception from the second terminal, and also includes receptionindirectly via some other device or group of devices.

According to this authentication system, by the first symbol string andthe second symbol string of the authentication symbol siring beinginputted from different terminals, it is ensured that ail of theauthentication symbol string cannot leak, out from either of theseterminals individually. Moreover, although the first symbol string istransmitted to the ID issuance server, since the second symbol string isnot transmitted, accordingly all of the authentication symbol stringcannot leak during this transmission. Yet further, it is possible toreconstruct the authentication symbol string from the first symbolstring and the second symbol string which are inputted from differentterminals, on the basis of the one-time ID, so that this may be used forauthentication in an appropriate manner.

And, with the authentication system described above, the one-time IDissuance server may further include a first authentication key storageunit which stores a first authentication key of the user, and amanagement ID of the user; and: the first reception unit may acquire thefirst authentication key and the first symbol string from the firstterminal of the user; the one-time ID issuance server may furtherinclude a first authentication key authentication unit which performs afirst stage of authentication by comparing the first authentication keywhich has been received, with the first authentication key which isstored in the authentication key storage unit; the ID issuance unit mayissue the one-time ID if the authentication has succeeded, the one-timeID storage unit may store the one-time ID, the first symbol string, andthe management ID of the user for which authentication has succeeded, inmutual correspondence; the second reception unit of the authenticationsymbol string construction server may receive, from the second terminal,a second authentication key of the user, said second symbol string, andthe one-time ID; said authentication symbol string construction servermay further include: a second authentication key storage unit whichstores the second authentication key of the user and the management IDof the user; and a management ID acquisition unit which acquires themanagement ID which corresponds to the second authentication key whichhas been received from the second authentication key storage unit; andthe first symbol string acquisition unit may acquire the first symbolstring on the basis of the management ID which it has acquired and theone-time ID which it has received.

According to this authentication system, it is possible to enhance theaccuracy of user authentication, since the first stage of authenticationis performed by the one-time ID Issuance server, and moreover a secondstage of authentication is also provided by the authentication symbolstring construction server acquiring the first, symbol string using thesecond authentication key.

Furthermore, the authentication system described above may furtherinclude a service provision server, and: the authentication server mayinclude a return unit which performs predetermined confirmationprocessing including authentication on the basis of the authenticationsymbol string which has been received from the authentication symbolstring construction server, and returns a confirmation result; and theservice provision server may include a service supply unit whichreceives the confirmation result, and starts the supply of the serviceif the confirmation result shows that the supply of the service ispermitted. According to this authentication system, it is possible tostart the supply of the service according to the predeterminedconfirmation result which includes the authentication.

Furthermore, with the authentication system described above, the firstterminal may be a telephone device, and the first authentication key maybe a telephone number of the telephone device, which is notified when acall is made from the telephone device. According to this authenticationsystem, along with it not being necessary for the user to input thefirst authentication key, it is also possible to enhance the accuracy ofthe authentication, since, for the authentication to succeed, the firstterminal is limited to being one specific telephone device.

Furthermore, the authentication system described above may furtherinclude a service provision server, and: the service provision servermay include: a first, telephone number reception unit which receives thetelephone number of the telephone device of the user; and a telephonenumber transmission unit which transmits the telephone number which hasbeen received to the one-time ID issuance server; and the one-time IDissuance server may include: a second telephone number reception unitwhich receives the telephone number from the service provision server,and a telephone number registration unit which registers the telephonenumber which has been received in the first authentication key storageunit. Since, according to this authentication system, it is possible todivert the data which is registered upon the service provision server tothis purpose, accordingly no further load is imposed upon the user,since the telephone number of the telephone device of the user isregistered upon the one-time ID issuance server. Due to this, it ispossible for the user to utilize this authentication system in a simpleand easy manner.

Furthermore, with the authentication system described above, the IDissuance unit may notify the one-time ID by audio. According to thisauthentication system, it is possible tor the user to use any telephonedevice which can be employed for audio communication for authenticationby this authentication system.

Furthermore, with the authentication system described above, the firstsymbol string acquisition unit of the authentication symbol stringconstruction server may include: an issued one-time ID reception unitwhich sequentially receives the one-time IDs issued by the one-time IDissuance server, and the corresponding the first symbol strings; anissued one-time ID storage unit which stores the one-time ID and thefirst symbol string which have been received; and a first symbol stringsearch unit which searches, from the issued one-time ID storage unit,for a first symbol string corresponding to the one-time ID which hasbeen received from the second terminal. According to this authenticationsystem, it is possible for the processing to produce a response rapidly,since it is possible to search for the first symbol string within theauthentication symbol string construction server at the time point thatthe one-time ID is received from the service provision server.

Furthermore, with the authentication system described above, the firstsymbol string acquisition unit of the authentication symbol stringconstruction server may include: a one-time ID transmission unit whichtransmits the one-time ID which has been received to the one-time IDissuance server; and a corresponding first symbol string reception unitwhich receives from the one-time ID issuance server a first symbolstring which corresponds to the one-time ID; and the one-time IDissuance server may include: an issued one-time ID storage unit whichstores the one-time IDs which have been issued and the first symbolstrings which correspond thereto; a one-time ID reception unit whichreceives the one-time ID which has been transmitted from theauthentication symbol string construction server; a first symbol stringsearch unit which searches, on the basis of the issued one-time IDstorage unit, for a first symbol string corresponding to the one-time IDwhich has been received from the authentication symbol stringconstruction server; and a first symbol string transmission unit whichtransmits the first symbol string which has been found to theauthentication symbol string construction server.

According to this authentication system, it is possible to reduce thememory amount which is necessary for the authentication symbol stringconstruction server, since it is not necessary to store ail of theone-time IDs and the first symbol strings which have been issued by theID issuance server upon the authentication symbol string constructionserver.

And an authentication method according to another aspect of the presentinvention is for an authentication system which includes anauthentication server which performs authentication using anauthentication symbol string, a one-time ID issuance server, and anauthentication symbol string construction server, and includes: a firstreception step in which the one-time ID issuance server receives, from afirst terminal of a user, a first symbol string which is a portion ofthe authentication symbol string; a one-time ID issuance step in whichthe ID issuance unit issuing a one-time ID to the first terminal; aone-time ID storage step in which the one-time ID issuance server storesthe first symbol string and the one-time ID which has been issued inmutual correspondence in a one-time ID storage unit; a second receptionstep in which the authentication symbol string construction serverreceives, from a second terminal, a second symbol string which is theremaining portion of the authentication symbol string other than thefirst symbol string, and the one-time ID, a first symbol stringacquisition step in which the authentication symbol string constructionserver acquires the first symbol string which corresponds to theone-time ID which has been received; a construction step in which theauthentication symbol string construction server reconstructs theauthentication symbol string on the basis of the first symbol stringwhich has been acquired and the second symbol string which has beenreceived from the second terminal; an authentication symbol stringtransmission step in which the authentication symbol string constructionserver transmits the authentication symbol string which has beenreconstructed to the authentication server; an authentication step inwhich the authentication server performs confirmation processing whichincludes authentication on the basis of the authentication symbolstring; and a confirmation result transmission step in which theauthentication server transmitting the result of the confirmationprocessing.

According to this authentication method, by the first symbol string andthe second symbol string of the authentication symbol string beinginputted from different terminals, it is ensured that all of theauthentication symbol string cannot leak out from either of theseterminals individually. Moreover, although the first symbol string istransmitted to the ID issuance server, since the second symbol string isnot transmitted, accordingly all of the authentication symbol stringcannot leak during this transmission. Yet further, it is possible toreconstruct the authentication symbol string from the first symbolstring and the second symbol string which are inputted from differentterminals, on the basis of the one-time ID, so that this may be used forauthentication in an appropriate manner.

Furthermore, with the authentication method described above, theone-time ID issuance server may include a first authentication keystorage unit which stores a first authentication key of the user, and amanagement ID of the user; the authentication symbol string constructionserver may include a second authentication key storage means whichstores a second authentication key of the user, and the management ID ofthe user; in the first reception step, the first authentication key andthe first symbol string may be acquired from the first terminal of theuser; in the one-time ID issuance step, a first stage of authenticationmay be performed by comparing the first authentication key which hasbeen received, with the first authentication key which is stored in theauthentication key storage unit, and the one-time ID is issued if thisauthentication has succeeded; in the one-time ID storage step, theone-time ID, the first symbol string, and the management ID of the userfor which authentication has succeeded, may be stored in mutualcorrespondence; in the second reception step, the second authenticationkey and the second authentication symbol string may be received from thesecond terminal; in the second symbol string transmission step, thesecond authentication key and the second authentication symbol stringmay be transmitted to the authentication symbol string constructionserver; and there may be further included a management ID acquisitionstep in which the authentication symbol string construction serveracquires from the second authentication key storage unit the managementID which corresponds to the second authentication key which was receivedin the third reception step, and, in said first symbol stringacquisition step, the first symbol string may be acquired on the basisof the management ID which has been acquired and the one-time ID whichhas been received.

According to this authentication method, it is possible to enhance theaccuracy of user authentication, since the first stage of authenticationis performed by the one-time ID issuance server, and moreover a secondstage of authentication is also provided by the authentication symbolstring construction server acquiring the first symbol string using thesecond authentication key.

Furthermore, with the authentication method described above, the firstterminal may be a telephone device, and the first authentication key maybe a telephone number of the telephone device, and there may be furtherincluded: a first telephone number reception step in which a serviceprovision server of the authentication system receives the telephonenumber of the telephone device of the user; a telephone numbertransmission step in which said telephone number which has beenreceived, is transmitted to the one-time ID issuance server; a secondtelephone number reception step in which the one-time ID issuance serverreceives the telephone number from the service provision server; and atelephone number registration step in which the telephone number whichhas been received, is registered in the first authentication key storageunit.

Since, according to this authentication method, it is possible to divertthe data which is registered upon the service provision server to thispurpose, accordingly no further load is imposed upon the user, since thetelephone number of the telephone device of the user is registered uponthe one-time ID issuance server. Due to this, it is possible for theuser to utilize this authentication system in a simple and easy manner.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

FIG. 1 is a figure for explanation of the schematic structure andprocessing of an authentication system according to a firstconfiguration;

FIG. 2 is a flow chart of processing performed by a portable telephonedevice according to the first configuration;

FIG. 3 is a flow chart of processing performed by an ID issuance server,according to the first configuration;

FIG. 4 is a flow chart of processing performed by a PC, according to thefirst configuration;

FIG. 5 is a flow chart of processing performed by a service provisionserver, according to the first configuration;

FIG. 6 is a flow chart of processing performed by a number constructionand authentication processing server according to the firstconfiguration;

FIG. 7 is a figure for explanation of the schematic structure andprocessing of an authentication system according to a secondconfiguration;

FIG. 8 is a flow chart of processing performed by an ID issuance server,according to the second configuration;

FIG. 9 is a flow chart of processing performed by a number constructionand authentication processing server according to the secondconfiguration;

FIG. 10 is a figure for explanation of the schematic structure andprocessing of an authentication system according to a thirdconfiguration;

FIG. 11 is a structural diagram of a number construction andauthentication processing server according to a variant configuration;and

FIG. 12 is a structural diagram of a portion of an authentication systemaccording to another variant configuration.

DETAILED DESCRIPTION OF THE INVENTION

Configurations will now be explained with reference to the drawings. Itshould be understood that the configurations explained below are not tobe considered as being limitative of the scope of the Claims in any way;and, moreover, it is not the case that all of the elements and thecombinations thereof which are explained in connection with theseconfigurations are essential as means for implementation of theauthentication system and method.

First, an authentication system according to a first configuration willbe explained.

FIG. 1 is a figure for explanation of the schematic structure andprocessing of an authentication system according to this firstconfiguration.

The authentication system 1 is a system which performs authentication byusing a credit card number (which is one example of an authenticationsymbol string), and comprises a portable telephone device 10 (which isone example of a first terminal), a PC (Personal Computer) 11 (which isone example of a second terminal), an ID issuance server 20 (which isone example of a one-time ID issuance server), a service provisionserver 30, and a number construction and authentication processingserver 40 (which is one example of an authentication symbol stringconstruction server and an authentication server). The portabletelephone device 10, the PC 11, the ID issuance server 20, the serviceprovision server 30, and the number construction and authenticationprocessing server 40 each comprises a CPU (Central Processing Unit), aROM (Read Only Memory), a RAM (Random Access Memory) and so on, none ofwhich are shown in the figures; and, by programs which are stored in theROMs or the like being executed by the CPUs, it is possible for thevarious functions of these devices described hereinafter to beimplemented.

For example, the portable telephone device 10 and the PC 11 are devicesowned by the user. The portable telephone device 10, along with beingcapable of audio communication with some other telephone device (or witha server which is endowed with the function of a telephone), and oftransmitting and receiving data to and from a web server, also isadapted to be able to transmit and receive electronic mail via anetwork.

The PC 11 stores software for a web browser and electronic mail, and isadapted to transmit and receive data via the network to and from serversof various types, as well as to be able to transfer and receiveelectronic mail via the internet.

The ID issuance server 20 is managed, for example, by an ID issuanceinstitution which has received permission from a credit card company.The ID issuance server 20 includes a one-time ID management database 21,and performs issue processing of a one-time ID to the portable telephonedevice 10 and so on.

In this configuration, the one-time ID management database 21 storesnumbers (first symbol strings) each of which consists of a portion A(for example, the first eight digits) of a credit card number, andone-time IDs which have been issued to those numbers, in mutualcorrespondence. Here, this one-time ID is an ID which can be usedtemporarily and/or only once. Moreover, each one-time ID is unique amongthe one-time IDs which are valid at the time point it is issued.

The service provision server 30 supplies services upon the network. Inthis configuration, the service provision server 30 is, for example,managed by a company which administers an internet shop. Furthermore,the service provision server 30 includes a purchase management database31, and supplies the service of selling goods. For goods purchased byusers, this purchase management database 31 stores the product names,the prices, the destinations for dispatch of the goods (for example, theaddresses of the users), and so on. It should be understood that theservices supplied by the service provision server 30 are not limited tothe above; for example, internet banking services or the like may besupplied by a financial institution, or internet services may besupplied to the population or the like by a public institution; thepoint is that any type of services which utilizes the network will beacceptable.

The number construction and authentication processing server 40 ismanaged, for example, by a credit card company which issues creditcards. The number construction and authentication processing server 40includes an issued one-time ID management database 41 and a card membermanagement database 42, and performs processing for constructing(reconstructing) credit card numbers and settlement checking processingwhich includes authentication on the basis of credit card numbers, andso on.

The issued one-time ID management database 41 stores one-time IDs whichhave been issued and numbers which consist of the portions A of thecredit card numbers which correspond thereto. Here, the issue timeperiods of the one-time IDs are stored in correspondence with thoseone-time IDs, and it would be acceptable to arrange to delete theone-time IDs and the corresponding number portions A after apredetermined time period has elapsed from the time of issue thereof;or, alternatively, it would also be acceptable to arrange for theone-time IDs and the corresponding number portions A to be deleted afterthey have been used just once. The card member management database 42manages credit card numbers and other data which is used in settlementchecking processing which includes authentication (such as, for example,the periods of validity of the cards and the names of the cardholdersand so on).

Next, a general outline of the processing performed by thisauthentication system 1 will be explained.

Here, it will be supposed that the user is a person who holds a creditcard that has been issued by a credit card company.

When the user wishes to purchase some goods from an internet shop, firsthe inputs a number (the first symbol string) consisting of the portion Aof his credit card number to his portable telephone device 10, and thisnumber portion A is transmitted by the portable telephone device 10 tothe ID issuance server 20 (FIG. 1(1)). Here, there is no danger of theentire credit card number leaking from the portable telephone device 10,since only a part of the number portion A, in other words only a pan ofthe credit card number, is inputted with the portable telephone device10.

When the ID issuance server 20 receives the number portion A from theportable telephone device 10, it issues a one-time ID which is unique atthis time point, transmits this one-time ID which it has issued to theportable telephone device 10 which transmitted the number portion A(FIG. 1(2)), stores the number portion A and the one-time ID in mutualcorrespondence in the one-time ID management database 21, and transmitsthe number portion A and the one-time ID to the number construction andauthentication processing server 40 (FIG. 1(3)). Due to this, theone-time ID is received by the user of the portable telephone device 10,and is outputted (for example, is displayed). Moreover, since only thenumber portion A, in other words only a portion of the credit cardnumber, is stored upon the ID issuance server 20, accordingly, even ifthis information should leak out from the ID issuance server 20, leakagedoes not take place of the entire credit card number.

The number construction and authentication processing server 40 storesthe number portion A and the one-time ID which it has received from theID issuance server 20 in the issued one-time ID management database 41.

Using his PC 11, the user accesses the website of the internet shop, inother words the service provision server 30, determines the goods whichhe wishes to purchase, and selects settlement by credit card.Thereafter, the user transmits to the service provider 10, with the PC11, the one-time ID which is acquired with the portable telephone device10. the number portion B of the credit card number (for example, thelast eight digits thereof) (i.e., the second symbol string), and otherdata which is required during the purchase (for example, the name of thecardholder, the period of validity of the card, the name of the user,the destination for dispatch of the goods, and so on, i.e. the “userdata for purchase”) (FIG. 1(4)).

When the one-time ID, the number portion B of the credit card number(for example, the last eight digits thereof) (i.e., the second symbolstring), and the user data for purchase are received by the serviceprovision server 30 from the PC 11, then the data which is required forselling the goods, such as the name of the user, the destination fordispatch of the goods, the goods which have been purchased, and so on,is registered in the purchase management database 31. Moreover, theservice provision server 30 transmits the one-time ID, the numberportion B, the data which is required for settlement checking processing(authentication processing and so on) of the credit card (such as, forexample, the name of the cardholder, the period of validity of the card,and so on: i.e., the “other data for settlement”) to the numberconstruction and authentication processing server 40 (FIG. 1(5)).

And, upon receipt of the one-time ID, the number portion B, and theother data for settlement, the number construction and authenticationprocessing server 40 acquires the number portion A which corresponds tothis one-time ID which has been received from the issued one-time IDmanagement database 41, and constructs (reconstructs) the entire creditcard number on the basis of the number portion B which has been receivedand the number portion A which has been acquired. Next, the numberconstruction and authentication processing server 40 refers to the cardmember management database 42, and performs settlement checking as towhether or not purchase of the goods is permitted, on the basis of thecredit card number and the other data for settlement. In this settlementchecking, along with performing authentication as to whether or not thisis a legitimate user, moreover, if the authentication has succeeded, inother words if this is a legitimate user, then confirmation is furtherperformed as to whether or not the purchase is within the permittedrange. In this authentication as to whether or not this is a legitimateuser, the authentication succeeds if the credit card number, the name ofthe cardholder, and the period of validity match the data which is heldin the card member management database 42, then the authenticationsucceeds, whereas, if the data does not match, then the authenticationfails. Furthermore, whether or not the purchase is within the permittedrange is determined according to whether or not the cost of the goodsbeing purchased is within the permitted cost range, which is approvedfor this user in advance.

Next, the number construction and authentication processing server 40transmits the settlement checking result to the service provision server30 (FIG. 1(6)).

On the one hand, if the result of settlement checking from the numberconstruction and authentication processing server 40 is success, thenthe service provision server 30 considers that this order from the useris valid, and processing is performed for starting the dispatch of thegoods which have been specified for purchase, while, on the other hand,if the result of the settlement checking is failure, then this orderfrom the user is considered to be invalid, so that processing is startedfor revocation of this order from the user. And the service provisionserver 30 transmits the result as to whether the order is valid orinvalid to the PC 11 (FIG. 1(7)).

Next, the details of processing performed by this authentication systemwill be explained using the flow charts shown in FIGS. 2 through 6.

FIG. 2 is a flow chart of processing performed by the portable telephonedevice, according to the first configuration.

When a command is issued by the user to access the ID issuance server20, the portable telephone device 10 accesses the ID issuance server 20,and requests a web page from the ID issuance server 20 (a step S1).Next, the portable telephone device 10 receives this one-time IDissuance web page which Is transmitted from the ID issuance server 20,and displays this one-time ID issuance web page upon the screen (a stepS2).

The portable telephone device 10 makes a decision as to whether or notthe input of the number portion A to the one-time ID issuance web pagehas been completed (a step S3), and if it has not been completed (NO inthe step S3), then it waits until it is completed; while, when it hasbeen completed (YES in the step S3), then it transmits the numberportion A which has been inputted to the ID issuance server 20 (a stepS4, FIG. 1(1)). Thereafter, the portable telephone device 10 receives aweb page including the one-time ID which is transmitted from the IDIssuance server 20, and displays if upon the screen (a step S5).

Since, in this manner, with the authentication system 1 according tothis configuration, only the number portion A related to the credit cardnumber is inputted and transmitted by the portable telephone device 10,accordingly there is no risk of the entire credit card number leakingfrom the portable telephone device 10.

FIG. 3 is a flow chart of processing performed by the ID issuanceserver, according to the first configuration.

The ID issuance server 20 decides whether or not a web page has beenrequested from the user of any portable telephone device 10 (a stepS11), and if no web page has been requested, then does nothing, but, onthe other hand, if a web page has been requested (YES in the step S11),then it transmits a one-time ID issuance web page to the portabletelephone device 10 which was the source of the request (a step S12, andFIG. 1(2)).

Next, the ID issuance server 20 decides whether or not the numberportion A has been received from the portable telephone device 10 (astep S13), and, if the number portion A has not been received, waitsuntil it is received, whereas, when the number portion A has beenreceived (YES in the step S13), it issues a one-time ID whichcorresponds to this number portion A (a step S14), and registers thisone-time ID and the number portion A in the one-time ID managementdatabase 21 (a step S15), transmits a web page which includes theone-time ID to the portable telephone device 10 (a step S16), andmoreover transmits the one-time ID which has been registered in theone-time ID management database 21 and the number portion A to thenumber construction and authentication processing server 40 (a step S17,and FIG. 1(3)).

FIG. 4 is a flow chart of processing performed by the PC, according tothe first configuration.

Upon receipt of an access request from the user to the web site of theinternet shop, in other words to the service provision server 30, the PC11 requests a web page from the service provision server 30 (a stepS21), and receives this web page of the internet shop from the serviceprovision server 30 and displays it upon the screen (a step S22).

Next, the PC 11 decides whether or not a confirmation of purchase ofgoods has been received from the user (a step S23), and, if the purchaseof the goods has not been confirmed (NO in a step S23), waits until itis confirmed; whereas, if the purchase of the goods has been confirmed(YES in the step S23), then it requests the service provision server 30to transmit a purchase web page (a step S24).

Next, the PC 11 receives the purchase web page from the serviceprovision server 30 and displays it upon the screen (a step S25). And,upon this purchase web page, the PC 11 receives from the user input ofvarious types of data necessary for the purchase (a step S26). In thisconfiguration, the PC 11 receives input of the one-time ID which theuser acquired with the portable telephone device 10, the number portionB of the credit card number of the user (the second symbol string), andother data required for the purchase (for example, the name of thecardholder, the period of validity of the card, the name on the user,the destination for dispatch of the goods, and so on).

Thereafter, the PC 11 decides whether or not the inputting of the datarequired for the purchase has been completed (a step S27), and, if ithas not been completed (NO in the step S27), waits until it iscompleted; whereas, when the input has been completed (YES in the stepS27), it transmits the data which has been inputted to the serviceprovision server 30 (a step S28).

Since, in this manner, with the authentication system according to thisconfiguration, in relation to the credit card number, only the numberportion B is inputted and transmitted by the PC 11, accordingly there isno possibility of leakage of the entire credit card number from the PC11. Moreover, even if the one-time ID and the number portion B shouldleak out, since the one-time ID is a temporary ID or one that can onlybe used once, accordingly it is possible to prevent purchase of goods orthe like being performed by using them, in an appropriate manner.

FIG. 5 is a flow chart of processing performed by the service provisionserver, according to the first configuration.

The service provision server 30 decides whether or not a web pagerequest has been received from the PC 11 (a step S31), and, if there hasbeen no web page request (NO in the step S31), waits until a web pagerequest arrives; whereas, if there has been a web page request (YES inthe step S31), it transmits an internet shop web page to the PC 11 whichoriginated the request (a step S32).

Next, the service provision server 30 decides whether or not a purchaseweb page request has been received from the PC 11 (a step S33), and, ifthere has been no purchase web page request (NO in the step S33), waitsuntil a purchase web page request arrives; whereas, if there has been apurchase web page request (YES in the step S33), it transmits anpurchase web page to the PC 11 which originated the request (a stepS34).

Thereafter, the service provision server 30 decides whether or notpurchase data has been received (a step S35), and if purchase data hasnot been received (NO In the step S35), waits until such purchase datais received; whereas, if purchase data has been received (YES in thestep S35), it registers the necessary data from within this purchasedata, such as for example the name of the user, the destination fordispatch of the goods, and so on, in the purchase management database 31(a step S36).

Next, the service provision server 30 transmits the data for settlement(for example, the one-time ID, the number portion B of the credit cardnumber, the name of the cardholder, the period of validity of the card,the amount of money to be paid for the goods, and so on) to the numberconstruction and authentication processing server 40 (a step S37, andFIG. 1(5)).

Thereafter, the service provision server 30 decides whether or not thesettlement checking result has been received from the numberconstruction and authentication processing server 40 (a step S38), and,if the settlement checking result has not been received (NO in the stepS38), waits until the settlement-checking result is received; whereas,when the settlement checking result has been received (YES in the stepS38), it makes a decision as to whether or not the settlement checkingresults is that the settlement has succeeded (a step S39).

Next, if the settlement checking result is success, then, since thismeans that the purchase with the corresponding credit-card is possible,accordingly the service provision server 30 starts processing for whenthe order is valid (processing for when the order is valid: for example,processing to transmit to some predetermined terminal the necessary datarequired for processing to send to the user the goods for which theorder has been received, processing to transmit the order result thatthe order has succeeded, and so on) (a step S40). On the other hand, ifthe settlement checking result is failure, then, since this means eitherthat authentication with the credit card number has failed, or thatalthough this authentication has succeeded the price limit has beenexceeded, accordingly the service provision server 30 starts processingfor when the order is to be cancelled (processing for when the order isinvalid: for example, processing to delete the data for the goods forwhich the order was received, processing to transmit the order resultthat the order has failed, and so on) (a step S41).

In this manner, with the authentication system 1 according to thisconfiguration, since, in relation to the credit card number, the serviceprovision server 30 only receives the number portion B, accordinglythere is no danger of leakage of the entire credit card number from theservice provision server 30. Moreover, even if the one-time ID and thenumber portion B should leak out, since the one-time ID is a temporaryID or one that can only be used once, accordingly it is possible toprevent purchase of goods or the like being performed by using them, inan appropriate manner.

FIG. 6 is a flow chart of the processing by the number construction andauthentication processing server according to the first configuration.

The number construction and authentication processing server 40 decideswhether or not the one-time ID, the number portion B, the other data forsettlement and so on have been received from the service provisionserver 30 (a step S51), and if they have not been received (NO in thestep S51), waits until they are received; whereas, if they have beenreceived (YES in the step S51), it acquires the number portion A on thebasis of the one-time ID (a step S52). In this configuration, the numberconstruction and authentication processing server 40 acquires the numberportion A from the issued one-time ID management database 41 bysearching in it for that number portion A which is in correspondencewith a one-time ID which is the same as the one-time ID which has beenreceived from the service provision server 30. It should be understoodthat the number construction and authentication processing server 40performs processing to sequentially receive from the ID issuance server20 the number portions A and the corresponding one-time IDs which havebeen issued, and to store these number portions A and these one-time IDswhich have thus been received in the issued one-time ID managementdatabase 41.

Next, the number construction and authentication processing server 40constructs the whole credit card number from the number portion A whichit has acquired and the number portion B which it has received from theservice provision server 30 (a step S53). In this configuration, thenumber construction and authentication processing server 40 constructsthe credit card number by simply joining together the number portion Aand the number portion B.

Thereafter, the number construction and authentication processing server40 refers to the card member management database 42, and performs creditsettlement checking processing (a step S54). In concrete terms, thenumber construction and authentication processing server 40 performsauthentication of the user, according to whether the credit card numberwhich it has reconstructed, the name of the cardholder which has beentransmitted from the service provision server 30, and the period ofvalidity of the card, and the data in the card member managementdatabase 42, agree with one another, or not. Moreover, if theauthentication of the user has been successful (i.e. if there isagreement with the data in the card member database 42), then the numberconstruction and authentication processing server 40 decides whether ornot the amount of money for the goods in the data for settlement iswithin the amount of money permitted for the user in the card membermanagement database 42. If the result is that, along with theauthentication of the user having succeeded, the amount of money forpurchase of the goods is within the permitted amount of money, then thesettlement checking is successful, while in other cases the settlementchecking fails.

And the number construction and authentication processing server 40decides whether or not the settlement checking has succeeded (a stepS55), and if the settlement checking has succeeded (YES in the stepS55), then the number construction and authentication processing server40 transmits the result that the settlement checking has succeeded tothe service provision server 30 (a step S56), whereas if the settlementchecking has failed (NO in the step S55), then the number constructionand authentication processing server 40 transmits the result that thesettlement checking has failed to the service provision server 30 (astep S57).

In this manner, with this authentication system 1 according to the firstconfiguration, the number construction and authentication processingserver 40 constructs the credit card number in an appropriate mannerfrom the number portion A and the number portion B into which it wasdivided, and is able to perform appropriate authentication using thiscredit card number.

Next, an authentication system according to a second configuration willbe explained. It should be understood that, to portions which are thesame as the first configuration, the same reference symbols areallotted.

FIG. 7 is a figure for explanation of the schematic structure andprocessing of an authentication system 1 according to the secondconfiguration.

The ID issuance server 20 of the authentication system 1 according tothe second configuration maintains a one-time ID management database 22,instead of the one-time ID management database 21 of the firstconfiguration.

The one-time ID management database 22 stores first user IDs forauthenticating users (for example, the terminal IDs of portabletelephone devices 10 or user identification codes (PIN codes): “firstauthentication keys”), the number portions A of credit card numbers, theone-time IDs which have been issued to those numbers, and usermanagement IDs, in mutual correspondence. Here, the user management IDsare managed so as to be the same if the user in the one-time IDmanagement database 22, and the user in a second user ID managementdatabase 44 (which will be described hereinafter) are the same. As sucha method for managing the same users with the same user management IDs,for example, a method may be adopted of getting this informationregistered in the ID issuance server 20 by making it possible for theuser to apply to use this authentication system 1 by sending documentscontaining information of various types to the credit card company bymail, so that when, on its side, the credit card company receives thisapplication, it registers a management ID for this user in the numberconstruction and authentication server 40, and notifies this usermanagement ID to the side of the ID issuance institution. It should beunderstood that, if no one-time ID issue request has been made from aportable telephone device 10, then data is not stored for a numberportion A and a one-time ID in the one-time ID management database 22.

Furthermore, the number construction and authentication processingserver 40 according to this configuration, maintains an issued one-timeID management database 43 instead of the issued one-time managementdatabase 41 of the first configuration, and also maintains a second userID management database 44.

The one-time IDs which have been issued, the number portions A of thecorresponding credit card numbers, and the corresponding user managementIDs are stored in this issued one-time ID management database 43. Here,the issue time periods of the one-time IDs are stored in correspondencewith the one-time IDs, and it may be arranged to delete a one-time IDand the corresponding number portion A and user management ID for whicha predetermined time period from the issue date has elapsed; or it wouldalso be acceptable to arrange to delete a one-time ID and thecorresponding number portion A and management ID after they have beenused only once.

Second user IDs (second authentication keys) for authenticating theusers and the user management IDs of said users are stored in mutualcorrespondence in the second user ID management database 44. Here, asecond user ID is notified to a user in advance by letter or the like,when he has applied to utilize this authentication system 1.

Next, an outline of the processing by this authentication system 1according to the second configuration will be explained.

Here, it will be supposed that the user is a person who holds a creditcard that has been issued by a credit card company. Moreover, it will besupposed that the user has made an application to utilize thisauthentication system 1, and that a user management ID which has beenallocated to the user and a PIN code (a first user ID) of the portabletelephone device 10 of the user which serves as a first user ID areregistered in the one-time ID management database 22 of the ID issuanceserver 20. Furthermore, it will be supposed that a user management IDwhich is the same as the user management ID registered in the one-timeID management database 22, and a second user ID which is notified to theuser, are registered in the second user ID management database 44 of thenumber construction and authentication processing server 40.

When the user wishes to purchase some goods from an internet shop,first, he inputs a number consisting of the portion A of his credit cardnumber (for example, the first eight digits thereof) to his portabletelephone device 10, and this number portion A is transmitted to the IDissuance server 20 by the portable telephone device 10. Here, it isarranged for the PIN code to be automatically transmitted from theportable telephone device 10, so that the number portion A and the PINcode are transmitted to the ID issuance server 20 (FIG. 7(1)).

And here, in relation to the credit card number, since only a part ofthe number portion A is inputted with the portable telephone device 10,accordingly there is no danger of the entire credit card number leakingfrom the portable telephone device 10.

When the ID issuance server 20 receives the number portion A and the PINcode from the portable telephone device A, it performs a first stage ofindividual person authentication by comparing the PIN code which it hasreceived with the PIN code in the one-time ID management database 22.And, if this individual person authentication has succeeded, in otherwords if the same PIN is present in the database 22, then the IDissuance server 20 issues a one-time ID which is unique at this timepoint, and transmits this one-time ID which it has issued to theportable telephone device 10 (FIG. 7(2)). It should be understood that,if the individual person authentication has failed, an error is returnedto the portable telephone device 10, and no one-time ID is issued.Moreover, the ID issuance server 20 stores the one-time ID which hasbeen issued and the number portion A in the one-time ID managementdatabase 22, in correspondence with the PIN code and the user managementID. Furthermore, the ID issuance server 20 transmits the number portionA, the one-time ID which has bees issued, and the user management ID forthe corresponding user, to the number construction and authenticationprocessing server 40 (FIG. 7(3)).

Due to this, the one-time ID is received by the user of the portabletelephone device 10, and is outputted (for example, is displayed).Moreover, since only the number portion A, in other words only a portionof the credit card number, is stored upon the ID issuance server 20,accordingly, even if this information should leak out from the IDissuance server 20, leakage does not take place of the entire creditcard number. Furthermore, since the individual person authentication isperformed by the ID issuance server 20 with the PIN code which is storedupon the portable telephone device 10, accordingly it is possible toprevent, in an appropriate manner, any one-time ID from being issued, ifa PIN code which is not registered has been transmitted.

The number construction and authentication processing server 40 storesthe number portion A, the one-time ID, and the user management ID whichhave been received from the ID issuance server 20 in the issued one-timeID management database 43.

Using his PC 11, the user accesses the website of the internet shop, inother words the service provision server 30, determines the goods whichhe wishes to purchase, and selects settlement by credit card.Thereafter, the user transmits to the service provider 30, with the PC11, the second user ID, the one-time ID which is acquired with theportable telephone device 10, the number portion B of the credit cardnumber (for example, the last eight digits thereof), and other datawhich is required during the purchase (for example, the name on thecard, the period of validity of the card, the name of the user, thedestination for dispatch of the goods, and so on, i.e. the “user datafor purchase”) (FIG. 7(4)).

When the second user ID, the one-time ID, the number portion B of thecredit card number, and the user data for purchase are received by theservice provision server 30 from the PC 11, then the data which isrequired for selling the goods, such as the name of the user, thedestination for dispatch of the goods, the goods which have beenpurchased, and so on, is registered in the purchase management database31. Next, the service provision server 30 transmits the second user ID,the one-time ID, the number portion B, the data which is required forsettlement checking processing (authentication processing and so on) ofthe credit card (such as, for example, the name of the cardholder, theperiod of validity of the card, the amount of money to be paid for thegoods, and so on: i.e., the “other data for settlement”) to the numberconstruction and authentication processing server 40 (FIG. 7(5)).

And, upon receipt of the second user ID, the one-time ID, the numberportion B, and the other data for settlement, the number constructionand authentication processing server 40 performs a second stage ofindividual person authentication, using the second user ID and theone-time ID. That is, the number construction and authenticationprocessing server 40 acquires the user management ID which correspondsto the second user ID which has been received from the second user IDmanagement database 44, acquires the one-time ID which corresponds tothe user management ID which has been acquired from the issued one-timeID management database 43, and performs authentication by comparingtogether the one-time ID which has been acquired and the one-time IDwhich has been received from the service provision server 30.

In this second stage of individual person authentication, theauthentication is considered to have succeeded if the one-time ID whichhas been acquired and the one-time ID which has been received from theservice provision server 30 match one another, whereas this individualperson authentication is considered to have failed, if no usermanagement ID corresponding to the second user ID which has beenreceived can be acquired from the second user ID management database 44,or if it is not possible to acquire from the issued one-time IDmanagement database 43 a one-time ID corresponding to the usermanagement ID which has been acquired, or if the one-time ID which hasbeen acquired and the one-time ID which has been received from, theservice provision server 30 do not match one another.

If this second stage of authentication has succeeded, the numberconstruction and authentication processing server 40 acquires the numberportion A which corresponds to the one-time ID which has matched fromthe issued one-time ID management database 43, constructs the entirecredit card number on the basis of the number portion B which has beenreceived and the number portion A which has been acquired, and refers tothe card member management database 42 and performs settlement checkingas to whether or not purchase of the goods is permitted, on the basis ofthe credit card number and the other data for settlement.

And the number construction and authentication processing server 40transmits the result settlement checking (including also the result ofauthentication if the second stage of authentication has failed) to theservice provision server 30 (FIG. 7(6)).

On the one hand, if the result of settlement checking from the numberconstruction and authentication processing server 40 is success, thenthe service provision server 30 considers that this order from the useris valid, and processing is performed for starting the dispatch of thegoods which have been specified for purchase; while, on the other hand,if the result of the settlement checking is failure, then this orderfrom the user is considered to be invalid, so that processing is startedfor revocation of this order from the user. And the service provisionserver 30 transmits the result as to whether the order is valid orinvalid to the PC 11 (FIG. 7(7)).

Next, the details of the processing by this authentication systemaccording to the second configuration will be explained.

FIG. 8 is a flow chart, for the processing performed by the ID issuanceserver, according to the second configuration. It should be understoodthat, to processing steps which are the same as ones performed by the IDissuance server according to the first configuration shown in FIG. 3,the same reference symbols are appended, and explanation thereof isomitted.

In a step S61, the ID issuance server 20 decides whether or not thenumber portion A and the PIN code have been received from the portabletelephone device 10, and, if the number portion A and the PIN code havenot been received (NO in the step S61), waits until they are received;whereas, when they have been received (YES in the step S61), it performsthe first stage of individual person authentication by comparingtogether the PIN code which has been received and the PIN code in theone-time ID management database 22.

And the ID issuance server 20 makes a decision as to whether or not thisindividual person authentication has succeeded, in other words as towhether or not the PIN code (the first user ID) is registered or not (astep S62).

If the result is that the individual person authentication has succeeded(YES in the step S62), then the flow of control proceeds to the stepS14. On the other hand, if this authentication has failed (NO in thestep S62), then error processing is executed for notifying to theportable telephone device 10 that a failure in authentication has takenplace (a step S65).

After having performed the step S14, then the ID issuance server 20stores the one-time ID which has been issued and the number portion A inthe one-time ID management database 22 in correspondence with the PINcode and the user management ID (a step S63), and then the flow ofcontrol proceeds to the step S16.

Furthermore, after having performed the step S16, the ID issuance server20 transmits the number portion A, the one-time ID which has beenissued, and the corresponding user management ID of the correspondinguser to the number construction and authentication processing server 40(a step S64, and FIG. 7(3)).

FIG. 9 is a flow chart of processing performed by the numberconstruction and authentication processing server according to thesecond configuration. It should be understood that, the same referencesymbols are appended to processing steps which are the same as onesperformed by the number construction and authentication processingserver according to the first configuration shown in FIG. 6, andexplanation thereof is omitted.

If the number construction and authentication processing server 40 hasreceived the second user ID, the one-time ID, the number portion B, thedata for settlement and so on from the service provision server 30 (YESin the step S51), then it makes a decision as to whether or not thesecond user ID which has been received is registered in the second userID management database 44 (a step S71), and if it is not registered (NOin the step S71), then this means that this is not the user who isregistered using the authentication which used that one-time ID, inother words, that the second stage of individual person authenticationhas failed, so that the flow of control is transferred to a step S75.

On the other hand, if the second user ID which has been received isregistered in the second user ID management database 44 (YES in the stepS71), then the number construction and authentication processing server40 acquires from the second user ID management database 44 the usermanagement ID corresponding to the second user ID which has beenreceived (a step S72), acquires from the issued one-time ID managementdatabase 43 the one-time ID corresponding to the user management IDwhich has been acquired (a step S73), and makes a decision as to whetheror not the one-time ID which has been acquired and the one-time ID whichhas been received from the service provision server 30 agree with oneanother (a step S74). If the result is that these two one-time IDs agreewith one another (YES In the step S74), then, since this means that thisis a user to whom the one-time ID was issued by the ID issuance server20, accordingly the number construction and authentication processingserver 40 decides that this second stage of individual personauthentication has been successful, and the flow of control proceeds tothe next step S52. On the other hand, if these two one-time IDs do notagree with one another (NO in the step S74), then, since this means thatit has not been possible to authenticate the user to whom the one-timeID was issued by the ID issuance server 20, accordingly the numberconstruction and authentication processing server 40 decides that thissecond stage of individual person authentication has failed, and theflow of control is transferred to the step S75.

In the step S75, the number construction and authentication processingserver 40 transmits the fact that the second stage of authentication hasfailed, or the fact that the settlement checking processing has failed,to the service provision server 30 (FIG. 7(6)).

With the authentication system according to the second configurationdescribed above, it is possible to prevent, in an appropriate manner,the issuance of a one-time ID to any device other than a portabletelephone device 10 which provide a PIN code which is registered, sothat it is possible appropriately to prevent any malicious action by auser who is not registered.

Furthermore, since the second stage of individual person authenticationby the number construction and authentication processing server 40 doesnot succeed if the one-time ID and the second user ID do not agree withone another, accordingly it is possible appropriately to preventimproper usage by a third party, even if the portable telephone device10 has been acquired by such a third party and a one-time ID has been(undesirably) issued. Moreover, by utilizing the one-time ID which isemployed for the above type of advantage, it is possible to constructthe credit card number in an appropriate manner, and to use it forauthentication.

Next, an authentication system according to a third configuration willbe explained. It should be understood that, to portions which are thesame as the first and the second configurations, the same referencesymbols are allotted.

FIG. 10 is a figure for explanation of the schematic structure andprocessing of an authentication system according to the thirdconfiguration.

The ID issuance server 20 of this authentication system 1 according tothe third configuration maintains a one-time ID management database 23instead of the one-time ID management database 22 of the secondconfiguration. And the ID issuance server 20 also maintains a shop IDmanagement database 24.

The one-time ID management database 23 stores first user IDs forauthenticating users (for example, the telephone numbers of portabletelephone devices 10), and the number portions A of credit card numbers,in mutual correspondence. It should be understood that, if no one-timeID issue request has been, made from a portable telephone device 10,then data is not stored for a number portion A and a one-time ID in theone-time ID management database 23.

The shop ID management database 24 stores IDs of shops (shop IDs) ofshops which can perform settlement by issue of one-time IDs.

Furthermore, the number construction and authentication processingserver 40 according to this configuration maintains an issued one-timeID management database 45 instead of the issued one-time managementdatabase 43 of the second configuration.

The one-time IDs which have been issued, the number portions A of thecorresponding credit card numbers, and the telephone numbers of theportable telephone devices 10 to which these one-time IDs were issued,are stored in this issued one-time ID management database 45. Here, theissue time periods of the one-time IDs are stored in correspondence withthe one-time IDs, and it may be arranged to delete a one-time ID and thecorresponding number portion A and telephone number for which apredetermined time period from the issue date has elapsed; or it wouldalso be acceptable to arrange to delete a one-time ID, the correspondingnumber portion A, and the corresponding telephone number after they havebeen used only once.

The service provision server 30 according to this configurationmaintains a user management database 32, instead of the user managementdatabase 31 of the second configuration.

IDs for internet shopping of the users, the addresses of those users,and their telephone numbers and so on are stored in this user managementdatabase 32. The addresses and telephone numbers in the user managementdatabase 32 may, for example, be registered by the user transmitted themto the service provision server 30 when starting to utilize the servicesof the service provision server 30. Or the ID of the user for internetshopping may be notified in advance to the user, when he has registeredfor the services of the service provision server 30.

Next, an outline of the processing performed by this authenticationsystem 1 according to the third configuration will be explained.

Here, it will be supposed that the user is a person who is registeredupon the service provision server 30 for receiving the benefit ofservices, and that the address of the user and the telephone number ofthe portable telephone device 10 of the user are registered in the usermanagement database 32. Moreover, it will be supposed that an ID forinternet shopping has been notified to the user.

First, according to a command from the user, the PC 11 displays a webpage for purchase of goods from the service provision server 30, and,along with receiving specification of the goods, the PC 11 receivesspecification of settlement by credit card, and moreover receives inputof the user's ID for internet shopping.

The PC 11 transmits the ID for internet shopping to the serviceprovision server, along with the specification of the goods and thespecification of settlement (FIG. 10(1)).

The service provision server 30 performs user authentication with theinternet shopping ID which has been transmitted, and, if thisauthentication has succeeded, transmits to the ID issuance server 20 thetelephone number of the user which is stored in the user managementdatabase 32 and the shop ID which is allocated from the credit cardcompany in advance (FIG. 10(2)).

The ID issuance server 20 decides whether or not the shop ID which ithas received from the service provision server 30 is stored in the shopID management database 42, and, if the shop ID is stored, then itregisters the telephone number which it has received in the one-time IDmanagement table 23. Due to this, it is not necessary for the userhimself to register the telephone number of his own portable telephonedevice 10 with the ID issuance server 20.

Here, with this authentication system 1, for the user to perform creditcard settlement with the service provision server 30, it is necessaryfor him to telephone with his portable telephone device 10 to apredetermined telephone number to which the ID issuance server 20 canrespond.

When the user has telephoned with his portable telephone device 10 tothe predetermined telephone number to which the ID issuance server 20can respond, the ID issuance server 20 starts a telephone conversationwith the portable telephone device 10, and acquires the telephone numberof the portable telephone device 10 (i.e., its caller number). And theID issuance server 20 makes a decision as to whether or not thistelephone number which it has acquired is stored in the one-time IDmanagement database 23, and, if this telephone number is so stored, thenthe server 20 transmits audio to the portable telephone device 10 whichcommands the user to input the number portion A by key input, andrecognizes the number portion A from audio due to key input by the userupon the portable telephone device 10 (FIG. 10(3)).

The ID issuance server 20 issues a one-time ID which is unique at thistime point, and transmits this one-time ID which it has determined tothe portable telephone device 10 via audio (FIG. 10(4)). By doing this,the one-time ID is outputted as audio by the portable telephone deviceof the user, so that the user is able to ascertain this one-time ID as asound.

Moreover, the ID issuance server 20 stores (as data) this one-time IDwhich has been issued, and the number portion A, in the one-time IDmanagement database 23 in correspondence with the-correspondingtelephone number. Next, the-ID issuance server 20 transmits the numberportion A, the one-time ID which has been issued, and the correspondingtelephone number to the number construction and authenticationprocessing server 40 (FIG. 10(5)). Here since only the number portion A,which is only a part of the credit card number, is stored upon the IDissuance server 20, accordingly, even if this information should leakout from the ID issuance server 20, still there is no danger of theentire credit card number leaking out.

The number construction and authentication processing server 40 storesthe number portion A which has been received from the ID issuance server20, the one-time ID, and the telephone-number in the issued one-time IDmanagement database 45.

Subsequently, according to a command from the user, the PC 11 transmitsthe internet shopping ID, the one-time ID which has been acquired by theportable telephone device 10, the number portion B of the credit cardnumber, and the other data required for authentication (for example, thename on the-card and the period of validity of the card) to the serviceprovision server 30 (FIG. 10(6)).

When the Internet shopping ID, the one-time ID, the number portion B ofthe credit card number, and the data for authentication have beenreceived by the service provision server 30 from the PC 11, it registersthe data such as the goods which have been purchased and so on in theuser management database 32, and transmits the one-time ID, the numberportion B, the telephone number, and the data which is required for thesettlement checking processing of the credit card (authenticationprocessing and so on) (for example, the name of the cardholder, theperiod of validity of the card, the amount of money to be paid for thegoods, and so on: i.e., the other data for settlement) to the numberconstruction and authentication processing server 40 (FIG. 10(7)).

And, upon receipt of the telephone number, the number portion B, and theother data for settlement from the service provision server 30, thenumber construction and authentication processing server 40 performsindividual person authentication for the user by using the telephonenumber and the one-time ID. In other words, the number construction andauthentication processing server 40 performs authentication according towhether or not any telephone number is stored in the issued one-time IDmanagement database 45 corresponding to the telephone number which hasbeen received. Moreover, the number construction and authenticationprocessing server 40 acquires the one-time ID which corresponds to thistelephone number from the issued one-time ID management database 45, andperforms authentication by comparing together this one-time ID which hasbeen acquired and the one-time ID which has been received from theservice provision server 30.

If, in this individual person authentication, the one-time ID which hasbeen acquired and the one-time ID which has been received from theservice provision server 30 match one another, then the individualperson authentication succeeds, whereas, if no telephone numbercorresponding to the telephone number which has been received is storedin the issued one-time ID management database 45, or if the one-time IDwhich has been acquired and the one-time ID which has been received fromthe service provision server 30 do not match one another, then theindividual person authentication fails.

If the authentication has succeeded, then the number construction andauthentication processing server 40 acquires the number portion Acorresponding to the one-time ID which has matched from the issuedone-time ID management database 45, constructs the credit card number onthe basis of the number portion B which has been received and the numberportion A which has been acquired, and performs settlement checking asto whether or not to permit purchase of the goods by referring to thecard member management database 42 on the basis of the credit cardnumber and the other data for settlement.

And the number construction and authentication processing server 40transmits the result of the settlement checking (including the result ofauthentication if the authentication has failed) to the serviceprovision server 30 (FIG. 10(8)).

If the result of the settlement checking from the number constructionand authentication processing server 40 is that the checking hassucceeded, then the service provision server 30 takes the order from theuser as being valid, and performs processing for starting the dispatchof the goods which have been designated for purchase; whereas, on theother hand, if the result of the settlement checking is that it hasfailed, then the server 30 takes the order from the user as beinginvalid, and starts to perform processing for revoking this order fromthe user.

Next, a number construction and authentication processing serveraccording to a variant configuration will be explained.

FIG. 11 is a structural diagram of a number construction andauthentication processing server 40 according to a variantconfiguration. It should be understood that this variant configurationmay be applied to any of the first through the third configurations, buthere an example is shown in which it is applied to the firstconfiguration.

This variant configuration is one in which the functioning of the numberconstruction and authentication processing server 40 of the firstconfiguration is implemented by a number construction server 40 a andone or more authentication processing servers 40 b.

The number construction server 40 a is, for example, provided to apredetermined number construction company which has received permissionfrom the credit card companies, and, in the number construction andauthentication processing server 40, this server 40 a: executes theprocessing to construct the credit card number, executes the processingto transmit the credit card number which has been constructed and thedata required for settlement checking to an authentication processingserver 40 b (FIG. 11(1)); and executes processing to receive thesettlement checking result from the settlement processing server 40 b(FIG. 11(2)) and processing to transmit this result to the serviceprovision server 30.

An authentication processing server 40 b may be, for example, providedto each credit card company, and is a device which executes settlementchecking processing including: authentication of a credit card number;transmission of the credit card number and the other data required forsettlement checking from the source of the request (FIG. 11(1));performing settlement checking on this basis of this data; and returningthe result of this settlement checking to the source of the request(FIG. 11(2)).

According to this variant configuration it is possible to utilize, assuch an authentication processing server 40 b, a server which is alreadypresent at the credit card company and which is executing settlementconfirmation processing, just as it is.

Next, a number construction and authentication processing serveraccording to another variant configuration will be explained.

FIG. 12 is a structural diagram of a portion of an authentication systemaccording to another variant configuration. It should be understoodthat, while this variant configuration may be applied to any of thefirst configuration through the third configuration, here, an example isshown in which it is applied to the first configuration.

As shown in FIG. 12A, it is arranged for this authentication system 1 toinclude a service and number construction and authentication processingserver 50, which integrates together into one unit the functions of theservice provision server 30 and of the number construction andauthentication processing server 40. This structure is one which may,for example, be applied in a case in which network service andauthentication are performed by a single organization (an internetservice supply company), and may, for example, be applied to the networkservice of a financial institution, or network service by a publicorganization, or the like.

Moreover, as shown In FIG. 12B, it would also be acceptable to arrangeto transmit the data such as the one-time ID, the number portion B, andso on from the PC 11 to the number construction and authenticationprocessing server 40, for the number construction and authenticationprocessing server 40 to construct the credit card number and perform theauthorization and to notify the result thereof to the service provisionserver 30, and, if the result of this authentication result is success,for the service provision server 30 to start the supply of service viathe PC (for example, the PC 11).

Although the present authentication system and method have beenexplained on the basis of configurations thereof, they are not limitedto the details of those configurations; various other modes ofconfiguration may be contemplated.

For example while, in the first configuration, it was arranged for theone-time ID which has been issued and the number portion A to betransmitted in advance to the number construction and authenticationprocessing server 40, and for the searching of the number portion Awhich corresponds to the one-time ID which has been transmitted from theservice provision server 30 to be performed by the number constructionand authentication processing server 40, the authentication system andmethod are not to be considered as being limited by this feature. Inaddition, it would also be acceptable to arrange for the one-time IDwhich has been issued and the number portion A to be stored in the IDissuance server 20 without being transmitted to the number constructionand authentication processing server 40, and for the number constructionand authentication processing server 40 to transmit the one-time IDwhich has been received from the service provision server 30 to the IDissuance server 20, and tor the ID issuance server 20 to search for thenumber portion A which corresponds to the one-time ID and to transmit itto the number construction and authentication processing server 40.

Furthermore while, in the second configuration described above, theissued one-time ID, the number portion A, and the user management IDwere transmitted in advance to the number construction andauthentication processing server 40, the user management ID wasspecified by the number construction and authentication processingserver 40 on the basis of the second user ID which was transmitted fromthe service provision server 30, and, with the user management ID andthe one-time ID, the number portion A was searched for and was acquired,the authentication system and method are not to be considered as beinglimited by this feature. In addition, it would also be acceptable toarrange, not to transmit the issued one-time ID, the number portion A,and the user management ID to the number construction and authenticationprocessing server 40, but to store them in the ID issuance server 20,for the number construction and authentication processing server 40 tospecify the second user ID which has been received from the serviceprovision server 30 and to transmit this user management ID which hasbeen specified to the ID issuance server 20, for the ID issuance server20 to acquire the one-time ID and the number portion A corresponding tothis user management ID and to transmit them to the number constructionand authentication processing server 40, and for the number constructionand authentication processing server 40 to search for and to acquire thenumber portion A corresponding to this one-time ID; or, it would also beacceptable to arrange, not to transmit the issued one-time ID, thenumber portion A, and the user management ID to the number constructionand authentication processing server 40, but to store them in the IDissuance server 20, and tor the number construction and authenticationprocessing server 40 to acquire the number portion A, by the numberconstruction and authentication processing server 40 specifying the usermanagement ID from the second user ID which has been received from theservice provision server 30 and transmitting this user management IDwhich has been specified and the one-time ID to the ID issuance server20, and the ID issuance server 20 searching for and acquiring the numberportion A corresponding to the one-time ID and the user management IDand transmitting it to the number construction and authenticationprocessing server 40.

Furthermore while, in the first configuration through the thirdconfiguration described above, examples were shown in which theauthentication was performed using the credit card number, theauthentication system and method are not to be considered as beinglimited by that feature. For example, it is possible to apply theauthentication system and method to a case in which authentication isperformed by using a number of a network service of a financialinstitution (for example, an account number, a member ID, or the like),a personal number which is issued by a public institution, a log-inpassword to a service supply organization, a membership number of aninternet shop, the address, name, telephone number, or email address ofthe user, or a combination thereof; the point is that a symbol stringfor authentication (an authentication symbol string) should be used.Here, any symbol string which consists of numerals, letters, symbols, ora combination of two or more of these would be acceptable as theauthentication symbol string.

Furthermore although, in the configurations described above, the creditcard number was separated into a front half portion and a rear halfportion, i.e. into its first eight digits and its last eight digits, andit was arranged for them to be inputted by different terminals, theauthentication system and method should not be considered as beinglimited by this feature. For example, it may be separated into twoportions, each of which is to be inputted from a different terminal, byseparating its odd numbered digits from its even numbered digits; or itmay be separated so that some of predetermined digits (the last eightdigits) of the credit card number belong to a different portion; thepoint is that it should be separated into two portions according to somepredetermined rule, and that each of these portions should be inputtedfrom a different terminal. Moreover, as the credit card number, apartfrom the number on the face of the card, it would also be acceptable toarrange to include the security code of the credit card, for example theCVV2 (Card Verification Value), the CVC2 (Card Verification Code), theCID (Card Identification Number) or the like.

Moreover while, in the first configuration through the thirdconfiguration described above, the PC 11 of the user was explained asbeing one example of a second terminal, this is not limitative of theauthentication system and method; for example, it would also beacceptable for the second terminal to be a device which is supplied bythe internet shop administration company, which can transmit data to theservice provision server 30.

Furthermore while, in the third configuration described above, anexample was given of the user of a portable telephone device 10, itwould also be acceptable to arrange to utilize a fixed telephone device.

Furthermore while, in the first configuration through the thirdconfiguration described above, the authentication symbol string wasdivided into two parts by some method determined in advance and thesetwo parts were transmitted via two different terminals, and theconstruction of the authentication symbol string was performed by thenumber construction and authentication processing server 40, it wouldalso be acceptable, for example, to arrange for a separation method tobe determined according to designation by the user, or according todesignation by the ID issuance server 20, to arrange for theauthentication symbol string to be transmitted by the two differentterminals after having been separated into two parts according to thisseparation method, and to arrange for the number construction andauthentication processing server 40 to receive notification of theseparation method which was determined upon, and to reconstruct theauthentication symbol string on the basis of this separation method.Moreover, it would also be acceptable to arrange for the portabletelephone device 10 to determine the separation method for theauthentication symbol string according to some predetermined algorithm,for the authentication symbol string to be divided into two partsaccording to this separation method and for these parts to betransmitted by different terminals, for the portable telephone device 10to notify the method of separation which has been used to the numberconstruction and authentication processing server 40, and for the numberconstruction and authentication processing server 40 to reconstruct theauthentication symbol string according to the separation method whichhas thus been notified.

The invention claimed is:
 1. An authentication method, comprising:dividing a credit card number into a first portion and a second portiondifferent from the first portion, the credit card number beingcompletely reconstructable from the first portion and the secondportion; transmitting (1) the first portion of the credit card numberfrom a portable telephone device (10) of a user to an ID issuance server(20); transmitting (2) a one-time ID corresponding to the first portionof the credit card number from the ID issuance server to the portabletelephone device (10); transmitting (3) the first portion of the creditcard number and the one-time ID from the ID issuance server (20) to anumber construction and authentication processing server (40);transmitting (4) the second portion of the credit card number, theone-time ID and user purchase data from a computer (11) of the user to aservice provision server (30) via the internet; forming settlement dataat the service provision server (30) from the purchase data;transmitting (5) the second portion of the credit card number, theone-time ID and the settlement data from the service provision server(30) to the number construction and authentication processing server(40); ensuring at the number construction and authentication processingserver (40) that the one-time ID received with the second portion of thecredit card number matches the one-time ID received with the firstportion of the credit card number; reconstructing the full credit cardnumber at the number construction and authentication processing server(40) from the first and second portions of the credit card number;forming a settlement checking result at the number construction andauthentication processing server (40) from the full credit card numberand the settlement data; transmitting (6) the settlement checking resultfrom the number construction and authentication processing server (40)to the service provision server (30); forming an order result at theservice provision server (30) from the settlement checking result; andtransmitting (7) the order result from the service provision server (30)to the computer (11) of the user via the internet.
 2. The authenticationmethod of claim 1, wherein the transmitting steps (1) and (2) comprisethe portable telephone device (10) performing the following steps:requesting (S1) a web page from the ID issuance server (20); receivingthe requested web page from the ID issuance server (20); displaying (S2)the received web page; receiving (S3) the first portion of the creditcard number from the user; transmitting (S4) the first portion of thecredit card number to the ID issuance server (20); receiving (S5) a webpage containing the one-time ID from the ID issuance server (20); anddisplaying (S5) the web page containing the one-time ID to the user. 3.The authentication method of claim 1, wherein the transmitting steps(1), (2) and (3) comprise the ID issuance server (20) performing thefollowing steps: receiving (S11) a request for a web page from theportable telephone device (10); transmitting (S12) the requested webpage to the portable telephone device (10); receiving (S13) the firstportion of the credit card number from the portable telephone device(10); issuing (S14) a one-time ID corresponding to the first portion ofthe credit card number; registering (S15) the one-time ID and thecorresponding first portion of the credit card number with a one-time IDmanagement database (21); transmitting (S16) a web page containing theone-time ID to the portable telephone device (10); and transmitting(S17) the one-time ID and the corresponding first portion of the creditcard number to the number construction and authentication processingserver (40).
 4. The authentication method of claim 1, wherein thetransmitting step (4) comprises the computer (11) performing thefollowing steps: requesting (21) a web page from the service provisionserver (30); receiving the requested web page from the service provisionserver (30); displaying (S22) the received web page; confirming (S23)with the user that goods are to be purchased; requesting (S24) apurchase web page from the service provision server (30); receiving therequested purchase web page from the service provision server (30);displaying (S25) the received purchase web page; receiving (S26) thepurchase data from the user; confirming (S27) with the user that thepurchase data is complete; and transmitting (S28) the purchase data tothe service provision server (30).
 5. The authentication method of claim1, wherein the transmitting steps (4), (5) and (6) comprise the serviceprovision server (30) performing the following steps: receiving (S31) arequest for an internet shop web page from the computer (11);transmitting (S32) the requested internet shop web page to the computer(11); receiving (S33) a request for a purchase web page from thecomputer (11); transmitting (S34) the requested purchase web page to thecomputer (11); receiving (S35) the purchase data from the computer (11);registering (S36) the purchase data; transmitting (S37) the settlementdata to the number construction and authentication processing server(40); receiving (S38) the settlement checking result from the numberconstruction and authentication processing server (40); confirming (S39)the success of the received settlement checking result; and initiating(S40) processing for a valid order.
 6. The authentication method ofclaim 1, wherein the transmitting steps (3), (5) and (6) comprise thenumber construction and authentication processing server (40) performingthe following steps: receiving (S51) the settlement data from theservice provision server (30); receiving (S52) the first portion of thecredit card number and the one-time ID from the ID issuance server (20);receiving (S52) the second portion of the credit card number and theone-time ID from the service provision server (30); ensuring that theone-time ID received with the second portion of the credit card numbermatches the one-time ID received with the first portion of the creditcard number; reconstructing (S53) the full credit card number from thefirst and second portions of the credit card number; forming (S54) thesettlement checking result from the reconstructed mil credit card numberand the received settlement data; ensuring (S55) that the settlementchecking result is successful; and transmitting (56) the successfulsettlement checking to the service provision server (30).
 7. Anauthentication system comprising: an authentication server whichperforms authentication using an authentication symbol string, aone-time ID issuance server, and an authentication symbol stringconstruction server, wherein: said one-time ID issuance servercomprises: a first reception unit which receives, from a first terminalof a user, a first symbol string which is a portion of saidauthentication symbol string; an ID issuance unit which issues aone-time ID to said first terminal; and a one-time ID storage unit whichstores said first symbol string and said one-time ID which has beenissued in mutual correspondence; and said authentication symbol stringconstruction server comprises: a second reception unit which receives,from a second terminal, a second symbol string which is the remainingportion of said authentication symbol string other than said firstsymbol string, and said one-time ID; a first symbol string acquisitionunit which acquires said first symbol string which corresponds to saidone-time ID by communication with said one-time ID issuance server; aconstruction unit which reconstructs said authentication symbol stringon the basis of said first symbol string which has been received; and anauthentication symbol string transmission unit which transmits saidauthentication symbol string which has been reconstructed to saidauthentication server.
 8. The authentication system of claim 7, wherein:said one-time ID issuance server further comprises a firstauthentication key storage unit which stores a first authentication keyof the user, and a management ID of said user; said first reception unitacquires said first authentication key and said first symbol string fromsaid first terminal of said user; said one-time ID issuance serverfurther comprises a first authentication key authentication unit whichperforms a first stage of authentication by comparing said firstauthentication key which has been received, with said firstauthentication key which is stored in said authentication key storageunit; said ID issuance unit issues said one-time ID if saidauthentication has succeeded; said one-time ID storage unit stores saidone-time ID, said first symbol string, and said management ID of theuser for which authentication has succeeded, in mutual correspondence;said second reception unit of said authentication symbol stringconstruction server receives, from said second terminal, a secondauthentication key of said user, said second symbol string, and saidone-time ID; said authentication symbol string construction serverfurther comprises: a second authentication key storage unit which storessaid second authentication key of the user and the management ID of saiduser; and a management ID acquisition unit which acquires the managementID which corresponds to said second authentication key which has beenreceived from said second authentication key storage unit; and saidfirst symbol string acquisition unit acquires said first symbol stringon the basis of said management ID which has been acquired and saidone-time ID which has been received.
 9. The authentication system ofclaim 8, wherein: said first terminal is a telephone device; and saidfirst authentication key is a telephone number of said telephone device,which is notified when a call is made from said telephone device. 10.The authentication system of claim 9, further comprising a serviceprovision server, and wherein: said service provision server comprises:a first telephone number reception unit which receives said telephonenumber of said telephone device of said user; and a telephone numbertransmission unit which transmits said telephone number which has beenreceived to said one-time ID issuance server; and said one-time IDissuance server comprises: a second telephone number reception unitwhich receives said telephone number from said service provision server;and a telephone number registration unit which registers said telephonenumber which has been received in said first authentication key storageunit.
 11. The authentication system of claim 7, further comprising aservice provision server, and wherein: said authentication servercomprises a return unit which performs predetermined confirmationprocessing including authentication on the basis of said authenticationsymbol string which has been received from said authentication symbolstring construction server, and returns a confirmation result; and saidservice provision server comprises a service supply unit which receivessaid confirmation result, and starts the supply of said service if saidconfirmation result shows that the supply of said service is permitted.12. The authentication system of claim 7, wherein said ID issuance unitnotifies said one-time ID by audio.
 13. The authentication system ofclaim 7, wherein: said first symbol string acquisition unit of saidauthentication symbol string construction server comprises: an issuedone-time ID reception unit which sequentially receives the one-time IDissued by said one-time ID issuance server, and the corresponding saidfirst symbol strings; an issued one-time ID storage unit which storessaid one-time IDs and said first symbol strings which have beenreceived; and a first symbol string search unit which searches, fromsaid issued one-time ID storage unit, for a first symbol stringcorresponding to said one-time ID which has been received from saidsecond terminal.
 14. The authentication system of claim 7, wherein: saidfirst symbol string acquisition unit of said authentication symbolstring construction server comprises: a one-time ID transmission unitwhich transmits said one-time ID which has been received to saidone-time ID issuance server; and a corresponding first symbol stringreception unit which receives from said one-time ID issuance server afirst symbol string which corresponds to said one-time ID; and saidone-time ID issuance server comprises: an issued one-time ID storageunit which stores said one-time IDS which have been issued and saidfirst symbol strings which correspond thereto; a one-time ID receptionunit which receives said one-time ID which has been transmitted fromsaid authentication symbol string construction server; a first symbolstring search unit which searches, on the basis of said issued one-timeID storage unit, for a first symbol string corresponding to saidone-time ID which has been received from said authentication symbolstring construction server; and a first symbol string transmission unitwhich transmits said first symbol string which has been found to saidauthentication symbol string construction server.
 15. An authenticationmethod for an authentication system which comprises an authenticationserver which performs authentication using an authentication symbolstring, a one-time ID issuance server, and an authentication symbolstring construction server, comprising: a first reception step in whichone-time ID issuance server receives, from a first terminal of a user, afirst symbol string which is a portion of said authentication symbolstring; a one-time ID issuance step in which said ID issuance unitissues a one-time ID to said first terminal; a one-time ID storage stepin which said one-time ID issuance server stores said first symbolstring and said one-time ID which has been issued in mutualcorrespondence in a one-time ID storage unit; a second reception step inwhich said authentication symbol string construction server receives,from said second terminal, a second symbol string which is the remainingportion of said authentication symbol string other than said firstsymbol string, and said one-time ID; a first symbol string acquisitionstep in which said authentication symbol string construction serveracquires said first symbol string which corresponds to said one-time IDwhich has been received; a construction step in which saidauthentication symbol string construction server reconstructs saidauthentication symbol string on the basis of said first symbol stringwhich has been acquired and second symbol string which has been receivedfrom said second terminal; an authentication symbol string transmissionstep in which said authentication symbol string construction servertransmits said authentication symbol string which has been reconstructedto said authentication server; an authentication step in which saidauthentication server performs confirmation processing which includesauthentication on the basis of said authentication symbol string; and aconfirmation result transmission step in which said authenticationserver transmits results of said confirmation processing.
 16. Theauthentication method of claim 15, wherein: said one-time ID issuanceserver comprises a first authentication key storage unit which stores afirst authentication key of the user, and a management ID of said user;said authentication symbol string construction server comprises a secondauthentication key storage unit which stores a second authentication keyof the user, and the management ID of said user; in said first receptionstep, said first authentication key and said first symbol string areacquired from said first terminal of said user; in said one-time IDissuance step, a first stage of authentication is performed by comparingsaid first authentication key which has been received, with said firstauthentication key which is stored in said authentication key storageunit, and said one-time ID is issued if said authentication hassucceeded; in said one-time ID storage step, said one-time ID, saidfirst symbol string, and said management ID of the user for whichauthentication has succeeded, are stored in mutual correspondence; insaid second reception step, said second authentication key of said userand said second authentication symbol string are received from saidsecond terminal; in said second symbol string transmission step, saidsecond authentication key and said second authentication symbol stringare transmitted to said authentication symbol string constructionserver; and further comprising; a management ID acquisition step inwhich said authentication symbol string construction server acquiresfrom said second authentication key storage unit the management ID whichcorresponds to said second authentication key which was received in saidsecond reception step; and wherein, in said first symbol stringacquisition step, said first symbol string is acquired on the basis ofsaid management ID which has been acquired and said one-time ID whichhas been received.
 17. The authentication method of claim 16, whereinsaid first terminal is a telephone device, and said first authenticationkey is a telephone number of said telephone device, and furthercomprising: a first telephone number reception step in which a serviceprovision server of said authentication system receives said telephonenumber of said telephone device of said user; and a telephone numbertransmission step in said telephone number which has been received, istransmitted to said one-time ID issuance server; a second telephonenumber reception step in which said one-time ID issuance server receivessaid telephone number from said service provision server; and atelephone number registration step in which said telephone number whichhas been received, is registered in said first authentication keystorage unit.