{"id":382,"date":"2022-07-13T21:34:48","date_gmt":"2022-07-13T21:34:48","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=382"},"modified":"2022-07-13T21:34:48","modified_gmt":"2022-07-13T21:34:48","slug":"%e3%83%97%e3%83%83%e3%82%b7%e3%83%a5%e9%80%9a%e7%9f%a5%e8%aa%8d%e8%a8%bc-%e4%bb%95%e7%b5%84%e3%81%bf%e3%81%a8%e7%9f%a5%e3%81%a3%e3%81%a6%e3%81%8a%e3%81%8f%e3%81%b9%e3%81%8d%e3%81%93%e3%81%a8","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ja\/%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3\/%e3%83%97%e3%83%83%e3%82%b7%e3%83%a5%e9%80%9a%e7%9f%a5%e8%aa%8d%e8%a8%bc-%e4%bb%95%e7%b5%84%e3%81%bf%e3%81%a8%e7%9f%a5%e3%81%a3%e3%81%a6%e3%81%8a%e3%81%8f%e3%81%b9%e3%81%8d%e3%81%93%e3%81%a8\/","title":{"rendered":"\u30d7\u30c3\u30b7\u30e5\u901a\u77e5\u8a8d\u8a3c - \u305d\u306e\u4ed5\u7d44\u307f\u3068\u77e5\u3063\u3066\u304a\u304f\u3079\u304d\u3053\u3068"},"content":{"rendered":"<p>\u30d3\u30b8\u30cd\u30b9\u3068\u9867\u5ba2\u30c7\u30fc\u30bf\u3092\u5b89\u5168\u306b\u4fdd\u3064\u305f\u3081\u306b\u306f\u3001\u30e6\u30fc\u30b6\u30fc\u306b\u30a2\u30af\u30bb\u30b9\u3092\u8a31\u53ef\u3059\u308b\u524d\u306b\u8a8d\u8a3c\u3059\u308b\u65b9\u6cd5\u304c\u5fc5\u8981\u3067\u3059\u3002\u30d7\u30c3\u30b7\u30e5\u901a\u77e5\u8a8d\u8a3c\u306f\u3001\u305d\u308c\u3092\u7c21\u5358\u304b\u3064\u5b89\u5168\u306b\u884c\u3046\u65b9\u6cd5\u3067\u3059\u3002\u3053\u306e\u30d6\u30ed\u30b0\u8a18\u4e8b\u3067\u306f\u3001\u305d\u306e\u4ed5\u7d44\u307f\u3068\u59cb\u3081\u308b\u305f\u3081\u306b\u77e5\u3063\u3066\u304a\u304f\u3079\u304d\u3053\u3068\u3092\u8aac\u660e\u3057\u307e\u3059\u3002.<\/p>\n\n\n\n<p>\u30d7\u30c3\u30b7\u30e5\u901a\u77e5\u3092\u4f7f\u7528\u3057\u3066\u3001\u30e6\u30fc\u30b6\u30fc\u306e\u5b89\u5168\u3092\u5b88\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u5f7c\u3089\u306e\u30e1\u30fc\u30eb\u30a2\u30c9\u30ec\u30b9\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u5834\u5408\u306f\u3001Facebook\u30a2\u30ab\u30a6\u30f3\u30c8\u3078\u306e\u30ea\u30f3\u30af\u3092\u542b\u3080\u30e1\u30fc\u30eb\u3092\u9001\u4fe1\u3067\u304d\u307e\u3059\u3002\u30d7\u30c3\u30b7\u30e5\u901a\u77e5\u306f\u3001\u30d1\u30b9\u30ef\u30fc\u30c9\u3060\u3051\u3067\u30ed\u30b0\u30a4\u30f3\u3059\u308b\u3088\u308a\u3082\u5b89\u5168\u306a\u65b9\u6cd5\u3092\u4f7f\u7528\u3059\u308b\u53ef\u80fd\u6027\u3092\u9ad8\u3081\u307e\u3059\u3002\u30e6\u30fc\u30b6\u30fc\u306f\u30dc\u30bf\u30f3\u3092\u4f7f\u7528\u3057\u3066\u8a8d\u8a3c\u30b9\u30c6\u30fc\u30bf\u30b9\u3092\u78ba\u8a8d\u3067\u304d\u3001\u901a\u77e5\u306f\u30a4\u30f3\u30d0\u30f3\u30c9\u307e\u305f\u306f\u30a2\u30a6\u30c8\u30d0\u30f3\u30c9\u3067\u884c\u308f\u308c\u307e\u3059\u3002.<\/p>\n\n\n\n<p>\u81ea\u5206\u304c\u8a00\u3063\u3066\u3044\u308b\u4eba\u7269\u3067\u3042\u308b\u3053\u3068\u3092\u8a3c\u660e\u3059\u308b\u8cac\u4efb\u306f\u7533\u8acb\u8005\u306b\u3042\u308a\u307e\u3059\u3002\u3053\u308c\u306f\u30d7\u30c3\u30b7\u30e5\u901a\u77e5\u3092\u4f7f\u7528\u3057\u3066\u884c\u308f\u308c\u3001\u30b9\u30de\u30fc\u30c8\u30d5\u30a9\u30f3\u306b\u30ea\u30f3\u30af\u3055\u308c\u305f\u8a8d\u8a3c\u30b7\u30b9\u30c6\u30e0\u304c\u624b\u5143\u306b\u3042\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059\u3002\u30d7\u30c3\u30b7\u30e5\u901a\u77e5\u8a8d\u8a3c\u306f\u7c21\u5358\u3067\u4eba\u6c17\u304c\u9ad8\u307e\u3063\u3066\u3044\u308b\u305f\u3081\u3001\u4f7f\u7528\u304c\u5897\u3048\u3066\u3044\u307e\u3059\u3002.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"push-notification-authentication-benefits\">\u30d7\u30c3\u30b7\u30e5\u901a\u77e5\u8a8d\u8a3c\u306e\u5229\u70b9<\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"user-comfort\">\u30e6\u30fc\u30b6\u30fc\u306e\u5feb\u9069\u3055<\/h3>\n\n\n<p>You can quickly and easily accept a push notification from the app on your phone to get in immediately. You don\u2019t need to type in a password or remember anything. This is ideal for people who already have cell phones and are familiar with mobile systems.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"security\">\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<\/h3>\n\n\n<p>\u5404\u30aa\u30d7\u30b7\u30e7\u30f3\u306b\u306f\u3044\u304f\u3064\u304b\u306e\u6b20\u70b9\u3068\u5229\u70b9\u304c\u3042\u308a\u307e\u3059\u3002\u30d1\u30b9\u30ef\u30fc\u30c9\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u63d0\u4f9b\u3057\u307e\u3059\u304c\u3001\u3055\u307e\u3056\u307e\u306a\u65b9\u6cd5\u3067\u767a\u898b\u3055\u308c\u305f\u308a\u6f0f\u6d29\u3057\u305f\u308a\u3059\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002\u307b\u3068\u3093\u3069\u306e\u4eba\u304c\u6570\u5206\u3067\u30c6\u30ad\u30b9\u30c8\u30e1\u30c3\u30bb\u30fc\u30b8\u3067\u767b\u9332\u3067\u304d\u308b\u305f\u3081\u3001SMS\u3084\u591a\u8981\u7d20\u8a8d\u8a3c\uff08MFA\uff09\u306fSIM\u30b9\u30ef\u30c3\u30d7\u306e\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002Authy\u3084Google Authenticator\u306e\u3088\u3046\u306a\u3088\u308a\u5f37\u529b\u306a\u6697\u53f7\u5316\u3092\u4f7f\u7528\u3059\u308b\u8a8d\u8a3c\u30a2\u30d7\u30ea\u3067\u3055\u3048\u3001SMS\u3088\u308a\u3082&nbsp;<a target=\"_blank\" href=\"https:\/\/securitybriefing.net\/ja\/%e3%83%86%e3%82%af%e3%83%8e%e3%83%ad%e3%82%b8%e3%83%bc\/%e3%81%aa%e3%81%9c%e7%84%a1%e6%96%99%e3%81%aevpn%e3%82%92%e4%bd%bf%e3%81%a3%e3%81%a6%e3%81%af%e3%81%84%e3%81%91%e3%81%aa%e3%81%84%e3%81%ae%e3%81%8b\/\" rel=\"noreferrer noopener\">\u6697\u53f7\u5316&nbsp;<\/a>SIM\u30b9\u30ef\u30c3\u30d7\u3055\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002\u307b\u3068\u3093\u3069\u306e\u4eba\u304c\u6570\u5206\u3067\u30c6\u30ad\u30b9\u30c8\u30e1\u30c3\u30bb\u30fc\u30b8\u3067\u767b\u9332\u3067\u304d\u308b\u305f\u3081\u3067\u3059\u3002.<\/p>\n\n\n\n<p>You can authenticate to OneLogin using text or 2D security codes. You may allow or deny login access and transactions with a particular code. Simply choosing yes or no is sufficient to authenticate securely. It isn\u2019t transmitted over the internet, so it\u2019s not susceptible to man-in-the-middle attacks.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"frictionless-multifactor-authentication\">\u6469\u64e6\u306e\u306a\u3044\u591a\u8981\u7d20\u8a8d\u8a3c<\/h3>\n\n\n<p>Google\u306f\u3001Android 9 Pie\u306e\u30ea\u30ea\u30fc\u30b9\u306b\u3088\u308a\u3001\u4eba\u3005\u304c\u96fb\u8a71\u3092\u4f7f\u3044\u3084\u3059\u304f\u3059\u308b\u305f\u3081\u306b\u53d6\u308a\u7d44\u3093\u3067\u304d\u307e\u3057\u305f\u3002&nbsp;<a target=\"_blank\" href=\"https:\/\/developer.android.com\/about\/versions\/pie\" rel=\"noreferrer noopener\">Android 9 Pie\u306e\u30ea\u30ea\u30fc\u30b9<\/a>. \u3053\u306e\u65b0\u3057\u3044\u30d0\u30fc\u30b8\u30e7\u30f3\u306eAndroid\u306b\u306f\u3001\u96fb\u8a71\u3092\u3088\u308a\u7c21\u5358\u304b\u3064\u4fbf\u5229\u306b\u4f7f\u7528\u3067\u304d\u308b\u3088\u3046\u306b\u3059\u308b\u5f37\u5316\u3055\u308c\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u304c\u542b\u307e\u308c\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u3089\u306e\u6a5f\u80fd\u306b\u306f\u3001\u5f37\u5316\u3055\u308c\u305f\u30d7\u30c3\u30b7\u30e5\u8a8d\u8a3c\u3068\u96fb\u8a71\u30ed\u30c3\u30af\u6a5f\u80fd\u304c\u542b\u307e\u308c\u3066\u3044\u307e\u3059\u3002.<\/p>\n\n\n\n<p>Your registered phone is the first factor of authentication. The second factor can be Touch ID, FaceID, or PIN. MFA is still popular, mainly because it is linked to smartphone unlocking, but this type of MFA is more secure because it requires the user to combine push authentication with their phone\u2019s locking function.<\/p>\n\n\n\n<p>\u4f7f\u3044\u3084\u3059\u3044MFA\u306e\u4ee3\u66ff\u6848\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3067\u3001\u9867\u5ba2\u306e\u4fe1\u983c\u3092\u9ad8\u3081\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5acc\u60aa\u8981\u56e0\u3068\u3044\u3046\u7528\u8a9e&nbsp;<em>\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5acc\u60aa\u8981\u56e0<\/em>&nbsp;refers to people\u2019s negative feelings when new security measures make their lives more difficult without offering clear benefits.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"lowcost-security\">\u4f4e\u30b3\u30b9\u30c8\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<\/h3>\n\n\n<p>2\u8981\u7d20\u8a8d\u8a3c\u306f\u3001\u30cf\u30c3\u30ab\u30fc\u3092&nbsp;<a target=\"_blank\" href=\"https:\/\/securitybriefing.net\/ja\/%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e8%84%85%e5%a8%81\/%e4%bc%81%e6%a5%ad%e3%81%ab%e5%af%be%e3%81%99%e3%82%8b%e6%9c%80%e3%82%82%e5%ba%83%e7%af%84%e3%81%aa%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e6%94%bb%e6%92%83%e3%81%ae%e7%a8%ae%e9%a1%9e%e3%81%a8%e3%81%9d\/\" rel=\"noreferrer noopener\">\u9632\u3050\u65b9\u6cd5\u4ee5\u4e0a\u306e\u3082\u306e\u3067\u3059<\/a>&nbsp;and other people from getting into your network. This program is flexible and doesn\u2019t require any hardware. That means it\u2019s a more cost-effective option than high-end security solutions. It\u2019s also easier to set up and use, especially if you run your business from home.<\/p>\n\n\n\n<p>\u3082\u3046\u4e00\u3064\u306e\u5229\u70b9\u306f\u3001\u7ba1\u7406\u304c\u7c21\u5358\u3067\u3042\u308b\u3053\u3068\u3067\u3059\u3002\u30e6\u30fc\u30b6\u30fc\u306fIT\u306e\u52a9\u3051\u3092\u501f\u308a\u305a\u306b\u81ea\u5206\u306e\u96fb\u8a71\u306b\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3067\u304d\u3001\u65b0\u3057\u3044\u30d0\u30fc\u30b8\u30e7\u30f3\u306f\u81ea\u52d5\u7684\u306b\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u304a\u3088\u3073\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3055\u308c\u307e\u3059\u3002\u591a\u304f\u306e\u30c7\u30d0\u30a4\u30b9\u3092\u540c\u3058\u30a2\u30ab\u30a6\u30f3\u30c8\u30a2\u30c9\u30ec\u30b9\u306b\u30ea\u30f3\u30af\u3067\u304d\u307e\u3059\u3002.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"push-notification-authentication-disadvantages\">\u30d7\u30c3\u30b7\u30e5\u901a\u77e5\u8a8d\u8a3c\u306e\u6b20\u70b9<\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"needs-internet-connection\">\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u63a5\u7d9a\u304c\u5fc5\u8981<\/h3>\n\n\n<p>You need to have an internet connection to use this type of authentication. So, if you\u2019re in an area with weak or no signal, you may need help logging in.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"relies-on-thirdparty-service\">\u30b5\u30fc\u30c9\u30d1\u30fc\u30c6\u30a3\u30b5\u30fc\u30d3\u30b9\u306b\u4f9d\u5b58<\/h3>\n\n\n<p>\u3053\u306e\u30bf\u30a4\u30d7\u306e\u8a8d\u8a3c\u306f\u30b5\u30fc\u30c9\u30d1\u30fc\u30c6\u30a3\u30b5\u30fc\u30d3\u30b9\u306b\u3082\u4f9d\u5b58\u3057\u3066\u3044\u308b\u305f\u3081\u3001\u5225\u306e\u4f1a\u793e\u304c\u30c7\u30fc\u30bf\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u307e\u3059\u3002\u305d\u306e\u4f1a\u793e\u304c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4fb5\u5bb3\u3092\u53d7\u3051\u305f\u5834\u5408\u3001\u30c7\u30fc\u30bf\u304c\u5371\u967a\u306b\u3055\u3089\u3055\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"requires-a-mobile-device\">\u30e2\u30d0\u30a4\u30eb\u30c7\u30d0\u30a4\u30b9\u304c\u5fc5\u8981<\/h3>\n\n\n<p>Businesspeople who use their phones for business are more at ease. On the other hand, some people may be unable to or unwilling to do so because they need access to a smartphone. Furthermore, your phone\u2019s battery depletes over time; thus, you will only be able to verify your identity with this approach if your phone runs out of juice.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"security-breaches\">\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4fb5\u5bb3<\/h3>\n\n\n<p>Authentication systems are only as secure as the technology they use. For example, push authentication is more secure than other types of identification. A fraudulent request, for example, may be acknowledged by a user by accident. It\u2019s too easy to fall into the trap of clicking \u201capprove\u201d after getting an email from a device.<\/p>\n\n\n\n<p>However, push notifications may help to reduce this disadvantage. When a user receives a push notification, it will prompt them to accept the app\u2019s terms and conditions. \u201cPlease approve request ECG2 on the local system,\u201d says the phone, and the user must link the number with permission. Furthermore, independent elements have no impact on an app\u2019s security. Smartphones are just like any other technological device with an operating system regarding vulnerability to attack and infection. Android phones are particularly vulnerable to attacks and malware.<\/p>\n\n\n\n<p><strong>\u7d50\u8ad6\u3068\u3057\u3066<\/strong><\/p>\n\n\n\n<p>While push notification authentication has some disadvantages, the advantages outweigh the disadvantages. The fact that it\u2019s a low-cost security measure that is easy to set up and use makes it an attractive option for businesses.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u30d3\u30b8\u30cd\u30b9\u3084\u9867\u5ba2\u30c7\u30fc\u30bf\u306e\u5b89\u5168\u3092\u5b88\u308b\u305f\u3081\u306b\u306f\u3001\u30a2\u30af\u30bb\u30b9\u6a29\u3092\u4e0e\u3048\u308b\u524d\u306b\u30e6\u30fc\u30b6\u30fc\u3092\u8a8d\u8a3c\u3059\u308b\u65b9\u6cd5\u304c\u5fc5\u8981\u3067\u3059\u3002\u30d7\u30c3\u30b7\u30e5\u901a\u77e5\u8a8d\u8a3c\u306f\u3001\u7c21\u5358\u3067\u5b89\u5168\u306a\u65b9\u6cd5\u3067\u3059\u3002 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ja\/%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3\/%e3%83%97%e3%83%83%e3%82%b7%e3%83%a5%e9%80%9a%e7%9f%a5%e8%aa%8d%e8%a8%bc-%e4%bb%95%e7%b5%84%e3%81%bf%e3%81%a8%e7%9f%a5%e3%81%a3%e3%81%a6%e3%81%8a%e3%81%8f%e3%81%b9%e3%81%8d%e3%81%93%e3%81%a8\/\">\u7d9a\u304d\u3092\u8aad\u3080 <span class=\"screen-reader-text\">\u30d7\u30c3\u30b7\u30e5\u901a\u77e5\u8a8d\u8a3c - \u305d\u306e\u4ed5\u7d44\u307f\u3068\u77e5\u3063\u3066\u304a\u304f\u3079\u304d\u3053\u3068<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":383,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[27],"tags":[],"class_list":["post-382","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is Push Notification Authentication | securitybriefing.net<\/title>\n<meta name=\"description\" content=\"Push Notification Authentication is easy, secure authentication method keeps your business and customer data safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ja\/\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\/\u30d7\u30c3\u30b7\u30e5\u901a\u77e5\u8a8d\u8a3c-\u4ed5\u7d44\u307f\u3068\u77e5\u3063\u3066\u304a\u304f\u3079\u304d\u3053\u3068\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Push Notification Authentication | securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"Push Notification Authentication is easy, secure authentication method keeps your business and customer data safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ja\/\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\/\u30d7\u30c3\u30b7\u30e5\u901a\u77e5\u8a8d\u8a3c-\u4ed5\u7d44\u307f\u3068\u77e5\u3063\u3066\u304a\u304f\u3079\u304d\u3053\u3068\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-13T21:34:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Push-Notification.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Push Notification Authentication &#8211; How It Works and What You Need to Know\",\"datePublished\":\"2022-07-13T21:34:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/\"},\"wordCount\":920,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Push-Notification.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"ja\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/\",\"url\":\"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/\",\"name\":\"What is Push Notification Authentication | securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Push-Notification.jpg\",\"datePublished\":\"2022-07-13T21:34:48+00:00\",\"description\":\"Push Notification Authentication is easy, secure authentication method keeps your business and customer data safe.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Push-Notification.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Push-Notification.jpg\",\"width\":640,\"height\":427,\"caption\":\"Push Notification\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Push Notification Authentication &#8211; How It Works and What You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ja\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u30d7\u30c3\u30b7\u30e5\u901a\u77e5\u8a8d\u8a3c\u3068\u306f | securitybriefing.net","description":"\u30d7\u30c3\u30b7\u30e5\u901a\u77e5\u8a8d\u8a3c\u306f\u7c21\u5358\u3067\u5b89\u5168\u306a\u8a8d\u8a3c\u65b9\u6cd5\u3067\u3042\u308a\u3001\u30d3\u30b8\u30cd\u30b9\u3068\u9867\u5ba2\u306e\u30c7\u30fc\u30bf\u3092\u5b89\u5168\u306b\u4fdd\u3061\u307e\u3059\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ja\/\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\/\u30d7\u30c3\u30b7\u30e5\u901a\u77e5\u8a8d\u8a3c-\u4ed5\u7d44\u307f\u3068\u77e5\u3063\u3066\u304a\u304f\u3079\u304d\u3053\u3068\/","og_locale":"ja_JP","og_type":"article","og_title":"What is Push Notification Authentication | securitybriefing.net","og_description":"Push Notification Authentication is easy, secure authentication method keeps your business and customer data safe.","og_url":"https:\/\/securitybriefing.net\/ja\/\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\/\u30d7\u30c3\u30b7\u30e5\u901a\u77e5\u8a8d\u8a3c-\u4ed5\u7d44\u307f\u3068\u77e5\u3063\u3066\u304a\u304f\u3079\u304d\u3053\u3068\/","og_site_name":"Security Briefing","article_published_time":"2022-07-13T21:34:48+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Push-Notification.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"security","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"4\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Push Notification Authentication &#8211; How It Works and What You Need to Know","datePublished":"2022-07-13T21:34:48+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/"},"wordCount":920,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Push-Notification.jpg","articleSection":["Security"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/","url":"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/","name":"\u30d7\u30c3\u30b7\u30e5\u901a\u77e5\u8a8d\u8a3c\u3068\u306f | securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Push-Notification.jpg","datePublished":"2022-07-13T21:34:48+00:00","description":"\u30d7\u30c3\u30b7\u30e5\u901a\u77e5\u8a8d\u8a3c\u306f\u7c21\u5358\u3067\u5b89\u5168\u306a\u8a8d\u8a3c\u65b9\u6cd5\u3067\u3042\u308a\u3001\u30d3\u30b8\u30cd\u30b9\u3068\u9867\u5ba2\u306e\u30c7\u30fc\u30bf\u3092\u5b89\u5168\u306b\u4fdd\u3061\u307e\u3059\u3002.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Push-Notification.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Push-Notification.jpg","width":640,"height":427,"caption":"Push Notification"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/security\/push-notification-authentication-how-it-works-and-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Push Notification Authentication &#8211; How It Works and What You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d6\u30ea\u30fc\u30d5\u30a3\u30f3\u30b0","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d6\u30ea\u30fc\u30d5\u30a3\u30f3\u30b0","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"\u30ac\u30d0\u30e1\u30f3\u30c8\u30fb\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u8a8c\u306e\u30b7\u30cb\u30a2\u30fb\u30b9\u30bf\u30c3\u30d5\u30fb\u30e9\u30a4\u30bf\u30fc\u3002\u4ee5\u524d\u306fPYMNTS\u3068The Bay State Banner\u306b\u5bc4\u7a3f\u3057\u3001\u30ab\u30fc\u30cd\u30ae\u30fc\u30e1\u30ed\u30f3\u5927\u5b66\u3067\u30af\u30ea\u30a8\u30a4\u30c6\u30a3\u30d6\u30fb\u30e9\u30a4\u30c6\u30a3\u30f3\u30b0\u306e\u5b66\u58eb\u53f7\u3092\u53d6\u5f97\u3002\u30dc\u30b9\u30c8\u30f3\u90ca\u5916\u306b\u62e0\u70b9\u3092\u7f6e\u304f\u3002","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ja\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/posts\/382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/comments?post=382"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/posts\/382\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/media\/383"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/media?parent=382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/categories?post=382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/tags?post=382"}],"curies":[{"name":"\u30ef\u30fc\u30c9\u30d7\u30ec\u30b9","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}