TW202030494A - Position identifying system, position identifying device, position identifying method, position identifying program, computer readable recording medium, and recorded equipment - Google Patents

Position identifying system, position identifying device, position identifying method, position identifying program, computer readable recording medium, and recorded equipment Download PDF

Info

Publication number
TW202030494A
TW202030494A TW108137070A TW108137070A TW202030494A TW 202030494 A TW202030494 A TW 202030494A TW 108137070 A TW108137070 A TW 108137070A TW 108137070 A TW108137070 A TW 108137070A TW 202030494 A TW202030494 A TW 202030494A
Authority
TW
Taiwan
Prior art keywords
location
time
personal
mobile terminal
terminal
Prior art date
Application number
TW108137070A
Other languages
Chinese (zh)
Other versions
TWI748262B (en
Inventor
足立安比古
Original Assignee
日商極簡付股份有限公司 日本國大阪府大阪市北區角田町1 番12 號
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 日商極簡付股份有限公司 日本國大阪府大阪市北區角田町1 番12 號 filed Critical 日商極簡付股份有限公司 日本國大阪府大阪市北區角田町1 番12 號
Publication of TW202030494A publication Critical patent/TW202030494A/en
Application granted granted Critical
Publication of TWI748262B publication Critical patent/TWI748262B/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S11/00Systems for determining distance or velocity not using reflection or reradiation
    • G01S11/02Systems for determining distance or velocity not using reflection or reradiation using radio waves
    • G01S11/06Systems for determining distance or velocity not using reflection or reradiation using radio waves using intensity measurements
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/14Determining absolute distances from a plurality of spaced points of known location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • H04B17/318Received signal strength
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/023Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/0205Details
    • G01S5/021Calibration, monitoring or correction

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Quality & Reliability (AREA)
  • Electromagnetism (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

To enable position detection of a personal portable terminal to be performed stably indoors. A personal portable terminal 10 is provided with a personal terminal side transmitting unit 11 for transmitting to a position identifying device 20 a position identifying signal for use in position identification, and a personal terminal side control unit 12 for controlling the personal terminal side transmitting unit 11, wherein the position identifying device 20 is provided with: a plurality of first position identification side receiving units 22A, 22B arranged in first positions separated by a first distance from the personal portable terminal 10, for receiving the position identifying signal transmitted by the personal terminal side transmitting unit 11; a plurality of second position identification side receiving units 23A, 23B arranged in second positions which are positions that are different from the first positions, and which are separated from the personal portable terminal 10 by a second distance greater than the first distance; and a position identification side computing unit 25 for identifying the position of the personal portable terminal 10 on the basis of a strength difference between the position identifying signals received by each of the plurality of first position identification side receiving units 22A, 22B and second position identification side receiving units 23A, 23B.

Description

位置特定系統、位置特定裝置、位置特定方法、位置特定程式及電腦可讀取之記錄媒體及記錄之機器Location-specific systems, location-specific devices, location-specific methods, location-specific programs, computer-readable recording media and recording machines

本發明係關於一種位置特定系統、位置特定裝置、位置特定方法、位置特定程式及電腦可讀取之記錄媒體及記錄之機器。The present invention relates to a location specific system, a location specific device, a location specific method, a location specific program, a computer readable recording medium and a recording machine.

先前,作為檢測、測定移動終端或物體等之位置之技術,已知有使用GPS(Global Positioning System,全球定位系統)之位置測定。又,作為亦能夠實現GPS電波難以透過之室內之測位之方法,已知有根據與基地台或存取點等之無線通信之狀況測定位置之方法。Previously, as a technique for detecting and measuring the position of a mobile terminal or an object, a position measurement using GPS (Global Positioning System) is known. In addition, as a method that can also realize a position measurement in a room where GPS radio waves are difficult to transmit, a method of determining a position based on the status of wireless communication with a base station or an access point is known.

作為此種室內之通常之位置測定之方法,有Wi-Fi測位、基地台測位、音波測位、Bluetooth(藍芽)測位(BLE信標)、可見光測位、相機圖像測位、氣壓測位、PDR(Pedestrian Dead-Reckoning,行人航位推算)、地磁測位、GPS、IMES(Indoor Messaging System,室內訊息系統)等各種方法。其等之中,作為可不取出智慧型手機終端等而非觸碰(touch)地對終端本身進行測位之物理性之利用方法,可列舉使用氣壓、PDR、地磁、無線及光者。As the usual method of indoor location measurement, there are Wi-Fi positioning, base station positioning, sonic positioning, Bluetooth (Bluetooth) positioning (BLE beacon), visible light positioning, camera image positioning, atmospheric pressure positioning, PDR ( Pedestrian Dead-Reckoning, pedestrian dead-reckoning), geomagnetic positioning, GPS, IMES (Indoor Messaging System, indoor messaging system) and other methods. Among them, as a physical utilization method that can locate the terminal itself without taking out the smart phone terminal, etc., instead of touching it, there are those using air pressure, PDR, geomagnetism, wireless, and light.

又,作為通常之測定位置之運算法,已知有測定電波或光之強度之三角測量、對週期性之電波或光測定與對象物之通信角度或時間之TOF(Time of Flight,飛時測距)、根據基於相對性理論之原子鐘等精度較高之複數個裝置之位置資訊進行測定之方法、根據加速度、陀螺儀、地磁等感測器推算移動之方向及速度之PDR、將環境特有之物理資訊預先資料庫化並利用匹配處理進行位置測定之所謂指紋分析(fingerprinting)法等(專利文獻1、專利文獻2、非專利文獻1)。In addition, as a common method for determining position, there are known triangulation to measure the intensity of electric waves or light, and TOF (Time of Flight, to measure the communication angle or time of periodic electric waves or light to an object). Distance), the method of measuring the position information of multiple devices with higher precision such as atomic clocks based on the theory of relativity, the PDR of the direction and speed of movement estimated by sensors such as acceleration, gyroscope, and geomagnetism, and the unique environment The so-called fingerprinting method, etc. (Patent Document 1, Patent Document 2, Non-Patent Document 1) in which physical information is pre-database and the position is measured by matching processing.

位置測定多數情況下組合該等物理性之利用方法與運算法而利用。該等無線通信中存在如下方法,即,藉由接收基地台或終端等週期性地發送之信標信號,而偵測終端進出信標區域。作為該信標信號,有基於能夠以極少之功耗進行通信且低成本、通用之BLE(Bluetooth Low Energy,藍芽低功耗)標準的BLE信標。BLE信標於無線標準之中亦為極低消耗且通用。認為若能夠使用該BLE信標針對攜帶智慧型手機終端等移動之人逐個地高速且高精度地進行捕捉、區分、辨識,則不僅用於位置判定,而且可非觸碰地將代替鑰匙僅藉由靠近便可開鎖、或者完成所需之支付等認證所附隨之行為自動化。因此,嘗試提高位置精度(專利文獻3、4)。 例如,為了與支付之認證相關之安全,亦開發有分別確定信標基地台與終端之構造(專利文獻5)。然而,由於未能與位置之測定協作,故為了特定出支付者,而於收銀機等顯示臉等並手動地特定出交遞商品等之對象。除此以外,亦提出有利用NFC(Near Field Communication,近距離無線通信)或二維條碼等進行支付終端之認證等方法,但均未報告非觸碰地將位置測定與支付聯動之安全方法。 [先前技術文獻] [專利文獻]In most cases, position measurement is used in combination with these physical utilization methods and algorithms. There is a method in such wireless communication, namely, by receiving a beacon signal periodically sent by a base station or a terminal, and detecting that the terminal enters and exits the beacon area. As the beacon signal, there is a BLE beacon based on the low-cost, universal BLE (Bluetooth Low Energy) standard that can communicate with very little power consumption. BLE beacons are also extremely low-consumption and universal among wireless standards. It is believed that if the BLE beacon can be used to capture, distinguish, and identify mobile people with smart phones and other mobile terminals at high speed and with high precision, it will not only be used for location determination, but also a substitute key can be borrowed without touching it. Automated actions attached to authentication such as unlocking the lock or completing the required payment by approaching. Therefore, an attempt is made to improve the position accuracy (Patent Documents 3 and 4). For example, for the security related to the authentication of payment, a structure for separately identifying a beacon base station and a terminal has also been developed (Patent Document 5). However, since it cannot cooperate with the measurement of the location, in order to identify the payer, a face or the like is displayed on a cash register, etc., and the object of the delivery of goods or the like is manually identified. In addition, methods such as authentication of payment terminals using NFC (Near Field Communication) or two-dimensional barcodes have also been proposed, but none of them report a secure method of linking location measurement and payment without touch. [Prior Technical Literature] [Patent Literature]

[專利文獻1]日本專利特開2008-104029號公報 [專利文獻2]日本專利特表2012-521557號公報 [專利文獻3]日本專利特開2015-200504號公報 [專利文獻4]日本專利特開2017-17491號公報 [專利文獻5]日本專利特表2017-501620號公報 [非專利文獻][Patent Document 1] Japanese Patent Laid-Open No. 2008-104029 [Patent Document 2] Japanese Patent Publication No. 2012-521557 [Patent Document 3] Japanese Patent Laid-Open No. 2015-200504 [Patent Document 4] Japanese Patent Laid-Open No. 2017-17491 [Patent Document 5] Japanese Patent Publication No. 2017-501620 [Non-Patent Literature]

[非專利文獻1]He, Suining, Tianyang Hu, and S-H. Gary Chan. "Contour-based trilateration for indoor fingerprinting localization." Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems. ACM, 2015.[Non-Patent Document 1] He, Suining, Tianyang Hu, and S-H. Gary Chan. "Contour-based trilateration for indoor fingerprinting localization." Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems. ACM, 2015.

[發明所欲解決之問題][The problem to be solved by the invention]

本發明之目的之一在於提供一種於室內亦能穩定地進行位置檢測之位置特定系統、位置特定裝置、位置特定方法、位置特定程式及電腦可讀取之記錄媒體及記錄之機器。 [解決問題之技術手段及發明效果]One of the objectives of the present invention is to provide a position identification system, a position identification device, a position identification method, a position identification program, a computer-readable recording medium and a recording machine that can perform position detection stably even indoors. [Technical means to solve the problem and the effect of the invention]

根據本發明之第1態樣之位置特定系統,其係具備成為特定出位置之對象之由個人攜帶之個人移動終端、及特定出上述個人移動終端之位置之位置特定裝置者;且上述個人移動終端具備:個人終端側發送部,其係用以對上述位置特定裝置發送用於位置之特定之位置特定信號;及個人終端側控制部,其控制上述個人終端側發送部;上述位置特定裝置具備:複數個第一位置特定側接收部及複數個第二位置特定側接收部,其等係用以接收上述個人終端側發送部所發送之位置特定信號,上述複數個第一位置特定側接收部配置於與上述個人移動終端隔開第一距離之第一位置,上述複數個第二位置特定側接收部配置於與上述第一位置不同之第二位置且為與上述個人移動終端隔開較上述第一距離長之第二距離之位置;以及位置特定側運算部,其係用以基於由上述複數個第一位置特定側接收部及第二位置特定側接收部分別接收到之位置特定信號之強度差,特定出上述個人移動終端之位置。根據上述構成,藉由利用位置特定信號之強度差,能夠減小接收個人終端側發送部所發出之位置特定信號之複數個位置特定側接收部中之信號強度之偏差,而能夠準確地且於短時間內測定個人移動終端之位置。According to the position identification system of the first aspect of the present invention, it is provided with a personal mobile terminal carried by an individual that becomes an object of identifying a location, and a location identifying device that identifies the location of the personal mobile terminal; and the above-mentioned personal mobility The terminal is provided with: a personal terminal-side transmitting unit for transmitting a position-specific signal for specifying a position to the position specifying device; and a personal terminal-side control unit for controlling the personal terminal-side transmitting unit; the position specifying device includes : A plurality of first position specifying side receiving units and a plurality of second position specifying side receiving units, which are used to receive the position specifying signal sent by the personal terminal side transmitting unit, the plurality of first position specifying side receiving units Are arranged at a first position separated from the personal mobile terminal by a first distance, and the plurality of second position specific side receiving portions are arranged at a second position different from the first position and are separated from the personal mobile terminal than the above The position of the first distance and the second distance; and the position specifying side calculation unit, which is used to determine the position specifying signals received by the plurality of first position specifying side receiving units and the second position specifying side receiving units. The strength is poor, and the location of the personal mobile terminal is specified. According to the above configuration, by using the difference in the strength of the position-specific signal, it is possible to reduce the deviation of the signal strength in the plurality of position-specific receivers that receive the position-specific signal from the transmitter on the personal terminal side, and can accurately and accurately Measure the location of personal mobile terminals in a short time.

又,根據本發明之第2態樣之位置特定系統,除了上述構成以外,還可構成為上述位置特定側運算部計算如下條件式而特定出上述個人移動終端之位置,上述條件式係比較由上述複數個第一位置特定側接收部所接收之位置特定信號之電波強度與由上述複數個第二位置特定側接收部所接收之位置特定信號之電波強度的差、和預先設定之閾值之大小。Furthermore, according to the position specifying system of the second aspect of the present invention, in addition to the above configuration, the position specifying side computing unit can also be configured to calculate the following conditional expression to specify the position of the personal mobile terminal. The conditional expression is compared by The difference between the radio wave intensity of the position identifying signal received by the plurality of first position identifying side receiving units and the radio wave intensity of the position identifying signal received by the plurality of second position identifying side receiving units, and the magnitude of a preset threshold .

進而,根據本發明之第3態樣之位置特定系統,除了上述任一構成以外,還可構成為上述位置特定側運算部計算如下條件式而特定出上述個人移動終端之位置,上述條件式係比較由上述複數個第一位置特定側接收部所接收之位置特定信號之電波強度之平均值與由上述複數個第二位置特定側接收部所接收之位置特定信號之電波強度之平均值的差、和預先設定之閾值之大小。Furthermore, according to the position specifying system of the third aspect of the present invention, in addition to any of the above-mentioned configurations, the position specifying side computing unit may calculate the following conditional expression to specify the position of the personal mobile terminal. The conditional expression is Comparing the difference between the average value of the radio wave intensity of the location specifying signal received by the plurality of first location specifying side receiving units and the average value of the radio wave intensity of the location specifying signal received by the plurality of second location specifying side receiving units , And the size of the preset threshold.

進而,又,根據本發明之第4態樣之位置特定系統,除了上述任一構成以外,上述個人終端側控制部還可以如下方式進行控制,即,檢測出上述個人移動終端在一定距離(例如10 m或100 m等)以內接近上述位置特定裝置之後,由上述個人終端側發送部對上述位置特定裝置發送位置特定信號。根據上述構成,能夠以於攜帶個人移動終端之個人接近位置特定裝置之前,由個人終端側發送部對位置特定裝置發送位置特定信號之方式進行控制,而能夠於個人移動終端與位置特定裝置之間執行順利之位置特定動作。Furthermore, according to the position specifying system of the fourth aspect of the present invention, in addition to any of the above-mentioned configurations, the personal terminal side control unit can also perform control in such a way that it detects that the personal mobile terminal is at a certain distance (for example, After approaching the location specifying device within 10 m or 100 m, etc., the personal terminal side transmitting unit transmits a location specifying signal to the location specifying device. According to the above configuration, it is possible to control the way that the personal terminal-side transmitting unit transmits the location specifying signal to the location specifying device before the person carrying the personal mobile terminal approaches the location specifying device, and it is possible to communicate between the personal mobile terminal and the location specifying device. Perform smooth location-specific actions.

進而,又,根據本發明之第5態樣之位置特定系統,除了上述任一構成以外,還可進而具備啟動信號發送機,該啟動信號發送機係設置於與上述位置特定裝置相距一定距離(例如10 m或100 m等)以上之位置,且用以朝向上述個人移動終端發送使上述個人終端側發送部向上述位置特定裝置發送位置特定信號之發送動作啟動的啟動信號。根據上述構成,變得能夠於攜帶個人移動終端之個人接近位置特定裝置之前階段預先啟動個人終端側發送部,而能夠於個人移動終端與位置特定裝置之間執行順利之位置特定動作。Furthermore, according to the position specifying system of the fifth aspect of the present invention, in addition to any of the above-mentioned configurations, it may further include an activation signal transmitter that is provided at a certain distance from the position specifying device ( For example, at a position above 10 m or 100 m, etc., and used to send an activation signal to the personal mobile terminal to start the transmission operation of the personal terminal-side transmitting unit to transmit the position specifying signal to the position specifying device. According to the above configuration, it becomes possible to activate the personal terminal-side transmitting unit in advance before the personal mobile terminal carrying the personal mobile terminal approaches the position specifying device, and it is possible to perform a smooth position specifying operation between the personal mobile terminal and the position specifying device.

進而,又,根據本發明之第6態樣之位置特定系統,除了上述任一構成以外,還可構成為上述個人終端側發送部與上述位置特定側接收部可雙向通信,上述位置特定側運算部藉由上述位置特定側接收部與上述個人終端側發送部進行通信,而進行上述個人移動終端之認證。根據上述構成,變得能夠認證攜帶個人移動終端之個人,而能夠實現區分個人之位置檢測。Furthermore, according to the position specifying system of the sixth aspect of the present invention, in addition to any of the above-mentioned configurations, the personal terminal side transmitting unit and the position specifying side receiving unit can communicate bidirectionally, and the position specifying side calculation The unit performs authentication of the personal mobile terminal by communicating with the receiving unit on the location specifying side and the transmitting unit on the personal terminal side. According to the above configuration, it becomes possible to authenticate the individual who carries the personal mobile terminal, and it is possible to realize the position detection of the individual.

進而,又,根據本發明之第7態樣之位置特定系統,除了上述任一構成以外,還可構成為上述個人移動終端進而具備用以保持預先被賦予之固有之識別資訊之個人終端側記憶部,上述個人終端側控制部於上述個人終端側發送部與上述位置特定側接收部進行通信時,可發行上述個人終端側記憶部所保持之固有之識別資訊、及每個該識別資訊所固有之僅可使用一次之一次性密碼,上述位置特定側運算部對上述位置特定側接收部自上述個人終端側發送部接收到之上述識別資訊及一次性密碼進行認證。Furthermore, according to the position identification system of the seventh aspect of the present invention, in addition to any of the above-mentioned configurations, the above-mentioned personal mobile terminal can be further provided with a personal terminal-side memory for holding inherent identification information assigned in advance When the personal terminal-side sending unit communicates with the location-specific receiving unit, the personal terminal-side control unit may issue unique identification information held by the personal terminal-side memory unit, and each unique identification information For a one-time password that can only be used once, the location specifying side computing unit authenticates the identification information and the one-time password received by the location specifying side receiving unit from the personal terminal side sending unit.

進而,又,根據本發明之第8態樣之位置特定系統,除了上述任一構成以外,還可構成為上述個人移動終端進而具備用以產生與時刻相關之資訊之個人終端側時刻部,上述個人終端側記憶部保持有於上述個人移動終端與位置特定裝置之間預先交換之被賦予至該個人移動終端之識別資訊所固有之公共密鑰、及用於產生上述一次性密碼之既定函數,上述位置特定裝置進而具備:位置特定側記憶部,其將被賦予至上述個人移動終端之識別資訊與每個該識別資訊所固有之公共密鑰建立關連地保持;及位置特定側時刻部,其係用以產生與時刻相關之資訊;且以如下方式構成,即,於上述個人移動終端將上述識別資訊及一次性密碼傳送至上述位置特定裝置時,利用上述個人終端側時刻部獲取與上述個人終端側控制部發行上述一次性密碼時之發行時刻相關之資訊,並將其應用於上述個人終端側記憶部所保持之既定函數,進一步以上述個人終端側記憶部所保持之公共密鑰進行加密後,發行上述一次性密碼;且上述位置特定側運算部係自上述位置特定側時刻部獲取上述位置特定側接收部自上述個人終端側發送部接收上述識別資訊及一次性密碼時之接收時刻,並且根據所接收到之上述識別資訊,自上述位置特定側記憶部搜尋與該識別資訊對應之公共密鑰,使用所獲得之公共密鑰將上述一次性密碼解密,而獲取經函數化之與發行時刻相關之資訊,並將於一接收時刻所獲取之與發行時刻相關之資訊和與上述一接收時刻相關之資訊的差量與在另一接收時刻所獲取之與發行時刻相關之資訊和與上述另一接收時刻相關之資訊的差量進行比較,若其差為既定時間內,則對上述個人移動終端進行認證,若並非既定時間內,則不對上述個人移動終端進行認證。Furthermore, according to the location specifying system of the eighth aspect of the present invention, in addition to any of the above-mentioned configurations, the personal mobile terminal may further include a personal terminal-side time section for generating information related to the time. The personal terminal-side memory section holds the public key inherent in the identification information assigned to the personal mobile terminal and a predetermined function for generating the one-time password, which is exchanged in advance between the personal mobile terminal and the location specifying device, The location specifying device further includes: a location specifying side memory portion that associates the identification information assigned to the personal mobile terminal with a public key inherent to each identification information; and a location specifying side time portion, which It is used to generate time-related information; and is structured in the following way, that is, when the personal mobile terminal transmits the identification information and one-time password to the location specifying device, the personal terminal-side time unit is used to obtain the information related to the personal The terminal-side control unit issues the information related to the time of issuance when the one-time password is issued, and applies it to the predetermined function held by the personal terminal-side storage unit, and further encrypts it with the public key held by the personal terminal-side storage unit After that, the one-time password is issued; and the location specifying side computing unit acquires the receiving time when the location specifying side receiving unit receives the identification information and the one-time password from the personal terminal side transmitting unit from the location specifying side time unit, And based on the received identification information, search for the public key corresponding to the identification information from the location specific side memory, use the obtained public key to decrypt the one-time password, and obtain the functionalized and issued Time-related information, and the difference between the information related to the issuance time acquired at one receiving time and the information related to the above-mentioned one receiving time and the information related to the issuance time acquired at another receiving time and the above The difference of information related to another reception time is compared, and if the difference is within a predetermined time, the personal mobile terminal is authenticated, and if it is not within the predetermined time, the personal mobile terminal is not authenticated.

進而,又,根據本發明之第9態樣之位置特定系統,除了上述任一構成以外,還可構成為上述位置特定側運算部藉由將於上述一接收時刻所獲取之與發行時刻相關之資訊和與上述一接收時刻相關之資訊之差量作為認證基準資訊保存於上述位置特定側記憶部,將於另一接收時刻所獲取之與發行時刻相關之資訊和與上述另一接收時刻相關之資訊的差量與上述位置特定側記憶部中所保存之認證基準資訊進行比較,而進行上述個人移動終端之認證。根據上述構成,藉由保持認證基準資訊,並將逐次獲得之資料與該認證基準資訊進行比較,可容易地進行於一連串之通信中所獲取之資料之認證。Furthermore, according to the position specifying system of the ninth aspect of the present invention, in addition to any of the above-mentioned configurations, the position specifying-side computing unit may be configured to correlate the issue time obtained at the one receiving time The difference between the information and the information related to the above-mentioned one receiving time is stored as the authentication reference information in the above-mentioned location-specific side memory, and the information related to the issuing time obtained at the other receiving time and the information related to the other receiving time The difference of the information is compared with the authentication reference information stored in the memory section of the location specifying side, and the authentication of the personal mobile terminal is performed. According to the above structure, by keeping the authentication standard information and comparing the successively obtained data with the authentication standard information, the authentication of the data acquired in a series of communication can be easily performed.

進而,又,根據本發明之第10態樣之位置特定系統,除了上述任一構成以外,還可構成為於經過一定時間(例如1分鐘、10分鐘或1小時等)之後刪除上述位置特定側記憶部中所保存之認證基準資訊。根據上述構成,藉由在進行新的通信時另外重新獲取成為認證之基準之認證基準資訊,可防止冒充,而進一步提高安全性。Furthermore, according to the position specifying system of the tenth aspect of the present invention, in addition to any of the above configurations, it can be configured to delete the position specifying side after a certain period of time (for example, 1 minute, 10 minutes, or 1 hour, etc.) The authentication standard information stored in the memory. According to the above-mentioned structure, by additionally acquiring authentication standard information that becomes the standard of authentication when new communication is performed, impersonation can be prevented, and security can be further improved.

進而,又,根據本發明之第11態樣之位置特定系統,除了上述任一構成以外,還可構成為上述位置特定側運算部於已認證上述個人移動終端之情形時,進行結算。Furthermore, according to the location specifying system of the eleventh aspect of the present invention, in addition to any of the above-mentioned configurations, the location specifying-side computing unit may be configured to perform settlement when the personal mobile terminal is authenticated.

進而,又,根據本發明之第12態樣之位置特定系統,除了上述任一構成以外,還可使上述位置特定裝置進而具備位置特定側控制部,該位置特定側控制部係用以根據藉由上述位置特定側運算部所測定出之上述個人移動終端之位置,對限制攜帶上述個人移動終端之個人之移動之動作進行控制。根據上述構成,可一面辨識攜帶個人移動終端之個人,一面根據該個人之位置而控制其移動。Furthermore, according to the position specifying system of the twelfth aspect of the present invention, in addition to any of the above-mentioned configurations, the position specifying device may further include a position specifying side control unit, which is used for The position of the personal mobile terminal measured by the position specifying side computing unit controls the movement of the person carrying the personal mobile terminal. According to the above configuration, it is possible to recognize the individual carrying the personal mobile terminal while controlling the movement of the individual based on the location of the individual.

進而,又,根據本發明之第13態樣之位置特定系統,除了上述任一構成以外,還可使上述位置特定裝置為具有對攜帶個人移動終端之個人之通過進行限制之開閉式門板部的閘機,且上述位置特定側控制部控制上述門板部之開閉。根據上述構成,可藉由個人之辨識及位置檢測,而判斷能否進行對攜帶個人移動終端之個人之通過進行限制之閘機之門板部的開閉。Furthermore, according to the position specifying system of the thirteenth aspect of the present invention, in addition to any of the above-mentioned configurations, the position specifying device may be a type having an opening and closing door panel that restricts the passage of a person carrying a personal mobile terminal The gate, and the position specifying side control unit controls the opening and closing of the door panel. According to the above configuration, it is possible to determine whether the door panel of the gate that restricts the passage of the individual carrying the personal mobile terminal can be opened and closed by the identification and position detection of the individual.

進而,又,根據本發明之第14態樣之位置特定系統,除了上述任一構成以外,還可將上述個人終端側發送部與位置特定側接收部之通信方式設為BLE、RFID(Radio Frequency Identification,無線射頻識別)或Wi-Fi。Furthermore, according to the location identification system of the fourteenth aspect of the present invention, in addition to any of the above configurations, the communication method between the personal terminal side transmitting unit and the location identifying side receiving unit can be set to BLE, RFID (Radio Frequency Identification, radio frequency identification) or Wi-Fi.

進而,又,根據本發明之第15態樣之位置特定系統,除了上述任一構成以外,還可構成為上述個人移動終端作為公共交通工具之車票發揮功能,上述位置特定裝置對攜帶上述個人移動終端之個人之車票進行認證及結算。Furthermore, according to the position specifying system of the 15th aspect of the present invention, in addition to any of the above-mentioned configurations, the personal mobile terminal may also be configured to function as a ticket for public transportation, and the position specifying device is suitable for carrying the personal mobile The personal ticket of the terminal is authenticated and settled.

進而,又,根據本發明之第16態樣之位置特定系統,除了上述任一構成以外,還可構成為其係具備成為特定出位置之對象之由個人攜帶之個人移動終端、及特定出上述個人移動終端之位置之位置特定裝置者,且上述個人移動終端具備:個人終端側發送部,其係用以相對於上述位置特定裝置進行雙向通信;個人終端側控制部,其係用以控制上述個人終端側發送部;個人終端側記憶部,其係用以保持預先被賦予之固有之識別資訊、於上述個人移動終端與位置特定裝置之間預先交換之賦予至該個人移動終端之識別資訊所固有之公共密鑰、及用於產生上述一次性密碼之既定函數;以及個人終端側時刻部,其係用以產生與時刻相關之資訊;上述位置特定裝置具備:位置特定側接收部,其係用以與上述個人終端側發送部進行雙向通信;上述位置特定側運算部,其係用以藉由上述位置特定側接收部與上述個人終端側發送部進行通信,而進行上述個人移動終端之認證;位置特定側記憶部,其係用以將被賦予至上述個人移動終端之識別資訊與每個該識別資訊所固有之公共密鑰建立關連地保持;及位置特定側時刻部,其係用以產生與時刻相關之資訊;且以如下方式構成,即,上述個人終端側控制部於上述個人終端側發送部與上述位置特定側接收部進行通信時,可發行上述個人終端側記憶部所保持之固有之識別資訊、及每個該識別資訊所固有之僅可使用一次之一次性密碼,上述位置特定側運算部對上述位置特定側接收部自上述個人終端側發送部接收到之上述識別資訊及一次性密碼進行認證;且以如下方式構成,即,於上述個人移動終端將上述識別資訊及一次性密碼傳送至上述位置特定裝置時,利用上述個人終端側時刻部獲取與上述個人終端側控制部發行上述一次性密碼時之發行時刻相關之資訊,並將其應用於上述個人終端側記憶部中所保持之既定函數,進一步以上述個人終端側記憶部中所保持之公共密鑰進行加密後,發行上述一次性密碼;且上述位置特定側運算部係自上述位置特定側時刻部獲取上述位置特定側接收部自上述個人終端側發送部接收上述識別資訊及一次性密碼時之接收時刻,並且根據所接收到之上述識別資訊,自上述位置特定側記憶部搜尋與該識別資訊對應之公共密鑰,使用所獲得之公共密鑰將上述一次性密碼解密,而獲取經函數化之與發行時刻相關之資訊,將於一接收時刻所獲取之與發行時刻相關之資訊和與上述一接收時刻相關之資訊的差量與在另一接收時刻所獲取之與發行時刻相關之資訊和與上述另一接收時刻相關之資訊的差量進行比較,若其差為既定時間內,則對上述個人移動終端進行認證,若並非既定時間內,則不對上述個人移動終端進行認證。根據上述構成,變得可對攜帶個人移動終端之個人進行認證,而能夠進行區分個人之位置檢測。Furthermore, according to the location specifying system of the 16th aspect of the present invention, in addition to any of the above-mentioned configurations, it can also be configured to have a personal mobile terminal carried by an individual that becomes an object of specifying a location, and to specify the above The location specifying device of a personal mobile terminal, and the personal mobile terminal is equipped with: a personal terminal-side transmitting unit for two-way communication with the location specifying device; a personal terminal-side control unit for controlling the above Personal terminal-side sending part; personal terminal-side memory part, which is used to hold the inherent identification information assigned in advance, the identification information assigned to the personal mobile terminal exchanged in advance between the personal mobile terminal and the location specifying device The inherent public key and the predetermined function used to generate the above-mentioned one-time password; and the personal terminal-side time unit, which is used to generate time-related information; the above-mentioned location specifying device includes: a location specifying-side receiving unit, which is It is used for two-way communication with the personal terminal-side sending unit; the position-specific-side computing unit is used to communicate with the personal terminal-side sending unit through the location-specific receiving unit to perform authentication of the personal mobile terminal ; The location specific side memory portion, which is used to establish a relationship between the identification information assigned to the personal mobile terminal and the public key inherent in each of the identification information; and the location specific side time portion, which is used Generates time-related information; and is structured in such a way that the personal terminal side control section can issue the personal terminal side memory section when the personal terminal side transmitting section communicates with the location specifying side receiving section The unique identification information and the one-time password unique to each identification information that can be used only once, the location specifying side computing unit responds to the location specifying side receiving unit receiving the identification information from the personal terminal side sending unit and The one-time password is used for authentication; and is configured in such a way that when the personal mobile terminal transmits the identification information and the one-time password to the location specifying device, the personal terminal-side time unit is used to obtain the information from the personal terminal-side control unit The information related to the time of issuance when the one-time password is issued, and it is applied to the predetermined function held in the personal terminal-side memory section, and further encrypted with the public key held in the personal terminal-side memory section, Issuing the one-time password; and the location specifying side computing unit acquires the receiving time when the location specifying side receiving unit receives the identification information and the one-time password from the personal terminal transmitting unit from the location specifying side time unit, and according to For the received identification information, search for the public key corresponding to the identification information from the location-specific side memory, use the obtained public key to decrypt the one-time password, and obtain the functionalized correlation with the issuance time The information will be the difference between the information related to the issuing time obtained at one receiving time and the information related to the above one receiving time and the information related to the issuing time obtained at another receiving time and the other receiving Time-related information In comparison, if the difference is within a predetermined time, the personal mobile terminal is authenticated, and if it is not within the predetermined time, the personal mobile terminal is not authenticated. According to the above-mentioned structure, it becomes possible to authenticate the individual carrying the personal mobile terminal, and it is possible to perform position detection for distinguishing individuals.

進而,又,根據本發明之第17態樣之位置特定裝置,其係特定出成為特定出位置之對象之由個人攜帶之個人移動終端之位置者,且可具備:複數個第一位置特定側接收部及複數個第二位置特定側接收部,其等係用以接收上述個人移動終端自個人終端側發送部發送至上述位置特定裝置之用於位置之特定之位置特定信號,上述複數個第一位置特定側接收部配置於與上述個人移動終端隔開第一距離之第一位置,上述複數個第二位置特定側接收部配置於與上述第一位置不同之第二位置且為與上述個人移動終端隔開較上述第一距離長之第二距離之位置;以及位置特定側運算部,其係用以基於由上述複數個第一位置特定側接收部及第二位置特定側接收部分別接收到之位置特定信號之強度差,特定出上述個人移動終端之位置。根據上述構成,藉由利用位置特定信號之強度差,能夠減少接收個人終端側發送部所發出之位置特定信號之複數個位置特定側接收部中之信號強度之偏差,而能夠準確地且於短時間內測定個人移動終端之位置。Furthermore, according to the location specifying device of the 17th aspect of the present invention, it specifies the location of the personal mobile terminal carried by the individual as the object of the specified location, and may have: a plurality of first location specifying sides The receiving unit and a plurality of second location specifying side receiving units are used to receive the location specifying signal for location specifying that the personal mobile terminal sends from the personal terminal side sending unit to the location specifying device. A position specifying side receiving portion is arranged at a first position separated from the personal mobile terminal by a first distance, and the plurality of second position specifying side receiving portions are arranged at a second position different from the first position and are different from the personal mobile terminal. The mobile terminal is separated from a position at a second distance longer than the first distance; and a position specifying side calculation unit for receiving the plurality of first position specifying side receiving units and the second position specifying side receiving units respectively The difference in the strength of the specific signal to the location specifies the location of the above-mentioned personal mobile terminal. According to the above configuration, by using the difference in the strength of the position-specific signal, it is possible to reduce the deviation of the signal strength in the plurality of position-specific receivers that receive the position-specific signal from the transmitter on the personal terminal side, and can be accurate and short. Determine the location of the personal mobile terminal within time.

進而,又,根據本發明之第18態樣之位置特定方法,其係於具備成為特定出位置之對象之由個人攜帶之個人移動終端、及特定出上述個人移動終端之位置之位置特定裝置的位置特定系統中特定出上述個人移動終端之位置者,且可包括如下步驟:上述個人移動終端檢測出攜帶個人移動終端之個人在一定距離以內接近上述位置特定裝置之後,個人終端側控制部啟動個人終端側發送部;上述個人移動終端自個人終端側發送部對上述位置特定裝置發送用於位置之特定之位置特定信號;上述位置特定裝置分別利用複數個第一位置特定側接收部及複數個第二位置特定側接收部接收上述個人終端側發送部所發送之位置特定信號,上述複數個第一位置特定側接收部配置於與上述個人移動終端隔開第一距離之第一位置,上述複數個第二位置特定側接收部配置於與上述第一位置不同之第二位置且為與上述個人移動終端隔開較上述第一距離長之第二距離之位置;以及基於由上述複數個第一位置特定側接收部及第二位置特定側接收部分別接收到之位置特定信號之強度差,由位置特定側運算部特定出上述個人移動終端之位置。藉此,藉由利用位置特定信號之強度差,能夠減少接收個人終端側發送部所發送之位置特定信號之複數個位置特定側接收部中之信號強度之偏差,而能夠準確地且於短時間內測定個人移動終端之位置。Furthermore, according to the location specifying method of the eighteenth aspect of the present invention, it is provided with a personal mobile terminal carried by an individual as an object of specifying a location, and a location specifying device that specifies the location of the above-mentioned personal mobile terminal The location specifying system specifies the location of the personal mobile terminal, and may include the following steps: After the personal mobile terminal detects that the person carrying the personal mobile terminal approaches the location specifying device within a certain distance, the personal terminal side control unit activates the personal The terminal-side sending unit; the personal mobile terminal sends a location-specific signal for location-specification from the personal terminal-side sending unit to the location specifying device; the location specifying device uses a plurality of first location specifying side receiving portions and a plurality of second The second location specifying side receiving unit receives the location specifying signal sent by the personal terminal side transmitting unit, the plurality of first location specifying side receiving units are arranged at a first position separated from the personal mobile terminal by a first distance, and the plurality of The second position specifying side receiving portion is arranged at a second position different from the first position and is a position separated from the personal mobile terminal by a second distance longer than the first distance; and based on the plurality of first positions The position specifying signal intensity difference received by the specific side receiving unit and the second location specifying side receiving unit is determined by the position specifying side computing unit to specify the position of the personal mobile terminal. Thus, by using the difference in the strength of the position-specific signal, it is possible to reduce the deviation of the signal strength in the plurality of position-specific receivers that receive the position-specific signal transmitted by the personal terminal-side transmitter, and can accurately and in a short time Determine the location of personal mobile terminals within.

進而,又,根據本發明之第19態樣之位置特定方法,可設為除了上述以外,於上述個人終端側發送部發送位置特定信號之步驟之前,進而包括如下步驟:上述個人終端側發送部對上述位置特定側接收部傳送個人終端側記憶部所保持之固有之識別資訊、及每個該識別資訊所固有之僅可使用一次之一次性密碼;以及上述位置特定側運算部基於上述識別資訊及一次性密碼進行上述個人移動終端之認證;且上述個人移動終端將上述識別資訊及一次性密碼傳送至上述位置測定機之步驟係由個人終端側時刻部獲取與上述個人終端側控制部發行上述一次性密碼時之發行時刻相關之資訊,並將其應用於上述個人終端側記憶部所保持之既定函數,進一步以上述個人終端側記憶部所保持之公共密鑰進行加密後,發行上述一次性密碼;且上述位置特定側運算部基於上述識別資訊及一次性密碼進行上述個人移動終端之認證之步驟係上述位置特定側運算部自位置測定側時刻部獲取上述位置測定側通信部自上述個人終端側發送部接收上述識別資訊及一次性密碼時之接收時刻,並且根據所接收到之上述識別資訊,自上述位置測定側記憶部搜尋與該識別資訊對應之公共密鑰,使用所獲得之公共密鑰將上述一次性密碼解密,而獲取經函數化之與發行時刻相關之資訊,將於一接收時刻所獲取之與發行時刻相關之資訊和與上述一接收時刻相關之資訊的差量與在另一接收時刻所獲取之與發行時刻相關之資訊和與上述另一接收時刻相關之資訊的差量進行比較,若其差為既定時間內,則對上述個人移動終端進行認證,若並非既定時間內,則不對上述個人移動終端進行認證。藉此,變得可認證攜帶個人移動終端之個人,而能夠進行區分個人之位置檢測。Furthermore, according to the position identification method of the 19th aspect of the present invention, in addition to the above, before the step of transmitting the position identification signal by the personal terminal-side transmitting unit, the method further includes the following steps: the personal terminal-side transmitting unit To the receiving unit on the location specifying side, the unique identification information held by the memory on the personal terminal side and the one-time password unique to each of the identification information are transmitted to the receiving unit on the location specifying side; and the computing unit on the location specifying side is based on the identification information And a one-time password for authentication of the personal mobile terminal; and the personal mobile terminal transmits the identification information and the one-time password to the position measuring machine is obtained by the personal terminal-side time unit and issued by the personal terminal-side control unit The information related to the time of issuance of the one-time password is applied to the predetermined function held by the personal terminal-side storage unit, and the public key held by the personal terminal-side storage unit is further encrypted to issue the above-mentioned one-time password. Password; and the step of the location specifying side computing unit to authenticate the personal mobile terminal based on the identification information and one-time password is that the location specifying side computing unit acquires the location measurement side communication unit from the personal terminal from the location measurement side time unit The receiving time when the side transmitter receives the identification information and the one-time password, and based on the received identification information, searches for the public key corresponding to the identification information from the location measurement side memory, and uses the obtained public key The key decrypts the above-mentioned one-time password and obtains the functionalized information related to the issuance time. The difference between the information related to the issuance time obtained at one receiving time and the information related to the above-mentioned one receiving time is compared with the other Compare the difference between the information related to the issuance time obtained at one receiving time and the information related to the other receiving time. If the difference is within a predetermined time, the above personal mobile terminal is authenticated, if it is not within the predetermined time , The above personal mobile terminal is not authenticated. As a result, it becomes possible to authenticate the individual carrying the personal mobile terminal, and to detect the location of the individual.

進而,又,根據本發明之第20態樣之位置特定程式,其係於具備成為特定出位置之對象之由個人攜帶之個人移動終端、及特定出上述個人移動終端之位置之位置特定裝置的位置特定系統中特定出上述個人移動終端之位置者,且可使電腦實現如下功能,即:上述個人移動終端檢測出攜帶個人移動終端之個人在一定距離以內接近上述位置特定裝置之後,個人終端側控制部啟動個人終端側發送部;上述個人移動終端自個人終端側發送部對上述位置特定裝置發送用於位置之特定之位置特定信號;上述位置特定裝置分別利用複數個第一位置特定側接收部及複數個第二位置特定側接收部接收上述個人終端側發送部所發送之位置特定信號,上述複數個第一位置特定側接收部配置於與上述個人移動終端隔開第一距離之第一位置,上述複數個第二位置特定側接收部配置於與上述第一位置不同之第二位置且為與上述個人移動終端隔開較上述第一距離長之第二距離之位置;以及位置特定側運算部基於由上述複數個第一位置特定側接收部及第二位置特定側接收部分別接收到之位置特定信號之強度差,特定出上述個人移動終端之位置。藉此,藉由利用位置特定信號之強度差,能夠減少接收個人終端側發送部所發送之位置特定信號之複數個位置特定側接收部中之信號強度之偏差,而能夠準確地且於短時間內測定個人移動終端之位置。Furthermore, according to the position specifying program of the 20th aspect of the present invention, it is provided with a personal mobile terminal carried by an individual that becomes an object of specifying a location, and a location specifying device that specifies the location of the above-mentioned personal mobile terminal The location identification system specifies the location of the above-mentioned personal mobile terminal, and enables the computer to realize the following functions, that is, after the above-mentioned personal mobile terminal detects that the person carrying the personal mobile terminal approaches the above-mentioned location-specific device within a certain distance, the personal terminal side The control unit activates the personal terminal-side transmitting unit; the personal mobile terminal transmits from the personal terminal-side transmitting unit to the location specifying device a location specifying signal for location specification; the location specifying device uses a plurality of first location specifying receiving units respectively And a plurality of second location specifying side receiving units receive the location specifying signal sent by the personal terminal side transmitting unit, and the plurality of first location specifying side receiving units are arranged at a first position separated from the personal mobile terminal by a first distance , The plurality of second position specifying side receiving parts are arranged at a second position different from the first position and are separated from the personal mobile terminal by a second distance longer than the first distance; and a position specifying side calculation The unit specifies the location of the personal mobile terminal based on the difference in the strength of the location specifying signals respectively received by the plurality of first location specifying side receiving units and the second location specifying side receiving unit. Thus, by using the difference in the strength of the position-specific signal, it is possible to reduce the deviation of the signal strength in the plurality of position-specific receivers that receive the position-specific signal transmitted by the personal terminal-side transmitter, and can accurately and in a short time Determine the location of personal mobile terminals within.

又,第21態樣之電腦可讀取之記錄媒體或記錄之機器係儲存上述程式者。記錄媒體包含可儲存CD-ROM(compact disc read-only memory,唯讀光碟)、CD-R(compact disc-recordable,可錄光碟)、CD-RW(Compact Disc Rewritable,可重寫光碟)、軟碟、磁帶、MO(magneto-optical disk driver,磁性光碟機)、DVD-ROM(Digital Versatile Disc-Read Only Memory,唯讀數位多功能光碟)、DVD-RAM(Digital Versatile Disc-Random Access Memory,數位多功能光碟-隨機存取記憶體)、DVD-R(Digital Versatile Disc-Recordable,可記錄式數位化多功能光碟)、DVD+R(Digital Versatile Disc+Recordable,高級可記錄式數位化多功能光碟)、DVD-RW(Digital Versatile Disc-Rewritable,可重寫數位多功能光碟)、DVD+RW(Digital Versatile Disc+Rewritable,高級可重寫數位多功能光碟)、Blu-ray(藍光)(註冊商標)、HD DVD(High Definition- Digital Versatile Disc,高畫質數位多功能光碟)(AOD(Advanced Optical Disc,進階光碟))等磁碟、光碟、磁光碟或半導體記憶體及其他可儲存程式之媒體。又,程式除了儲存於上述記錄媒體而散發者以外,亦包含通過網際網路等網路線路藉由下載而散發之形態者。進而,記錄媒體包含可記錄程式之機器、例如將上述程式以軟體或韌體等形態安裝為可執行之狀態之通用或專用機器。進而,又,程式所包含之各處理或功能既可藉由電腦可執行之程式軟體來執行,亦可以既定之閘陣列(FPGA(Field Programmable Gate Array,場可程式化閘陣列)、ASIC(Application Specific Integrated Circuit,特殊應用積體電路)、DSP(Digital Signal Processor,數位信號處理器))等硬體、或者程式軟體與實現硬體之一部分要素之部分硬體模組混合存在之形式實現各部之處理。In addition, the computer-readable recording medium or recording machine of the 21st aspect stores the above-mentioned program. Recording media include storable CD-ROM (compact disc read-only memory), CD-R (compact disc-recordable), CD-RW (Compact Disc Rewritable), floppy disk Disc, tape, MO (magneto-optical disk driver), DVD-ROM (Digital Versatile Disc-Read Only Memory), DVD-RAM (Digital Versatile Disc-Random Access Memory, digital Versatile Disc-Random Access Memory), DVD-R (Digital Versatile Disc-Recordable, recordable digital versatile disc), DVD+R (Digital Versatile Disc+Recordable, advanced recordable digital versatile disc ), DVD-RW (Digital Versatile Disc-Rewritable, rewritable digital versatile disc), DVD+RW (Digital Versatile Disc+Rewritable, advanced rewritable digital versatile disc), Blu-ray (Blu-ray) (registered trademark) ), HD DVD (High Definition- Digital Versatile Disc) (AOD (Advanced Optical Disc, Advanced Optical Disc)) and other disks, optical discs, magneto-optical discs or semiconductor memory and other storage programs media. In addition, the program is not only stored in the above-mentioned recording medium and distributed, but also includes the form of being distributed by downloading through network lines such as the Internet. Furthermore, the recording medium includes a machine that can record a program, for example, a general-purpose or special-purpose machine that installs the above-mentioned program into an executable state in the form of software or firmware. Furthermore, the various processes or functions included in the program can be executed by computer-executable program software, or a predetermined field programmable gate array (FPGA (Field Programmable Gate Array), ASIC (Application Specific Integrated Circuit, DSP (Digital Signal Processor, digital signal processor)) or other hardware, or program software and some hardware modules that implement some of the hardware deal with.

以下,基於圖式對實施形態詳細地進行說明。再者,於以下之說明中,視需要使用表示特定之方向或位置之用語(例如,「上」、「下」及包含該等用語之其他用語),但該等用語之使用係為了使參照圖式之發明之理解變得容易,並非以該等用語之含義限制本發明之技術性範圍。又,複數個圖式中所表示之相同符號之部分表示相同或等同之部分或構件。再者,於本說明書中,「具備」係以包含以不同體構件之形式具備者及構成為一體之構件者之兩者之含義使用。Hereinafter, the embodiment will be described in detail based on the drawings. Furthermore, in the following description, terms that indicate a specific direction or location (for example, "up", "down" and other terms containing these terms) are used as necessary, but the use of these terms is for reference The understanding of the invention of the drawings becomes easy, and the technical scope of the present invention is not limited by the meaning of these terms. In addition, the parts with the same symbols in the plural drawings indicate the same or equivalent parts or components. Furthermore, in this specification, "provided" is used to include both those provided in the form of different body members and those that are constituted as one body.

進而,以下所示之實施形態係例示用以使本發明之技術思想具體化之位置特定系統、位置特定裝置、位置特定方法、位置特定程式及電腦可讀取之記錄媒體及記錄之機器者,而並非將本發明限定於以下。又,以下所記載之構成零件之尺寸、材質、形狀及其相對性配置等係只要無特定之記載,則並非為將本發明之範圍僅限定於此之主旨,而是意圖進行例示。又,一實施形態、實施例中所說明之內容亦可應用於其他實施形態、實施例。又,圖式所示之構件之大小或位置關係等有時為了使說明明確而誇張。Furthermore, the embodiment shown below exemplifies a position specifying system, a position specifying device, a position specifying method, a position specifying program, a computer-readable recording medium and a recording machine for embodying the technical idea of the present invention. The invention is not limited to the following. In addition, the dimensions, materials, shapes, and relative arrangements of the component parts described below are not intended to limit the scope of the present invention to only these, but are intended to be exemplified unless there is a specific description. In addition, the content described in one embodiment and embodiment can also be applied to other embodiments and embodiments. In addition, the size or positional relationship of the components shown in the drawings are sometimes exaggerated in order to make the explanation clear.

再者,本說明書中稱為「智慧型手機終端」或「智慧型手機」時,並不限於智慧型手機,而是以包含平板、WIFI路由器或可攜式音樂廣播器等具有通信功能之終端之含義使用。Furthermore, when referred to as "smart phone terminal" or "smart phone" in this manual, it is not limited to smart phones, but includes terminals with communication functions such as tablets, WIFI routers, or portable music broadcasters. The meaning of use.

於本發明之實施形態中,於短時間內高精度地辨識攜帶智慧型手機終端等移動之使用者之位置。藉此,於例如以智慧型手機終端等之應用程式實現公共交通工具之車票或音樂會之票券等之情形時,先前必須使智慧型手機終端觸碰自動驗票機或入場閘機。然而,由於對利用者而言必須進行觸碰之動作,故而於例如拿著行李或抱著孩子之情形時、或者於身體殘疾等無法進行觸碰動作之情形時,有無法使閘機開門之問題。與此相對,於本實施形態之位置特定系統中,藉由以無線通信進行位置檢測,可無需觸碰地檢測已通過自動驗票機或入場閘機。又,如下所述,藉由組合使用者之認證功能,亦可實現入場、退場之管理或自動結算。例如,亦可應用於超商或便利商店之結算等。 (使用BLE之距離測定方法)In the embodiment of the present invention, the position of a mobile user carrying a smart phone terminal or the like is recognized with high accuracy in a short time. In this way, when using applications such as smart phone terminals to implement public transportation tickets or concert tickets, the smart phone terminal must previously be touched to the automatic ticket gate or entrance gate. However, since it is necessary for the user to perform the touch action, there are cases where the gate cannot be opened in situations such as when carrying luggage or holding a child, or when the touch action cannot be performed such as a physical disability. problem. In contrast, in the location identification system of this embodiment, by performing location detection through wireless communication, it is possible to detect that it has passed the automatic ticket gate or the entrance gate without touching it. In addition, as described below, by combining user authentication functions, management of admission and exit or automatic settlement can also be realized. For example, it can also be used for settlement in supermarkets or convenience stores. (Use BLE distance measurement method)

首先,對BLE信標、使用BLE信標之距離測定方法、使用BLE信標之位置特定方法、本發明之一實施形態之位置特定方法進行說明,然後對本發明之一實施形態之單向通信時之認證方式進行說明。 (BLE信標)First, the BLE beacon, the distance measurement method using the BLE beacon, the location specifying method using the BLE beacon, and the location specifying method according to one embodiment of the present invention will be explained, and then the unidirectional communication according to one embodiment of the present invention will be explained. The authentication method is explained. (BLE beacon)

首先,對BLE信標進行說明。BLE信標係以Bluetooth 4.0以後之標準規定,BLE意指藍芽低功耗(Bluetooth Low Energy)。BLE係以2.4 GHz頻帶進行通信,通信模式有廣播模式及連接模式之兩種。於廣播模式下,自某BLE設備對其他不特定之BLE設備單方面地且開放地傳送資料。於該通信方式中,發送時之電波強度隨時間在某種程度上一定。又,於連接模式下,在某BLE設備與其他BLE設備之間相互非公開地收發資料。於該通信方式中,以於傳送目的地之設備成為一定之電波強度之方式,使電波強度隨時間變動。不管哪種通信方式均藉由每隔一定時間(例如數ms或數十ms)僅以極少(例如次毫秒(sub-ms)等)之時間發送,而使功耗大幅度降低。 (使用BLE信標之距離測定方法)First, the BLE beacon will be explained. The BLE beacon is stipulated in the standard after Bluetooth 4.0, and BLE means Bluetooth Low Energy (Bluetooth Low Energy). BLE communicates in the 2.4 GHz frequency band. There are two communication modes: broadcast mode and connection mode. In the broadcast mode, a BLE device unilaterally and openly transmits data to other unspecified BLE devices. In this communication method, the intensity of the radio wave at the time of transmission is constant to some extent over time. In addition, in the connected mode, a certain BLE device and other BLE devices send and receive data non-publicly. In this communication method, the radio wave intensity is changed over time in a way that the device at the transmission destination becomes a certain radio wave intensity. Regardless of the communication method, the power consumption is greatly reduced by transmitting in a very small time (such as sub-ms, etc.) at regular intervals (such as several ms or tens of ms). (Method of distance measurement using BLE beacon)

其次,對使用BLE信標之通常之距離測定方法進行說明。此處,於圖1中表示使用BLE信標作為BLE發送機且使用智慧型手機終端作為BLE接收機而測定距離之情況。自BLE發送機輸出之廣播模式之電波信號之電波強度於時間上為一定(例如平均為-43 dBm等),每當拉開距離時電波強度便衰減。因此,藉由一面將自BLE發送機輸出之電波強度隨著電波信號進行傳送,一面測定接收電波強度RSSI(Received Signal Strength Indication,接收信號強度指示),而獲知電波強度之衰減(傳播損耗),亦可基於此而計算測定距離。此處,將傳播損耗與距離之關係式示於數式1。Next, the usual distance measurement method using BLE beacons will be explained. Here, FIG. 1 shows a case where a BLE beacon is used as a BLE transmitter and a smart phone terminal is used as a BLE receiver to measure the distance. The radio wave intensity of the radio wave signal in the broadcast mode output from the BLE transmitter is constant over time (for example, the average is -43 dBm, etc.), and the radio wave intensity attenuates whenever the distance is opened. Therefore, by transmitting the strength of the radio wave output from the BLE transmitter along with the radio signal, while measuring the received signal strength RSSI (Received Signal Strength Indication), the attenuation (propagation loss) of the radio wave strength can be obtained. The measurement distance can also be calculated based on this. Here, the relationship between propagation loss and distance is shown in Equation 1.

[數式1]

Figure 02_image001
(L:傳播損耗[dB],d:測定距離[m],n:衰減指數)[Numerical formula 1]
Figure 02_image001
(L: propagation loss [dB], d: measurement distance [m], n: attenuation index)

關於衰減指數n,若於真空中則為2,但於實際環境中可取2以上之值。根據數式1可知,若測定距離變為2倍,則所獲得之RSSI減少6 dBm以上。但,認為由於實際利用之智慧型手機終端等之收發天線之增益不穩定等,故而電波強度不穩定。Regarding the attenuation index n, it is 2 in a vacuum, but it can take a value of 2 or more in an actual environment. According to Equation 1, if the measured distance is doubled, the obtained RSSI will decrease by more than 6 dBm. However, it is believed that the strength of the radio wave is unstable due to unstable gains of the transmitting and receiving antennas of the smart phone terminals etc. actually used.

圖2中將與BLE發送機隔開大致相同距離(例如1 m)之4個BLE接收機BLE1~4之電波強度以時間軸進行表示。此處,各BLE接收機大概每隔4 ms獲取資料。根據該圖可知,於數百ms左右之時間內,電波強度亦變動20 dB左右。其係由BLE之發送電波強度及接收電波強度之隨時間之測定變動所引起,如此一來,無法準確測定電波強度。因此,通常取1分鐘左右等足夠之時間,於同一地點持續接收電波,並將所獲得之RSSI平均化,藉此獲得隨時間穩定之傳播損耗之值,並基於此求出測定距離。利用該方法,無法高速且準確地測定距離。 (使用BLE信標之位置特定方法)In Fig. 2, the radio wave intensities of four BLE receivers BLE1 to 4, which are separated from the BLE transmitter by approximately the same distance (for example, 1 m), are represented on the time axis. Here, each BLE receiver obtains data approximately every 4 ms. According to the figure, it can be seen that the intensity of the radio wave also fluctuates by about 20 dB within a period of hundreds of ms. It is caused by the measurement changes of the BLE's transmitted radio wave intensity and received radio wave intensity over time. As a result, the radio wave intensity cannot be accurately measured. Therefore, it is usually a sufficient time of about 1 minute to continuously receive radio waves at the same place and average the obtained RSSI to obtain a stable propagation loss value over time, and then calculate the measurement distance based on this. With this method, the distance cannot be measured quickly and accurately. (Location specific method using BLE beacon)

繼而,對使用BLE信標之位置特定方法進行說明。此處,於圖3中表示使用BLE信標之通常之三角測量之例。於該圖中,以足夠之時間由智慧型手機終端等BLE接收機接收來自3個BLE信標發送機之信號,並於各終端測定根據數式1所求出之距離,藉此可準確測定位置。藉由以圓描繪由各BLE信標發送機所測定出之距離,可獲得圓弧一致通過之點X。例如,於由各BLE信標發送機分別以-40 dBm之發送功率傳送信號,且接收信號之智慧型手機自各BLE信標發送機接收到之功率為-51 dBm、-55 dBm、-46 dBm之情形時,可知各傳播損耗為11 dB、15 dB、6 dB。由於當幾乎無電波吸收等之情形時衰減指數成為n=2,故而藉此可求出各者之半徑,而可描繪圓弧。該點X成為BLE接收機所在之地點。但,由於短時間內無法準確地測定距離,故而有時無法測定位置。Next, the location specifying method using BLE beacons will be explained. Here, Fig. 3 shows an example of usual triangulation using BLE beacons. In this figure, BLE receivers such as smart phone terminals receive signals from three BLE beacon transmitters in sufficient time, and the distances calculated according to Equation 1 are measured at each terminal, so as to accurately determine position. By drawing the distance measured by each BLE beacon transmitter with a circle, the point X through which the arc passes uniformly can be obtained. For example, each BLE beacon transmitter transmits a signal with a transmission power of -40 dBm, and the power received by the smartphone receiving the signal from each BLE beacon transmitter is -51 dBm, -55 dBm, -46 dBm In this case, it can be seen that the propagation losses are 11 dB, 15 dB, and 6 dB. Since the attenuation index becomes n=2 when there is almost no radio wave absorption, etc., the radius of each can be obtained by this, and an arc can be drawn. This point X becomes the location where the BLE receiver is located. However, since the distance cannot be accurately measured in a short time, the position cannot be measured in some cases.

又,將使用BLE信標之以短時間之三角測量示於圖4中。若欲在與圖3同樣地配置有3個BLE信標發送機之狀態下,於短時間內由智慧型手機終端等BLE接收機接收來自各BLE信標發送機之信號,並自各終端測定根據數式1所求出之距離,則無法準確測定距離。因此,若描繪由各BLE信標發送機所測定之距離之圓,則如圖4所示般表示距離之圓彼此之重疊變大,而不會產生一致通過之點。因此,不清楚BLE接收機所在之地點。In addition, the triangulation in a short time using the BLE beacon is shown in Fig. 4. If you want to configure 3 BLE beacon transmitters as shown in Figure 3, a BLE receiver such as a smart phone terminal will receive the signal from each BLE beacon transmitter within a short period of time, and measure the basis from each terminal The distance calculated by Equation 1 cannot be accurately measured. Therefore, if the circles of the distance measured by each BLE beacon transmitter are drawn, the overlap of the circles representing the distances as shown in FIG. 4 becomes larger, and no point of unanimous passing will be generated. Therefore, it is not clear where the BLE receiver is located.

以上對使用BLE特定出或檢測出距離或位置之方法進行了說明,但位置檢測等並不限於使用BLE,亦可使用其他Bluetooth標準或Wi-Fi、RFID (Radio Frequency Identifier)、IMES、超音波、ZigBee等其他無線通信標準。然而,於其他無線通信標準中亦與上述BLE同樣地,難以於短時間內高精度地檢測,且於實際使用中不耐用。例如,為了非觸碰地檢測通過電車之驗票機,必須與接近之其他利用者進行區分、或與鄰接地設置之驗票機進行區分,因此要求40 cm以下之測定誤差。又,若鑒於利用者之步行速度,則位置特定必須以100 ms以下進行處理。進而,考慮到智慧型手機終端等處於利用者之包或衣服之口袋中等之情形,亦必須考慮自BLE發送機發送之電波強度與由BLE接收機獲得之RSSI之差未必限於空間中之傳播損耗。該等處理速度或位置精度並不限於向驗票機或入場閘機之應用,例如於超商或便利商店之收銀機中之結算等中亦有同樣之要求。 [實施形態1]The above has explained the method of using BLE to identify or detect the distance or location, but the location detection is not limited to the use of BLE, and other Bluetooth standards or Wi-Fi, RFID (Radio Frequency Identifier), IMES, ultrasound can also be used , ZigBee and other wireless communication standards. However, in other wireless communication standards, similar to the aforementioned BLE, it is difficult to detect with high accuracy in a short time, and it is not durable in actual use. For example, in order to detect a ticket inspection machine that passes a tram without touching it, it must be distinguished from other users approaching or from a ticket inspection machine installed adjacent to it. Therefore, a measurement error of 40 cm or less is required. Also, considering the walking speed of the user, the location identification must be processed in 100 ms or less. Furthermore, considering that smart phone terminals are in the user’s bag or clothing pocket, it must also be considered that the difference between the strength of the radio wave transmitted from the BLE transmitter and the RSSI obtained by the BLE receiver is not necessarily limited to the propagation loss in the space . The processing speed or position accuracy is not limited to the application to ticket inspection machines or entrance gates, for example, the same requirements are also required in the settlement of cash registers in supermarkets or convenience stores. [Embodiment 1]

如此,若為先前之方法,則即便欲將使用者攜帶之智慧型手機終端等設為BLE接收機而進行位置特定,於精度及處理速度之方面亦不實用。因此,於本發明之實施形態1之位置特定方法中,為了實現能夠適應實際環境之位置精度及處理速度,將智慧型手機終端等設為BLE發送機而並非BLE接收機,進一步將複數台BLE接收機配置於不同之位置。藉此,可根據BLE接收機之電波強度差特定出位置,而實現與實際環境對應之實用之檢測精度及檢測速度。其結果,可針對攜帶智慧型手機終端等移動之使用者,逐個高速且高精度地進行捕捉、區分、辨識。又,可將認證所附隨之行為非觸碰地自動化,亦能夠掌握行為。例如,於收銀機或驗票機處,即便應支付之使用者移動,亦能夠不誤辨識地進行特定。In this way, if it is the previous method, even if the smart phone terminal or the like carried by the user is set as a BLE receiver for location identification, it is not practical in terms of accuracy and processing speed. Therefore, in the location identification method of the first embodiment of the present invention, in order to achieve location accuracy and processing speed that can adapt to the actual environment, the smart phone terminal is set as a BLE transmitter instead of a BLE receiver, and a plurality of BLE The receiver is placed in a different location. In this way, the location can be specified according to the radio wave intensity difference of the BLE receiver, and practical detection accuracy and detection speed corresponding to the actual environment can be realized. As a result, it is possible to quickly and accurately capture, distinguish, and recognize users who are on the move with smart phone terminals and the like. In addition, the behavior attached to the certification can be automated non-touch, and the behavior can also be grasped. For example, at a cash register or a ticket inspection machine, even if the user who should pay moves, it can be identified without misidentification.

於圖5中表示將智慧型手機終端等設為BLE發送機且將BLE接收機配置於2處之例。於該情形時,即便智慧型手機終端等處於包或衣服之口袋等之中,而包或衣服之口袋等之外側之輸出電波強度與智慧型手機終端等之輸出電波強度不同,BLE接收機之電波強度差亦不改變。又,藉此,可吸收BLE發送機之發送電波強度之隨時間之測定變動,因此有助於準確測定電波強度。Fig. 5 shows an example in which a smart phone terminal or the like is set as a BLE transmitter and the BLE receiver is arranged in two places. In this case, even if the smart phone terminal is in a bag or clothing pocket, etc., and the output radio wave intensity of the bag or clothing pocket is different from the output radio wave intensity of the smart phone terminal, etc., the BLE receiver The difference in radio wave intensity does not change. In addition, it can absorb the measurement fluctuation of the intensity of the transmitted radio wave of the BLE transmitter over time, which helps to accurately measure the intensity of the radio wave.

又,圖6係表示將智慧型手機終端等設為BLE發送機且將BLE接收機配置於2處之情形時,根據BLE接收機之電波強度差所求出之發送機之存在區域之例。根據BLE接收機之電波強度差所求出之發送機之存在區域描繪成阿波羅尼里側斯圓(Apollonian circles)或直線。其原因在於,由於電波強度係以對數表示,故而於電波強度之差一定(例如10 dB)之情形時,可視為距離之比一定(例如10倍等)。但,僅利用一個圓或直線,未必能限定出BLE發送機之存在區域。In addition, FIG. 6 shows an example of the existence area of the transmitter obtained from the difference in radio wave intensity of the BLE receiver when a smart phone terminal or the like is set as a BLE transmitter and the BLE receiver is arranged in two places. The existence area of the transmitter calculated from the difference in the radio wave intensity of the BLE receiver is drawn as Apollonian circles or straight lines. The reason is that since the radio wave intensity is expressed in logarithm, when the difference in radio wave intensity is constant (for example, 10 dB), the distance ratio can be regarded as constant (for example, 10 times, etc.). However, only using a circle or straight line may not be able to limit the existence area of the BLE transmitter.

此處,於圖7中表示將智慧型手機終端等設為BLE發送機且將BLE接收機配置於3處之情形,又,於圖8中表示於該情形時根據BLE接收機之電波強度差所求出之BLE發送機之存在區域之例。於該情形時,描繪3個阿波羅尼里側斯圓或直線。藉由描繪該阿波羅尼里側斯圓,而產生一致通過之點X,該點X成為該BLE發送機所在之地點。但,若僅描繪一條直線則BLE發送機之位置不確定。設為如必定能特定出位置般之配置之條件係將4個以上之BLE接收機以由其等所描繪之四邊形之邊均不平行之方式配置。Here, FIG. 7 shows a situation in which a smart phone terminal etc. is set as a BLE transmitter and the BLE receiver is arranged in 3 places, and FIG. 8 shows the difference in radio wave intensity of the BLE receiver in this situation. Example of the area where the BLE transmitter is found. In this case, draw 3 Apollonius circles or straight lines. By drawing the Apollonius circle, a consistent point X is generated, and the point X becomes the location of the BLE transmitter. However, if only a straight line is drawn, the position of the BLE transmitter is uncertain. The condition for setting the position as if the position must be specified is to arrange more than 4 BLE receivers in such a way that the sides of the quadrilateral drawn by them are not parallel.

或者,如圖6般,於BLE發送機之存在區域為例如直徑40 cm等所需尺寸以下之情形時,亦可當作存在於該位置而進行位置特定。例如,與配置於2處之BLE發送機隔開不同距離而配置BLE接收機。以由該BLE接收機接收到之電波強度之差為某閾值(例如10 dB)以上為條件,BLE發送機之存在區域成為根據BLE接收機之電波強度差進行計算後所描繪之阿波羅尼里側斯圓之內側之整個區域。亦可利用該方法而特定出存在位置。Or, as shown in Fig. 6, when the existence area of the BLE transmitter is less than a required size such as 40 cm in diameter, it can also be regarded as existing in the position for position identification. For example, the BLE receiver is configured at different distances from the BLE transmitter configured in two places. On the condition that the difference of the radio wave intensity received by the BLE receiver is greater than a certain threshold (for example, 10 dB), the existence area of the BLE transmitter becomes the Apolloniri drawn after calculation based on the radio wave intensity difference of the BLE receiver The entire area inside the side circle. This method can also be used to specify the location of existence.

於圖9中表示如圖2般由與BLE發送機(例如以-43 dBm之平均電波強度輸出)相距一定距離(例如1 m)之1個BLE接收機檢測出之電波強度之柱狀圖。根據該圖,BLE接收機變動30 dB左右,標準偏差為5.85左右。如此,電波強度之變動非常大,最大值與最小值之差亦較大,因此即便根據此種電波強度計算距離,同樣地變動亦變大。Fig. 9 shows a histogram of the radio wave intensity detected by a BLE receiver at a certain distance (e.g., 1 m) from the BLE transmitter (e.g., output with an average radio wave intensity of -43 dBm) as shown in Fig. 2. According to this figure, the BLE receiver fluctuates by about 30 dB, and the standard deviation is about 5.85. In this way, the radio wave intensity fluctuates greatly, and the difference between the maximum value and the minimum value is also large. Therefore, even if the distance is calculated based on such radio wave intensity, the fluctuation is similarly large.

另一方面,於圖10中表示與BLE發送機(例如以-43 dBm之平均電波強度輸出)相距不同距離(例如1 m、3 m)之2個BLE接收機之電波強度差(近距離及短距離處之各單一接收機之電波強度差分佈)之柱狀圖。標準偏差為6.21左右。一般而言,可知距BLE發送機較近之BLE接收機與較遠側之BLE接收機相比,電波強度成為更大之值,但一部分相反。如此,可知電波強度差之變動較大,大小關係亦混亂。On the other hand, Fig. 10 shows the radio wave intensity difference between two BLE receivers (for example, 1 m, 3 m) at different distances (for example, 1 m, 3 m) from the BLE transmitter (for example, with an average electric wave intensity output of -43 dBm). The histogram of the distribution of the radio wave intensity difference of each single receiver at a short distance. The standard deviation is about 6.21. Generally speaking, it can be known that the BLE receiver closer to the BLE transmitter has a higher radio wave strength than the BLE receiver on the far side, but the opposite is true. In this way, it can be seen that the difference in radio wave intensity varies greatly, and the magnitude relationship is also confused.

又,一般而言,已知若求出描繪2個理想之常態分佈(normal distribution)柱狀圖之相同機率分佈(probability distribution)彼此之差,則標準偏差成為√2倍左右。與此相對,圖10之標準偏差係相較圖9之標準偏差而小於√2倍之範圍。據此可知,吸收BLE之發送電波強度之隨時間之測定變動,稍微有助於準確測定電波強度。但,若圖10之標準偏差之範圍沒有更小,則無法實現高速且高精度之位置特定。In addition, in general, it is known that if the difference between the same probability distributions that draw two ideal normal distribution histograms is obtained, the standard deviation becomes about √2 times. In contrast, the standard deviation of Fig. 10 is smaller than the range of √2 times compared with the standard deviation of Fig. 9. Based on this, it can be seen that the measurement variation of the intensity of the transmitted radio wave that absorbs BLE over time is slightly helpful to accurately measure the intensity of the radio wave. However, if the standard deviation range of Fig. 10 is not smaller, high-speed and high-precision position identification cannot be achieved.

因此,吸收BLE之接收電波強度之隨時間之測定變動。如根據圖2可知般,可知與BLE發送機隔開一定距離(例如1 m等)之4個BLE接收機之電波強度之變動係大致獨立地變動。一般而言,已知若求出描繪獨立之n個理想之常態分佈柱狀圖之相同機率分佈彼此之平均,則標準偏差成為1/√n倍左右。因此,期待可藉由在同一位置配置複數個BLE接收機,並將於此處獲得之複數個BLE接收機之電波強度平均化,而減少BLE之接收電波強度之隨時間之測定變動。Therefore, the measurement of the received radio wave intensity that absorbs BLE varies with time. As can be seen from FIG. 2, it can be seen that the changes in the radio wave intensity of the four BLE receivers separated from the BLE transmitter by a certain distance (for example, 1 m, etc.) vary substantially independently. Generally speaking, it is known that if the average of the same probability distributions depicting independent n ideal normal distribution histograms is obtained, the standard deviation becomes about 1/√n times. Therefore, it is expected that by arranging a plurality of BLE receivers at the same location and averaging the radio wave intensity of the plurality of BLE receivers obtained here, the measurement variation of the received radio wave intensity of BLE can be reduced over time.

於圖11中表示將智慧型手機終端等設為BLE發送機且將複數個BLE接收機配置於2處之情形之例。例如,於在各位置配置2台BLE接收機而配置共計4個BLE接收機之情形時,若將該4個BLE接收機之強度平均化,則根據其柱狀圖求出之標準偏差成為2.63左右。可確認該值為根據與BLE發送機相距一定距離(例如1 m等)之1個BLE接收機之電波強度之柱狀圖所求出之標準偏差之約1/2。可知,藉此能夠減少BLE之接收電波強度之隨時間之測定變動。Fig. 11 shows an example of a case where a smart phone terminal or the like is set as a BLE transmitter and a plurality of BLE receivers are arranged in two places. For example, when two BLE receivers are placed at each location and a total of four BLE receivers are placed, if the strengths of the four BLE receivers are averaged, the standard deviation calculated from the histogram becomes 2.63 about. It can be confirmed that the value is about 1/2 of the standard deviation calculated based on the histogram of the radio wave intensity of a BLE receiver at a certain distance (for example, 1 m, etc.) from the BLE transmitter. It can be seen that this can reduce the measurement fluctuation of the received radio wave intensity of BLE over time.

又,於圖12中表示將與BLE發送機(例如以-43 dBm之平均電波強度輸出)相距不同距離(例如1 m、3 m)之4個BLE接收機配置於2處且於各處將電波強度平均化所得者之差之柱狀圖。根據該圖,可知與圖10等相比,電波強度變動變小,大小關係亦得到修正。又,標準偏差為2.85左右。可知,藉由如此將與BLE發送機相距不同距離之複數個BLE接收機配置於2處,並取於各處將電波強度平均化所得者之差,可充分減少BLE之發送電波強度及接收電波強度之隨時間之測定變動。In addition, Fig. 12 shows that 4 BLE receivers with different distances (for example, 1 m, 3 m) from the BLE transmitter (for example, with an average radio wave intensity output of -43 dBm) are arranged at 2 locations and placed A histogram of the difference between the averaging of the radio wave intensity. According to this figure, it can be seen that the fluctuation of the electric wave intensity is smaller than that of Fig. 10 and the like, and the magnitude relationship is also corrected. Also, the standard deviation is about 2.85. It can be seen that by arranging a plurality of BLE receivers at different distances from the BLE transmitter in two places, and taking the difference between the averaging of the radio wave intensity in each place, the transmitted radio wave intensity and the received radio wave of BLE can be sufficiently reduced. The intensity changes over time.

此處,於圖13中表示將智慧型手機終端等設為BLE發送機且將複數個BLE接收機配置於3處之情形之例。又,於圖14中表示於配置有圖13之BLE發送機與BLE接收機之例中,根據將複數個BLE接收機之電波強度平均化所得者之差所求出的BLE發送機之存在區域之例。於該情形時,變為描繪3個阿波羅尼里側斯圓或直線。藉由描繪該阿波羅尼里側斯圓,而產生一致通過之點X,該點X成為該BLE發送機所在之地點。但,若僅描繪一條直線則BLE發送機之位置不確定。此處,設為如必定能特定出位置般之配置之條件係將4個以上之BLE接收機以由其等所描繪之四邊形之邊均不平行之方式配置。Here, FIG. 13 shows an example of a case where a smart phone terminal or the like is set as a BLE transmitter and a plurality of BLE receivers are arranged in three places. In addition, in the example in which the BLE transmitter and the BLE receiver of FIG. 13 are arranged in Fig. 14, the existence area of the BLE transmitter is calculated based on the difference between the radio wave intensity of a plurality of BLE receivers.的例。 Examples. In this case, three Apollonius circles or straight lines are drawn. By drawing the Apollonius circle, a consistent point X is generated, and the point X becomes the location of the BLE transmitter. However, if only a straight line is drawn, the position of the BLE transmitter is uncertain. Here, the condition for the arrangement as if the position can be specified is to arrange more than 4 BLE receivers so that the sides of the quadrilateral drawn by them are not parallel.

或者,於BLE發送機之存在區域為例如直徑40 cm等所需尺寸以下之情形時,亦可當作存在於該位置而進行位置特定。圖15表示藉由限定BLE發送機之存在區域地加以利用,而進行BLE發送機之位置特定之例。藉由調整條件,可設定為BLE發送機之存在區域成為針對攜帶智慧型手機終端等移動之使用者逐個高精度地進行區分之範圍(例如直徑40 cm以下之圓內)。例如,以在與配置於2處之BLE發送機相距不同距離(例如2 m)之各處將複數個BLE接收機之電波強度平均化所得者之差為某閾值(例如10 dB)以上為條件,BLE發送機之存在區域成為根據將複數個BLE接收機之電波強度平均化所得者之差進行計算後所描繪之阿波羅尼里側斯圓之內側之整個區域。Or, when the existence area of the BLE transmitter is less than the required size such as 40 cm in diameter, it can also be regarded as existing at that position for position identification. FIG. 15 shows an example of specifying the location of the BLE transmitter by limiting the existence area of the BLE transmitter and using it. By adjusting the conditions, it can be set that the existence area of the BLE transmitter becomes a range (for example, within a circle with a diameter of less than 40 cm) that can be distinguished one by one with high accuracy for mobile users such as mobile phones with smartphones. For example, assuming that the difference between the radio wave strengths of multiple BLE receivers at different distances (for example, 2 m) from the BLE transmitters placed at 2 locations is equal to or greater than a certain threshold (for example, 10 dB) , The existence area of the BLE transmitter becomes the entire area inside the Apollonius circle drawn by calculating the difference between the averaging of the radio wave intensity of a plurality of BLE receivers.

但,例如於在收銀機或驗票機處進行支付之情形時,若錯誤地判斷為處於不存在BLE發送機之區域,則會產生問題。因此,將此定義為誤辨識。一般而言,必須降低誤辨識之機率本身,於支付等需要高精度之辨識之場景時,需要用以進一步減少誤辨識之設計。因此,於圖16中表示用以於支付等需要高精度之認證之場景進一步降低誤辨識之設計之例。如圖16般,藉由設置兩處使用者之通過判定區域,且僅於使用者以一定時間差(例如0.5秒~2秒等)通過該兩者之情形時進行認證,可進一步降低誤辨識。亦即,即便偶然靠近其中一個使用者之通過判定區域且進行了認證,只要另一個使用者之通過判定區域未進行認證,則亦不判斷為已通過。However, for example, when making a payment at a cash register or a ticket inspection machine, if it is incorrectly determined that it is in an area where there is no BLE transmitter, a problem will occur. Therefore, this is defined as misidentification. Generally speaking, it is necessary to reduce the probability of misidentification itself. In payment scenarios that require high-precision identification, a design to further reduce misidentification is required. Therefore, FIG. 16 shows an example of a design used to further reduce misidentification in scenarios requiring high-precision authentication such as payment. As shown in FIG. 16, by setting two pass judgment areas for users, and authentication is performed only when the user passes the two with a certain time difference (for example, 0.5 second to 2 seconds, etc.), misidentification can be further reduced. That is, even if one of the users is accidentally approached and authenticated by the pass judgment area, as long as the pass judgment area of the other user is not authenticated, it is not judged as passed.

再者,此處亦可利用圖15之配置。亦即,於設定通過時之前半部分之使用者之通過判定區域時,使用以如下內容為條件之判定方法:如圖15般,於與配置於2處之BLE發送機相距不同距離(例如2 m)之各處,複數個BLE接收機之電波強度經平均化所得者之差為某閾值以上。又,於設定通過時之後半部分之使用者之通過判定區域時,可藉由使用以如下內容為條件之判定而加以利用:於與圖15相反之、與配置於2處之BLE發送機相距不同距離之各處,複數個BLE接收機之電波強度經平均化所得者之差為某閾值(例如10 dB)以上。Furthermore, the configuration of FIG. 15 can also be used here. That is, when setting the passing judgment area of the user in the first half of the passing time, use the judgment method based on the following content: as shown in Figure 15, at different distances from the BLE transmitters arranged at 2 places (for example, 2 m), the difference between the averaging of the radio wave intensities of multiple BLE receivers is above a certain threshold. In addition, when setting the pass judgment area for the second half of the pass time, it can be used by using the judgment based on the following content: Contrary to Figure 15, it is away from the two BLE transmitters. At different distances, the difference between the averaging of the radio wave intensity of multiple BLE receivers is above a certain threshold (for example, 10 dB).

圖17表示用以限制圖16之使用者之通過之設計。如圖17般,設置自動驗票機作為用以規定使用者之通過路徑之閘機。FIG. 17 shows a design used to restrict the passage of the user of FIG. 16. As shown in Figure 17, an automatic ticket checking machine is set up as a gate for specifying the user's passage.

再者,於設定如圖16或圖17般之使用者之通過判定區域時,亦可與BLE發送機隔開不同距離(例如2 m)而將複數個BLE接收機配置於2處。此處,能夠以於各處將複數個BLE接收機之電波強度平均化所得者之差為某閾值(例如10 dB)以上為條件,進行BLE發送機之位置特定。例如,藉由利用如圖15般之配置,可共用用以進行使用者之通過判定之2處之複數個BLE接收機。Furthermore, when setting the passing determination area of the user as shown in FIG. 16 or FIG. 17, a plurality of BLE receivers can also be arranged at two places with different distances (for example, 2 m) from the BLE transmitter. Here, the position of the BLE transmitter can be specified on the condition that the difference between the averaging of the radio wave intensities of a plurality of BLE receivers is a certain threshold (for example, 10 dB) or more. For example, by using the configuration as shown in Fig. 15, it is possible to share a plurality of BLE receivers in 2 locations for the user's pass judgment.

再者,實際上,關於電波強度,例如未必描繪如圖8或圖14般之作為BLE發送機之存在區域之3個阿波羅尼里側斯圓或直線一致通過之點。因此,理想為準備3個以上之阿波羅尼里側斯圓或直線,將誤差最小之位置推定為BLE發送機之位置。此處言及之誤差例如可使用距離或電波強度之最小平方法,亦可使用非線性最小平方法等其他回歸計算。Furthermore, in fact, regarding the intensity of the radio wave, for example, it is not necessary to describe the point where the three Apollonius circles or straight lines pass uniformly as the existence area of the BLE transmitter as shown in FIG. 8 or FIG. 14. Therefore, it is ideal to prepare more than three Apollonian circles or straight lines, and estimate the position with the smallest error as the position of the BLE transmitter. For the error mentioned here, for example, the least square method of distance or radio wave intensity can be used, and other regression calculations such as the nonlinear least square method can also be used.

其等之結果,例如藉由將使用之BLE接收機於要配置之每一處利用4個,將此種BLE接收機配置於複數個場所,能夠以95%以上之機率於BLE發送機之存在區域中確認辨識,而誤辨識成為0.0%以下。又,測定時間能夠以平均十ms以下進行測定。因此,於本實施形態中,能夠實現高速且高精度之位置特定。其結果,可即時地進行利用者之位置檢測。As a result, for example, by using 4 BLE receivers in each place to be deployed, locating such BLE receivers in multiple places, the BLE transmitter can exist with a probability of more than 95% The recognition is confirmed in the area, and the misrecognition becomes 0.0% or less. In addition, the measurement time can be measured at an average of ten ms or less. Therefore, in this embodiment, high-speed and high-precision position identification can be realized. As a result, the user's position can be detected immediately.

如此,將與BLE發送機隔開不同距離之複數個BLE接收機配置於2處以上。然後,取將各處由BLE接收機所接收之信號之電波強度平均化所得者之差,如圖6、圖8、圖12或圖14等般特定出位置。藉此,可充分減少BLE之發送電波強度及接收電波強度之隨時間之測定變動而高速且高精度地進行BLE發送機之位置特定。又,藉此,可個別地高速且高精度地捕捉、區分、辨識攜帶智慧型手機終端等移動之使用者,而能夠將認證所附隨之行為非觸碰地自動化。 (位置特定系統之功能方塊圖)In this way, a plurality of BLE receivers separated from the BLE transmitter are arranged at more than two locations. Then, take the difference obtained by averaging the radio wave intensity of the signal received by the BLE receiver everywhere, and specify the position as shown in Figure 6, Figure 8, Figure 12, or Figure 14. Thereby, it is possible to sufficiently reduce the measurement variation of the BLE's transmitted radio wave intensity and the received radio wave intensity over time, so that the position of the BLE transmitter can be specified with high speed and high accuracy. In addition, by this, it is possible to individually capture, distinguish, and identify mobile users who are carrying smart phone terminals and the like at high speed and high precision, and it is possible to automate the actions attached to authentication without touching. (Function block diagram of location specific system)

此處,於圖18中表示位置特定系統之功能方塊圖。該圖所示之位置特定系統100具備成為要特定出位置之對象之由個人攜帶之個人移動終端10、及特定出該個人移動終端10之位置之位置特定裝置20。Here, the functional block diagram of the location specific system is shown in FIG. 18. The position specifying system 100 shown in the figure includes a personal mobile terminal 10 carried by an individual that is a target to be specified, and a position specifying device 20 that specifies the position of the personal mobile terminal 10.

個人移動終端10具備個人終端側發送部11及個人終端側控制部12。個人終端側發送部11係用以與位置特定裝置20進行通信之構件。具體而言,個人終端側發送部11對位置特定裝置20發送用於位置之特定之位置特定信號。又,個人終端側控制部12控制個人終端側發送部11。The personal mobile terminal 10 includes a personal terminal-side transmission unit 11 and a personal terminal-side control unit 12. The personal terminal side transmitting unit 11 is a member for communicating with the position specifying device 20. Specifically, the personal terminal-side transmitting unit 11 transmits a location specifying signal for specifying a location to the location specifying device 20. In addition, the personal terminal side control unit 12 controls the personal terminal side transmission unit 11.

位置特定裝置20具備位置特定側接收部21及位置特定側運算部25。位置特定側接收部21係用以接收個人終端側發送部11所發送之位置特定信號之構件,且具備複數個第一位置特定側接收部22A、22B及複數個第二位置特定側接收部23A、23B。第一位置特定側接收部22排列地配置於與個人移動終端10隔開第一距離之第一位置。又,第二位置特定側接收部23排列地配置於與第一位置不同之第二位置,且為與個人移動終端10隔開較第一距離長之第二距離之位置。The position specifying device 20 includes a position specifying side receiving unit 21 and a position specifying side computing unit 25. The position specifying side receiving section 21 is a member for receiving the position specifying signal sent by the personal terminal side transmitting section 11, and is provided with a plurality of first position specifying side receiving sections 22A, 22B and a plurality of second position specifying side receiving sections 23A , 23B. The first position specifying side receiving portion 22 is arranged in a first position separated from the personal mobile terminal 10 by a first distance. In addition, the second position specifying side receiving portion 23 is arranged in a second position different from the first position, and is a position separated from the personal mobile terminal 10 by a second distance longer than the first distance.

進而,位置特定側運算部25基於由複數個第一位置特定側接收部22A、22B及第二位置特定側接收部23A、23B分別接收到之位置特定信號之強度差,特定出個人移動終端10之位置。藉此,藉由利用位置特定信號之強度差,能夠減少接收個人終端側發送部11所發出之位置特定信號之複數個位置特定側接收部中之信號強度之偏差,而能夠準確地且於短時間內測定個人移動終端10之位置。Furthermore, the position specifying side calculating unit 25 specifies the personal mobile terminal 10 based on the difference in the strength of the position specifying signals received by the plurality of first position specifying side receiving units 22A, 22B and the second position specifying side receiving units 23A, 23B. The location. Thereby, by using the difference in the strength of the position-specific signal, it is possible to reduce the deviation of the signal strength in the plurality of position-specific receivers that receive the position-specific signal sent by the personal terminal-side transmitter 11, and can be accurate and short. The location of the personal mobile terminal 10 is determined within time.

位置特定側運算部25係計算如下條件式而特定出個人移動終端10之位置,上述條件式係比較由複數個第一位置特定側接收部22A、22B接收到之位置特定信號之電波強度與由複數個第二位置特定側接收部23A、23B接收到之位置特定信號之電波強度的差、和預先設定之閾值之大小。例如,計算比較電波強度之差是否大於預先設定之閾值(例如10 dB)之條件式。The position specifying side calculation unit 25 specifies the position of the personal mobile terminal 10 by calculating the following conditional expression. The above condition formula compares the radio wave strength of the position specifying signal received by the plurality of first position specifying side receiving units 22A, 22B with The magnitude of the difference between the radio wave strengths of the position specifying signals received by the plurality of second position specifying side receiving units 23A and 23B and the preset threshold value. For example, a conditional expression for calculating whether the difference in radio wave intensity is greater than a preset threshold (for example, 10 dB).

或者,藉由利用於第一位置或第二位置配置有複數台之位置特定側接收部進行平均化,亦可抑制信號強度之偏差。於該情形時,位置特定側運算部25計算如下條件式而特定出個人移動終端10之位置,上述條件式係比較由複數個第一位置特定側接收部22A、22B接收到之位置特定信號之電波強度之平均值與由複數個第二位置特定側接收部23A、23B接收到之位置特定信號之電波強度之平均值的差、和預先設定之閾值之大小。 (個人終端側發送部11之自動啟動功能)Alternatively, it is also possible to suppress the deviation of the signal strength by averaging by using the position specifying side receiving unit where a plurality of units are arranged at the first position or the second position. In this case, the position specifying side calculating unit 25 calculates the following conditional expression to specify the position of the personal mobile terminal 10, and the above conditional expression compares the position specifying signals received by the plurality of first position specifying side receiving units 22A, 22B The difference between the average value of the radio wave intensity and the average value of the radio wave intensities of the position specifying signals received by the plurality of second position specifying side receiving units 23A and 23B, and the magnitude of the preset threshold. (Auto-start function of the sending unit 11 on the personal terminal side)

於以上之構成中,利用個人移動終端10作為發送機。此處,藉由利用BLE進行通信,可抑制功耗。但,認為使智慧型手機終端之BLE功能始終開啟會與利用者側抑制電池消耗之意願相左。因此,認為根據利用者會存在欲將智慧型手機終端之BLE功能關閉之情況。於利用上述位置特定系統時,必須預先將智慧型手機終端之BLE功能開啟,例如於將位置特定系統用作地鐵等公共交通工具之車票之情形時,於靠近自動驗票機之前,利用者必須操作自己之智慧型手機終端而手動地使BLE功能開啟,而較費事。In the above configuration, the personal mobile terminal 10 is used as a transmitter. Here, by using BLE for communication, power consumption can be suppressed. However, it is believed that keeping the BLE function of the smart phone terminal always on would be contrary to the user's willingness to suppress battery consumption. Therefore, it is believed that users may want to turn off the BLE function of the smart phone terminal. When using the above-mentioned location-specific system, the BLE function of the smartphone terminal must be turned on in advance. For example, when the location-specific system is used as a ticket for public transportation such as subways, the user must approach the automatic ticket gate It is more troublesome to operate your own smart phone terminal and manually enable the BLE function.

因此,亦可具備使BLE功能等之個人終端側發送部11於利用者接近位置特定裝置20之前自動地啟動之自動啟動功能。例如,以如下方式進行控制,即,由個人終端側控制部12檢測出攜帶個人移動終端10之個人在一定距離以內接近位置特定裝置20,然後自動地使BLE功能開啟,啟動個人終端側發送部11,而使個人終端側發送部11對位置特定裝置20發送位置特定信號。藉此,能夠以於攜帶個人移動終端10之個人靠近位置特定裝置20之前,由個人終端側發送部11對位置特定裝置20發送位置特定信號之方式進行控制,而可於個人移動終端10與位置特定裝置20之間執行順利之位置特定動作。Therefore, it is also possible to provide an automatic activation function that automatically activates the personal terminal side transmitter 11 such as the BLE function before the user approaches the position specifying device 20. For example, the control is performed in a manner that the personal terminal side control unit 12 detects that the person carrying the personal mobile terminal 10 approaches the location specifying device 20 within a certain distance, and then automatically turns on the BLE function, and activates the personal terminal side transmitting unit 11, the personal terminal side transmitting unit 11 transmits a position specifying signal to the position specifying device 20. Thereby, before the individual carrying the personal mobile terminal 10 approaches the location specifying device 20, the personal terminal side transmitting unit 11 can control the location specifying device 20 to send the location specifying signal, and the personal mobile terminal 10 and the location The specific device 20 executes a smooth position specifying action.

又,亦可使智慧型手機終端等進行BLE信標信號發送。例如藉由將BLE信標設置於車站之入口等,且預先自該BLE信標朝向利用者之移動終端發送,而接收到該信號之智慧型手機終端等自動地發送BLE信標信號(例如,包含利用者之移動終端之ID(Identifier,識別碼)資訊之用於位置測定之信號)。又,作為其他構成,亦可構成為使用移動終端所具有之GPS功能,當靠近車站等特定之設施後,自動地發送信號。於該情形時,可利用地理圍欄(Geofence)功能等。 (啟動信號發送機90)In addition, a smart phone terminal or the like may be used to transmit BLE beacon signals. For example, by installing a BLE beacon at the entrance of a station, and sending it from the BLE beacon to the user’s mobile terminal in advance, the smartphone terminal receiving the signal automatically transmits the BLE beacon signal (for example, The signal used for location determination including the ID (Identifier) information of the user's mobile terminal). In addition, as another configuration, it may be configured to use the GPS function of the mobile terminal to automatically transmit a signal when it approaches a specific facility such as a station. In this case, the Geofence function can be used. (Start signal transmitter 90)

或者,亦可設置用以啟動個人終端側發送部11之構件。具體而言,於與位置特定裝置20相距一定距離以上之位置設置啟動信號發送機。啟動信號發送機朝向個人移動終端10發送使個人終端側發送部11向位置特定裝置20發送位置特定信號之發送動作啟動的啟動信號。藉此,可於攜帶個人移動終端10之個人接近位置特定裝置20之前階段預先使個人終端側發送部11啟動,而可於個人移動終端10與位置特定裝置20之間執行順利之位置特定動作。於例如用作地鐵等公共交通工具之車票之情形時,於車站之入口或驗票口之附近等利用者於靠近作為自動驗票機之位置特定裝置20之前會通過之場所設置啟動信號發送機。於圖19中表示此種示例。此處,於鐵路之車站之入口分別設置有啟動信號發送機90。啟動信號發送機90將利用者USR之智慧型手機終端之BLE功能開啟,並且使位置特定信號之發送動作開始。如此,藉由在利用者USR前往自動驗票機等位置特定裝置20之路徑上預先設置啟動信號發送機90,可於利用者USR接近自動驗票機等位置特定裝置20之前使位置特定信號之發送動作開始,而於已接近位置特定裝置20之狀態下,可於位置特定裝置20側檢測位置特定信號從而執行智慧型手機終端之位置特定。Alternatively, a member for activating the transmitting unit 11 on the personal terminal side may also be provided. Specifically, a start signal transmitter is installed at a position more than a certain distance from the position specifying device 20. The activation signal transmitter transmits to the personal mobile terminal 10 an activation signal for starting the transmission operation of the personal terminal side transmitter 11 to transmit the location specifying signal to the location specifying device 20. Thereby, the personal terminal-side transmitting unit 11 can be activated in advance before the personal mobile terminal 10 carrying the personal mobile terminal 10 approaches the position specifying device 20, and a smooth position specifying action can be performed between the personal mobile terminal 10 and the position specifying device 20. For example, in the case of using a ticket for public transportation such as subways, an activation signal transmitter is installed at a place where the user approaches the location identification device 20 which is an automatic ticket gate, etc. near the entrance of a station or near a ticket gate. . An example of this is shown in Figure 19. Here, the start signal transmitter 90 is respectively installed at the entrance of the railway station. The activation signal transmitter 90 turns on the BLE function of the smartphone terminal of the user USR, and starts the transmission of the location specific signal. In this way, by pre-installing the activation signal transmitter 90 on the path from the user USR to the location specifying device 20 such as the automatic ticket gate, the location specifying signal can be set before the user USR approaches the location specifying device 20 such as the automatic ticket gate. The sending action starts, and when the position specifying device 20 is approached, the position specifying signal can be detected on the position specifying device 20 side to perform the location specifying of the smart phone terminal.

又,同樣地,亦可設為於通過自動驗票機等位置特定裝置20之後,於利用者USR之路徑上另外設置結束信號發送機而將BLE功能關閉。例如藉由在車站之驗票內或驗票外之車站之出口等設置結束信號發送機,可降低BLE功能之功耗。又,結束信號發送機亦可與啟動信號發送機共通化。例如利用配置於車站之入口之啟動信號發送機,針對在朝向車站內之方向上移動之智慧型手機終端等使BLE功能開啟,針對在自車站內離開之方向上移動之智慧型手機終端等使BLE功能關閉。此種啟動信號發送機或結束信號發送機可利用BLE信標等。Also, in the same way, after passing through a position specifying device 20 such as an automatic ticket gate, an additional end signal transmitter is installed on the path of the user USR to turn off the BLE function. For example, the power consumption of the BLE function can be reduced by installing the end signal transmitter in the ticket inspection of the station or the exit of the station outside the ticket inspection. In addition, the end signal transmitter may be shared with the start signal transmitter. For example, use the start signal transmitter at the entrance of the station to turn on the BLE function for the smart phone terminal moving in the direction toward the station, and use the BLE function for the smart phone terminal moving in the direction away from the station. The BLE function is turned off. Such start signal transmitter or end signal transmitter may use BLE beacons and the like.

再者,於能夠利用GPS特定出智慧型手機終端等個人移動終端10之位置之情形時,亦可設為利用GPS特定出個人移動終端10之位置。於該情形時,亦可以如下方式構成,即,當智慧型手機終端等進入至無法利用GPS之室內時,偵測到該情況後自動地將BLE功能開啟,並且開始發送位置特定信號。Furthermore, when the location of the personal mobile terminal 10 such as a smart phone terminal can be specified by GPS, it can also be set to specify the location of the personal mobile terminal 10 by GPS. In this case, it can also be configured as follows: that is, when a smart phone terminal or the like enters a room where GPS cannot be used, the BLE function is automatically turned on after detecting the situation, and the location specific signal is started to be sent.

如此,藉由組合自動地切換BLE功能之開啟/關閉之功能,不會損害非觸碰方式之認證、結算之本實施形態之位置特定系統之方便性,且於非利用時亦可將BLE維持為關閉之狀態,利用者之方便性進一步提高。 [實施形態2]In this way, by combining the function of automatically switching the BLE function on/off, the convenience of the location specific system of this embodiment of authentication and settlement of non-touch mode will not be impaired, and BLE can be maintained when not in use In the closed state, the convenience for users is further improved. [Embodiment 2]

於以上之例中,對利用使用者所攜帶之智慧型手機終端等行動裝置作為BLE發送機之例進行了說明,但本發明不限於該構成。例如,亦可以如下方式構成,即,藉由將使用者所攜帶之智慧型手機終端等行動裝置設為BLE接收機,且使其與配置於既定位置之複數個BLE發送機之間進行通信,而進行行動裝置之位置檢測。將此種示例作為實施形態2之位置特定系統示於圖20中。該圖所示之位置特定系統表示將智慧型手機終端等設為BLE接收機且將BLE發送機配置於2處之情形之例。In the above example, an example of using a mobile device such as a smart phone terminal carried by a user as a BLE transmitter has been described, but the present invention is not limited to this configuration. For example, it can also be configured as follows, that is, by setting a mobile device such as a smart phone terminal carried by a user as a BLE receiver, and communicating with a plurality of BLE transmitters arranged at a predetermined position, And perform location detection of mobile devices. This example is shown in FIG. 20 as the position specifying system of the second embodiment. The location-specific system shown in the figure shows an example of a situation where a smart phone terminal is set as a BLE receiver and the BLE transmitter is arranged in two places.

於上述例中,藉由將智慧型手機終端側用作發送機,且將接收器於複數處設置複數台,而利用複數台減少接收機感度之偏差,並且利用複數處之差減少(抵消)發送機之電波強度之偏差。與此相對,於本實施形態中,相反地,將智慧型手機終端側用作接收機,並且將發送器於複數處設置複數台,且取發送機彼此之差,藉此抵消接收機之感度。即,藉由將接收機側或發送機側之至少一者設為複數台,而減少發送機側之放大器之偏差(電波強度之偏差)或接收機側之放大器之偏差(接收感度之偏差),從而發揮抵消之效果。再者,發送機之電波強度之偏差係若為一台則不怎麼能減少。相對於此,藉由設置複數台,可藉由對各處逐個進行平均化,而某種程度上減少偏差。In the above example, by using the smartphone terminal side as a transmitter, and multiple receivers are installed at multiple locations, the multiple receivers are used to reduce the deviation of the receiver sensitivity, and the difference between the multiple locations is used to reduce (cancel) The deviation of the radio wave strength of the transmitter. In contrast to this, in this embodiment, on the contrary, the smartphone terminal side is used as a receiver, and multiple transmitters are installed in plural places, and the difference between the transmitters is taken to cancel the sensitivity of the receiver. . That is, by setting at least one of the receiver side or the transmitter side as plural units, the deviation of the amplifier on the transmitter side (the deviation of electric wave intensity) or the deviation of the amplifier on the receiver side (the deviation of reception sensitivity) can be reduced. , So as to play the effect of offset. Furthermore, the deviation of the radio wave intensity of the transmitter is not much reduced if it is one. In contrast, by installing a plurality of stations, the deviation can be reduced to a certain extent by averaging each location one by one.

圖21表示於圖20之配置例中根據BLE發送機之電波強度差所求出之BLE接收機之存在區域之例。根據BLE接收機之電波強度差所求出之BLE接收機之存在區域描繪出阿波羅尼里側斯圓或直線。但,僅利用一個圓或直線,未必能限定出BLE發送機之存在區域。FIG. 21 shows an example of the existence area of the BLE receiver obtained from the difference in the radio wave intensity of the BLE transmitter in the configuration example of FIG. 20. Based on the difference in radio wave intensity of the BLE receiver, the Apollonius circle or straight line is drawn on the existence area of the BLE receiver. However, only using a circle or straight line may not be able to limit the existence area of the BLE transmitter.

另一方面,圖22表示將智慧型手機終端等設為BLE接收機且將BLE發送機配置於3處之情形之例。又,圖23表示於圖22之配置例中根據BLE發送機之電波強度差所求出之BLE接收機之存在區域之例。於該情形時,描繪有3個阿波羅尼里側斯圓或直線。藉由描繪該阿波羅尼里側斯圓,而產生一致通過之點X,該點X成為該BLE接收機所在之地點。但,若僅描繪一條直線,則BLE接收機之位置不確定。設為如必定能特定出位置般之配置之條件係將4個以上之BLE發送機以由其等所描繪之四邊形之邊均不平行之方式配置。On the other hand, FIG. 22 shows an example of a case where a smartphone terminal or the like is used as a BLE receiver and the BLE transmitter is arranged in three places. In addition, FIG. 23 shows an example of the existence area of the BLE receiver obtained from the difference in radio wave intensity of the BLE transmitter in the configuration example of FIG. 22. In this case, 3 Apollonius circles or straight lines are drawn. By drawing the Apollonius circle, a consistent point X is generated, and the point X becomes the location of the BLE receiver. However, if only a straight line is drawn, the position of the BLE receiver is uncertain. The condition for setting the configuration as if the position must be specified is to arrange more than 4 BLE transmitters in such a way that the sides of the quadrilateral drawn by them are not parallel.

或者,如圖21般,於BLE接收機之存在區域為例如直徑40 cm等所需尺寸以下之情形時,亦可當作存在於該位置而進行位置特定。例如,以與配置於2處之BLE接收機相距不同距離之BLE發送機之電波強度差為某閾值以上為條件。於該條件下,BLE接收機之存在區域成為根據BLE發送機之電波強度差進行計算後所描繪之阿波羅尼里側斯圓之內側之整個區域,因此,亦可利用該方法。 [實施形態3]Or, as shown in FIG. 21, when the BLE receiver's existence area is less than a required size such as 40 cm in diameter, it can be regarded as existing at that position for position identification. For example, it is a condition that the radio wave intensity difference of the BLE transmitters at different distances from the BLE receivers arranged at two places is greater than a certain threshold. Under this condition, the existence area of the BLE receiver becomes the entire area inside the Apollonius circle drawn after calculating the difference in radio wave intensity of the BLE transmitter. Therefore, this method can also be used. [Embodiment 3]

於上述例中,表示了配置於複數個不同處之各BLE發送機設為一台之構成,但本發明並不限於該構成,亦可將配置於複數個不同處之BLE發送機設為複數台。將此種示例作為實施形態3之位置特定系統示於圖24中。圖24表示將智慧型手機終端等設為BLE接收機且將複數個BLE發送機配置於2處之情形之例。例如,於配置有4個BLE發送機之情形時,若將該4個BLE發送機之強度平均化,則可確認根據其柱狀圖所求出之標準偏差為根據與BLE接收機相距一定距離之1個BLE發送機之電波強度之柱狀圖所求出之標準偏差之約1/2。藉此判定能夠減少BLE之發送電波強度之隨時間之測定變動。In the above example, the configuration in which each BLE transmitter arranged in a plurality of different places is set to one, but the present invention is not limited to this structure, and BLE transmitters arranged in a plurality of different places may be set to plural station. This example is shown in Fig. 24 as the position specifying system of the third embodiment. FIG. 24 shows an example of a case where a smart phone terminal or the like is set as a BLE receiver and a plurality of BLE transmitters are arranged in two places. For example, in a situation where 4 BLE transmitters are configured, if the intensity of the 4 BLE transmitters is averaged, it can be confirmed that the standard deviation obtained from the histogram is based on a certain distance from the BLE receiver About 1/2 of the standard deviation calculated by the histogram of the radio wave intensity of a BLE transmitter. With this, it is determined that the measurement variation of the intensity of BLE transmission waves over time can be reduced.

圖25表示將智慧型手機終端等設為BLE接收機且將複數個BLE發送機配置於3處之情形之例。又,圖26表示於將智慧型手機終端等設為BLE接收機且將複數個BLE發送機配置於3處之情形時,根據將複數個BLE發送機之電波強度平均化所得者之差所求出的BLE接收機之存在區域之例。於該情形時,描繪有3個阿波羅尼里側斯圓或直線。藉由描繪該阿波羅尼里側斯圓,產生一致通過之點X,該點X成為該BLE接收機所在之地點。但,若僅描繪一條直線,則BLE接收機之位置不確定。設為如必定能特定出位置般之配置之條件係將4個以上之BLE發送機以由其等所描繪之四邊形之邊均不平行之方式配置。Fig. 25 shows an example of a case where a smart phone terminal or the like is set as a BLE receiver and a plurality of BLE transmitters are arranged in three places. In addition, FIG. 26 shows a case where a smart phone terminal or the like is set as a BLE receiver and a plurality of BLE transmitters are arranged in three places, and the difference is obtained from the difference obtained by averaging the radio wave intensity of the plurality of BLE transmitters The example of the existence area of the BLE receiver is shown. In this case, 3 Apollonius circles or straight lines are drawn. By drawing the Apollonius circle, a consistent point X is generated, and the point X becomes the location of the BLE receiver. However, if only a straight line is drawn, the position of the BLE receiver is uncertain. The condition for setting the configuration as if the position must be specified is to arrange more than 4 BLE transmitters in such a way that the sides of the quadrilateral drawn by them are not parallel.

或者,於BLE接收機之存在區域為例如直徑40 cm等必要尺寸以下之情形時,亦可當作存在於該位置而特定出位置。圖27表示限定BLE接收機之存在區域而特定出BLE發送機之位置之情況。藉由調整條件,而BLE接收機之存在區域對攜帶智慧型手機終端等移動之使用者逐個地高精度地進行區分(例如直徑40 cm以下)。例如,與配置於2處之BLE接收機隔開不同距離地配置複數個BLE發送機。以於該等複數個BLE發送機之各處將各BLE發送機之電波強度平均化所得者之差為某閾值以上為條件,BLE接收機之存在區域成為根據將複數個BLE發送機之電波強度平均化所得者之差進行計算後所描繪之阿波羅尼里側斯圓之內側之整個區域。Or, when the existence area of the BLE receiver is less than a necessary size such as 40 cm in diameter, it can also be regarded as existing at that position to specify the position. Fig. 27 shows a situation where the existence area of the BLE receiver is limited and the location of the BLE transmitter is specified. By adjusting the conditions, the existence area of the BLE receiver can be distinguished one by one with high precision (for example, the diameter is less than 40 cm) for the mobile users who carry smart phone terminals. For example, a plurality of BLE transmitters are arranged at different distances from the BLE receivers arranged at two places. On the condition that the difference between the averaging of the radio wave intensity of each BLE transmitter at various places of the BLE transmitters is more than a certain threshold, the existence area of the BLE receiver becomes based on the radio wave intensity of the plurality of BLE transmitters The entire area inside the Apollonius circle drawn after calculating the difference between the averaged ones.

再者,為了能夠同樣地檢測複數個BLE接收機之接收電波強度,亦可於電波強度設定補償(offset)。又,亦可藉由將距BLE發送機較遠之側之BLE接收機設置成距較近之側之BLE接收機足夠遠,而作為與複數個較近之BLE接收機共通之較遠側之BLE接收機進行處理。藉此,亦可設為能夠藉由對攜帶智慧型手機終端等移動之使用者逐個地高速且高精度地進行捕捉、區分、辨識,而將認證所附隨之行為非觸碰地自動化。Furthermore, in order to be able to detect the received radio wave intensity of a plurality of BLE receivers in the same way, an offset may be set in the radio wave intensity. In addition, the BLE receiver on the far side from the BLE transmitter can be set to be far enough away from the BLE receiver on the closer side, and it can be used as the far side common to a plurality of closer BLE receivers. The BLE receiver performs processing. In this way, it can also be set to be able to automatically capture, distinguish, and identify the mobile users carrying smart phone terminals and the like at a high speed and with high precision, so that the actions attached to the authentication can be automated non-touch.

但,例如於在收銀機或驗票機處進行支付之情形時,若錯誤地判斷為處於不存在BLE接收機之區域,則會產生問題。將此定義為誤辨識。必須降低誤辨識之機率本身,於支付等需要高精度之辨識之場景時,需要用以進一步減少誤辨識之設計。圖28表示用以於支付等需要高精度之認證之場景進一步降低誤辨識之設計之例。如圖28般,藉由設置兩處使用者之通過判定區域,且僅於使用者以一定時間差通過該兩者之情形時進行認證,可進一步降低誤辨識。亦即,即便偶然靠近其中一個使用者之通過判定區域且進行了認證,只要另一個使用者之通過判定區域未進行認證,則亦不判斷為已通過。再者,此處亦可利用圖27之配置。亦即,於設定通過時之前半部分之使用者之通過判定區域時,使用以如下內容為條件之判定方法,即,如圖27般,與配置於2處之BLE接收機相距不同距離之各處,複數個BLE發送機之電波強度經平均化所得者之差為某閾值以上。另一方面,於設定通過時之後半部分之使用者之通過判定區域時,可利用以如下內容為條件之判定方法,即,與圖27相反地,與配置於2處之BLE接收機相距不同距離之各處,複數個BLE發送機之電波強度經平均化所得者之差為某閾值以上。但,於如配置複數個BLE發送機之上述例之情形時,BLE接收機另外需要將所測定之電波強度結果、或根據其電波強度進行位置特定之結果等通知給位置特定系統之構造。However, for example, when making a payment at a cash register or a ticket inspection machine, if it is incorrectly determined that it is in an area where there is no BLE receiver, a problem will occur. Define this as misidentification. It is necessary to reduce the probability of misrecognition itself. For scenarios that require high-precision recognition such as payment, a design to further reduce misrecognition is required. Figure 28 shows an example of a design used to further reduce misidentification in scenarios requiring high-precision authentication such as payment. As shown in Fig. 28, by setting two pass judgment areas for users and only authenticate when the user passes the two with a certain time difference, misidentification can be further reduced. That is, even if one of the users is accidentally approached and authenticated by the pass judgment area, as long as the pass judgment area of the other user is not authenticated, it is not judged as passed. Furthermore, the configuration of FIG. 27 can also be used here. That is, when setting the passing judgment area of the user in the first half of the passing time, the judgment method based on the following content is used, that is, as shown in Figure 27, each of the two BLE receivers at different distances Where, the difference between the averaging of the radio wave intensity of multiple BLE transmitters is greater than a certain threshold. On the other hand, when setting the passing judgment area for the user in the second half of the passing time, the judgment method based on the following conditions can be used, that is, contrary to Fig. 27, the distance between the two BLE receivers is different At various distances, the difference between the averaging of the radio wave intensities of multiple BLE transmitters is greater than a certain threshold. However, in the case of the above example where a plurality of BLE transmitters are configured, the BLE receiver additionally needs to notify the structure of the location specifying system of the measured radio wave intensity result or the position specific result based on the radio wave intensity.

再者,實際上,關於電波強度,未必描繪例如如圖23或圖26般之作為BLE發送機之存在區域之3個阿波羅尼里側斯圓或直線一致通過之點。因此,理想為準備3個以上之阿波羅尼里側斯圓或直線,將如誤差最小般之位置推定為BLE接收機之位置。其等之結果,與實施形態1同樣地,於實施形態2中,亦可充分減少BLE之接收電波強度及發送電波強度之隨時間之測定變動而高速且高精度地進行BLE接收機之位置特定。Furthermore, in fact, regarding the intensity of the radio wave, it is not necessary to describe the point where the three Apollonius circles or straight lines pass uniformly as the existence area of the BLE transmitter as shown in Fig. 23 or Fig. 26. Therefore, it is ideal to prepare 3 or more Apollonian circles or straight lines, and estimate the position with the smallest error as the position of the BLE receiver. As a result, in the same way as in the first embodiment, in the second embodiment, it is also possible to sufficiently reduce the measurement variation of the received radio wave intensity and the transmitted radio wave intensity of BLE over time, so that the position of the BLE receiver can be specified with high speed and high accuracy. .

於以上之實施形態1~3中,對使用BLE特定出或檢測出距離或位置之方法進行了說明。但,本發明並不限於BLE,亦可使用其他無線通信標準、例如並非BLE之其他Bluetooth標準或Wi-Fi、RFID、IMES、超音波、ZigBee或者光通信等。藉由使用此種無線通信,無需使用GPS,即於室內亦實現穩定之位置特定。 (單向通信中之認證方法)In the above embodiments 1 to 3, the method of identifying or detecting the distance or position using BLE has been described. However, the present invention is not limited to BLE, and other wireless communication standards, such as Bluetooth standards other than BLE, or Wi-Fi, RFID, IMES, ultrasonic, ZigBee, or optical communication can also be used. By using this kind of wireless communication, GPS is not required, and stable location identification is achieved even indoors. (Authentication method in one-way communication)

另一方面,於伴隨認證之位置特定中,會另外產生與安全相關之問題。其原因在於,若他人或其他裝置冒充位置,則例如無需於收銀機或驗票機處進行必需之支付便可實現目的。因此,接下來對本發明之另一實施形態之單向通信之認證方式進行說明。On the other hand, in the location identification accompanying authentication, additional security-related problems will arise. The reason is that if another person or other device pretends to be a location, for example, it is not necessary to make a necessary payment at a cash register or a ticket inspection machine to achieve the purpose. Therefore, an authentication method for one-way communication according to another embodiment of the present invention will be described next.

首先,作為進行認證之方法,提出有各種方法。此處,將認證之3個要素示於圖29中。用作通常之認證方法之例如ID或密碼係使用利用者已知之知識的知識資訊之一。作為知識資訊,除了ID或密碼以外,還可列舉PIN(Personal Identification Number,個人身分識別碼)碼或秘密之提問(涉及一部分所持資訊)等。First, as a method of authentication, various methods have been proposed. Here, the three elements of authentication are shown in Figure 29. For example, an ID or password used as a common authentication method is one of knowledge information that uses knowledge known to the user. As knowledge information, in addition to ID or password, PIN (Personal Identification Number) codes or secret questions (involving part of the information held) can also be listed.

其次,門之鎖定解除等中所利用之IC(Integrated Circuit,積體電路)卡係使用利用者所持之物,為所持資訊之一。作為所持資訊,除了IC卡以外,還可列舉一次性密碼、USB(Universal Serial Bus,通用串列匯流排)符記(Token)、SMS(Short Message Service,簡訊服務)認證、E-mail認證、語音通話(Voice Call)、智慧型手機應用程式認證或密碼表認證等。Secondly, the IC (Integrated Circuit) card used in unlocking the door, etc., is what the user holds and is one of the held information. As information held, in addition to IC cards, one-time passwords, USB (Universal Serial Bus) tokens (Token), SMS (Short Message Service) authentication, E-mail authentication, Voice call (Voice Call), smart phone application authentication or password table authentication, etc.

進而,指紋認證等係使用利用者本人之特徵之生物資訊之一。作為生物資訊,除了指紋認證以外,還可列舉臉部認證、虹膜認證、視網膜認證或靜脈認證等。Furthermore, fingerprint authentication and the like are one of the biological information that uses the user's own characteristics. As biometric information, in addition to fingerprint authentication, facial authentication, iris authentication, retina authentication, or vein authentication can also be cited.

藉由對該等知識資訊、所持資訊、生物資訊等資訊進行認證,亦防止他人之冒充。又,藉由將該等資訊組合複數個而進行二階段認證或多要素認證等,可確保較高之安全性。By authenticating the knowledge information, holding information, biological information and other information, it also prevents others from impersonating. Furthermore, by combining multiple pieces of this information to perform two-stage authentication or multi-factor authentication, etc., higher security can be ensured.

目前所利用之該等認證方法中,尚未提出不接觸地、不費事且安全地進行個人認證之方法。例如,雖提出有某使用者藉由觸碰車之門把手而進行開鎖之方法,但該方法並非不接觸。又,亦提出有某使用者舉起IC卡或藉由利用智慧型手機終端等讀取QR(Quick Response,快速回應)碼或條碼等符號而進行支付之方法。該等方法雖然不接觸,但為了讀取必須使IC卡或QR碼等接近讀取機,使用者必須進行自口袋取出或舉起等動作,而較費事。進而,於藉由某使用者攜帶成為鑰匙之無線機器,同時接近自動門而進行開鎖之方法中,位置不明確,因此假設於有複數個使用者之情形時,難以識別對哪個使用者進行了認證,不能說安全。Among the currently used authentication methods, no contactless, effortless, and secure method of personal authentication has not been proposed. For example, although a method has been proposed for a user to unlock the door by touching the door handle of the car, this method is not non-contact. In addition, there is also a method in which a user raises an IC card or uses a smart phone terminal to read QR (Quick Response) codes or barcodes and other symbols to make payment. Although these methods are non-contact, in order to read, the IC card or QR code must be brought close to the reader, and the user must perform actions such as taking it out of the pocket or lifting it, which is more troublesome. Furthermore, in the method of unlocking the automatic door by approaching the automatic door while carrying the wireless device as a key by a user, the position is not clear. Therefore, assuming that there are multiple users, it is difficult to identify which user was Authentication cannot be said to be safe.

因此,考慮與使用者之位置資訊組合地加以利用之方法。亦即,可知不接觸地、不費事且安全地進行個人認證及特定出持有欲接受認證之終端或IC卡等之個人係與某些位置資訊具有不可分割之關係。Therefore, consider a method of using it in combination with the user's location information. In other words, it can be known that personal authentication is performed in a contactless, effortless, and secure manner, and individuals who hold terminals or IC cards to be authenticated have an inseparable relationship with certain location information.

認為測定此種位置資訊之方法有複數個,但於不接觸且不費事地測定位置資訊之情形時,利用電波等無線或光、聲音等能夠於空氣中傳播之物理介質。若於室外,則亦可藉由進行使用GPS等相對性理論之測定,而利用數量較少之位置特定裝置20進行大範圍高精度之位置特定。然而,於室內存在各種頻率下之障礙物,因此需要數量較多之位置特定裝置20。尤其是,為了進行使用者之位置特定以確保安全,而需要40 cm左右之精度。因此,位置特定裝置20之設置間隔亦越近則越佳,而設置數容易變多。於進行位置特定時,必須與該等數量較多之位置特定裝置20之一部分及全部進行通信,因此,必須確保數量較多之通信路徑。因此,為了獲得位置資訊,必須確保數量較多之通信路徑。It is believed that there are multiple methods for measuring such position information, but when measuring position information without contact and effort, use radio waves and other wireless or light, sound and other physical media that can propagate in the air. If it is outdoors, it is also possible to use a relatively small number of location specifying devices 20 to perform wide-range and high-precision location specification by performing measurement using relativity theory such as GPS. However, there are obstacles at various frequencies indoors, so a large number of location specifying devices 20 are required. In particular, in order to specify the user's position to ensure safety, an accuracy of about 40 cm is required. Therefore, the closer the installation interval of the position specifying device 20 is, the better, and the installation number tends to increase. When performing location identification, it is necessary to communicate with part and all of the location identification devices 20 with a larger number. Therefore, a larger number of communication paths must be ensured. Therefore, in order to obtain location information, a large number of communication paths must be secured.

另一方面,通常要測定位置資訊之使用者存在複數個,故若欲進行單純之雙向通信,則變為進行多對多之雙向通信。如此一來,必須按人數×位置特定裝置20之數量確保相應數量之通信路徑,而有通信頻帶不足之擔憂。On the other hand, there are usually multiple users who want to measure location information. Therefore, if you want to perform simple two-way communication, you need to perform many-to-many two-way communication. As a result, a corresponding number of communication paths must be secured according to the number of people × the number of location specifying devices 20, and there is a concern that the communication band is insufficient.

因此,可考慮如下等進行一對多之雙向通信之對策,即,將使用者所持有之欲接受認證之終端或IC卡等每一台可使用之通信頻帶限制為一個或兩個等、或將每個位置特定裝置20可使用之通信頻帶限制為一個或兩個等。Therefore, the following countermeasures for one-to-many two-way communication can be considered, that is, the user’s terminal or IC card to be authenticated, etc., can be used to limit each communication band to one or two, etc. Or limit the communication frequency band that each location specific device 20 can use to one or two, etc.

然而,於該情形時,難以確保安全。例如,於使用包含使用者所持有之欲接受認證之終端或IC卡等所提供之唯一之ID及相當者的信號特定出位置之時間點,位置特定與位置資訊之認證完成。因此,必須將ID及相當者加密。然而,於始終使用相同之加密密鑰履行加密程序之情形時,經加密之ID及相當者亦始終一定,而容易被冒充。亦即,藉由複製經加密之ID及相當者本身並發送,有可能做到冒充。However, in this case, it is difficult to ensure safety. For example, at the point in time when the location is specified using the unique ID provided by the terminal or IC card that the user wants to be authenticated and the equivalent signal, the authentication of the location identification and location information is completed. Therefore, the ID and its equivalent must be encrypted. However, when the same encryption key is always used to perform the encryption process, the encrypted ID and the equivalent are always constant, and it is easy to be faked. That is, by copying the encrypted ID and the equivalent itself and sending it, impersonation is possible.

對此,考慮每次通信時改變加密密鑰或者改變加密程序等方法。但,該方法於本發明之實施形態中無法利用。其原因在於,一般於進行雙向通信之通信終端之間,使加密密鑰或加密程序之變更時機同步,且一面進行失敗時之調整等,一面進行穩定之通信,於在存在相同ID及相當者之通信頻帶中傳播之情形時,一旦通信失敗之後,為了獲得整體之同步有可能非常費時間。其結果,一旦通信失敗之通信終端不易恢復通信。In this regard, consider methods such as changing the encryption key or changing the encryption program every communication. However, this method cannot be used in the embodiment of the present invention. The reason is that generally between communication terminals that perform two-way communication, the timing of changing the encryption key or encryption program is synchronized, and while performing adjustments in case of failure, while performing stable communication, when there is the same ID and equivalent In the case of propagation in the communication frequency band, once the communication fails, it may be very time-consuming to obtain the overall synchronization. As a result, it is not easy for the communication terminal to resume communication once the communication fails.

因此,於本實施形態中,作為以多對多之方式進行通信之情形時之通信方法,採用單向通信。此處,自使用者所攜帶之欲接受認證之終端或IC卡等朝位置特定裝置20側單向地進行通信,基於其資訊進行位置特定裝置20與使用者所攜帶之欲接受認證之終端或IC卡等之位置特定。或者,相反地,自位置特定裝置20側朝使用者之欲接受認證之終端等進行單向通信,基於其資訊進行其等之位置特定。例如,於利用BLE進行通信之情形時,可利用BLE信標進行單向通信。於此種一對一或一對多之單向通信中,藉由每次發行一次性密碼,能夠解決安全之問題。Therefore, in this embodiment, one-way communication is adopted as a communication method when communication is performed in a many-to-many manner. Here, one-way communication is carried out from the terminal or IC card carried by the user to be authenticated toward the location specifying device 20, and the location specifying device 20 and the terminal or IC card to be authenticated carried by the user are communicated based on the information. Location specific for IC cards, etc. Or, conversely, one-way communication is performed from the position specifying device 20 side to the user's terminal or the like to be authenticated, and the position identification is performed based on the information. For example, when BLE is used for communication, BLE beacons can be used for one-way communication. In this one-to-one or one-to-many one-way communication, the security problem can be solved by issuing a one-time password each time.

再者,測定位置資訊之方法並不限定於本實施形態。例如,僅藉由對使用者所持有之欲接受認證之終端或IC卡等所提供之唯一之ID及相當者每次追加地傳送成為一次性密碼者,而一面使用該信號特定出位置,一面對該一次性密碼進行認證,藉此能夠於複數個位置特定裝置20中於每次接收時完成位置特定與位置資訊之認證。由於該信號僅可利用一次,故即便被盜取亦無法進行第二次認證。又,即便於複數個位置特定裝置20中之任一者中接收失敗,亦可緊接著進行接收,故能夠進行非常穩定之通信。 (一次性密碼)In addition, the method of measuring position information is not limited to this embodiment. For example, only the unique ID provided by the terminal or IC card that the user wants to be authenticated and the equivalent are sent each additional time to become a one-time password, while using the signal to identify the location, The one-time password is authenticated, so that the authentication of the location identification and the location information can be completed in the plurality of location identification devices 20 each time it is received. Since the signal can only be used once, even if it is stolen, the second authentication cannot be performed. In addition, even if reception fails in any one of the plurality of position specifying devices 20, reception can be performed immediately, so very stable communication can be performed. (One-time password)

然,既有之一次性密碼中不存在滿足上述規格者。作為當前利用之一次性密碼,存在(1)哈希鏈型;(2)時刻同步(Time Synchronization)型;(3)詰問型;(4)交易(transaction)型等。Of course, none of the existing one-time passwords meets the above specifications. As currently used one-time passwords, there are (1) hash chain type; (2) time synchronization (Time Synchronization) type; (3) interrogation type; (4) transaction type, etc.

(1)哈希鏈型係使用雜湊函數等單向性函數者。雜湊函數係指根據某數值求出某數值之函數,但一般而言,無法根據所以求出之數值特定出原始數值。因此,藉由反覆應用雜湊函數之類之單向性函數,可製作所需個數之密碼串。將該密碼串反過來於每段有效時間內用作一次性密碼。即便知曉該密碼,亦無法求出有效時間後之下一個密碼。又,密碼串不能無限地產生。(1) Hash chain type uses one-way functions such as hash functions. A hash function refers to a function that finds a certain value based on a certain value, but generally speaking, it is impossible to specify the original value based on the calculated value. Therefore, by repeatedly applying a one-way function such as a hash function, a required number of cipher strings can be produced. Reverse the password string as a one-time password during each valid period. Even if you know the password, you cannot find the next password after the valid time. Also, the password string cannot be generated indefinitely.

(2)時刻同步型係使用根據時刻所求出之符記進行認證者。於接受認證之裝置與進行認證之裝置之內部,使用相同運算法,根據時刻求出符記,並以是否一致來進行認證。即便於各裝置間時刻稍微偏離,進行認證之裝置亦偵測到該時間之偏差,一面修正接受認證之裝置用之本身之時刻,一面進行認證。藉此,可以始終同步之時刻進行認證。但,為了實現同步,將符記之更新時間例如設為一分鐘,且容許例如1秒鐘等時間範圍內之時間之偏差,因此無法以ms單位等進行修正。(2) The time synchronization type is a person who uses the token obtained according to the time for authentication. The same algorithm is used inside the device to be authenticated and the device to be authenticated, and the token is obtained according to the time, and the authentication is performed based on whether it is consistent. Even if there is a slight deviation in the time between the devices, the authenticating device detects the time deviation and performs authentication while correcting the time used by the authenticating device. In this way, authentication can always be performed at a synchronized time. However, in order to achieve synchronization, the update time of the symbol is set to, for example, one minute, and the time deviation within a time range such as one second is allowed, so it cannot be corrected in ms units.

(3)詰問型係由接受認證之裝置對自進行認證之裝置提出之問題(詰問)進行答覆(回應)者。為了避免答覆被複製,組入有如下構造,即,通常當提出相同之問題時,變為與以前不同之答覆。再者,該詰問型係以雙向通信為前提。(3) The cross-examination type is a device that answers (responses) questions (examinations) raised by the authenticated device. In order to prevent the reply from being copied, the grouping has the following structure, that is, usually when the same question is asked, it becomes a different reply from the previous one. Furthermore, the interrogation type is based on two-way communication.

(4)交易型係事先準備密碼清單,每次認證時使用一個。一個密碼僅可利用一次。不能無限地產生該密碼清單。(4) The transaction system prepares a password list in advance, and uses one for each authentication. A password can only be used once. The password list cannot be generated indefinitely.

其次,作為多對多之單向通信之安全所需之要件,必須滿足如下3點:(1)可用於單向通信;(2)可無限次利用;(3)具有位置特定等所需之高速性。然而,當前發明所利用之一次性密碼方式中,均無法滿足全部該等條件。Secondly, as a security requirement for many-to-many one-way communication, the following three points must be met: (1) It can be used for one-way communication; (2) It can be used unlimited times; (3) It has the requirements for location specific High speed. However, none of the one-time password methods used in the current invention can satisfy all these conditions.

因此,於本實施形態中,藉由發送經加密之時間而解決該問題。即,構成為利用於某一確定之通信環境下傳送側與接收側之時間差大致一定這一情況,藉由確認收發之時間差來判定通信之真偽。具體而言,個人移動終端對位置特定裝置傳送資料時,傳送識別資訊及一次性密碼。此時,於個人移動終端中,當發行一次性密碼時,獲取發行時刻,以公共密鑰將該發行時刻之資訊加密後,發行一次性密碼。個人移動終端將該識別資訊及一次性密碼傳送至位置特定裝置。Therefore, in this embodiment, the problem is solved by transmitting the encrypted time. That is, it is configured to utilize the fact that the time difference between the transmitting side and the receiving side is substantially constant in a certain communication environment, and to determine the authenticity of the communication by confirming the time difference between transmission and reception. Specifically, when the personal mobile terminal transmits data to the location specific device, it transmits identification information and a one-time password. At this time, in a personal mobile terminal, when a one-time password is issued, the issuance time is acquired, and the information at the issuance time is encrypted with a public key to issue the one-time password. The personal mobile terminal transmits the identification information and the one-time password to the location-specific device.

另一方面,於位置特定裝置側,自個人終端側發送部接收識別資訊及一次性密碼,並且自位置特定側時刻部獲取此時之接收時刻。然後,根據所接收到之識別資訊,自位置特定側記憶部搜尋與該識別資訊對應之公共密鑰,使用所獲得之公共密鑰將一次性密碼解密,而獲取經函數化之與發行時刻相關之資訊。藉此,可獲取與發行一次性密碼時之發行時刻(換言之個人移動終端側之傳送時刻)相關之資訊及與接收時刻相關之資訊,故獲取其等之差量。On the other hand, on the location specifying device side, the identification information and the one-time password are received from the personal terminal side transmitting unit, and the receiving time at that time is obtained from the location specifying side time unit. Then, based on the received identification information, search for the public key corresponding to the identification information from the location-specific side memory, use the obtained public key to decrypt the one-time password, and obtain the functionalized correlation with the issuance time的信息。 Information. With this, it is possible to obtain information related to the issuance time when the one-time password is issued (in other words, the transmission time on the personal mobile terminal side) and information related to the reception time, so the difference between them can be obtained.

以此方式,每次進行資料通信時測定所發送之資料之密碼發行時刻與接收時刻之差量、即自傳送時至接收時為止之時間差。一般而言,當將傳送側與接收側置於一定之通信環境下時,難以想像通信環境會於短時間內大幅度變動。例如,當攜帶智慧型手機終端之利用者通過車站之自動驗票機時,可假定為以BLE進行通信之速度於該利用者通過自動驗票機之前之期間內一定。In this way, the difference between the password issuance time and the reception time of the transmitted data, that is, the time difference from the time of transmission to the time of reception, is measured every time data communication is performed. Generally speaking, when the transmitting side and the receiving side are placed in a certain communication environment, it is difficult to imagine that the communication environment will change drastically in a short time. For example, when a user with a smart phone terminal passes through an automatic ticket inspection machine at a station, it can be assumed that the communication speed using BLE is constant before the user passes the automatic ticket inspection machine.

如此,若每次進行資料通信時(例如每次封包時),通信所需之時間一定,則自傳送時至接收時為止之時間差一定。另一方面,考慮欲違規通過自動驗票機之違規利用者如其他正規利用者般行動之冒充等違規訪問。於該情形時,一般而言,難以考慮正欲冒充之正規利用者實際上處於違規利用者之附近,而是考慮自遠處使用網際網路等通信路徑進行訪問,可認為於該情形時之傳送時與接收時之時間差與正規利用者之時間差不同(例如花費更長之時間)。In this way, if the time required for communication is constant every time data communication is performed (for example, every time a packet is packetized), the time difference from the time of transmission to the time of reception is constant. On the other hand, consider the illegal visits by impersonating users who want to pass the automatic ticket gate in violation of the rules, acting like other regular users. In this situation, generally speaking, it is difficult to consider that the legitimate user who is about to impersonate is actually in the vicinity of the illegal user. Instead, it is considered to use the Internet or other communication paths to access from a distance. The time difference between transmission and reception is different from that of regular users (for example, it takes longer).

基於此種假定,而每次進行資料通信時測定傳送時與接收時之時間差,若該時間差一定,則正當地進行通信,於非一定之情形時,要懷疑冒充等違規訪問。其結果,藉由將傳送時刻加密後傳送,並監視收發之時間差,而於時間差相差較大之情形時可判別為違規訪問,因此,可進行個人移動終端之認證。Based on this assumption, the time difference between the time of transmission and the time of reception is measured every time data is communicated. If the time difference is constant, then the communication will be carried out properly. If the situation is not constant, illegal access such as impersonation should be suspected. As a result, by encrypting the transmission time and transmitting and monitoring the time difference between sending and receiving, when the time difference is large, it can be judged as illegal access. Therefore, personal mobile terminal authentication can be performed.

又,此種個人移動終端之認證係每當接近位置特定裝置時便進行一次。例如,每當攜帶智慧型手機終端之利用者通過自動驗票機時便進行。藉此,即便於設置有自動驗票機之每種環境下通信速度不同,亦由於對每種環境測定收發之時間差,故準確地進行認證。因此,較佳為於經過一定時間後刪除暫時獲取之時間差之資訊。In addition, the authentication of such a personal mobile terminal is performed every time the location specifying device is approached. For example, every time a user carrying a smart phone terminal passes through an automatic ticket gate. Thereby, even if the communication speed is different in each environment where the automatic ticket checking machine is installed, since the time difference between sending and receiving is measured for each environment, the authentication is accurately performed. Therefore, it is better to delete the temporarily acquired time difference information after a certain period of time has passed.

例如,將於某時機(較佳為資料通信之最初階段)之接收時刻獲取之發行時刻與所獲取之接收時刻之差量作為認證基準資訊並保存於位置特定側記憶部等。然後,於保存後之一定時間內,將該認證基準資訊作為標準之收發之時間差而進行認證。即,針對一連串通信資料,將接收時刻與發行時刻之差量和認證基準資訊進行比較,若為可視為相同或大致相同之程度,則進行認證,於差較大之情形時不進行認證。藉此,可進行順利之認證。然後,於經過一定時間後將認證基準資訊刪除,藉此當重新進行通信時,再次獲取新的認證基準資訊並覆寫,藉此,即便於暫時性地成功冒充之情形時,亦可於下一次認證時將其排除,而可進一步提高安全性。For example, the difference between the issuance time acquired at a certain time (preferably the initial stage of data communication) and the acquired reception time is used as the authentication reference information and stored in the location specifying side memory. Then, within a certain period of time after storage, the authentication reference information is used as the time difference between the standard transmission and reception for authentication. That is, for a series of communication data, the difference between the reception time and the issuance time is compared with the authentication standard information, and authentication is performed if the difference is considered to be the same or approximately the same, and if the difference is large, authentication is not performed. With this, smooth authentication can be performed. Then, after a certain period of time has elapsed, the authentication reference information is deleted, so that when the communication is resumed, the new authentication reference information is acquired and overwritten again, so that even if the impersonation is temporarily successful, the following It can be excluded during the first authentication, which can further improve the security.

此處,將發送經加密之時間並進行認證之情況示於圖30中。例如,設為Alice與Bob進行單向通信。事先,Alice與Bob以安全之方法於Alice與Bob之間共有Alice所持有之欲接受認證之終端等所提供之唯一之ID等識別資訊、及與其成組之加密密鑰。Alice以如下信號之形式向Bob進行傳送,即,將Alice所持有之欲接受認證之終端等提供之唯一之ID等中該終端等所具有之時刻以例如ms為單位加密成例如UNIX時間等自1970年算起之時間,並以ID等與上述經加密之時間成為一體而成。已接收之Bob基於所接收到之ID等,檢索用於譯解之加密密鑰,並使用該加密密鑰將經加密之時間解密,求出與接收之時刻之差。然後,對在下一時機接收到之信號進行同樣之處理,確認剛才之解密所得之時間與接收之時刻之差是否一致。於一致之情形時,認證為來自Alice之信號,於不一致之情形時,不進行認證。之後重複此動作。再者,設為基準之信號可為任意時間之時間點之信號。Here, the case where the encrypted time is sent and authenticated is shown in FIG. 30. For example, suppose that Alice and Bob have one-way communication. In advance, Alice and Bob share the unique ID and other identification information provided by the terminal to be authenticated, etc. held by Alice, and the encryption key grouped with it, in a secure way between Alice and Bob. Alice transmits to Bob in the form of a signal, that is, the unique ID provided by the terminal to be authenticated held by Alice, etc., and the time of the terminal, etc., is encrypted in units of ms, such as UNIX time, etc. The time counted from 1970 and integrated with the above-mentioned encrypted time with ID etc. The received Bob retrieves the encryption key for deciphering based on the received ID, etc., and uses the encryption key to decrypt the encrypted time to find the difference with the received time. Then, perform the same processing on the signal received at the next time to confirm whether the difference between the time obtained by decryption and the time of reception is the same. In the case of agreement, the authentication is a signal from Alice, and in the case of inconsistency, no authentication is performed. Repeat this action afterwards. Furthermore, the signal set as the reference can be a signal at any point in time.

或者,已接收之Bob基於所接收到之ID等,檢索用於譯解之加密密鑰,並使用該加密密鑰將經加密之時間解密,並與接收之時刻一起記錄。然後,對在下一時機接收到之信號進行同樣之處理,確認解密所得之時間彼此之差與接收之時刻彼此之差是否一致。於一致之情形時,認證為來自Alice之信號,於不一致之情形時,不進行認證。之後重複此動作。再者,設為基準之信號可為任何時間之信號。Alternatively, the received Bob retrieves the encryption key for deciphering based on the received ID, and uses the encryption key to decrypt the encrypted time and record it together with the time of reception. Then, the same processing is performed on the signal received at the next time, and it is confirmed whether the difference between the decrypted time and the receiving time are the same. In the case of agreement, the authentication is a signal from Alice, and in the case of inconsistency, no authentication is performed. Repeat this action afterwards. Furthermore, the signal set as the reference can be a signal at any time.

再者,與安裝時,亦可附加如下等處理,即,容許例如1 ms以下等某閾值以下之誤差,但不允許數秒等單位之時刻差。Furthermore, at the time of installation, processing such as the following may be added, that is, an error below a certain threshold such as 1 ms or less is allowed, but a time difference in units of several seconds is not allowed.

藉由使用該方法,而該信號僅可利用一次,故即便被盜取,亦無法進行第二次認證。又,即便於複數個位置特定裝置20中之任一者中接收失敗,亦能夠緊接著進行接收,因此可於接收後進行認證,可進行非常穩定之認證。By using this method, the signal can only be used once, so even if it is stolen, the second authentication cannot be performed. In addition, even if the reception fails in any one of the plurality of location specifying devices 20, the reception can be performed immediately, so authentication can be performed after the reception, and very stable authentication can be performed.

尤其是,於通信資料被盜取之情形時,由於經加密之時間與接收之時機不同,故不進行第二次認證,不僅如此,即便假設使用類比電路等高速地進行單純之信號複製,亦於接收相同之信號兩次以上之時間點獲知冒充。或者,於存在單純之信號複製之情形時,會複製於附近進行發送之所有使用者之信號,故如於一處有複數人般進行位置特定,因此,獲知冒充。Especially when the communication data is stolen, since the encrypted time is different from the receiving time, the second authentication is not performed. Not only that, even if it is assumed that simple signal reproduction is performed at high speed using analog circuits, etc. The impersonation is known at the time when the same signal is received more than twice. Or, in the case of simple signal copying, the signals of all users who are transmitting nearby will be copied, so the location is specified as if there are multiple people in one place, so the impersonation is known.

再者,ID之位元數例如可為40位元等。40位元可準備大致1兆人之ID,故可唯一地設定。又,ID可為OSI(Open System Interconnect,開放系統互連)參考模型之任一層。又,時間之位元數例如可為48位元等。48位元具有能以微秒表現4000年左右之程度之空間。Furthermore, the number of bits of the ID may be 40 bits, for example. 40 bits can prepare the ID of approximately 1 trillion people, so it can be set uniquely. Furthermore, the ID can be any layer of the OSI (Open System Interconnect) reference model. In addition, the number of bits of time may be 48 bits, for example. 48 bits have a space that can represent about 4000 years in microseconds.

再者,於加密之前,既可將表現改變成無法預測時間之形式,亦可進行填補(padding)處理等。又,作為加密,例如可利用3DES(Triple Data Encryption Standard,三重資料加密標準)或AES(Advanced Encryption Standard,進階加密標準)等公共密鑰密碼,亦可利用橢圓曲線密碼(Elliptic curve cryptography)等公開密鑰密碼。進而,於將時間轉換為ms單位時,既可以ms測定自1970年算起之時間,亦可對以秒為單位測定之時間附加ms單位。Furthermore, before encryption, the performance can be changed to an unpredictable time format, or padding can be performed. In addition, as encryption, for example, public key cryptography such as 3DES (Triple Data Encryption Standard) or AES (Advanced Encryption Standard) can be used, and Elliptic curve cryptography can also be used. Public key password. Furthermore, when converting time into ms units, it is possible to measure the time since 1970 in ms, or add the ms unit to the time measured in seconds.

又,時間未必需要與自1970年算起之時間一致,設為容許誤差之構造。但,於時間過度偏離之情形時,於安全方面成為問題。假設Alice與Bob使用本實施形態之方法進行單向通信,將Alice發送之信號間隔設為隨機,將Eve為攻擊者。於該情形時,Eve記錄Alice之發送信號與該信號之發送時機之組,當Eve於該信號之發送時機發送相同之發送信號時,Bob無法區分是否為Alice。因此,必須以如成為持續發送信號之期間般之例如10秒左右以下一致。因此,理想為亦適當進行與時刻伺服器之同步等。In addition, the time does not necessarily need to be the same as the time since 1970, and it is a structure that allows errors. However, when time deviates too much, it becomes a problem in terms of safety. Suppose that Alice and Bob use the method of this embodiment for one-way communication, the signal interval sent by Alice is set to random, and Eve is the attacker. In this case, Eve records the set of Alice's sending signal and the sending timing of the signal. When Eve sends the same sending signal at the sending timing of the signal, Bob cannot distinguish whether it is Alice. Therefore, it is necessary to match the signal to a period of 10 seconds or less such as a period of continuous signal transmission. Therefore, it is ideal to also appropriately synchronize with the time server.

進而,亦可具有每隔一定時間(例如一天等)對智慧型手機終端等進行不同之本人認證之構造。再者,經過該一定時間(例如一天等)之後,既可提示提醒本人認證之文章等,或者亦可於一定時間(例如追加一天等)內設為有效。 [實施形態4]Furthermore, it is also possible to have a structure in which different personal authentication is performed on a smart phone terminal or the like at regular intervals (for example, one day). Furthermore, after a certain period of time (for example, one day, etc.), an article reminding the person to be authenticated may be presented, or it may be valid for a certain period of time (for example, an additional day, etc.). [Embodiment 4]

再者,本實施形態之單向通信之認證方法亦可用於無須進行位置特定之一般之單向之信號。亦即,可用作作為單向通信之一種之BLE信標或業務無線等中安全地加密之認證方式。此處,作為實施形態4,將無須進行位置特定之認證系統之功能方塊圖示於圖31中。該圖所示之認證系統400具備成為特定出位置之對象之由個人攜帶之個人移動終端10、及特定出個人移動終端10之位置之位置特定裝置20。個人移動終端10具備個人終端側發送部11、個人終端側控制部12、個人終端側記憶部13及個人終端側時刻部14。個人終端側發送部11相對於位置特定裝置20進行雙向通信。個人終端側控制部12控制個人終端側發送部11。個人終端側記憶部13保持預先被賦予之固有之識別資訊、於個人移動終端10與位置特定裝置20之間預先交換之被賦予至該個人移動終端10之識別資訊所固有之公共密鑰、及用於產生一次性密碼之既定函數。個人終端側時刻部14產生與時刻相關之資訊。Furthermore, the one-way communication authentication method of this embodiment can also be used for general one-way signals without location specificity. That is, it can be used as an authentication method for secure encryption in BLE beacons or service wireless as a one-way communication. Here, as the fourth embodiment, the functional block diagram of the authentication system that does not require location identification is shown in FIG. 31. The authentication system 400 shown in the figure includes a personal mobile terminal 10 carried by an individual, which is a target for specifying a location, and a location specifying device 20 that specifies the location of the personal mobile terminal 10. The personal mobile terminal 10 includes a personal terminal-side transmission unit 11, a personal terminal-side control unit 12, a personal terminal-side storage unit 13, and a personal terminal-side time unit 14. The personal terminal side transmitting unit 11 performs two-way communication with the position specifying device 20. The personal terminal side control unit 12 controls the personal terminal side transmission unit 11. The personal terminal side memory 13 holds the unique identification information assigned in advance, the public key unique to the identification information assigned to the personal mobile terminal 10 exchanged in advance between the personal mobile terminal 10 and the location specifying device 20, and The established function for generating a one-time password. The personal terminal side time unit 14 generates information related to time.

另一方面,位置特定裝置20具備位置特定側接收部21、位置特定側運算部25、位置特定側記憶部26及位置特定側時刻部27。位置特定側接收部21係與個人終端側發送部11進行雙向通信。位置特定側運算部25藉由位置特定側接收部21與個人終端側發送部11進行通信,而進行個人移動終端10之認證。位置特定側記憶部26將被賦予至個人移動終端10之識別資訊與每個該識別資訊所固有之公共密鑰建立關連地保持。位置特定側時刻部27產生與時刻相關之資訊。On the other hand, the position specifying device 20 includes a position specifying side receiving unit 21, a position specifying side calculating unit 25, a position specifying side storage unit 26, and a position specifying side time unit 27. The location specifying side receiving unit 21 performs two-way communication with the personal terminal side transmitting unit 11. The location specifying side computing unit 25 communicates with the personal terminal side transmitting unit 11 through the location specifying side receiving unit 21 to authenticate the personal mobile terminal 10. The location specifying-side storage unit 26 associates the identification information assigned to the personal mobile terminal 10 with the public key inherent in each identification information. The position specifying side time section 27 generates information related to time.

個人終端側控制部12係於個人終端側發送部11與位置特定側接收部21進行通信時,發行個人終端側記憶部13中所保持之固有之識別資訊、及每個該識別資訊所固有之僅可使用一次之一次性密碼。又,位置特定側運算部25對位置特定側接收部21自個人終端側發送部11接收到之識別資訊及一次性密碼進行認證。The personal terminal side control unit 12 is to issue the unique identification information held in the personal terminal side storage unit 13 and the unique identification information for each individual terminal side when the personal terminal side transmitting unit 11 communicates with the location specifying side receiving unit 21 The one-time password can only be used once. In addition, the location specifying side computing unit 25 authenticates the identification information and the one-time password received by the location specifying side receiving unit 21 from the personal terminal side transmitting unit 11.

個人移動終端10於對位置特定裝置20傳送識別資訊及一次性密碼時,利用個人終端側時刻部14獲取與個人終端側控制部12發行一次性密碼時之發行時刻相關之資訊,並將其應用於個人終端側記憶部13中所保持之既定函數,進一步以個人終端側記憶部13中所保持之公共密鑰進行加密後,發行一次性密碼。When the personal mobile terminal 10 transmits the identification information and the one-time password to the location specifying device 20, the personal terminal-side time unit 14 obtains information related to the issuance time when the personal terminal-side control unit 12 issues the one-time password, and applies it The predetermined function held in the personal terminal side storage unit 13 is further encrypted with the public key held in the personal terminal side storage unit 13 to issue a one-time password.

另一方面,位置特定側運算部25自位置特定側時刻部27獲取位置特定側接收部21自個人終端側發送部11接收識別資訊及一次性密碼時之接收時刻。然後,根據所接收到之識別資訊,自位置特定側記憶部26搜尋與該識別資訊對應之公共密鑰,並使用所獲得之公共密鑰將一次性密碼解密,而獲取經函數化之與發行時刻相關之資訊。進而,將所獲取之與發行時刻相關之資訊和所獲取之與接收時刻相關之資訊進行比較,而獲取差量。即,獲取與自接收時刻減去傳送時刻所得之通信所需之時間相關之資訊。其次,於另一時機進行同樣之處理而獲取收發所需之時間,若與之前之收發所需之時間相同,則判定為進行正當之通信,對該個人移動終端進行認證。另一方面,於收發所需之時間與之前之時間相差較大之情形時,判斷為違規訪問而不進行認證。藉此,可對攜帶個人移動終端10之個人進行認證,而可進行區分個人之位置檢測。On the other hand, the location specifying side computing unit 25 acquires the receiving time when the location specifying side receiving unit 21 receives the identification information and the one-time password from the personal terminal side transmitting unit 11 from the location specifying side time unit 27. Then, according to the received identification information, the location specifying side memory 26 searches for the public key corresponding to the identification information, and uses the obtained public key to decrypt the one-time password to obtain the functionalized and issued Relevant information at all times. Furthermore, the obtained information related to the issuing time and the obtained information related to the receiving time are compared to obtain the difference. That is, information related to the time required for communication obtained by subtracting the transmission time from the reception time is acquired. Secondly, perform the same processing at another time to obtain the time required for transmission and reception. If the time required for transmission and reception is the same as the previous transmission and reception, it is determined that proper communication is performed and the personal mobile terminal is authenticated. On the other hand, when the time required for sending and receiving is significantly different from the previous time, it is judged as a violation of access without authentication. Thereby, the individual carrying the personal mobile terminal 10 can be authenticated, and the position detection of the individual can be performed.

再者,於可假定通信環境一定且不變化之情形時,收發所需之時間係於各通信成為相同之時間。但,個人移動終端、位置特定裝置或伺服器等各機器所具有之時刻資訊係根據世界時鐘或時刻伺服器而修正時刻,但該等時刻存在稍許偏差。因此,各個人移動終端或位置特定裝置多具有之時刻本來就不完全一致。因此,考慮假設於機器間存在100 ms左右之誤差之情形。若存在此種程度之時間差,則自遠處之冒充可實現。即便是遠處,通信亦僅花費數十ms之情形較多。若假設於遠處隨意地盜取使用者A之個人移動終端之發送資訊並於另一地點進行同樣之發送,則實現了冒充。為了阻止該情況,考慮即便為數ms左右亦不容許誤差。Furthermore, when it can be assumed that the communication environment is constant and unchanged, the time required for transmission and reception is the time when each communication becomes the same. However, the time information possessed by each machine such as personal mobile terminals, location specifying devices or servers is corrected based on the world clock or time server, but there is a slight deviation in these times. Therefore, the time that each person's mobile terminal or location specifying device has is not completely consistent. Therefore, consider the assumption that there is an error of about 100 ms between machines. If there is such a time difference, impersonation from a distance can be realized. Even at a distance, communication only takes tens of ms in many cases. If it is assumed that the sending information of user A's personal mobile terminal is arbitrarily stolen from a remote place and the same sending is performed at another location, impersonation is realized. In order to prevent this, it is considered that no error is allowed even if it is about several ms.

因此,於本實施形態中,如上所述般設為每次通信時將收發所需之時間作為認證基準資訊加以保持,藉由與該值進行比較而進行認證。於自遠處之通信中,因通信網中之堵塞等而產生時間差之波動。另一方面,自處於現場之使用者A之個人移動終端向位置特定裝置之通信係接近光速之高速,故基本不會產生通信路徑上之通信時間之波動。其結果,能夠有效地阻止冒充。但,只要他人可藉由對該發送時機與資料進行記錄等並加以保持而適時地進行發送,則有可能冒充成功。因此,較佳為附加絕對之時間差之限制。例如,可列舉設定1秒以內或100 ms以內等基準時間差作為絕對時間差而附加限制之方法。於自動驗票機之情形時,可如下所述般獲取於自動驗票機側接收之時刻與解密所得之時刻(即個人移動終端側之傳送時刻)之時間差,因此,於該時間差大於預先設定之基準時間差之情形時,藉由廢除該資料而能夠避免冒充。Therefore, in this embodiment, as described above, it is assumed that the time required for transmission and reception is held as authentication reference information for each communication, and authentication is performed by comparing with this value. In communications from a distance, the time difference fluctuates due to congestion in the communications network. On the other hand, the communication from the personal mobile terminal of the user A in the field to the location-specific device is close to the speed of light, so there is basically no fluctuation in the communication time on the communication path. As a result, impersonation can be effectively prevented. However, as long as someone else can send it in a timely manner by recording the sending timing and data, etc., and keeping it, the impersonation may succeed. Therefore, it is better to add an absolute time difference restriction. For example, a method of setting a reference time difference such as within 1 second or within 100 ms as an absolute time difference and adding restrictions can be cited. In the case of an automatic ticket inspection machine, the time difference between the time received at the automatic ticket inspection machine and the decrypted time (ie the transmission time on the personal mobile terminal) can be obtained as described below. Therefore, the time difference is greater than the preset In the case of the base time difference, by abolishing the data, impersonation can be avoided.

根據本實施形態之單向通信之認證方法,相較一般之雙向通信時之使用公開密鑰密碼等之認證方法,可進行更高速之認證。又,一般而言,與多個使用者進行通信之業務無線等中經常利用之單向通信之加密係以事先決定之公共密鑰加密之情形較多。於該情形時,公共密鑰嵌入於通信機器內。因此,於某通信機器中公共密鑰洩露之情形時,安全問題容易波及整體。與此相對,於本實施形態中,由於亦可提供針對每個通信機器不同之公共密鑰,故不易受此種安全問題之影響。亦即,即便不存在高級之位置資訊,亦可於藉由觸碰門把手之方法、利用IC卡、智慧型手機終端等讀取QR碼之方法或使用BLE信標等之方法進行開鎖或支付時,利用本實施形態之單向通信之認證方法進行認證。藉此,可設為藉由對攜帶智慧型手機終端等移動之使用者逐個地高速且高精度地進行捕捉、區分,且非接觸地不費事且安全地進行個人認證,而可將認證所附隨之行為非觸碰地自動化。According to the authentication method for one-way communication of this embodiment, it is possible to perform authentication at a higher speed than the authentication method that uses public key cryptography during two-way communication in general. In addition, generally speaking, the encryption of one-way communication, which is frequently used in business wireless communication with multiple users, is often encrypted with a public key determined in advance. In this case, the public key is embedded in the communication device. Therefore, when the public key is leaked in a certain communication device, the security problem is likely to affect the whole. In contrast, in the present embodiment, since a different public key for each communication device can also be provided, it is not susceptible to such security issues. That is, even if there is no advanced location information, you can unlock or pay by touching the doorknob, reading the QR code with an IC card, smart phone terminal, or using BLE beacons. At the time, use the one-way communication authentication method of this embodiment for authentication. In this way, it can be set up to carry out high-speed and high-precision capturing and distinguishing one by one for mobile users carrying smartphones, etc., and to perform personal authentication in a non-contact, effortless and secure manner. The accompanying behavior is non-touch automated.

再者,於不需要安全之情形時,BLE發送機中不需要運算部等。又,如本實施形態般,為了位置特定或為了認證而發送之信號有可能使通信頻帶壓迫。因此,為了產業發展,非常理想為僅於必需之區域、範圍或時間等進行發送。以下,對本實施形態之例示性之實施例進行說明。 [實施例1] (事後支付系統)Furthermore, in situations where security is not required, the BLE transmitter does not require an arithmetic unit, etc. Also, as in the present embodiment, a signal sent for location identification or authentication may compress the communication band. Therefore, in order to develop the industry, it is very ideal to send only the necessary area, range, or time. Hereinafter, an illustrative example of this embodiment will be described. [Example 1] (Post-payment system)

於實施例1中,說明於車站之驗票機處,利用者可不取出個人移動終端10地加以利用之例。再者,亦可將同樣之事後支付系統應用於公共汽車等公共交通工具。將鐵路或公共汽車等之事後支付系統之概略示於圖32中,將流程圖示於圖33中。圖32所示之事後支付系統包含具有登錄支付管理系統及利用管理系統之管理伺服器、設置有驗票機之車站、利用者所持有之個人移動終端10及鐵路公司。再者,此處,對利用者利用鐵路等之後支付費用之事後支付之例進行說明,但本發明並不限於事後支付,亦可用於預付或同時結算。In the first embodiment, an example in which the user can use the personal mobile terminal 10 without taking out the personal mobile terminal 10 at the ticket inspection machine at the station is described. Furthermore, the same post-payment system can also be applied to public transportation such as buses. The outline of the post-payment system for railways or buses is shown in FIG. 32, and the flow diagram is shown in FIG. 33. The post-payment system shown in FIG. 32 includes a management server with a registered payment management system and a utilization management system, stations with ticket inspection machines, personal mobile terminals 10 held by users, and railway companies. In addition, here, an example of post-payment in which the user pays the fare after using a railway or the like will be described. However, the present invention is not limited to post-payment, and can also be used for prepayment or simultaneous settlement.

基於圖33之流程圖對該事後支付系統之事後支付程序進行說明。首先,於步驟S3301中,於利用者之個人移動終端10預先安裝有用以進行驗票票券之事後支付之專用應用程式。又,於該專用應用程式中預先登錄有個人資訊、例如姓名或支付用之信用卡編號等。The post-payment procedure of the post-payment system will be described based on the flowchart in FIG. 33. First, in step S3301, a special application for post-payment of ticket verification is pre-installed in the personal mobile terminal 10 of the user. In addition, personal information, such as name or credit card number for payment, is pre-registered in the dedicated application.

其次,於步驟S3302中,自個人移動終端10利用專用應用程式將ID公共密鑰(例如3DES等)傳送至登錄伺服器之登錄支付管理系統側。又。於步驟S3303中,於需要之時機,由登錄支付管理系統與信用卡公司之間對信用卡資訊進行認證。進而,於步驟S3304中,將所輸入之個人資訊保管至個人資訊伺服器。進而,又,於步驟S3305中,將ID公共密鑰利用期間清單自登錄支付管理系統傳送至利用管理系統。Next, in step S3302, the personal mobile terminal 10 uses a dedicated application to send the ID public key (for example, 3DES, etc.) to the login payment management system side of the login server. also. In step S3303, when needed, the credit card information is authenticated between the login payment management system and the credit card company. Furthermore, in step S3304, the input personal information is stored in the personal information server. Furthermore, in step S3305, the ID public key utilization period list is transmitted from the login payment management system to the utilization management system.

繼而,於步驟S3306中,當利用者利用鐵路公司時,於通過驗票機之時機進行驗票機終端同步處理。然後,於步驟S3307中,於接近驗票時自個人移動終端10對作為位置特定裝置20之自動驗票機進行BLE發送。Then, in step S3306, when the user uses the railway company, the ticket inspection machine terminal synchronization process is performed when the user passes the ticket inspection machine. Then, in step S3307, the personal mobile terminal 10 performs BLE transmission to the automatic ticket inspection machine as the location specifying device 20 when approaching the ticket inspection.

繼而,於步驟S3307中,使位置特定系統運行而進行個人移動終端10之位置特定。進而,於步驟S3308中,將位置特定所得之結果傳送至利用管理系統。Then, in step S3307, the location identification system is operated to perform location identification of the personal mobile terminal 10. Furthermore, in step S3308, the result of the location identification is transmitted to the utilization management system.

最後,於步驟S3309中,自管理伺服器對個人移動終端10進行請求、支付或OD(Origin-Destination,起訖點)資料之提交等。Finally, in step S3309, the self-management server makes a request, payment, or submission of OD (Origin-Destination) data to the personal mobile terminal 10.

其次,將事後支付系統之詳細之構成圖示於圖34中。該圖所示之事後支付系統包含管理伺服器系統30、經營者用管理系統40、管理終端50、位置特定裝置20、個人移動終端10、金融機構60、及時刻配發伺服器70。各構件具備通信功能,且經由通信網路而相互連接。例如經由WAN(Wide Area Network,廣域網路)、LAN(Local Area Network,區域網路)、蜂巢式通信網、Wi-Fi、Bluetooth或網際網路等網路進行通信。再者,於雙向通信之情形時,可使用公開密鑰密碼或公共密鑰密碼進行加密、電子證書、電子簽名。利用各構件所具有之運算部及記憶部、視需要之ID、加密密鑰資料庫進行為此所需之密鑰之產生、保存等。又,視需要,亦可利用認證機構(Certification Authority)之認證。再者,一般之運算部、感測器或其他處理既可以軟體安裝,亦可以硬體安裝。例如,可以由CPU(Central Processing Unit,中央處理單元)等執行之軟體實現,亦可以LSI(large scale integration,大型積體電路)、ASIC或FPGA等硬體實現。又,一般之記憶體等記憶裝置視需要包含於各構成要素中。例如,亦可藉由ROM(Read Only Memory,唯讀記憶體)、快閃記憶體、HDD(Hard Disk Drive,硬碟驅動器)、SD(Secure Digital,安全數位)卡等非揮發性之記錄媒體、及RAM(Random Access Memory,隨機存取記憶體)、暫存器等揮發性之記錄媒體而實現。如此,於本說明書中,當稱為○○運算部時,運算部包含電腦或伺服器等硬體,此外,亦可設為以軟體之形式實現之構成。又,於包含硬體之情形時,可利用CPU、LSI或ASIC等運算處理裝置。同樣地,於本說明書中,當稱為○○記憶部時,可利用硬碟或非揮發性之半導體記憶體等。Next, the detailed structure of the post-payment system is shown in FIG. 34. The post-payment system shown in the figure includes a management server system 30, a management system 40 for an operator, a management terminal 50, a location specifying device 20, a personal mobile terminal 10, a financial institution 60, and a time distribution server 70. Each component has a communication function and is connected to each other via a communication network. For example, it communicates via a WAN (Wide Area Network), a LAN (Local Area Network), a cellular communication network, Wi-Fi, Bluetooth, or the Internet. Furthermore, in the case of two-way communication, public key cryptography or public key cryptography can be used for encryption, electronic certificates, and electronic signatures. Use the calculation unit and memory unit of each component, the ID as needed, and the encryption key database to generate and save the key required for this purpose. In addition, if necessary, certification by a certification authority (Certification Authority) can also be used. Furthermore, general computing units, sensors, or other processing can be installed in software or hardware. For example, it can be implemented by software executed by CPU (Central Processing Unit, central processing unit), or by hardware such as LSI (large scale integration), ASIC, or FPGA. In addition, general memory and other memory devices are included in each component as necessary. For example, non-volatile recording media such as ROM (Read Only Memory), flash memory, HDD (Hard Disk Drive), SD (Secure Digital) card, etc. , And RAM (Random Access Memory, random access memory), register and other volatile recording media to achieve. As such, in this specification, when referred to as ○ ○ arithmetic unit, the arithmetic unit includes hardware such as a computer or a server, and in addition, it can also be implemented in the form of software. In addition, when hardware is included, arithmetic processing devices such as CPU, LSI, or ASIC can be used. Similarly, in this specification, when it is called ○ ○ memory part, a hard disk or non-volatile semiconductor memory can be used.

於本實施例中,經營者用管理系統40例如亦可設置於鐵路公司之IT管理擔當崗位等。又,管理終端50亦可設置於車站等。亦可將位置特定裝置20設為自動驗票機且設置複數個。再者,經營者用管理系統40、管理終端50亦可為使構成要素更少之更簡易者。又,個人移動終端10亦可具有複數個感測器作為構成要素。再者,於用於公共汽車之情形時,管理終端50可設置於公共汽車之經營所等,位置特定裝置20可設置於公共汽車內。又,亦可利用SD卡(商品名)等進行所需資料之交換,以代替利用網際網路進行通信。 (管理伺服器系統30)In this embodiment, the management system 40 for operators may also be installed in IT management positions of railway companies, for example. In addition, the management terminal 50 may be installed in a station or the like. It is also possible to set the position specifying device 20 as an automatic ticket inspection machine and provide a plurality of them. Furthermore, the management system 40 and the management terminal 50 for business operators may be simpler with fewer components. Moreover, the personal mobile terminal 10 may have a plurality of sensors as constituent elements. Furthermore, when used in a bus, the management terminal 50 may be installed in a bus business office, etc., and the location specifying device 20 may be installed in the bus. In addition, an SD card (trade name) can also be used to exchange necessary data instead of using the Internet for communication. (Management Server System 30)

管理伺服器系統30係包含伺服器側通信部31、伺服器側運算部32、伺服器側記憶部33、伺服器側利用資訊資料庫、伺服器側個人資訊資料庫、伺服器側ID、加密密鑰資料庫的伺服器群,且包含一台或複數台伺服器。管理伺服器系統30係與整體連接者,且為統括本實施例之整體系統者。管理伺服器系統30係登錄個人之資料,進而中繼個人與利用位置特定裝置20之經營者間之服務利用。又,於個人資料之中包含支付資訊之情形時,基於所提供之經營者之服務利用費用表,自利用者之支付器件徵收利用者所利用之經營者之服務利用費用。又,與金融機構60進行通信,於登錄時及隨時進行授信審查或認證之確認。可將其結果通知給個人移動終端10、管理終端50或位置資訊認證裝置等。各伺服器側資料庫亦可存在於複數個不同之資料保存場所。再者,來自個人移動終端10之通信必須儘可能始終連接,但與經營者及其他系統未必需要始終連接,理想為分為至少2種以上之伺服器而考慮穩定性之運用方法。再者,除了將伺服器側利用資訊資料庫、伺服器側個人資訊資料庫、伺服器側ID、加密密鑰資料庫設為個別之伺服器以外,亦可整合。或者,亦可組入至伺服器側記憶部33。The management server system 30 includes a server-side communication unit 31, a server-side computing unit 32, a server-side memory unit 33, a server-side utilization information database, a server-side personal information database, a server-side ID, and encryption. The server group of the key database, including one or more servers. The management server system 30 is the one that is connected to the whole, and is the one that covers the whole system of this embodiment. The management server system 30 registers personal data, and then relays the service utilization between the individual and the operator using the location specifying device 20. In addition, when payment information is included in the personal data, the service usage fee of the operator used by the user is collected from the payment device of the user based on the service usage fee schedule of the provided operator. In addition, it communicates with the financial institution 60 and performs credit review or certification confirmation at the time of registration and at any time. The result can be notified to the personal mobile terminal 10, the management terminal 50, the location information authentication device, or the like. Each server-side database can also exist in multiple different data storage locations. Furthermore, the communication from the personal mobile terminal 10 must always be connected as much as possible, but it may not always be connected to the operator and other systems. It is ideal to divide into at least two types of servers and consider the stability of the operation method. Furthermore, in addition to setting the server-side utilization information database, the server-side personal information database, the server-side ID, and the encryption key database as separate servers, it can also be integrated. Alternatively, it may be incorporated into the server-side memory 33.

伺服器側ID、加密密鑰資料庫係保存與發送至管理伺服器系統30之個人移動終端10之唯一之ID成組之加密密鑰、利用場所、利用期間等,並向管理終端50或位置特定裝置20配發。再者,亦可包含出入場記錄。又,加密密鑰可為3DES或AES密碼等公共密鑰密碼,亦可為RSA(Ron Rivest-Adi Shamir-Leonard Adleman,羅納德·李維斯特-阿迪·薩莫耳-倫納德·阿德曼)、DSA(Digital Signature Algorithm,數位簽章演算法)或橢圓曲線密碼等公開密鑰密碼。再者,關於BLE信標,雖理想為如3DES般較短之位元數,且理想為如公共密鑰密碼般計算成本較低者,但理想為根據可處理之位元數而加密方式逐漸轉變為安全性更高且計算成本相對不高者。 (經營者用管理系統40)The server-side ID and encryption key database store and send the unique ID of the personal mobile terminal 10 of the management server system 30 to the group of encryption keys, use locations, use periods, etc., and send them to the management terminal 50 or location The specific device 20 is issued. Furthermore, entry and exit records can also be included. In addition, the encryption key can be a public key cipher such as 3DES or AES, or RSA (Ron Rivest-Adi Shamir-Leonard Adleman, Ron Rivest-Adi Shamir-Leonard Adleman, Ron Rivest-Adi Shamir-Leonard Adleman). Mann), DSA (Digital Signature Algorithm, digital signature algorithm) or elliptic curve cryptography and other public key cryptography. In addition, for BLE beacons, although the ideal number of bits is as short as 3DES, and the calculation cost is lower such as public key cryptography, it is ideal that the encryption method is gradually based on the number of bits that can be processed Transform into one with higher security and relatively low computational cost. (Management System 40 for Business Operators)

經營者用管理系統40具備經營者側通信部41、經營者側運算部42、經營者側輸入輸出部43、經營者側利用資訊資料庫及經營者側記憶部44。經營者用管理系統40係可獲得藉由自登錄於管理伺服器系統30之利用者受理利用申請,並由利用者利用該經營者所進行之服務等而獲得之收入或利用資訊食物系統。再者,經營者可根據提供之服務,對該利用者指定位置特定裝置20之利用場所、利用期間等。又,於根據經營者所提供之服務自利用者徵收利用費用之情形時,經營者通過經營者用管理系統40將服務利用費用表提供給管理伺服器系統30。又,可於得到利用者之許諾之範圍內,超過經營者所提供之服務之範圍地獲得利用者資訊。同樣地,可於得到利用者之許諾之範圍內獲得管理伺服器系統30解析所得之利用者資訊。再者,例如,經營者側輸入輸出部43既可不存在,亦可與其他系統連接而利用。 (管理終端50)The business management system 40 includes a business communication unit 41, a business calculation unit 42, a business input and output unit 43, a business use information database, and a business memory 44. The management system 40 for the business operator can obtain income obtained by accepting a use application from a user registered in the management server system 30, and the user uses the service provided by the business operator or the information food system. Furthermore, the operator can designate the location and period of use of the location specifying device 20 for the user based on the service provided. In addition, when a usage fee is collected from the user based on the service provided by the business operator, the business operator provides the service usage fee table to the management server system 30 through the business management system 40. In addition, the user information can be obtained beyond the scope of the service provided by the operator within the scope of the promise of the user. Similarly, the user information analyzed by the management server system 30 can be obtained within the scope of the user's promise. In addition, for example, the operator-side input/output unit 43 may not exist, and may be connected to another system and used. (Management Terminal 50)

管理終端50具備管理終端側利用資訊資料庫、管理終端側時刻部54、管理終端側ID、加密密鑰資料庫、管理終端側通信部51、管理終端側運算部52、管理終端側輸入輸出部53及管理終端側記憶部55。管理終端50主要以位置特定裝置20之管理及管理伺服器系統30與位置特定裝置20之中繼為目的,將位置特定裝置20所需之管理終端側時刻部54及管理終端側ID、加密密鑰資料庫暫時保持並向位置特定裝置20配發。又,可將自位置特定裝置20上傳之利用資訊記錄至管理終端側利用資訊資料庫,並傳送至管理伺服器系統30。又,於個人資訊之資料庫之中包含支付資訊之情形時,可接收授信審查或認證之確認結果並記錄至管理終端側ID、加密密鑰資料庫,或通知給位置資訊認證裝置等。藉此,即便管理伺服器系統30停止,亦可於管理終端50以下進行運用。再者,該管理終端50係以管理複數台位置特定裝置20為主要目標,故亦可將管理終端50之功能移交至一台或複數台位置特定裝置20。The management terminal 50 includes a management terminal-side utilization information database, a management terminal-side time unit 54, a management terminal-side ID, an encryption key database, a management terminal-side communication unit 51, a management terminal-side computing unit 52, and a management terminal-side input and output unit 53 and the management terminal side storage unit 55. The management terminal 50 mainly aims at the management of the location specifying device 20 and the relay between the management server system 30 and the location specifying device 20, and the management terminal side time section 54 and the management terminal side ID and encryption password required by the location specifying device 20 The key database is temporarily maintained and distributed to the location specifying device 20. In addition, the utilization information uploaded from the location specifying device 20 may be recorded in the utilization information database on the management terminal side and transmitted to the management server system 30. In addition, when payment information is included in the personal information database, the confirmation result of credit review or authentication can be received and recorded in the management terminal side ID, encryption key database, or notified to the location information authentication device. Thereby, even if the management server system 30 stops, it can be operated below the management terminal 50. Furthermore, the management terminal 50 is mainly aimed at managing a plurality of location specifying devices 20, so the functions of the management terminal 50 can also be transferred to one or a plurality of location specifying devices 20.

管理終端50還具有另外兩個作用。一個作用係合計位置特定裝置20之通過資料之作用。例如,設為分析於該車站中來自哪個車站之乘客較多,並編排今後之列車運行表所得之參考資料。亦可將此種通過資料儲存至利用資訊資料庫,以例如5分鐘等為單位進行合計並傳送至管理伺服器系統30。於管理伺服器系統30及管理終端50,亦可使用該資訊進行車站之擁擠資訊、集中度之計算或旅客流動調查。The management terminal 50 also has two other functions. One role is to add up the passing data of the location specifying device 20. For example, suppose it is used to analyze which station has more passengers in the station, and compile the reference data obtained from the future train schedule. Such passing data can also be stored in the utilization information database, aggregated in units such as 5 minutes, etc., and sent to the management server system 30. In the management server system 30 and the management terminal 50, the information can also be used to perform station congestion information, calculation of concentration or passenger flow survey.

另一個作用係對利用者之服務。具體而言,進行利用者之出入場記錄之確認與匹配性之修正等。此時,中心之主管人員可一面使用相機、麥克風等輸入輸出裝置進行對話,一面進行應對,同時亦可進行故障時之應對或新規劃券之引導、銷售等。Another role is to provide services to users. Specifically, confirm the user's entry and exit records and correct the compatibility. At this time, the supervisor of the center can use input and output devices such as cameras and microphones to conduct conversations while responding to them. At the same time, they can also respond to failures or guide and sell new plan coupons.

又,管理終端側時刻部54只要能夠較例如ms單位更高精度地對時刻進行計數即可。此處,亦可未必為準確之時刻,但必須以例如約1分鐘以下一致。因此,理想為利用一般之時刻配發伺服器70等,而儘可能地預先修正時刻。於時刻之偏差較大之情形時,亦可提醒終端或裝置管理者將其視為錯誤進行修正。In addition, the management terminal-side time unit 54 only needs to be able to count the time more accurately than, for example, in ms units. Here, it may not necessarily be the exact time, but it must match, for example, about 1 minute or less. Therefore, it is desirable to use the general time distribution server 70 or the like to correct the time as much as possible in advance. In situations where the time deviation is large, the terminal or device administrator can also be reminded to treat it as an error and correct it.

再者,通信裝置可利用Bluetooth收發功能,確認個人移動終端10之狀態,亦可告知車站接近個人移動終端10。Furthermore, the communication device can use the Bluetooth transceiver function to confirm the status of the personal mobile terminal 10, and can also inform the station that the personal mobile terminal 10 is approaching.

再者,為了應對違法乘車等,可將自位置特定裝置20發送來之出入記錄保持至管理終端側記憶部55或管理終端側ID、加密密鑰資料庫、或發送至管理伺服器系統30,亦可響應來自位置特定裝置20之參考。Furthermore, in order to deal with illegal rides, etc., the entry and exit records sent from the location specifying device 20 can be stored in the management terminal side memory 55 or the management terminal side ID, encryption key database, or sent to the management server system 30 , It can also respond to a reference from the location specifying device 20.

又,亦可於管理終端側輸入輸出部53設置圖像取入部。圖像取入部可根據位置特定裝置20所獲取之使用者及位置,將之後之位置特定自例如BLE信標切換為圖像,亦可將該資訊傳送至位置特定裝置20,還可使來自個人移動終端10之例如BLE信標之發送停止。 (位置特定裝置20)In addition, an image capture unit may be provided in the input/output unit 53 on the management terminal side. The image capture unit can switch the subsequent location-specific from, for example, a BLE beacon to an image, based on the user and location acquired by the location-specific device 20, and can also send the information to the location-specific device 20, or make it from the individual The transmission of, for example, the BLE beacon of the mobile terminal 10 stops. (Position specific device 20)

位置特定裝置20具備位置特定側通信部21A、位置特定側控制部28、位置特定側運算部25、位置特定側ID、加密密鑰資料庫及位置特定側時刻部27。位置特定裝置20係設為藉由對個人移動終端10之位置高速且高精度地進行位置特定、認證,而不用特地將個人移動終端10取出便可通過。再者,於存在服務提供所需之支付之情形時,事後自動地藉由與金融機構60之交易而進行。又,可接收授信審查或認證之確認結果並記錄至位置特定側ID、加密密鑰資料庫。The position identifying device 20 includes a position identifying side communication unit 21A, a position identifying side control unit 28, a position identifying side computing unit 25, a position identifying side ID, an encryption key database, and a position identifying side time unit 27. The location identifying device 20 is configured to identify and authenticate the location of the personal mobile terminal 10 at high speed and with high accuracy, and can pass through without taking out the personal mobile terminal 10 specially. Furthermore, when there is a situation of payment required for service provision, it is automatically performed by a transaction with the financial institution 60 afterwards. In addition, the confirmation result of credit review or certification can be received and recorded in the location specific side ID and encryption key database.

位置特定側通信部21A作為位置特定側接收部21發揮功能。位置特定側控制部28係對如下動作進行控制,即,根據由位置特定側運算部25所測定之個人移動終端10之位置,對攜帶個人移動終端10之個人之移動進行限制。藉此,可一面辨識攜帶個人移動終端10之個人,一面根據此人之位置控制其移動。此處,位置特定裝置20例如可設為具有限制攜帶個人移動終端10之個人之通過之開閉式門板部29的閘機型自動驗票機。於該情形時,位置特定側控制部28控制門板部29之開閉。藉此,可藉由個人之辨識及位置檢測,而判斷限制攜帶個人移動終端10之個人之通過的自動驗票機之門板部29可否開閉。The position specifying side communication unit 21A functions as the position specifying side receiving unit 21. The location specifying side control unit 28 controls the operation of restricting the movement of the individual carrying the personal mobile terminal 10 based on the location of the personal mobile terminal 10 measured by the location specifying side computing unit 25. In this way, it is possible to identify the person carrying the personal mobile terminal 10 while controlling the movement of the person according to the position of the person. Here, the position specifying device 20 may be, for example, a gate-type automatic ticket inspection machine having an open-close type door panel 29 that restricts the passage of individuals carrying the personal mobile terminal 10. In this case, the position specifying side control part 28 controls the opening and closing of the door panel part 29. In this way, it is possible to determine whether the door panel 29 of the automatic ticket inspection machine that restricts the passage of the individual carrying the personal mobile terminal 10 can be opened and closed by the identification and position detection of the individual.

位置特定側記憶部26保持有用以啟動本機之軟體、設置有本機之車站之識別資訊、本機之識別資訊、或顯示部用之顯示資訊。再者,亦可儲存有記憶有各車站間(或每種利用距離)之費用之費用表、及各車站間之距離等。The location specifying side memory unit 26 holds software for starting the machine, identification information of the station where the machine is installed, identification information of the machine, or display information for the display unit. Furthermore, it is also possible to store a fare table that memorizes the fare between each station (or each utilization distance), and the distance between each station.

將位置特定裝置20之外觀構成例示於圖35A中,將俯視圖示於圖36A中,將圖36A之XXXVIB-XXXVIB線處之剖視圖示於圖36B中。該等圖所示之位置特定裝置20係自動驗票機。該自動驗票機係使一對區劃板24以大致平行姿勢隔開。構成一對區劃板24之區劃板24A、24B之各者包含能夠使電波透過之例如樹脂等作為剛體,亦可視需要使其一部分包含不使電波透過之金屬。再者,本發明者試製之位置特定裝置20之大小設為高度90 cm、橫寬75 cm、深度180 cm。An example of the external structure of the position specifying device 20 is shown in FIG. 35A, a top view is shown in FIG. 36A, and a cross-sectional view taken along the line XXXVIB-XXXVIB in FIG. 36A is shown in FIG. 36B. The position specifying device 20 shown in these figures is an automatic ticket inspection machine. In this automatic ticket checking machine, a pair of partition plates 24 are spaced apart in a substantially parallel posture. Each of the partition plates 24A and 24B constituting the pair of partition plates 24 includes a rigid body such as resin capable of transmitting radio waves, and a part of it may include a metal that does not transmit radio waves if necessary. Furthermore, the size of the position specifying device 20 trial-produced by the inventor is 90 cm in height, 75 cm in width, and 180 cm in depth.

位置特定裝置20係如圖36A所示,於一對區劃板24A、24B之間,沿著利用者之動作路線劃定出通過判定區域DA與通過判定區域DB。此處,於圖中將左側設為自動驗票機之入口,將通過判定區域DA配置於入口側,又,將通過判定區域DB配置於自動驗票機之出口側。再者,亦可將通過判定區域DA設於出口側,將通過判定區域DB設於入口側,又,於不規定入口與出口而允許利用者雙向移動之情形時亦同樣。As shown in FIG. 36A, the position specifying device 20 defines a passage determination area DA and a passage determination area DB between a pair of partition plates 24A and 24B along the user's action route. Here, in the figure, the left side is set as the entrance of the automatic ticket inspection machine, the passing determination area DA is arranged on the entrance side, and the passing determination area DB is arranged on the exit side of the automatic ticket inspection machine. Furthermore, the passage determination area DA may be provided on the exit side, and the passage determination area DB may be provided on the entrance side, and the same applies when the entrance and exit are not specified and the user is allowed to move in both directions.

於通過判定區域DA之附近設置位置特定側接收部21,利用該位置特定側接收部21判定利用者是存在於通過判定區域DA,還是不存在於通過判定區域DA。因此,於通過判定區域DA之附近設置有BLE信標接收機2111、2112、2113、2114作為構成位置特定側接收部21之第一位置特定側接收部22、第二位置特定側接收部23。此處,與區劃板24A鄰接地設置有BLE信標接收機2111、2112作為第一位置特定側接收部22A、22B。又,與區劃板24B鄰接地設置BLE信標接收機2113、2114作為第二位置特定側接收部23A、23B。A position specifying side receiving unit 21 is provided in the vicinity of the passing determination area DA, and the position specifying side receiving portion 21 is used to determine whether the user is present in the passing judgment area DA or not in the passing judgment area DA. Therefore, BLE beacon receivers 2111, 2112, 2113, and 2114 are provided in the vicinity of the passing determination area DA as the first position specifying side receiving section 22 and the second position specifying side receiving section 23 constituting the position specifying side receiving section 21. Here, BLE beacon receivers 2111 and 2112 are provided adjacent to the partition board 24A as the first position specifying side receiving units 22A and 22B. In addition, BLE beacon receivers 2113 and 2114 are provided adjacent to the partition board 24B as the second position specifying side receiving units 23A and 23B.

同樣地,於通過判定區域DB之附近設置有BLE信標接收機2115、2116、2117、2118作為位置特定側接收部21。此處,與區劃板24A鄰接地設置有BLE信標接收機2115、2116作為第一位置特定側接收部22A、22B。又,與區劃板24B鄰接地設置有BLE信標接收機2117、2118作為第二位置特定側接收部23A、23B。Similarly, BLE beacon receivers 2115, 2116, 2117, and 2118 are installed as the position specifying side receiving unit 21 in the vicinity of the passing determination area DB. Here, BLE beacon receivers 2115 and 2116 are provided adjacent to the partition board 24A as the first position specifying side receiving units 22A and 22B. In addition, BLE beacon receivers 2117 and 2118 are provided adjacent to the partition board 24B as the second position specifying side receiving units 23A and 23B.

如圖36A之俯視圖所示,將通過判定區域DA1規定為以BLE信標接收機2111、2112之組為中心之同心圓形狀之通過判定區域。又,將通過判定區域DA2規定為以BLE信標接收機2113、2114之組為中心之同心圓形狀之通過判定區域。進而,將通過判定區域DA規定為以連結BLE信標接收機2111、2112之組與BLE信標接收機2113、2114之組之線段之中點為中心之同心圓形狀之通過判定區域。同樣地,將通過判定區域DB1規定為以BLE信標接收機2115、2116之組為中心之同心圓形狀之通過判定區域。又,將通過判定區域DB2規定為以BLE信標接收機2117、2118之組為中心之同心圓形狀之通過判定區域。進而,將通過判定區域DB規定為以連結BLE信標接收機2115、2116之組與BLE信標接收機2117、2118之組之線段之中點為中心之同心圓形狀之通過判定區域。如此,通過判定區域DA表示同時包含通過判定區域DA1、DA2之較廣之範圍,又,通過判定區域DB亦表示同時包含通過判定區域DB1、DB2之較廣之範圍。As shown in the top view of FIG. 36A, the passage determination area DA1 is defined as a concentric circle-shaped passage determination area centered on the group of BLE beacon receivers 2111 and 2112. In addition, the passage determination area DA2 is defined as a concentric circle-shaped passage determination area centered on the group of BLE beacon receivers 2113 and 2114. Furthermore, the passage determination area DA is defined as a passage determination area in a concentric circle shape centered on the midpoint of the line segment connecting the group of BLE beacon receivers 2111 and 2112 and the group of BLE beacon receivers 2113 and 2114. Similarly, the passage determination area DB1 is defined as a concentric circle-shaped passage determination area centered on the group of BLE beacon receivers 2115 and 2116. In addition, the passage determination area DB2 is defined as a concentric circle-shaped passage determination area centered on the group of BLE beacon receivers 2117 and 2118. Furthermore, the passage determination area DB is defined as a passage determination area in the shape of a concentric circle centered on the midpoint of the line segment connecting the group of BLE beacon receivers 2115 and 2116 and the group of BLE beacon receivers 2117 and 2118. In this way, the passing determination area DA indicates a wider range including both the passing determination areas DA1 and DA2, and the passing determination area DB also indicates a wider range including the passing determination areas DB1 and DB2.

如此,以複數個BLE信標接收機規定通過判定區域,與個人移動終端10進行BLE通信,而特定出個人移動終端10之位置。藉由利用通過判定區域DA、通過判定區域DA1及通過判定區域DA2,而實現闖入自動驗票機之個人移動終端10之位置特定。又,進入自動驗票機內之個人移動終端10之位置特定係利用通過判定區域DB、通過判定區域DB1及通過判定區域DB2。 (通過判定區域DA、DB)In this way, a plurality of BLE beacon receivers specify the passing determination area to perform BLE communication with the personal mobile terminal 10, thereby specifying the location of the personal mobile terminal 10. By using the passing judgment area DA, the passing judgment area DA1, and the passing judgment area DA2, the location of the personal mobile terminal 10 that has broken into the automatic ticket gate is specified. In addition, the position identification of the personal mobile terminal 10 entering the automatic ticket inspection machine uses the passing judgment area DB, the passing judgment area DB1, and the passing judgment area DB2. (Pass the judgment area DA, DB)

通過判定區域DA、DB係計算如下條件式而特定出個人移動終端10之位置,上述條件式係比較BLE信標接收機2111~2114之平均與BLE信標接收機2115~2118之平均之差、和預先設定之閾值之大小。例如,當BLE信標接收機2111、2112之組與BLE信標接收機2115、2116之組之距離為2000 mm,且BLE信標接收機2111、2112之組與BLE信標接收機2113、2114之組之距離為600 mm時,於通過判定區域DA中,BLE信標接收機2111~2114之平均較BLE信標接收機2115~2118之平均大10 dB。相反,於通過判定區域DB中,BLE信標接收機2111~2114之平均較BLE信標接收機2115~2118之平均小10 dB。 (通過判定區域DA1、DA2、DB1、DB2)The location of the personal mobile terminal 10 is specified by calculating the following conditional expressions by determining areas DA and DB. The above conditional expressions compare the difference between the average of BLE beacon receivers 2111-2114 and the average of BLE beacon receivers 2115-2118, And the size of the preset threshold. For example, when the distance between the group of BLE beacon receivers 2111, 2112 and the group of BLE beacon receivers 2115, 2116 is 2000 mm, and the group of BLE beacon receivers 2111, 2112 and BLE beacon receivers 2113, 2114 are When the distance of the group is 600 mm, the average of BLE beacon receivers 2111-2114 in the passing determination area DA is 10 dB larger than the average of BLE beacon receivers 2115-2118. On the contrary, in the passing determination area DB, the average of BLE beacon receivers 2111-2114 is 10 dB smaller than the average of BLE beacon receivers 2115-2118. (Pass the judgment area DA1, DA2, DB1, DB2)

又,通過判定區域DA1係計算如下條件式而特定出個人移動終端10之位置,上述條件式係比較BLE信標接收機2111、2112之組與BLE信標接收機2115~2118之平均之差、和預先設定之閾值之大小。例如於通過判定區域DA1中,BLE信標接收機2111~2112之平均較BLE信標接收機2115~2118之平均大10 dB。又,於通過判定區域DA2中,BLE信標接收機2113~2114之平均較BLE信標接收機2115~2118之平均大10 dB。同樣地,通過判定區域DB1係計算如下條件式而特定出個人移動終端10之位置,上述條件式係比較BLE信標接收機2115、2116之組與BLE信標接收機2111~2114之平均之差、和預先設定之閾值之大小。例如,於通過判定區域DB1中,BLE信標接收機2115~2116之平均較BLE信標接收機2111~2114之平均大10 dB。又,於通過判定區域DB2中,BLE信標接收機2117~2118之平均較BLE信標接收機2111~2114之平均大10 dB。In addition, the position of the personal mobile terminal 10 is specified by calculating the following conditional expression by determining the area DA1. The above conditional expression is to compare the difference between the group of BLE beacon receivers 2111, 2112 and the average of BLE beacon receivers 2115-2118, And the size of the preset threshold. For example, in the passing determination area DA1, the average of the BLE beacon receivers 2111-2112 is 10 dB larger than the average of the BLE beacon receivers 2115-2118. Furthermore, in the passing determination area DA2, the average of the BLE beacon receivers 2113-2114 is 10 dB larger than the average of the BLE beacon receivers 2115-2118. Similarly, the location of the personal mobile terminal 10 is specified by calculating the following conditional expression by determining the area DB1. The above conditional expression is to compare the average difference between the group of BLE beacon receivers 2115 and 2116 and the average of BLE beacon receivers 2111-2114 , And the size of the preset threshold. For example, in the passing determination area DB1, the average of the BLE beacon receivers 2115-2116 is 10 dB larger than the average of the BLE beacon receivers 2111-2114. In addition, in the passing determination area DB2, the average of the BLE beacon receivers 2117-2118 is 10 dB larger than the average of the BLE beacon receivers 2111-2114.

如此,除了通過判定區域DA以外,進而如圖36A之俯視圖及圖36B之垂直剖視圖所示般,設定通過判定區域DA1、DA2,而檢測個人移動終端10之位置。又,對通過判定區域DB亦同樣地設定通過判定區域DB1、DB2。如何設定通過判定區域之大小或位置取決於BLE信標接收機之位置或由各BLE信標接收機所檢測出之電波強度之平均差。基於對象通過判定區域中獲得之電波強度差是否大於其等中所設定之電波強度平均差,而判定個人移動終端10是否位於通過判定區域內。In this way, in addition to the passing determination area DA, as shown in the top view of FIG. 36A and the vertical cross-sectional view of FIG. 36B, the passing determination areas DA1 and DA2 are set to detect the position of the personal mobile terminal 10. In addition, the passing judgment areas DB1 and DB2 are similarly set for the passing judgment area DB. How to set the size or position of the passing judgment area depends on the position of the BLE beacon receiver or the average difference of the radio wave intensity detected by each BLE beacon receiver. It is determined whether the personal mobile terminal 10 is located in the passage determination area based on whether the difference in the radio wave intensity obtained by the subject passing the determination area is greater than the average difference in the radio wave intensity set in it.

再者,於例如以通過判定區域DA為基準,BLE信標接收機2111~2114之強度存在較大偏差之情形時,例如當由BLE信標接收機2111、2112所檢測出之電波強度之平均相較BLE信標接收機2113、2114之平均存在一定以上之差時,判定為存在偏差,於該情形時,利用BLE發送機應存在之電波較強者。例如,基於BLE信標接收機2111、2112之電波強度平均與BLE信標接收機2115~2118之電波強度平均是否為一定以上之電波強度平均差,而判定個人移動終端10是否位於通過判定區域DA1。Furthermore, for example, when the intensity of the BLE beacon receivers 2111-2114 has a large deviation based on the passing determination area DA, for example, when the radio wave intensity detected by the BLE beacon receivers 2111, 2112 is averaged When there is a certain difference or more than the average of the BLE beacon receivers 2113 and 2114, it is determined that there is a deviation. In this case, the BLE transmitter should have a stronger radio wave. For example, based on whether the average radio wave intensity of the BLE beacon receivers 2111, 2112 and the average radio wave intensity of the BLE beacon receivers 2115-2118 are equal to or greater than a certain level, it is determined whether the personal mobile terminal 10 is located in the passing determination area DA1. .

又,關於通過判定區域DA,如圖36B之垂直剖視圖所示,其形狀為球狀,故於閘機之中央附近,高度DH成為最大,能夠確保較廣之通過判定區域DA,另一方面,隨著靠近區劃板24A、24B,高度方向之寬度變窄,於區劃板24A、24B之附近,通過判定區域DA之外緣成為點狀,而高度方向之區域變小,其結果,該區域中之位置檢測之精度下降。因此,於進行沿著壁面即區劃板24A、24B而並非自動驗票機之閘機間之中央前進之利用者、或手裏拿著個人移動終端10等位於閘機之壁面側之利用者的位置檢測時,相較於通過判定區域DA,較佳為利用通過判定區域DA1或DA2。例如,通過判定區域DA1之高度DH1係與通過判定區域DA相反,越靠近區劃板24A、24B則越大,於區劃板24A、24B之位置成為最大,因此適於區劃板24A、24B之附近區域中之位置檢測。於該情形時,例如,關於通過判定區域DA1,若BLE信標接收機2111與2112之平均較BLE信標接收機2113與2114之平均大10 dB以上,則將BLE信標接收機2111~2114變更為BLE信標接收機2111~2112而進行位置檢測。再者,若BLE信標接收機2111與BLE信標接收機2115之間之距離足夠大,則BLE信標接收機2111與BLE信標接收機2115之距離、BLE信標接收機2111與BLE信標接收機2117之距離係於就強度而言之情形時差別不大,故作為差之對象,可仍為BLE信標接收機2115~2118。以上係通過判定區域DA1之例,通過判定區域DA2、DB1、DB2等亦同樣。In addition, regarding the passing judgment area DA, as shown in the vertical cross-sectional view of FIG. 36B, its shape is spherical, so the height DH becomes the largest near the center of the gate, and a wider passing judgment area DA can be ensured. On the other hand, As it approaches the partition plates 24A and 24B, the width in the height direction becomes narrower. In the vicinity of the partition plates 24A and 24B, the outer edge of the passing determination area DA becomes a dot, and the area in the height direction becomes smaller. As a result, the area The accuracy of position detection decreases. Therefore, for users who are walking along the wall, that is, the partition plates 24A, 24B, rather than the center of the gates of the automatic ticket gates, or for users who are on the wall side of the gates such as the personal mobile terminal 10 in their hands. In position detection, it is better to use the passing determination area DA1 or DA2 than the passing determination area DA. For example, the height DH1 of the passing judgment area DA1 is opposite to that of the passing judgment area DA. The closer it is to the partition plates 24A, 24B, the larger the height, and the position at the partition plates 24A, 24B becomes the largest, so it is suitable for the area near the partition plates 24A, 24B. In the position detection. In this case, for example, regarding the passage of the determination area DA1, if the average of the BLE beacon receivers 2111 and 2112 is greater than the average of the BLE beacon receivers 2113 and 2114 by more than 10 dB, the BLE beacon receivers 2111 to 2114 Change to BLE beacon receivers 2111-2112 to perform position detection. Furthermore, if the distance between the BLE beacon receiver 2111 and the BLE beacon receiver 2115 is sufficiently large, the distance between the BLE beacon receiver 2111 and the BLE beacon receiver 2115, the BLE beacon receiver 2111 and the BLE beacon The distance of the beacon receiver 2117 is not much different in terms of intensity, so the target of the difference can still be the BLE beacon receiver 2115-2118. The above is an example of passing the determination area DA1, and the same is true for passing the determination areas DA2, DB1, DB2, etc.

再者,若利用金屬覆蓋驗票機之外側區域,則電波一般而言無法越過金屬而傳播,故無法檢測溢出至通過判定區域DA1之外側之來自區域之電波。若利用此,則可限制通過判定區域之外緣。例如,於橫向排列地設置有多個驗票機之情形時,能夠進行遮斷以使得不會錯誤地測定利用鄰接之驗票機之利用者之個人移動終端之位置。Furthermore, if the area outside the ticket inspection machine is covered with metal, radio waves cannot generally propagate over the metal, so it is impossible to detect radio waves from the area that overflow to the outside of the passing determination area DA1. If you use this, you can restrict passing through the outer edge of the judgment area. For example, when a plurality of ticket inspection machines are arranged horizontally, blocking can be performed so that the position of the personal mobile terminal of the user who uses the adjacent ticket inspection machine is not mistakenly determined.

以此方式於兩片之一對區劃板24A、24B之間設定通過判定區域DA與通過判定區域DB之不同之檢測區域,而可即時地檢測出個人移動終端10位於哪一位置。尤其是,藉由將通過判定區域DA與通過判定區域DB分別隔開地設置於自動驗票機(閘機)之入口側與出口側,而可分別檢測出攜帶個人移動終端10之利用者已進入閘機、及欲自閘機出來,而可判別閘機之通過之有無。再者,於閘機容許不特定出入口側與出口側之雙向之移動之情形時亦同樣。又,藉由在確定閘機之左右之區劃板24分別設置位置檢測側接收部21,並於其間劃定檢測區域,可確實地檢測出是否已通過區劃板24之間。尤其是,於自動驗票機等中,通常橫向排列地配置有多個閘機,故若檢測之位置於圖36A中於上下方向上偏移,而被誤辨識為已通過鄰接之另一閘機,則無法進行正確之管理。因此,於第一位置特定側接收部22與第二位置特定側接收部23之間設定檢測區域,檢測其間所設定之檢測區域之通過,而降低此種鄰接之閘機間之誤辨識之擔憂。In this way, a different detection area between the passing determination area DA and the passing determination area DB is set between the two pair of partition plates 24A, 24B, and the position of the personal mobile terminal 10 can be detected instantly. In particular, by separating the passing judgment area DA and passing judgment area DB on the entrance side and exit side of the automatic ticket inspection machine (gate), it is possible to detect that the user carrying the personal mobile terminal 10 has If you enter the gate and want to exit from the gate, you can judge whether the gate has passed. Furthermore, the same applies when the gate allows bidirectional movement between the entrance side and the exit side of the gate. In addition, by arranging the position detection side receiving parts 21 on the partition plates 24 that determine the left and right sides of the gate, and delimiting the detection area therebetween, it is possible to reliably detect whether the partition plates 24 have passed. Especially, in automatic ticket inspection machines, etc., there are usually a plurality of gates arranged horizontally. Therefore, if the detected position is shifted in the vertical direction in FIG. 36A, it is mistakenly recognized as having passed through another adjacent gate. Machine, it cannot be properly managed. Therefore, a detection area is set between the first position specifying side receiving portion 22 and the second position specifying side receiving portion 23 to detect the passage of the detection area set therebetween, thereby reducing the fear of misidentification between adjacent gates. .

進而,由於多個利用者陸續通過自動驗票機,故必須分別準確地識別於動作路線方向上排列之個人移動終端10。因此,並非於自動驗票機之一處設定檢測區域,而是於入口側與出口側分別設定不同之檢測區域,追蹤特定之利用者於自動驗票機內移動之情況,而抑制此種誤檢測。而且,藉由在短時間內依次進行利用者之位置檢測,亦能夠於移動之利用者間抑制誤檢測。又,於圖36A之例中,對在入口側與出口側分別設定通過判定區域DA、通過判定區域DB之例進行了說明,但設定於每個自動驗票機之通過判定區域之數量並不限於2個,亦可設為3個以上。例如,亦可於通過判定區域DA與通過判定區域DB之間設置中間通過判定區域。藉此,可使利用者之檢測精度進一步提高。Furthermore, since a plurality of users pass through the automatic ticket gate one after another, it is necessary to accurately recognize the personal mobile terminals 10 arranged in the direction of the movement route. Therefore, instead of setting the detection area at one of the automatic ticket inspection machines, different detection areas are set on the entrance side and the exit side respectively to track the movement of specific users in the automatic ticket inspection machine and suppress this error Detection. Moreover, by sequentially performing position detection of users in a short period of time, it is also possible to suppress false detections among moving users. Also, in the example of FIG. 36A, the example in which the passing judgment area DA and the passing judgment area DB are set on the entrance side and the exit side respectively has been described, but the number of passing judgment areas set in each automatic ticket gate is not It is limited to two, and can be set to three or more. For example, an intermediate passage determination area may be provided between the passage determination area DA and the passage determination area DB. Thereby, the detection accuracy of the user can be further improved.

而且,藉由在短時間內依次進行利用者之位置檢測,亦能夠於移動之利用者間抑制誤檢測。即,亦考慮如下事態:當攜帶個人移動終端10之利用者連續地闖入自動驗票機時,若認證之時間間隔較長,則誤辨識為另一人之通過。因此,亦考慮利用者之步行速度而設定認證之時間間隔。Moreover, by sequentially performing position detection of users in a short period of time, it is also possible to suppress false detections among moving users. That is, the following situation is also considered: when a user carrying a personal mobile terminal 10 continuously breaks into the automatic ticket inspection machine, if the authentication time interval is long, it is mistakenly recognized as another person's passing. Therefore, the time interval for authentication is also set in consideration of the walking speed of the user.

亦可與個人移動終端10之認證分開地設置檢測利用者之移動之感測器。例如,各區劃板24亦可沿著通過區劃板24彼此之間之利用者之動作路線,配置光電感測器或紅外線感測器,來監視利用者之移動。一般而言,自動驗票機等位置特定裝置具備監視利用者之通過之感測器,可利用該感測器。例如,當未攜帶智慧型手機終端等個人移動終端之人欲通過自動驗票機時,可物理地檢測出此情況並進行將門板部29閉合等動作。It is also possible to install a sensor for detecting the movement of the user separately from the authentication of the personal mobile terminal 10. For example, each partition board 24 can also be equipped with a photoelectric sensor or an infrared sensor along the movement route of users passing between the partition boards 24 to monitor the movement of the user. Generally speaking, a location specifying device such as an automatic ticket gate is equipped with a sensor that monitors the passage of a user, and the sensor can be used. For example, when a person who does not carry a personal mobile terminal such as a smart phone terminal wants to pass through an automatic ticket gate, this situation can be physically detected and actions such as closing the door panel 29 can be performed.

再者,第一位置特定側接收部22A與第一位置特定側接收部22B之距離較第一位置特定側接收部22與第二位置特定側接收部23之距離短。較佳為第一位置特定側接收部22A與第一位置特定側接收部22B以鄰接之方式配置。鄰接地設置之BLE信標接收機2111與BLE信標接收機2112之距離例如設為5 mm~50 mm。 (位置特定側控制部28)Furthermore, the distance between the first position specifying side receiving portion 22A and the first position specifying side receiving portion 22B is shorter than the distance between the first position specifying side receiving portion 22 and the second position specifying side receiving portion 23. It is preferable that the first position-specific side receiving portion 22A and the first position-specific side receiving portion 22B are arranged adjacently. The distance between the BLE beacon receiver 2111 and the BLE beacon receiver 2112 arranged adjacently is set to, for example, 5 mm-50 mm. (Position specifying side control unit 28)

將位置特定裝置20之位置特定側控制部28之功能示於圖37之方塊圖中。該圖所示之位置特定側控制部28具備第1顯示部28A、第2顯示部28B、門板部29及通過感測器部210。又,位置特定側控制部28亦可具備用以進行先前類型之票或IC卡之讀取、寫入之讀寫器28C。位置特定裝置20例如於圖35A中控制利用者之向A方向之通過。設置於既有之自動驗票機等之顯著位置且顯示利用者之通過或錯誤、兒童費用之判別等之顯示燈等相當於第1顯示部28A。又,設置於供投入票券或舉起IC卡之部分且顯示扣除費用或餘額等之液晶顯示器或有機EL(Electroluminescence,電致發光)顯示器等相當於第2顯示部28B。門板部29係根據對利用者所持有之個人移動終端10進行之處理之結果而控制為打開狀態或關閉狀態。The function of the position specifying side control portion 28 of the position specifying device 20 is shown in the block diagram of FIG. 37. The position specifying side control section 28 shown in the figure includes a first display section 28A, a second display section 28B, a door panel section 29, and a passing sensor section 210. In addition, the position specifying side control unit 28 may also be provided with a reader/writer 28C for reading and writing the previous type of ticket or IC card. The position specifying device 20 controls the passage of the user in the direction A in FIG. 35A, for example. The display lamp, etc. installed in a conspicuous position of an existing automatic ticket gate, etc. and showing the pass or error of the user, the discrimination of child expenses, etc., corresponds to the first display portion 28A. In addition, a liquid crystal display or an organic EL (Electroluminescence) display, etc. installed at the portion where the ticket is inserted or the IC card is lifted and displaying the deduction of fees or balance, etc., corresponds to the second display portion 28B. The door panel 29 is controlled to be in an open state or a closed state according to the result of processing performed on the personal mobile terminal 10 held by the user.

又,通過感測器部210例如於位置特定裝置20之通路側之側面設置有複數個。例如於圖35B所示之變化例之自動驗票機20B中,示出了於區劃板24A、24B設置有5個通過感測器2101~2105作為通過感測器部210之例。該等通過感測器2101~2105檢測由自動驗票機20B所形成之通路內之利用者。通過感測器2101~2105例如以紅外線感測器、光感測器或超音波感測器等實現。通過感測器2101~2105既可為與設置於對向之輔助器件之通過感測器部協作地檢測通路內之利用者之透過型通過感測器,或亦可為與設置於自身之通過感測器協作地檢測通路內之利用者之反射型通過感測器。又,既可檢測發送之波之強度之變化,亦可檢測相位之變化。藉此,可測定身高,亦可追加使身高為某一定值以下之利用者或行李通過之功能。另一方面,於未能認證個人移動終端10卻偵測到人之情形時,亦可根據身高等判斷為不正當利用。In addition, a plurality of pass-through sensor parts 210 are provided on the side surface of the passage side of the position specifying device 20, for example. For example, in the automatic ticket inspection machine 20B of the modified example shown in FIG. 35B, there is shown an example in which five passing sensors 2101 to 2105 are provided as the passing sensor unit 210 on the partition plates 24A and 24B. These pass sensors 2101-2105 detect the users in the passage formed by the automatic ticket inspection machine 20B. The sensors 2101 to 2105 are realized by, for example, infrared sensors, light sensors, or ultrasonic sensors. The pass sensors 2101 to 2105 can be either a transmission type pass sensor that cooperates with the pass sensor section of the auxiliary device installed on the opposite side to detect the user in the passage, or it can also be the pass sensor installed in itself The sensor cooperatively detects the reflective pass sensor of the user in the path. In addition, it is possible to detect the change of the intensity of the transmitted wave and the change of the phase. With this, the height can be measured, and the function of passing users or luggage whose height is below a certain value can also be added. On the other hand, when the personal mobile terminal 10 cannot be authenticated but a person is detected, it can also be judged as improper use based on the height or the like.

再者,圖35B所示之自動驗票機20B例如具備第1顯示部28A、第2顯示部28B、門板部29、讀寫器28C及通過感測器2101~2105。自動驗票機20B於圖中控制利用者之向A方向之通過。第1顯示部28A及第2顯示部28B顯示各種資訊。門板部29係根據對個人移動終端10進行之認證處理之結果而控制為打開狀態或關閉狀態。Furthermore, the automatic ticket inspection machine 20B shown in FIG. 35B includes, for example, a first display portion 28A, a second display portion 28B, a door panel portion 29, a reader/writer 28C, and pass sensors 2101 to 2105. The automatic ticket inspection machine 20B controls the passage of the user in the direction A in the figure. The first display portion 28A and the second display portion 28B display various information. The door panel 29 is controlled to be in an open state or a closed state according to the result of the authentication process performed on the personal mobile terminal 10.

讀寫器28C係與既有之票或IC卡之讀取對應之構件,例如具備天線28C1與通信部28C2。通信部28C2具備控制器、調變部或解調部等。控制器控制調變部及解調部。調變部使指令重疊於具有既定頻帶之電波,並將該電波發送至天線28C1。又,解調部將經由天線28C1所獲取之電波中所包含之資訊進行解調,並將解調後之資訊(指令)輸出至控制裝置。The reader/writer 28C is a member corresponding to the reading of an existing ticket or IC card, and includes, for example, an antenna 28C1 and a communication unit 28C2. The communication unit 28C2 includes a controller, a modulation unit, a demodulation unit, and the like. The controller controls the modulation section and the demodulation section. The modulation unit superimposes the command on a radio wave having a predetermined frequency band, and transmits the radio wave to the antenna 28C1. In addition, the demodulation unit demodulates the information contained in the radio wave acquired via the antenna 28C1, and outputs the demodulated information (command) to the control device.

位置特定側運算部25一面使用BLE信標接收機特定出個人移動終端10之位置,一面基於位置特定側時刻部27與ID、加密密鑰資料庫之資訊,進行本人認證及支付能力認證,藉此進行位置特定認證。基於該判定結果,執行准許或禁止利用者之通過之控制。於進行准許利用者之通過之控制之情形時,位置特定側控制部28將門板部29設為打開狀態、或者使第1顯示部28A顯示表示准許通過之資訊。於進行禁止利用者之通過之控制之情形時,位置特定側控制部28將門板部29設為關閉狀態、或者使第1顯示部28A顯示表示禁止通過之資訊。又,於藉由位置特定側運算部25執行錯誤處理之情形時,作為錯誤處理,位置特定側控制部28將門板部29設為關閉狀態、或者使第1顯示部28A顯示與錯誤處理相關之資訊。與錯誤處理相關之資訊例如為無法執行位置特定之情形、無法進行個人認證之情形、或無法認證支付能力之情形。再者,亦可包括無法確認入場記錄之情形。又,位置特定裝置20亦可具備聲音輸入輸出部,以根據位置特定側運算部25之判定結果輸出既定之聲音或音頻、或者根據音頻之輸入利用位置特定側運算部25作出回應而解決錯誤處理等。又,位置特定裝置20亦可將出入記錄傳送至管理終端50或管理伺服器系統30,以應對違法乘車等。While the location specifying side computing unit 25 uses the BLE beacon receiver to specify the location of the personal mobile terminal 10, it performs identity authentication and payment ability authentication based on the location specifying side time unit 27 and the information in the ID and encryption key database. This performs location-specific authentication. Based on the result of this judgment, the control of permitting or prohibiting the user's passage is executed. In the case of the control permitting the passage of the user, the position specifying side control unit 28 sets the door panel 29 to the open state or causes the first display unit 28A to display information indicating that the passage is permitted. In the case of the control for prohibiting the passage of the user, the position specifying side control unit 28 sets the door panel 29 to the closed state or causes the first display unit 28A to display information indicating that passage is prohibited. In addition, when error processing is performed by the position specifying side calculation unit 25, the position specifying side control unit 28 sets the door panel 29 to the closed state or causes the first display unit 28A to display information related to the error processing as error processing News. Information related to error handling is, for example, situations where location specific cannot be performed, situations where personal authentication cannot be performed, or situations where payment ability cannot be authenticated. Furthermore, it can also include situations where the admission record cannot be confirmed. In addition, the position specifying device 20 may also be equipped with a voice input and output unit to output a predetermined voice or audio based on the determination result of the location specifying side computing unit 25, or to use the location specifying side computing unit 25 to respond based on audio input to solve error processing Wait. In addition, the location specifying device 20 may also transmit the entry and exit records to the management terminal 50 or the management server system 30 to deal with illegal rides and the like.

再者,於能夠自管理終端50以圖像追蹤利用者之位置資訊之情形時,既可認證其個人移動終端10並與圖像協作地使其通過,亦可使利用位置特定裝置20之位置資訊之認證停止。又,亦可省略第1顯示部28A或第2顯示部28B。 (個人移動終端10)Furthermore, when the user’s location information can be tracked with an image from the management terminal 50, the personal mobile terminal 10 can be authenticated and passed through in cooperation with the image, or the location of the location specifying device 20 can be used The authentication of information ceased. In addition, the first display portion 28A or the second display portion 28B may be omitted. (Personal mobile terminal 10)

個人移動終端10係成為位置特定或認證之對象之由利用者攜帶之個人所有之通信終端。如圖34所示,個人移動終端10具備個人終端側通信部11A、個人終端側控制部12、個人終端側時刻部14、個人終端側記憶部13、個人終端側輸入輸出部15及個人終端側運算部16。The personal mobile terminal 10 is a personally-owned communication terminal carried by a user that becomes a location-specific or authenticated object. As shown in FIG. 34, the personal mobile terminal 10 includes a personal terminal side communication unit 11A, a personal terminal side control unit 12, a personal terminal side time unit 14, a personal terminal side storage unit 13, a personal terminal side input and output unit 15, and a personal terminal side算部16。 Calculation unit 16.

個人終端側時刻部14產生與時刻相關之資訊。此處,相當於個人移動終端10側之時鐘。再者,個人終端側時刻部14亦可與個人終端側運算部16等其他構件整合或組入至個人終端側運算部16等。The personal terminal side time unit 14 generates information related to time. Here, it is equivalent to the clock on the personal mobile terminal 10 side. Furthermore, the personal terminal-side time unit 14 may be integrated with other components such as the personal terminal-side computing unit 16 or incorporated into the personal terminal-side computing unit 16 and the like.

個人終端側記憶部13係用以保持各種資訊之記憶構件,可利用非揮發性之半導體記憶體或硬碟等。此處,保持有固有之識別資訊或固有之公共密鑰、用於產生一次性密碼之函數等。The personal terminal side memory 13 is a memory component for holding various information, and non-volatile semiconductor memory or hard disk can be used. Here, inherent identification information or inherent public keys, functions for generating one-time passwords, etc. are maintained.

個人終端側輸入輸出部15係進行個人移動終端10之輸入輸出之構件,可利用鍵盤、滑鼠、控制台或麥克風等輸入設備、顯示器或揚聲器等輸出設備、或兼用於輸入輸出之觸控面板等人/機介面。The input and output unit 15 on the personal terminal side is a component for input and output of the personal mobile terminal 10, which can use input devices such as keyboard, mouse, console, or microphone, output devices such as displays or speakers, or a touch panel that is also used for input and output. Waiting for human/machine interface.

個人終端側運算部16係進行各種運算或處理之構件,可利用智慧型手機終端之SoC(System on a Chip,系統單晶片)、或個人電腦之CPU、或ASIC等。再者,個人終端側控制部12亦可與個人終端側運算部16整合。The computing unit 16 on the personal terminal side is a component that performs various operations or processing, and can use SoC (System on a Chip) of a smartphone terminal, or a CPU or ASIC of a personal computer. Furthermore, the personal terminal-side control unit 12 may also be integrated with the personal terminal-side computing unit 16.

該個人移動終端10可於管理伺服器系統30進行登錄,且通過管理伺服器系統30申請利用位置特定裝置20之經營者服務之提供。將為此所需之支付、例如信用卡、轉賬卡、預付卡或金融卡等之資訊登錄至管理伺服器系統30中。進而,可產生並發行利用位置特定裝置20時所需之個人移動終端10之唯一之ID及與該ID成組之加密密鑰。再者,可根據來自經營者之服務提供,將經營者所指定之位置特定裝置20之利用場所、利用期間等顯示於輸入輸出裝置。再者,亦可為於個人資訊等之登錄及管理伺服器系統30之設定後僅發送BLE信標之小型終端而並非智慧型手機終端等,亦可僅於位置特定裝置20周邊發送。The personal mobile terminal 10 can be registered in the management server system 30, and through the management server system 30, apply for the provision of operator services using the location-specific device 20. The information required for the payment, such as a credit card, debit card, prepaid card, or financial card, is registered in the management server system 30. Furthermore, it is possible to generate and issue the unique ID of the personal mobile terminal 10 required when using the location specifying device 20 and the encryption key combined with the ID. Furthermore, based on the service provided by the operator, the use location, use period, etc. of the location specifying device 20 designated by the operator can be displayed on the input/output device. Furthermore, it can also be a small terminal that only sends BLE beacons after personal information is registered and the management server system 30 is set, instead of a smart phone terminal, etc., or it can only be sent around the location specifying device 20.

個人終端側通信部11A係用以與外部機器進行通信之構件。個人移動終端10可利用個人終端側通信部11A,按照LTE、3G/4G/5G、CDMA、WIMAX或WiFi(均為商品名)等標準化之通信標準或獨立之通信標準與外部機器進行通信。又,個人終端側通信部11A作為個人終端側發送部11發揮功能。個人終端側通信部11A具備BLE信標發送裝置。進而,亦可具備GPS裝置或BLE信標接收裝置。個人移動終端10可藉由發送BLE信標而通過位置特定裝置20。再者,個人移動終端10係於使用GPS裝置或BLE信標接收功能感知到向管理終端50及位置特定裝置20之接近之情形時,亦可發送BLE信標,於遠離之情形時,亦可使BLE信標之發送停止。The personal terminal side communication unit 11A is a member for communicating with external devices. The personal mobile terminal 10 can use the personal terminal side communication unit 11A to communicate with external devices in accordance with standardized communication standards such as LTE, 3G/4G/5G, CDMA, WIMAX, or WiFi (all trade names) or independent communication standards. In addition, the personal terminal side communication unit 11A functions as the personal terminal side transmission unit 11. The personal terminal side communication unit 11A includes a BLE beacon transmission device. Furthermore, it may be equipped with a GPS device or a BLE beacon receiving device. The personal mobile terminal 10 can pass through the location specific device 20 by transmitting a BLE beacon. Furthermore, the personal mobile terminal 10 can also send a BLE beacon when it uses a GPS device or a BLE beacon receiving function to sense the approach to the management terminal 50 and the location-specific device 20, or when it is far away Stop the sending of BLE beacon.

又,亦可使個人終端側通信部11A具有無線LAN或行動通信等無線通信功能。該無線通信功能可與網際網路等網路連接。又,亦可具有個人終端側顯示部或個人終端側輸入部。進而,亦可具有加速度感測器等,亦可具有磁場測定裝置,還可具有圖像輸入裝置。已通過位置特定裝置20之個人移動終端10亦可藉由與根據加速度、陀螺儀、地磁等感測器推算移動方向及速度之PDR、將環境特有之物理資訊預先資料庫化並以匹配處理進行位置特定之所謂指紋分析法等組合,而特定出之後之位置。藉此,能夠進一步提高精度。藉由接受地圖應用程式或室內地圖資料之提供,亦可進行室內之地圖引導,亦可顯示於個人終端側輸入輸出部。又,於如本實施例般之利用於驗票機之情形時,亦可與換乘指南應用程式協作而用於乘車位置、時間、車站裏之引導或費用之確認等。又,亦可將其等移動路徑資訊傳送至管理伺服器系統30並登錄為利用資訊。 (金融機構60)In addition, the personal terminal side communication unit 11A may have a wireless communication function such as wireless LAN or mobile communication. The wireless communication function can be connected to the Internet and other networks. Moreover, it may have a personal terminal side display part or a personal terminal side input part. Furthermore, it may have an acceleration sensor etc., it may have a magnetic field measurement device, and may have an image input device. The personal mobile terminal 10 that has passed the location specifying device 20 can also use the PDR to calculate the moving direction and speed based on sensors such as acceleration, gyroscope, and geomagnetism, and pre-database the physical information unique to the environment and perform matching processing. The combination of the so-called fingerprint analysis method, etc., which specifies the location, specifies the location after it. This can further improve accuracy. By accepting map applications or indoor map data, indoor map guidance can also be performed, and it can also be displayed on the input and output section of the personal terminal. In addition, in the case of using a ticket inspection machine as in the present embodiment, it can also be used in cooperation with a transfer guide application to confirm boarding location, time, guidance in the station, or confirmation of fees. In addition, it is also possible to send their movement path information to the management server system 30 and register it as utilization information. (Financial Institution 60)

金融機構60為信用卡公司或銀行等,具有授信審查功能、信用卡編號發行功能、支付功能等。金融機構60進行登錄至管理伺服器系統30之使用者之支付登錄之授信審查。藉由將該等資訊與管理伺服器系統30協作,而管理伺服器系統30進行使用者之登錄、ID、加密密鑰資料庫之更新、來自使用者之支付或對經營者之支付。 (對使用經營者用管理終端50之事後支付系統之登錄處理)The financial institution 60 is a credit card company or bank, etc., and has a credit review function, a credit card number issuance function, a payment function, and the like. The financial institution 60 conducts credit review of the payment registration of the user who is logged in to the management server system 30. By cooperating with the information and the management server system 30, the management server system 30 performs user registration, ID, encryption key database update, payment from the user, or payment to the operator. (Log-in processing for the post-payment system using the management terminal 50 for the operator)

於圖38中示出表示本實施例中之對使用經營者用管理終端50之事後支付系統之登錄處理之流程的流程圖。該流程圖表示經營者用管理終端50具有可與經營者側輸入輸出部43進行網際網路連接之管理終端側通信部51之情形等,且為必需如此之情形。再者,於非必需或不可能如此之情形時,利用可與經營者用管理終端50連接且另外具有同等功能之另一終端並事先進行設定,而使其適應本流程。經營者用管理終端50可藉由利用網際網路等而安裝對本系統之登錄處理應用程式。或者,使得可於網際網路上進行登錄處理。或者,亦可用作安裝有登錄處理應用程式之專用終端。經營者用管理終端50理想為始終確認管理伺服器系統30之認證機構之電子證書,於確認安全性後進行連接。經營者用管理終端50例如將銀行賬戶等支付資訊登錄至管理伺服器系統30。又,經營者用管理終端50將用以基於經營者所提供之服務自利用者徵收費用之服務利用費用表交付給管理伺服器系統30。再者,該服務利用費用表亦可以獲知利用者之ID及獲知費用之形式事後進行交付。管理伺服器系統30發行對於經營者用管理系統40而言唯一之經營者ID,並賦予給經營者用管理系統40。經營者用管理系統40發行如與ID成組般之加密密鑰,並以安全之形式交付給管理伺服器系統30。管理伺服器系統30及經營者用管理系統40將其等保存至記憶裝置。既可先設置管理終端50及位置特定裝置20,亦可後設置,還可同時並行地設置。與管理終端50及位置特定裝置20斷開連接之管理伺服器系統30登錄設置場所。又,將該設置場所之資訊通知給經營者用管理系統40。管理伺服器系統30將該等資訊保存至記憶裝置。 再者,亦可使得可一面獲得管理伺服器系統30之認證,一面向其他經營者用管理系統40轉移賬戶(account)。FIG. 38 shows a flowchart showing the flow of the log-in processing of the post-payment system using the management terminal 50 for the business operator in this embodiment. This flowchart shows the case where the management terminal 50 for business operators has the management terminal side communication unit 51 which can be connected to the business input/output unit 43 via the Internet, etc., and this is necessary. Furthermore, when it is unnecessary or impossible, another terminal that can be connected to the management terminal 50 for the business operator and has the same function is used and set in advance to adapt this flow. The management terminal 50 for an operator can install a registration processing application to the system by using the Internet or the like. Or, make it possible to log in on the Internet. Alternatively, it can also be used as a dedicated terminal with a registration processing application. Ideally, the management terminal 50 for the operator always confirms the electronic certificate of the certification authority of the management server system 30, and connects after confirming the security. The management terminal 50 for an operator registers payment information such as a bank account to the management server system 30, for example. In addition, the management terminal 50 for the business operator delivers to the management server system 30 a service utilization fee table for collecting a fee from the user based on the service provided by the business operator. Furthermore, the service usage fee schedule can also be delivered afterwards in the form of knowing the ID of the user and knowing the fee. The management server system 30 issues a manager ID unique to the manager management system 40 and assigns it to the manager management system 40. The operator uses the management system 40 to issue an encryption key as if grouped with the ID, and delivers it to the management server system 30 in a secure manner. The management server system 30 and the manager management system 40 store them in the memory device. The management terminal 50 and the location specifying device 20 may be installed first, or may be installed later, or they may be installed in parallel at the same time. The management server system 30 disconnected from the management terminal 50 and the location specifying device 20 registers the installation location. In addition, the information of the installation place is notified to the management system 40 for business operators. The management server system 30 saves the information to the memory device. Furthermore, it is also possible to obtain the authentication of the management server system 30 and transfer the account (account) with the management system 40 to other operators.

圖39係表示本實施例之事後支付系統中之對使用個人移動終端10之本系統之登錄處理之流程的流程圖。該流程圖表示個人移動終端10具有可與智慧型手機終端等之輸入輸出裝置進行網際網路連接之通信裝置之情形等,且為必需如此之情形。再者,於非必需或不可能如此之情形時,利用可與個人移動終端10連接且另外具有同等功能之另一終端並事先進行設定,而使其適應本流程。個人移動終端10可藉由利用網際網路等,安裝對本系統之登錄處理應用程式。或者,設為可於網際網路上進行登錄處理者。或者,亦可用作安裝有登錄處理應用程式之專用終端。個人移動終端10理想為隨時確認管理伺服器系統30之認證機構之電子證書,於確認安全性後進行連接。個人移動終端10例如將信用卡等支付資訊登錄至管理伺服器系統30。此時,亦登錄信用卡之授信審查所需之姓名或住址等資訊。該登錄資訊係以安全之形式保存至管理伺服器系統30之個人資訊資料庫。基於該資訊進行授信審查。接收該授信審查之結果之通知,並將該授信審查之結果保存至個人資訊資料庫。於通過授信審查之情形時,管理伺服器系統30發行對於個人移動終端10而言唯一之ID,並賦予給個人移動終端10。個人移動終端10發行如與ID成組般之加密密鑰,並以安全之形式交付給管理伺服器系統30。個人移動終端10將該ID、加密密鑰保存至記憶裝置。管理伺服器系統30將該等資訊保存至個人資訊資料庫及ID、加密密鑰資料庫。再者,例如,即便於利用者遺失信用卡等之情形時等,亦可暫時性地使利用者之資訊變為無效。FIG. 39 is a flowchart showing the flow of the log-in process of the personal mobile terminal 10 in the post-payment system of this embodiment. The flowchart shows a situation where the personal mobile terminal 10 has a communication device that can connect to the input/output device such as a smart phone terminal, etc., and such a situation is necessary. Furthermore, when it is unnecessary or impossible, another terminal that can be connected to the personal mobile terminal 10 and has the same function is used and set in advance to adapt this flow. The personal mobile terminal 10 can install a registration processing application for the system by using the Internet or the like. Or, set as a person who can perform registration processing on the Internet. Alternatively, it can also be used as a dedicated terminal with a registration processing application. The personal mobile terminal 10 is ideally to confirm the electronic certificate of the certification authority of the management server system 30 at any time, and connect after confirming the security. The personal mobile terminal 10, for example, registers payment information such as a credit card to the management server system 30. At this time, the name or address and other information required for the credit review of the credit card is also registered. The login information is stored in the personal information database of the management server system 30 in a secure manner. Conduct credit review based on this information. Receive the notification of the result of the credit review and save the result of the credit review in the personal information database. When the credit review is passed, the management server system 30 issues an ID unique to the personal mobile terminal 10 and assigns it to the personal mobile terminal 10. The personal mobile terminal 10 issues an encryption key as a group with an ID, and delivers it to the management server system 30 in a secure form. The personal mobile terminal 10 saves the ID and encryption key to the memory device. The management server system 30 saves the information in the personal information database and the ID and encryption key database. Furthermore, for example, even when the user loses a credit card, etc., the user's information can be temporarily invalidated.

再者,於未能通過授信審查之情形時,無法登錄,可利用另一信用卡等進行申請。再者,亦可設為可一面獲得管理伺服器系統30之認證,一面向其他個人移動終端10轉移賬戶。In addition, in the case of failure to pass the credit review, you cannot log in, and you can use another credit card to apply. Furthermore, it can also be set to obtain the authentication of the management server system 30 while transferring accounts to other personal mobile terminals 10.

於圖40中示出表示本實施例之事後支付系統之自個人移動終端10申請經營者服務之處理之流程的流程圖。個人移動終端10可登錄欲使用之經營者之服務。例如,既可與一部分經營者締結契約,亦可藉由與一部分經營者事先締結契約而可自動地或任意地使用,還可省略申請。個人移動終端10藉由向管理伺服器系統30提出申請而申請需要之經營者服務。管理伺服器系統30將該資訊通知給經營者用管理系統40並提出申請,並向經營者詢問可否。於經營者拒絕之情形時,通知給管理伺服器系統30。管理伺服器系統30向個人移動終端10傳遞申請被拒絕之意旨,個人移動終端10不進行至以後之步驟。再者,亦可設為可由經營者用管理系統40自動地決定可否。FIG. 40 shows a flowchart showing the process of applying for operator services from the personal mobile terminal 10 in the post-payment system of this embodiment. The personal mobile terminal 10 can log in the service of the operator to be used. For example, it can be used automatically or arbitrarily by concluding a contract with a part of the business operators, or it can be used automatically or arbitrarily by signing a contract with a part of the business operators in advance, and the application can be omitted. The personal mobile terminal 10 applies for required operator services by applying to the management server system 30. The management server system 30 notifies the information to the management system 40 for the business operator, makes an application, and asks the business operator whether it is possible. In the event of rejection by the operator, the management server system 30 is notified. The management server system 30 transmits to the personal mobile terminal 10 that the application is rejected, and the personal mobile terminal 10 does not proceed to the subsequent steps. In addition, it can also be assumed that the managerial management system 40 can automatically determine the permission.

於經營者准許申請之情形時,經營者用管理系統40將經營者ID、位置特定裝置20可認可之認可期間及准許通過之設置場所等通知給管理伺服器系統30。但,基本上,經營者用管理系統40可指定與自身所管理之位置特定裝置20相關之設置場所及其認可期間。管理伺服器系統30亦可將申請被准許通知給個人移動終端10。管理伺服器系統30設定存在於被經營者用管理系統40准許通知之設置場所之、向位置特定裝置20提出申請之利用者之ID、加密密鑰及認可期間。其亦可通過管理終端50進行設定。若設定完成,則自位置特定裝置20及/或管理終端50將設定完成通知通知給管理伺服器系統30。接收設定完成通知之管理伺服器系統30亦可將設定完成通知給個人移動終端10及經營者用管理系統40。When the operator approves the application, the operator uses the management system 40 to notify the management server system 30 of the operator ID, the approval period recognized by the location specifying device 20, and the approved installation location. However, basically, the management system 40 for the business operator can designate the installation location and the approval period of the location specifying device 20 managed by the operator. The management server system 30 can also notify the personal mobile terminal 10 that the application is approved. The management server system 30 sets the ID, encryption key, and authorization period of the user who has applied to the location specifying device 20 at the installation location notified by the management system 40 for the operator. It can also be set through the management terminal 50. If the setting is completed, the location specifying device 20 and/or the management terminal 50 notifies the management server system 30 of the setting completion notification. The management server system 30 receiving the setting completion notification may also notify the personal mobile terminal 10 and the management system 40 for business operators of the completion of the setting.

於圖41中示出表示於本實施例之事後支付系統之管理伺服器系統30中,用以監視維持授信狀況之變化之處理流程的流程圖。管理伺服器系統30為了監視授信狀況之變化,只要授信資訊無變化,則定期地向金融機構60確認授信審查之狀況。管理伺服器系統30自金融機構60接收授信審查結果,並更新ID、加密密鑰資料庫。於有變化之情形時,視需要通知給經營者用管理系統40、管理終端50及位置特定裝置20。於該情形時,既可交付ID、加密密鑰資料庫之差量,亦可交付全部資料。藉此,接收到信用卡等之授信NG之ID變得無法通過需要事後支付之位置認證裝置。又,管理伺服器系統30亦可對個人移動終端10通知信用卡等之否認。再者,亦可促進新的信用卡等之登錄。FIG. 41 shows a flow chart showing the processing flow of the management server system 30 of the post-payment system of this embodiment for monitoring and maintaining changes in the credit status. In order to monitor changes in the credit status, the management server system 30 periodically confirms the status of credit review with the financial institution 60 as long as the credit information does not change. The management server system 30 receives the credit review result from the financial institution 60 and updates the ID and encryption key database. When there is a change, the manager's management system 40, the management terminal 50, and the location specifying device 20 are notified as necessary. In this case, the difference between the ID and encryption key database can be delivered, or all the data can be delivered. As a result, the ID of the credit NG received by the credit card or the like becomes unable to pass the location authentication device that requires payment afterwards. In addition, the management server system 30 may also notify the personal mobile terminal 10 of denial of the credit card or the like. Furthermore, the registration of new credit cards etc. can also be promoted.

於圖42中示出表示本實施例之事後支付系統之由利用者利用位置特定裝置20時之處理流程的流程圖。個人移動終端10藉由接收處於位置特定裝置20之附近之管理終端50或作為位置特定裝置20之通信裝置所設置之BLE發送機之信號、或者藉由接近利用GPS事先設定之位置特定裝置20之設置位置附近,而發送BLE信標信號。或者,既可始終發送,亦可藉由根據接近而提高其發送頻度而維持低功耗。對於要發送之BLE信標信號至少賦予ID。位置特定裝置20進行被賦予該ID之BLE信標信號之發送源之位置特定及認證。再者,BLE信標信號亦可被加密,亦可由管理終端50及位置特定裝置20解密。位置特定之結果,於使其通過之情形時,亦可將通過認證通知給個人移動終端10。又,亦可通知給經營者用管理系統40。又,亦可將其利用歷程通知給管理終端50。再者,關於位置特定及加密、解密之流程,將於下文進行說明。FIG. 42 shows a flowchart showing the processing flow when the user uses the location specifying device 20 in the post-payment system of this embodiment. The personal mobile terminal 10 receives signals from the management terminal 50 in the vicinity of the location specifying device 20 or the BLE transmitter set up as the communication device of the location specifying device 20, or by approaching the location specifying device 20 preset by GPS. Set near the location while sending BLE beacon signals. Alternatively, it may always be transmitted, or the transmission frequency may be increased according to proximity to maintain low power consumption. Assign at least ID to the BLE beacon signal to be sent. The location identification device 20 performs location identification and authentication of the transmission source of the BLE beacon signal assigned the ID. Furthermore, the BLE beacon signal can also be encrypted, and can also be decrypted by the management terminal 50 and the location specifying device 20. The result of the location identification can also be notified to the personal mobile terminal 10 of the passing authentication when it passes. In addition, it may be notified to the management system 40 for the business operator. In addition, the management terminal 50 may be notified of the use history. Furthermore, the process of location identification and encryption and decryption will be described below.

位置特定裝置20將利用歷程定期地通知給管理伺服器系統30。再者,亦可經由管理終端50,亦可使管理終端50代替位置特定裝置20執行。於精算時之前,將所決定之機構之利用歷程通知給經營者用管理系統40及個人移動終端10。於存在事後支付之情形時,進行金額清算。於精算時,管理伺服器系統30計算請求費用,並向金融機構60請求請求費用,將自金融機構60支付之付款中之例如除手續費等以外之部分支付給經營者,通過經營者用管理系統40來通知該利用資訊或支付結果。再者,亦可不通過經營者用管理系統40進行通知。又,對利用者通過個人移動終端10通知利用支付資訊。或者,亦可通過網站或SNS(social network service,社群網路服務)進行通知,亦可通過其他網際網路媒體或紙媒體進行通知,還可藉由通過信用卡等公司進行通知而不直接自管理伺服器系統30進行通知。 (位置特定程序)The location specifying device 20 periodically notifies the management server system 30 of the utilization history. Furthermore, the management terminal 50 may also be used, or the management terminal 50 may be executed instead of the location specifying device 20. Before the actuarial calculation, the utilization history of the determined organization is notified to the management system 40 for business operators and the personal mobile terminal 10. In the event of post-payment, the amount is settled. At the time of actuarial calculation, the management server system 30 calculates the request fee, and requests the request fee from the financial institution 60, and pays the payment from the financial institution 60, for example, excluding handling fees, etc., to the operator, through the operator’s management The system 40 informs the utilization information or payment result. In addition, the notification may not be made through the management system 40 for managers. In addition, the user is notified of the payment information through the personal mobile terminal 10. Alternatively, it can also be notified through the website or SNS (social network service), or through other Internet media or paper media, or through a credit card company and other companies without direct notification The management server system 30 makes a notification. (Location specific program)

其次,基於圖43之流程圖對位置特定程序進行說明。圖43表示利用位置特定裝置20進行個人移動終端10之位置特定時之個人移動終端10之處理流程。個人移動終端10係藉由接收位於位置特定裝置20之附近之管理終端50或作為位置特定裝置20之通信裝置所設置之BLE發送機之信號、或藉由接收GPS電波而求出位置,偵測出接近位置特定裝置20所在之區域,而發送BLE信標。或者,既可始終發送,亦可藉由根據接近而提高其發送頻度而維持低功耗。該區域例如既可為半徑10 m,亦可為半徑100 m。然後,亦可偵測出該區域之脫離,而停止BLE信標之發送。Next, the location specifying program will be described based on the flowchart of FIG. 43. FIG. 43 shows the processing flow of the personal mobile terminal 10 when the location specifying device 20 is used to specify the location of the personal mobile terminal 10. The personal mobile terminal 10 obtains the position by receiving the signal from the management terminal 50 located near the location specifying device 20 or the BLE transmitter set up as the communication device of the location specifying device 20, or by receiving GPS radio waves, and detects The BLE beacon is sent out of the area where the proximity location specific device 20 is located. Alternatively, it may always be transmitted, or the transmission frequency may be increased according to proximity to maintain low power consumption. For example, the area may have a radius of 10 m or a radius of 100 m. Then, the departure of the area can also be detected, and the sending of the BLE beacon can be stopped.

將利用位置特定裝置20進行個人移動終端10之位置特定時之位置特定裝置20之處理流程示於圖44之流程圖。位置特定裝置20利用處於位置特定側接收部21之例如如圖35A所示之8個BLE信標接收機各者等接收BLE信標電波。利用各BLE信標接收機測定BLE信標電波中所存在之ID等及其電波強度。針對同一ID之電波強度,算出下述基準值,求出其差是否為閾值以上。若其差為閾值以上,則判定為具有該ID之個人移動終端10存在於其基準值較大之區域。又,若其差並非閾值以上,則判定為具有該ID之個人移動終端10不存在於任何區域。再者,關於電波強度之計算方法,將於下文敍述。The process flow of the location specifying device 20 when the location specifying device 20 is used to specify the location of the personal mobile terminal 10 is shown in the flowchart of FIG. 44. The location specifying device 20 receives the BLE beacon radio waves by using each of the eight BLE beacon receivers, for example, as shown in FIG. 35A in the location specifying side receiving unit 21. Each BLE beacon receiver is used to measure the ID and the like in the BLE beacon radio wave and its radio wave strength. For the radio wave intensity of the same ID, the following reference value is calculated, and whether the difference is greater than or equal to the threshold value. If the difference is equal to or greater than the threshold value, it is determined that the personal mobile terminal 10 having the ID exists in an area with a large reference value. Furthermore, if the difference is not greater than the threshold value, it is determined that the personal mobile terminal 10 having the ID does not exist in any area. Furthermore, the calculation method of the radio wave intensity will be described below.

圖45係表示利用位置特定裝置20進行個人移動終端10之位置特定時之電波強度計算之處理流程的流程圖。本實施例之BLE信標信號之電波強度亦可基於BLE信標信號之接收強度之歷程資訊而算出電波強度。例如,圖之上層所示之BLE信標接收機之裝置A及裝置B係於處理每隔p秒獲得之電波強度時,並非僅使用各接收時機之值,而是每隔一定時間(圖45之例中為每隔q秒),基於單數或複數之時機之電波強度之資訊所包含之既定期間(圖45之例中為r秒,p≦q≦r)之資料求出平均值,並設為每個BLE信標接收機之電波強度。FIG. 45 is a flowchart showing the processing flow of the radio wave intensity calculation when the personal mobile terminal 10 is located by the location specifying device 20. The radio wave intensity of the BLE beacon signal in this embodiment can also be calculated based on the history information of the received intensity of the BLE beacon signal. For example, when the device A and device B of the BLE beacon receiver shown in the upper layer of the figure process the radio wave intensity obtained every p seconds, they do not only use the value of each reception timing, but every certain time (Figure 45 In the example, every q seconds), calculate the average value based on the data of the predetermined period (r seconds in the example in Figure 45, p≦q≦r) contained in the information of the radio wave intensity based on the singular or plural timing, and Set the radio wave strength of each BLE beacon receiver.

圖46係表示利用位置特定裝置20進行個人移動終端10之位置特定時之電波強度計算之處理流程的流程圖。再者,BLE信標信號之電波強度亦可基於BLE信標信號之接收強度之歷程資訊而算出電波強度。例如,圖之上層所示之BLE信標接收機之裝置A及裝置B處理每隔p秒獲得之電波強度,但未必於追加資料之時機將各裝置同時進行更新。因此,針對每個裝置進行同樣之處理。亦即,每隔一定時間(圖46之例中為每更新q次),基於每單數次或複數次資料更新之電波強度之資訊所包含之既定期間(圖46之例中為每更新r次,p≦q≦r)之資料求出平均值,並設為每個BLE信標接收機之電波強度。再者,關於某ID,於至任意之一定時間後為止並無通信之情形時,亦可刪除所積存之過去之資料。 (根據BLE接收機之電波強度求出基準值之程序)FIG. 46 is a flowchart showing the processing flow of the radio wave intensity calculation when the location specifying device 20 is used for the personal mobile terminal 10. Furthermore, the radio wave intensity of the BLE beacon signal can also be calculated based on the history information of the received intensity of the BLE beacon signal. For example, the device A and device B of the BLE beacon receiver shown in the upper layer of the figure process the radio wave intensity obtained every p seconds, but it is not necessary to update each device at the same time when the data is added. Therefore, the same processing is performed for each device. That is, at regular intervals (in the example of Figure 46, each update is q times), based on the predetermined period contained in the information of the radio wave intensity of each single or multiple data update (in the example of Figure 46, each update is r times) , P≦q≦r), calculate the average value and set it as the radio wave intensity of each BLE beacon receiver. Furthermore, for a certain ID, if there is no communication until a certain period of time has passed, the accumulated past data can also be deleted. (The procedure for obtaining the reference value based on the radio wave intensity of the BLE receiver)

其次,一面參照圖47,一面對根據BLE接收機之電波強度求出基準值之程序進行說明。圖47係表示根據BLE接收機之電波強度求出基準值之處理之流程的流程圖。設為使用剛才為止所說明之電波強度之測定方法由各BLE接收機所測定出之電波強度,以下,就同一ID進行說明。再者,於本實施例中說明了組合複數個條件所得之判定方法,但亦可將該等條件任意地組合而進行判定。又,位置特定存在如以成為本實施例之基礎之見解所說明般之各種配置,本實施例係作為一例而說明。此次,使用圖36A、圖36B所示之位置特定裝置20中之通過判定區域DA、DA1、DA2、DB、DB1、DB2進行說明。Next, referring to Fig. 47, the procedure for obtaining the reference value based on the radio wave intensity of the BLE receiver will be described. Fig. 47 is a flowchart showing the flow of processing for obtaining the reference value based on the radio wave intensity of the BLE receiver. Assuming the radio wave intensity measured by each BLE receiver using the method of measuring the radio wave intensity explained earlier, the same ID will be explained below. In addition, in this embodiment, the judgment method obtained by combining a plurality of conditions has been described, but these conditions may be arbitrarily combined for judgment. In addition, the position identification has various configurations as explained based on the knowledge that forms the basis of this embodiment, and this embodiment is explained as an example. This time, description will be made using the passing determination areas DA, DA1, DA2, DB, DB1, and DB2 in the position specifying device 20 shown in FIGS. 36A and 36B.

此次,將個人移動終端10設為BLE發送機,將位置特定裝置20設為BLE接收機,進行BLE通信,並藉由依序判定是否處於預先設定之複數個通過判定區域內來決定個人移動終端10處於哪個位置。複數個通過判定區域例如為圖36A所示之通過判定區域DA、DA1、DA2、DB、DB1、DB2等。關於以哪種順序對該等複數個通過判定區域進行判定,可根據處理速度或精度而適當設定。例如,首先判定是否處於通過判定區域DA內,於判定為通過判定區域DA內之情形時結束處理。另一方面,於判定為通過判定區域DA外之情形時,判定是否為通過判定區域DB內。或者,於在通過判定區域DA內外之判定中誤差較大之情形時,亦可進行至是否為通過判定區域DA1內、或是否為通過判定區域DA2內之判定。This time, the personal mobile terminal 10 is set as a BLE transmitter, and the location specifying device 20 is set as a BLE receiver for BLE communication, and the personal mobile terminal is determined by sequentially determining whether it is within a plurality of preset passing determination areas Where is 10? The plural passing determination areas are, for example, the passing determination areas DA, DA1, DA2, DB, DB1, DB2, etc. shown in FIG. 36A. The order in which the plural passage determination areas are determined can be appropriately set according to the processing speed or accuracy. For example, it is first determined whether it is in the passing determination area DA, and the processing is ended when it is determined that the passing determination area DA is. On the other hand, when it is determined that it is outside the passing determination area DA, it is determined whether it is inside the passing determination area DB. Alternatively, when the error is large in the judgment of passing the inside and outside of the judgment area DA, it is also possible to proceed to whether it is in the passing judgment area DA1 or whether it is in the passing judgment area DA2.

以下,作為判定特定之通過判定區域之內外之一程序,基於圖47之流程圖對判定個人移動終端10是否位於通過判定區域DA內之程序進行說明。首先,於步驟S4701中,個人移動終端10與作為BLE接收機之BLE信標接收機2111~2118分別進行BLE通信,利用各BLE接收機偵測ID及電波強度。Hereinafter, as one of the procedures for determining the inside and outside of the specific passage determination area, the procedure for determining whether the personal mobile terminal 10 is located in the passage determination area DA will be described based on the flowchart of FIG. 47. First, in step S4701, the personal mobile terminal 10 performs BLE communication with the BLE beacon receivers 2111-2118 as BLE receivers, respectively, and uses each BLE receiver to detect ID and radio wave intensity.

其次,於步驟S4702中,對偵測出之電波強度,計算相當於檢查區域A之BLE信標接收機2111~2114之平均及相當於檢查區域B之BLE信標接收機2115~2118之平均,判定其差是否為既定閾值以上。既定閾值係根據雜訊之多少等使用環境或所使用之電波之強度等而適當設定。此次,將閾值設為10 dB。然後,於平均值之差為閾值以上之情形時,進行至步驟S4708,判定為相當於該ID之個人移動終端10存在於平均值較大之檢查區域A、即通過判定區域DA內,然後結束處理。Next, in step S4702, calculate the average of the BLE beacon receivers 2111-2114 in the inspection area A and the average of the BLE beacon receivers 2115-2118 in the inspection area B for the detected radio wave intensity. Determine whether the difference is greater than or equal to a predetermined threshold. The predetermined threshold is appropriately set according to the usage environment such as the amount of noise or the intensity of the radio wave used. This time, set the threshold to 10 dB. Then, when the difference between the average values is greater than or equal to the threshold value, proceed to step S4708, where it is determined that the personal mobile terminal 10 corresponding to the ID exists in the inspection area A with the larger average value, that is, the passing determination area DA, and then the end deal with.

另一方面,於步驟S4702中,於平均值之差並非閾值以上之情形時,進行至步驟S4703,若於檢查區域A(此次為BLE信標接收機2111~2114)內,電波強度之最大值及最小值為既定閾值以上(例如10 dB以上),則進行自平均值之運算對象中去除最小值之處理。藉此,可獲得如下優點:於BLE信標接收機間之電波強度之偏差過大之情形時,尤其是BLE信標存在與原來相比偶爾輸出-30 dBm等非常低之電波強度之情況,因此可去除異常值。On the other hand, in step S4702, if the difference between the average values is not greater than the threshold value, proceed to step S4703. If in the inspection area A (this time, BLE beacon receivers 2111-2114), the radio wave intensity is the largest If the value and the minimum value are above the predetermined threshold (for example, 10 dB or above), the processing of removing the minimum value from the calculation object of the average value is performed. By this, the following advantages can be obtained: when the deviation of the radio wave intensity between the BLE beacon receivers is too large, especially when the BLE beacon occasionally outputs very low radio wave intensity such as -30 dBm compared with the original situation, so Outliers can be removed.

然後,進行至步驟S4704,再次與步驟S4702同樣地計算BLE信標接收機2111~2114之平均及BLE信標接收機2115~2118之平均,判定其差是否為既定閾值以上。然後,於平均值之差為閾值以上之情形時,進行至步驟S4708,判定為相當於該ID之個人移動終端10存在於通過判定區域DA內,然後結束處理。Then, the process proceeds to step S4704, the average of BLE beacon receivers 2111 to 2114 and the average of BLE beacon receivers 2115 to 2118 are calculated again in the same manner as step S4702, and it is determined whether the difference is greater than or equal to a predetermined threshold. Then, when the difference between the average values is greater than or equal to the threshold value, the process proceeds to step S4708, and it is determined that the personal mobile terminal 10 corresponding to the ID exists in the passing determination area DA, and then the process ends.

另一方面,於步驟S4704中,亦於平均值之差並非閾值以上之情形時,進行至步驟S4705,若於檢查區域A1(相當於通過判定區域DA1之BLE信標接收機2111~2112)與檢查區域A2(相當於通過判定區域DA2之BLE信標接收機2113~2114)中,電波強度之平均值之差為既定閾值(例如10 dB)以上,則選擇平均值較大者(BLE信標接收機2111~2112、或BLE信標接收機2113~2114中之任一者)。其意指由於個人移動終端10越近則電波強度之平均值越大,故基於該值進行判定。On the other hand, in step S4704, even when the difference between the average values is not greater than the threshold value, proceed to step S4705, if in the inspection area A1 (equivalent to the BLE beacon receiver 2111-2112 passing through the determination area DA1) and In the inspection area A2 (equivalent to the BLE beacon receivers 2113~2114 passing through the determination area DA2), if the difference between the average value of the radio wave intensity is greater than a predetermined threshold (for example, 10 dB), select the larger average value (BLE beacon) Receivers 2111 to 2112, or any one of BLE beacon receivers 2113 to 2114). This means that the closer the personal mobile terminal 10 is, the larger the average value of the radio wave intensity is, so the determination is made based on this value.

然後,進行至步驟S4706,計算所選擇之BLE信標接收機2111~2112或BLE信標接收機2113~2114之平均、及BLE信標接收機2115~2118之平均,並判定其差是否為既定閾值(例如10 dB)以上。然後,於平均值之差為閾值以上之情形時,同樣地進行至步驟S4708,判定為相當於該ID之個人移動終端10存在於通過判定區域DA1或DA2內,然後結束處理。藉此,即便於個人移動終端10接近區劃板24A、24B中之任一者而並非閘機之中央之情形時,亦能夠檢測。Then, proceed to step S4706 to calculate the average of the selected BLE beacon receivers 2111-2112 or BLE beacon receivers 2113-2114 and the average of the BLE beacon receivers 2115-2118, and determine whether the difference is a predetermined Above the threshold (for example, 10 dB). Then, when the difference between the average values is equal to or greater than the threshold value, the process proceeds to step S4708 in the same way, and it is determined that the personal mobile terminal 10 corresponding to the ID exists in the passing determination area DA1 or DA2, and then the process ends. Thereby, even when the personal mobile terminal 10 is close to any one of the partition boards 24A and 24B but not in the center of the gate, it can be detected.

另一方面,於步驟S4706中,亦於平均值之差並非閾值以上之情形時,進行至步驟S4707,判定為該ID之個人移動終端10不存在於通過判定區域DA(及DA1、DA2兩者)。On the other hand, in step S4706, even when the difference between the average values is not greater than the threshold value, proceed to step S4707, where it is determined that the personal mobile terminal 10 of the ID does not exist in the passing determination area DA (and both DA1 and DA2). ).

以相同之程序亦對通過判定區域DB(或DB1、DB2)進行判定。進而,對更高精度地進行該判定之流程進行說明。The same procedure is used to judge the passing judgment area DB (or DB1, DB2). Furthermore, the flow of this determination with higher accuracy will be described.

於圖48之流程圖中表示進行位置特定裝置20之對個人移動終端10之位置特定之處理流程。此次將剛才所獲得之是否存在於區域之判定結果稱為區域判定。如圖48所示,每次進行資料處理更新都追加資料,但若每隔一定時間(圖48之例中為每更新q次),基於每單數次或複數次資料更新之電波強度之資訊所包含之既定期間(圖48之例中為每更新r次,p≦q≦r)之資料,於r個之中,p個以上判定為○,則更新後亦可判定為○。其原因在於,於本系統中,可用於誤判定非常低之情形,由於本發明可使誤判定為0.0%,故能以充分之可靠性進行判斷。再者,關於某ID,於至任意之一定時間後為止並無通信之情形時,亦可刪除所積存之過去之資料。The flowchart of FIG. 48 shows the processing flow of the location specifying device 20 for the location specifying of the personal mobile terminal 10. This time, the judgment result obtained just now as to whether it exists in the area is called area judgment. As shown in Figure 48, data is added every time the data is processed and updated, but if every certain time (in the example of Figure 48, every update q times), based on the information of the radio wave intensity of each single or multiple data update For the data included in the predetermined period (in the example of FIG. 48, every update r times, p≦q≦r), among the r items, p or more are judged as ○, and it can also be judged as ○ after the update. The reason is that this system can be used in situations where the misjudgment is very low. Since the present invention can make the misjudgment to 0.0%, the judgment can be made with sufficient reliability. Furthermore, for a certain ID, if there is no communication until a certain period of time has passed, the accumulated past data can also be deleted.

藉由設定其等,可偵測如圖36A般之區域。例如,可辨識近似於直徑40 cm~60 cm左右之球之區域。藉此,作為保持個人移動終端10之高度,可大致覆蓋如自一般成人之口袋或手提包拿出之同時成為智慧型手機(非推薦)之高度般之高度。再者,為了以兒童等為對象,亦可除了將BLE接收機於同一高度上安裝8個以外,還於不同高度上同樣地安裝8個而進行位置特定。 (加密、解密之程序)By setting them, the area as shown in Figure 36A can be detected. For example, it can identify the area approximate to a sphere with a diameter of about 40 cm to 60 cm. As a result, the height of the personal mobile terminal 10 can be maintained as high as the height of a smart phone (not recommended) while being taken out from the pocket or handbag of a general adult. Furthermore, in order to target children, etc., in addition to installing 8 BLE receivers at the same height, 8 BLE receivers may also be installed at different heights in the same way for position identification. (Encryption and decryption procedures)

其次,一面參照圖49,一面對加密、解密之流程進行說明。圖49係表示加密、解密中之個人移動終端10之處理流程之流程圖。個人移動終端10事先進行例如個人資訊或信用卡等之本人認證、及其個人移動終端10之裝置認證。於該裝置認證中,例如可限於軟體中之許可證設定之一台,亦可限制啟動。藉此,對個人移動終端10賦予唯一之ID。個人移動終端10及其設定終端可設定與唯一之ID成組之加密密鑰。該加密密鑰既可利用3DES或AES等公共密鑰密碼,亦可利用橢圓曲線密碼等公開密鑰密碼。該加密密鑰係以安全之方法與ID成組地保存至管理伺服器系統30之ID、加密密鑰資料庫。Next, referring to FIG. 49, the flow of encryption and decryption will be described. FIG. 49 is a flowchart showing the processing flow of the personal mobile terminal 10 during encryption and decryption. The personal mobile terminal 10 performs personal authentication such as personal information or a credit card, and device authentication of the personal mobile terminal 10 in advance. In the device certification, for example, it can be limited to one of the license settings in the software, or it can be restricted to start. In this way, a unique ID is assigned to the personal mobile terminal 10. The personal mobile terminal 10 and its setting terminal can set an encryption key combined with a unique ID. The encryption key can use public key cryptography such as 3DES or AES, or public key cryptography such as elliptic curve cryptography. The encryption key is stored in the ID and encryption key database of the management server system 30 in a secure way and the ID group.

圖50係表示加密、解密中之個人移動終端10之處理流程之一例的流程圖。首先,於步驟S5001中,個人移動終端10係於運行時例如以ms等為單位之48位元獲取個人移動終端10之時間並進行填補處理。該填補處理係亦可用於所謂之銀行匯款等中所利用之一次性密碼之類之使用根據時刻求出之方程式者等。因此,不可為攻擊者能根據時刻及該資料而推測出填補處理內容者。FIG. 50 is a flowchart showing an example of the processing flow of the personal mobile terminal 10 during encryption and decryption. First, in step S5001, the personal mobile terminal 10 acquires the time of the personal mobile terminal 10 at 48 bits, for example, in units of ms, and performs padding. The padding process can also be used for so-called one-time passwords used in bank transfers, etc., which use equations obtained from time to time. Therefore, it cannot be someone who can infer the filling processing content based on the time and the data.

其次,於步驟S5002中,以事先準備之與該ID成組之加密密鑰,將該經填補處理之時間加密。然後,於步驟S5003中,交付ID及經加密之時間。以此方式,作為受到認證之被認證機器之個人移動終端係將傳送時之時刻加密,並與ID一併傳送至進行認證之認證裝置側。 (收發之時間差之一致)Next, in step S5002, the time of the padding process is encrypted with the encryption key prepared in advance and grouped with the ID. Then, in step S5003, the ID and the encrypted time are delivered. In this way, the personal mobile terminal, which is the authenticated machine to be authenticated, encrypts the time at the time of transmission, and transmits it together with the ID to the authentication device that performs authentication. (The time difference between sending and receiving is the same)

圖51係表示加密、解密中之位置特定裝置20之認證處理之流程之一例的流程圖。位置特定裝置20為了進行認證,首先,於步驟S5101中,利用位置特定裝置20接收自個人移動終端等欲接受認證之裝置傳送而來之ID(識別資訊)及經加密之時刻。其次,於步驟S5102中,進行認證之位置特定裝置20根據認證對象之裝置之ID檢索加密密鑰,將與該ID一併傳送之經加密之時刻解密。然後,於步驟S5103中,判定針對每個ID所設定之時間資訊i(ID)是否已定義。此處,於尚未定義之情形時,進行至步驟S5104,對i(ID)進行定義。i(ID)之定義方法有複數種,例如求出接收之時刻與解密所得之時刻(即被認證機器側之傳送時刻)之時間差。對i(ID)進行定義之後,返回至步驟S5101並重複進行處理。即,重新進行ID或經加密之時刻之接收。另一方面,於i(ID)已定義之情形時,進行至步驟S5105,判定接收之時刻與解密所得之時刻之時間差是否與i(ID)一致,於一致之情形時,於步驟S5106中進行認證。於不一致之情形時,不進行認證,而是返回至步驟S5101並重複進行處理。藉由反覆進行該操作,可進行反覆認證。再者,亦可為以所需次數停止之處理,於在即時之位置特定等中連續之認證不可或缺之情形時,亦可反覆進行。 (收發之時間差為既定範圍內)FIG. 51 is a flowchart showing an example of the flow of authentication processing of the location specifying device 20 during encryption and decryption. In order to perform authentication, the location specifying device 20 firstly uses the location specifying device 20 to receive the ID (identification information) and the encrypted time transmitted from a device to be authenticated, such as a personal mobile terminal, in step S5101. Next, in step S5102, the authentication location specifying device 20 searches for the encryption key according to the ID of the device to be authenticated, and decrypts the encrypted time transmitted with the ID. Then, in step S5103, it is determined whether the time information i (ID) set for each ID is defined. Here, in a situation that has not been defined yet, proceed to step S5104 to define i(ID). There are multiple ways to define i(ID), such as finding the time difference between the time of reception and the time obtained by decryption (that is, the transmission time of the authenticated machine side). After defining i(ID), return to step S5101 and repeat the process. That is, the ID or the encrypted time is received again. On the other hand, when i(ID) is defined, proceed to step S5105 to determine whether the time difference between the time of reception and the time obtained by decryption is consistent with i(ID). In the case of the same, proceed in step S5106 Certification. In the case of inconsistency, authentication is not performed, but returns to step S5101 and the processing is repeated. By repeating this operation, repeated authentication can be performed. In addition, it can also be a process that stops at the required number of times, and it can be repeated in situations where continuous authentication is indispensable in real-time location identification, etc. (The time difference between sending and receiving is within the established range)

於上述方法中,對當傳送時刻與接收時刻之時間差一致時進行認證之程序進行了說明。但,時間差i(ID)有時於ms單位之精度下不一致。例如,亦存在於規定傳送時刻之被認證機器側與規定接收時刻之認證裝置側時間有偏差之情況。因此,以下基於圖52之流程圖對可容許此種稍許之時間誤差之認證方法進行說明。In the above method, the procedure for authentication when the time difference between the transmission time and the reception time is the same is described. However, the time difference i(ID) is sometimes inconsistent with the accuracy of ms. For example, there may be a time deviation between the authenticated device side at the specified transmission time and the authentication device side at the specified reception time. Therefore, the following describes an authentication method that can tolerate such a slight time error based on the flowchart of FIG. 52.

圖52係表示加密、解密中之位置特定裝置20之認證處理之流程之另一例的流程圖。首先,於步驟S5201中,利用進行認證之位置特定裝置20,接收自欲被認證之裝置傳送而來之ID及經加密之時刻。其次,於步驟S5202中,位置特定裝置20根據所接收到之ID檢索加密密鑰,將與該ID一併傳送而來之經加密之時間解密。然後,於步驟S5203中,判定針對每個ID所設定之時間資訊i(ID)是否被定義。於此處尚未定義之情形時,進行至步驟S5204,定義時間資訊i(ID)。定義方法可考慮複數種,例如求出接收之時刻與解密所得之時刻之時間差。以此方式將時間資訊i(ID)定義後,返回至步驟S5201,並重複進行處理。即,重新接收ID或經加密之時刻。FIG. 52 is a flowchart showing another example of the flow of authentication processing of the location specifying device 20 during encryption and decryption. First, in step S5201, the location specifying device 20 for authentication is used to receive the ID and the encrypted time transmitted from the device to be authenticated. Secondly, in step S5202, the location specifying device 20 retrieves the encryption key according to the received ID, and decrypts the encrypted time transmitted together with the ID. Then, in step S5203, it is determined whether the time information i (ID) set for each ID is defined. In a situation that has not been defined here, proceed to step S5204 to define time information i (ID). The definition method can consider multiple types, such as finding the time difference between the time of reception and the time of decryption. After defining the time information i (ID) in this way, return to step S5201 and repeat the process. That is, the time when the ID or encrypted is received again.

另一方面,於步驟S5203中,於i(ID)已定義之情形時,進行至步驟S5205,判定重新接收之時刻與解密所得之時刻之時間差和i(ID)之差是否為任意之設定值、例如T秒以下。然後,於一致之情形時,於步驟S5206中進行認證。藉由反覆進行該操作,可進行反覆認證。再者,亦可為以所需次數停止之處理,於在即時之位置特定等中連續之認證不可或缺之情形時,亦可反覆進行。 (傳送時刻與接收時刻)On the other hand, in step S5203, when i(ID) is defined, proceed to step S5205 to determine whether the time difference between the time of re-reception and the decrypted time and the difference of i(ID) is an arbitrary set value , For example, T seconds or less. Then, in the case of coincidence, authentication is performed in step S5206. By repeating this operation, repeated authentication can be performed. In addition, it can also be a process that stops at the required number of times, and it can be repeated in situations where continuous authentication is indispensable in real-time location identification, etc. (Transmission time and reception time)

以上,對基於時間資訊i(ID)進行認證之程序進行了說明,但成為認證之基準之資訊亦可使用複數個。例如,亦可使用表示接收之時刻之時間資訊i(ID)及表示解密所得之時刻、即傳送時刻之時間資訊j(ID)進行認證。作為變化例,基於圖53對此種認證方法進行說明。Above, the authentication procedure based on time information i(ID) has been explained, but multiple pieces of information can be used as the basis of authentication. For example, time information i(ID) representing the time of reception and time information j(ID) representing the time obtained by decryption, that is, the time of transmission can also be used for authentication. As a modified example, this authentication method will be described based on FIG. 53.

圖53係表示加密、解密中之位置特定裝置20之認證處理之流程的流程圖。首先,於步驟S5301中,位置特定裝置20為了進行認證,接收自欲被認證之裝置傳送而來之ID及經加密之時刻。其次,於步驟S5302中,根據位置特定裝置20所接收到之ID檢索加密密鑰,將與該ID一併傳送之經加密之時刻解密。然後,於步驟S5303中,判定針對每個ID所設定之時間資訊i(ID)、j(ID)是否被定義,於尚未定義之情形時,於步驟S5304中,定義該等時間資訊i(ID)、j(ID)。例如,將接收之時刻定義為i(ID),將解密之時間定義為j(ID),返回至步驟S5301並重複進行處理。即,接收新的ID及經加密之時刻。FIG. 53 is a flowchart showing the flow of authentication processing of the location specifying device 20 during encryption and decryption. First, in step S5301, in order to perform authentication, the location specifying device 20 receives the ID and the encrypted time transmitted from the device to be authenticated. Next, in step S5302, the encryption key is retrieved based on the ID received by the location specifying device 20, and the encrypted time transmitted with the ID is decrypted. Then, in step S5303, it is determined whether the time information i(ID) and j(ID) set for each ID are defined. If they are not yet defined, in step S5304, the time information i(ID) is defined. ), j(ID). For example, define the time of reception as i(ID), and define the time of decryption as j(ID), return to step S5301 and repeat the process. That is, the new ID and the encrypted time are received.

另一方面,於步驟S5303中,於i(ID)、j(ID)已定義之情形時,進行至步驟S5305,分別獲取接收之時刻與i(ID)、及解密所得之時刻與j(ID)之差,判定該等差是否一致。於一致之情形時,於步驟S5305中進行認證。另一方面,於不一致之情形時不進行認證,返回至步驟S5301並重複進行處理。藉由反覆進行此種程序,可進行反覆認證。再者,亦可為以所需次數停止之處理,於在即時之位置特定等中連續之認證不可或缺之情形時,亦可反覆進行。On the other hand, in step S5303, when i(ID) and j(ID) are defined, proceed to step S5305 to obtain the received time and i(ID), and the decrypted time and j(ID) respectively. ) Difference, determine whether the difference is consistent. In the case of coincidence, authentication is performed in step S5305. On the other hand, in the case of inconsistency, authentication is not performed, and the process returns to step S5301 and the process is repeated. Repeated authentication can be performed by repeating this procedure. In addition, it can also be a process that stops at the required number of times, and it can be repeated in situations where continuous authentication is indispensable in real-time location identification, etc.

於以上之方法中,於i(ID)與j(ID)之差一致之情形時進行認證,但如上所述,亦可構成為,於無需要求完全一致,容許某種程度之誤差而獲得相同程度之值之情形時進行認證。作為變化例,基於圖54之流程圖對此種例進行說明。In the above method, authentication is performed when the difference between i(ID) and j(ID) is the same. However, as described above, it can also be configured to achieve the same without requiring a certain degree of error. In the case of the value of the degree, authentication is performed. As a variation example, this example will be described based on the flowchart of FIG. 54.

圖54係表示變化例之加密、解密中之位置特定裝置20之認證處理之流程的流程圖。於該例中,使用接收之時刻之時間差及解密所得之時刻之時間差進行認證。即,關於某ID,求出接收之時刻作為i(ID),求出解密所得之時間作為j(ID)。然後,於i(ID)、j(ID)已定義之情形時,藉由檢測接收之時刻與i(ID)之差、及解密所得之時間與j(ID)之差於ms單位之精度下不一致之情形,而進行認證之判定。具體而言,基於圖54,對由位置特定裝置20進行認證之程序進行說明。FIG. 54 is a flowchart showing the flow of the authentication process of the location specifying device 20 in encryption and decryption of the modified example. In this example, the time difference between the received time and the time difference between the decrypted time is used for authentication. That is, for a certain ID, the time of reception is obtained as i(ID), and the time obtained by decryption is obtained as j(ID). Then, when i(ID) and j(ID) have been defined, by detecting the difference between the time of reception and i(ID), and the difference between the decrypted time and j(ID), the accuracy is within ms In case of inconsistency, the certification will be determined. Specifically, based on FIG. 54, the procedure for authentication by the position specifying device 20 will be described.

首先,於步驟S5401中,位置特定裝置20自個人移動終端等認證對象之裝置接收ID及經加密之時間。其次,於步驟S5402中,位置特定裝置20根據傳送而來之ID檢索加密密鑰,將與該ID一併傳送而來之經加密之時間解密。繼而,於步驟S5403中,判定i(ID)、j(ID)是否已定義。此處,於尚未定義i(ID)、j(ID)之情形時,於步驟S5404中,於將接收之時刻定義為i(ID),將解密所得之時間定義為j(ID)之後,返回至步驟S5401並重複進行處理。即,重新接收ID或時刻。First, in step S5401, the location specifying device 20 receives the ID and the encrypted time from a device that is an authentication target such as a personal mobile terminal. Next, in step S5402, the location specifying device 20 retrieves the encryption key according to the transmitted ID, and decrypts the encrypted time transmitted together with the ID. Then, in step S5403, it is determined whether i(ID) and j(ID) have been defined. Here, when i(ID) and j(ID) have not been defined, in step S5404, after defining the receiving time as i(ID) and the decrypted time as j(ID), return Go to step S5401 and repeat the process. That is, the ID or time is received again.

另一方面,於步驟S5403中,於i(ID)、j(ID)已定義之情形時,進行至步驟S5405,判定接收之時刻與i(ID)、及解密所得之時間與j(ID)之各者於任意之設定值T秒以下是否一致。於一致之情形時,進行至步驟S5406,進行認證。另一方面,於不一致之情形時不進行認證,變為待機狀態。即,返回至步驟S5401重複進行處理。藉此,可進行認證。再者,亦可設為將反覆之次數限定於所需次數而停止處理之處理。或者,於在即時之位置特定等中連續之認證不可或缺之情形時,亦可無限地反覆進行處理。進而,如上所述,亦可於經過既定時間後將i(ID)、j(ID)初始化。藉此,變為每隔一定時間更新成為認證基準之i(ID)、j(ID),即便成功冒充一次,亦變得無法持久地繼續進行冒充,故能夠進一步提高安全性。 (冒充之偵測方法)On the other hand, in step S5403, when i(ID) and j(ID) are defined, proceed to step S5405 to determine the received time and i(ID), and the decrypted time and j(ID) Whether each of them is consistent under any set value T seconds or less. In the case of agreement, proceed to step S5406 for authentication. On the other hand, in the case of inconsistency, authentication is not performed and it becomes a standby state. That is, it returns to step S5401 to repeat the process. With this, authentication can be performed. Furthermore, it can also be set to limit the number of repetitions to the required number of times and stop the processing. Or, in situations where continuous authentication is indispensable in real-time location identification, etc., the processing can be repeated indefinitely. Furthermore, as described above, i(ID) and j(ID) may be initialized after a predetermined time has passed. As a result, i(ID) and j(ID), which are the authentication criteria, are updated at regular intervals. Even if the impersonation is successful once, impersonation cannot be continued for a long time, and security can be further improved. (Detection method of impersonation)

其次,對冒充之偵測方法進行說明。基本上,即便複製信號,亦若自接收起至傳送為止花費數ms以上,則藉由上述為止之認證方法無法進行認證,故不成問題,但有時不會花費數ms以上,因此對其對策進行說明。Secondly, the method of detecting impersonation will be explained. Basically, even if the signal is copied, if it takes more than a few ms from reception to transmission, it is not a problem because the authentication method mentioned above cannot be authenticated, but it may not take more than a few ms, so countermeasures Be explained.

圖55係表示加密、解密中之位置特定裝置20之認證冒充否認之處理流程的流程圖。於使用如圖53及圖54中所說明般之方法進行認證之情形時,當解密所得之時間較j(ID)更新時,可按照與迄今為止相同之程序。於圖55中,進行與圖53對應之說明,但亦可為與圖54對應之方法。但,於解密所得之時間較j(ID)不新之情形時、亦即於為複製了任一信號所得之信號之情形時,無法製作較j(ID)更新之信號,故存在ID之冒充,因此可藉由暫時停止ID來避免冒充。FIG. 55 is a flowchart showing the process flow of authentication and impersonation denial of the location specifying device 20 during encryption and decryption. In the case of authentication using the method described in Figure 53 and Figure 54, when the decrypted time is newer than j(ID), the same procedure as before can be followed. In FIG. 55, the description corresponding to FIG. 53 is made, but it may be a method corresponding to FIG. 54. However, when the decrypted time is not newer than j(ID), that is, when the signal obtained by copying any signal, it is impossible to create a newer signal than j(ID), so there is ID impersonation , So you can avoid impersonation by temporarily stopping the ID.

圖56及圖57表示選擇驗票機進行實驗之情形時之情況。左側所示之圖像為實驗中之圖像,右上所示之圖表示該認證之情況。於圖56中,可確認於左側所示之圖像之畫面裏側有使用者,於右上所示之圖中,於畫面裏側每數ms顯示有「○」,可進行位置特定認證。該顯示之機率係每一次為95%以上,藉由進行上述所說明之處理,而於移動10 cm左右之期間內可認證之機率可設為1-10-17 左右。同時,每一次進行誤辨識之機率為0.0%。同樣,於圖57中,已知可認證畫面近前。再者,關於反方向之利用者之通過,可藉由進行位置相反之操作而進行控制。Figure 56 and Figure 57 show the situation when the ticket inspection machine is selected for experiment. The image shown on the left is the image in the experiment, and the image shown on the upper right shows the status of the certification. In Figure 56, it can be confirmed that there is a user on the back side of the screen of the image shown on the left. In the figure shown on the upper right, "○" is displayed on the back side of the screen every few ms, and location specific authentication can be performed. The probability of this display is more than 95% each time. By performing the processing described above, the probability of authentication within a period of about 10 cm can be set to about 1-10 -17 . At the same time, the probability of misidentification every time is 0.0%. Similarly, in FIG. 57, the known authenticating screen is near. Furthermore, the passage of users in the opposite direction can be controlled by operating in the opposite direction.

本實施例中之驗票機中,可有用以對既有之票或IC卡進行讀取或處理之裝置,亦可有為此之網路連接,亦可與本實施例之系統協作而加以利用,還可作為獨立之支付方法進行處理。The ticket inspection machine in this embodiment can be used to read or process existing tickets or IC cards. It can also be connected to a network for this purpose, and can also be used in cooperation with the system of this embodiment. It can also be used as an independent payment method for processing.

再者,於本實施例中,使用具有複合性功能之智慧型手機終端等,故亦可防止交換IC卡等違規乘車。但,於利用時,例如需要針對每個終端等進行應用程式利用之許可證認證。於該情形時,利用者於更換終端等時,必須採取如自舊的終端停止許可證,且於新的終端可利用許可證般之手續。例如,可利用登錄網站等進行手續,亦可於在新的終端之相當之應用程式填入要輸入之ID及密碼等而登入時,自舊的終端之相當之應用程式自動地登出而變得無法利用。又,例如,藉由利用管理裝置等判斷個人移動終端10是否已入場,而即便與另一支付方法協作亦可防止違規乘車。Furthermore, in this embodiment, a smart phone terminal with multiple functions is used, so it is also possible to prevent illegal rides such as exchange of IC cards. However, at the time of use, for example, it is necessary to perform application license authentication for each terminal. In this case, when the user replaces the terminal, the user must take the procedure of stopping the license from the old terminal and using the license on the new terminal. For example, you can use the login website to perform the procedures, or when you log in by filling in the ID and password to be entered in the corresponding application of the new terminal, the corresponding application of the old terminal is automatically logged out and changed Too unusable. Also, for example, by using a management device or the like to determine whether the personal mobile terminal 10 has entered the venue, even if it cooperates with another payment method, illegal riding can be prevented.

再者,信號之發送或接收並不限定於BLE信標。例如藉由BLE通信、即BLE之發送與接收亦可實現。但,於該情形時,一部分程序不同。BLE通信可獲得與BLE信標相比可利用之通信頻帶更寬之優點。又,信號之種類亦不限於BLE,亦可適當利用Wi-Fi、RFID、IMES、ZigBee等既知之標準化之無線通信中所使用之信號。進而,並不限於電波信號,亦可利用超音波或光通信等介質。 [實施例2] (事後支付系統整體)Furthermore, the sending or receiving of signals is not limited to BLE beacons. For example, BLE communication, that is, BLE transmission and reception can also be realized. However, in this case, some procedures are different. BLE communication can obtain the advantage of a wider communication frequency band than BLE beacons. In addition, the type of signal is not limited to BLE, and the signals used in well-known standardized wireless communications such as Wi-Fi, RFID, IMES, ZigBee, etc. can also be appropriately used. Furthermore, it is not limited to radio wave signals, and media such as ultrasonic waves or optical communication may be used. [Example 2] (Overall payment system)

其次,作為實施例2,說明於便利商店或超商等經銷店中,利用者不取出個人移動終端10便能夠結算之例。再者,關於與實施例1相同之點,省略說明,僅對不同之點進行說明。Next, as the second embodiment, an example in which the user can settle the payment without taking out the personal mobile terminal 10 in a convenience store or a retail store such as a supermarket will be described. In addition, regarding the same points as in the first embodiment, the description will be omitted, and only the different points will be described.

先前,有藉由在便利商店或洋服店等經銷店中將RFID等設置於商品、或者藉由利用相機等進行監視,而知曉利用者欲購入之商品之合計金額之方法,但需要為了支付而利用收銀機或利用二維條碼等工夫。因此,藉由使用本實施例之位置特定認證技術,能夠提高方便性。Previously, there was a method of knowing the total amount of the product that the user wants to purchase by installing RFID or the like in a dealership such as a convenience store or a clothing store, or by monitoring with a camera, etc., but it is necessary to pay for it. Use cash registers or two-dimensional barcodes. Therefore, by using the location specific authentication technology of this embodiment, the convenience can be improved.

例如,經營者將管理終端50設置於便利商店,將位置特定裝置20設置於出口等處。於該位置特定裝置20中預先設置RFID標籤之讀取裝置。又,商品中預先安裝RFID標籤。於RFID標籤中記錄有金額資訊或關連之資訊。利用者通過管理伺服器系統30與經營者締結利用契約。藉此,利用者登錄何時可利用哪個位置特定裝置20。利用者一面保持個人移動終端10,一面拿著裝有所購買商品之袋通過經銷店出口之位置特定裝置20。位置特定裝置20一面進行利用者所攜帶之個人移動終端10之位置特定、認證,一面進行RFID標籤之讀取並計算合計金額,向利用者發出事後請求。For example, the operator installs the management terminal 50 in a convenience store, and installs the location specifying device 20 at an exit or the like. A reading device for the RFID tag is preset in the position specifying device 20. In addition, RFID tags are installed in the products in advance. The amount information or related information is recorded in the RFID tag. The user concludes a use contract with the operator through the management server system 30. By this, the user registers when and which location specifying device 20 is available. While holding the personal mobile terminal 10, the user passes the location specifying device 20 at the outlet of the dealership while holding the bag containing the purchased product. The location identification device 20 performs location identification and authentication of the personal mobile terminal 10 carried by the user, reads the RFID tag, calculates the total amount, and issues a post-request to the user.

藉此,利用者無需於收銀機處排隊,可直接將商品帶回。又,經營者可極度減少與利用者進行支付之往來。In this way, users do not need to line up at the cash register and can directly bring back the goods. In addition, the operator can minimize payment transactions with users.

再者,亦可代替RFID,而利用相機追蹤進入店鋪之利用者,並辨識放入至籃子或袋中之商品,求出該利用者應支付之合計金額。又,利用者亦可首先通過位置特定裝置20,然後於事後進行支付。Furthermore, instead of RFID, a camera can be used to track the user who enters the store, and to identify the goods placed in a basket or bag, and find the total amount that the user should pay. In addition, the user may pass through the location specifying device 20 first, and then pay later.

再者,亦可代替位置測定裝置20,而於收銀機等處僅設置Bluetooth以代用。於該情形時,雖然並非高精度之位置測定,但可實現先前程度之精度之位置測定精度,可使用本實施形態之認證技術進行本人認證。例如,亦可藉由使收銀機之畫面等上顯示結算、確定按鈕等,並由利用者按壓而進行結算。又,亦可於輸入4位數之數字等之後進行結算。於該情形時,收銀機裝置亦可為如包含平板等裝置及應用程式者。進而,商品之辨識並不限於利用RFID標籤或相機等辨識商品之構成,亦可為先前之條碼輸入等。於該情形時,有如下等優點,即,於經營者側,雖然需要於收銀機配置店員,但無需進行現金管理,又,對於利用者而言可獲得不費工夫便完成結算之方便性。Furthermore, it is also possible to replace the position measuring device 20, and only Bluetooth is installed in a cash register or the like. In this case, although it is not a high-precision position measurement, the position measurement accuracy of the previous level of accuracy can be achieved, and the authentication technology of this embodiment can be used for personal authentication. For example, the settlement and confirmation buttons may be displayed on the screen or the like of the cash register, and the user may press the buttons for settlement. In addition, you can also enter the 4-digit number after the settlement. In this case, the cash register device can also be one that includes devices such as tablets and applications. Furthermore, the identification of the product is not limited to the configuration of identifying the product using an RFID tag or camera, and can also be the previous barcode input. In this case, there are advantages such as that on the operator's side, although it is necessary to arrange a clerk in the cash register, there is no need to perform cash management, and the user can obtain the convenience of completing settlement without much effort.

又,亦可藉由在店鋪內設置BLE接收機,而設置如先前般之精度、或如本位置測定技術般之高精度之位置測定,從而利用顧客之智慧型手機所發送之BLE電波進行顧客等之動作路線分析。 [實施例3] (事後支付系統整體)(無線充電)In addition, you can also set up BLE receivers in the store, and set up position measurement with the same accuracy as before, or with the high-precision position measurement technology like this position measurement technology, so that the BLE radio waves sent by the customer's smartphone can be used for customers Analysis of the action route. [Example 3] (Overall post-payment system) (wireless charging)

於實施例3中,對無線充電時利用者可不取出個人移動終端10地加以利用之例進行說明。再者,關於與實施例1、2相同之點,省略說明,僅對不同之點進行說明。In the third embodiment, an example in which the user can use the personal mobile terminal 10 without taking out the personal mobile terminal 10 during wireless charging will be described. In addition, regarding the same points as the first and second embodiments, the description is omitted, and only the different points will be described.

研究開發了對智慧型手機終端等以無線之方式進行充電之方法,實際上已能夠進行充電。例如,Cota之無線充電系統可最大至10 m且以1 W進行充電。藉由將其於車站等設置複數個,可一面步行,一面對對應之智慧型手機進行充電。但是,若不特定出進行充電之人,則無法請求充電費用。因此,藉由使用本實施例之位置特定認證技術,而一面步行,一面對利用者進行特定、認證,利用者可進行事後支付。Research and development of wireless charging methods for smart phone terminals, etc., can actually be charged. For example, Cota's wireless charging system can charge up to 10 m and 1 W. By installing multiple devices in stations, etc., you can charge the corresponding smartphone while walking. However, if the person to be charged is not identified, the charging fee cannot be requested. Therefore, by using the location-specific authentication technology of this embodiment, while walking, the user can identify and authenticate the user, and the user can make payment afterwards.

例如,經營者預先將位置特定裝置20設置於無線充電系統周邊。又,利用者所安裝之個人移動終端10之位置特定、認證用之應用程式中具有測定充電量之功能。利用者事先經由管理伺服器系統30與經營者締結契約。利用者保持欲進行充電之個人移動終端10,移動至無線充電系統周邊。位置特定裝置20可藉由對利用者之個人移動終端10進行位置特定、認證,而確認支付能力,朝向該個人移動終端10發送無線充電系統用之電波並進行充電。個人移動終端10可通過位置特定、認證應用程式測定充電量,並計算充電量,且可通知給管理伺服器系統30。管理伺服器系統30可向利用者請求無線充電系統之利用費用。藉此,利用者與經營者之方便性均提高。 [實施例4] (事後支付系統整體)(得來速(drive-through))For example, the operator previously installs the location specifying device 20 around the wireless charging system. In addition, the location identification and authentication application of the personal mobile terminal 10 installed by the user has the function of measuring the charge amount. The user concludes a contract with the operator via the management server system 30 in advance. The user keeps the personal mobile terminal 10 that he wants to charge, and moves to the periphery of the wireless charging system. The location identifying device 20 can confirm the payment ability by identifying and authenticating the location of the personal mobile terminal 10 of the user, and send and charge the electric wave for the wireless charging system to the personal mobile terminal 10. The personal mobile terminal 10 can measure the charging capacity and calculate the charging capacity through a location-specific and authentication application, and can notify the management server system 30. The management server system 30 can request a user fee for the wireless charging system. As a result, the convenience for both users and operators is improved. [Example 4] (Overall post-payment system) (drive-through)

於實施例4中,說明於得來速中,利用者不取出現金、信用卡或個人移動終端10便可利用之例。再者,關於與實施例1~3相同之點,省略說明,僅對不同之點進行說明。In the fourth embodiment, an example in which the user can use the driver without taking out cash, credit card, or personal mobile terminal 10 will be described. In addition, regarding the same points as in the first to third embodiments, the description will be omitted, and only the different points will be described.

先前,於得來速中,於接收商品之後,必須利用現金、信用卡或個人移動終端10等進行支付,但需要支付之工夫。因此,藉由使用本實施例之位置特定認證技術,可待在車內,由經營者對利用者進行特定、認證,而利用者可進行事後支付。In the past, in Driveway, after receiving the goods, payment must be made by cash, credit card, or personal mobile terminal 10, etc., but payment is required. Therefore, by using the location-specific authentication technology of this embodiment, it is possible to stay in the car, the operator can identify and authenticate the user, and the user can make payment afterwards.

例如,預先將位置特定裝置20設置於得來速。利用者事先經由管理伺服器系統30與經營者締結契約。經營者係於利用者之下單時或商品交付時使用位置特定裝置20進行利用者之個人移動終端10之位置特定、認證,並請求費用。藉此,利用者亦減少用以支付之工夫,故方便性提高。又,經營者亦減少用以支付之工夫,故方便性提高。 再者,於實施形態4中,亦可代替位置測定裝置20而僅設置Bluetooth進行代用。該情形時之構成可利用與上述實施形態2相同者,省略詳細說明。 [實施例5] (事後支付系統+認證)(車之辨識與購物(shopping)之協作)For example, the position specifying device 20 is set to drive-thru in advance. The user concludes a contract with the operator via the management server system 30 in advance. The operator uses the location specifying device 20 to perform location identification and authentication of the user's personal mobile terminal 10 when the user places an order or when the product is delivered, and requests fees. By this, the user also reduces the time for payment, so the convenience is improved. In addition, the operator also reduces the time spent on payment, so convenience is improved. Furthermore, in the fourth embodiment, instead of the position measuring device 20, only Bluetooth may be installed instead. In this case, the configuration can be the same as that of the second embodiment described above, and detailed description is omitted. [Example 5] (Post-payment system + authentication) (Cooperation between car identification and shopping)

於實施例5中,對如下系統例進行說明,即,當駕車停在附屬停車場進行購物時,利用者不取出現金、信用卡或個人移動終端10地進行購物,並且即便於停車時不接收所發行之停車卡、或於購物時於收銀機處不交遞該停車卡,且於出庫時不利用出庫閘機機械等地讀入該停車卡,亦可出庫。再者,關於與實施例1~4相同之點,省略說明,僅對不同之點進行說明。In the fifth embodiment, the following system example will be described. That is, when the car is parked in the attached parking lot for shopping, the user does not take out cash, credit card or personal mobile terminal 10 for shopping, and even if the issued is not received when parking If you do not hand over the parking card at the cash register when shopping, and do not use the exit gate machinery to read in the parking card when leaving the warehouse, you can also leave the warehouse. In addition, regarding the same points as in the first to fourth embodiments, the description will be omitted, and only the different points will be described.

先前,有如下系統,即,於進行購物時,藉由在收銀機處交遞停車卡而根據購物之合計金額將停車費用打折。又,藉由在開進停車場時發行停車卡,同時拍攝車之車牌,而於開出停車場時不利用出庫閘機讀入停車卡地便可自動地打開閘機而出庫。然而,於該系統中,需要於入庫時接收停車卡且於購物時每次於收銀機處出示停車卡等各種工夫。Previously, there was a system in which when shopping, the parking fee was discounted based on the total amount of shopping by handing over the parking card at the cash register. In addition, by issuing a parking card when entering the parking lot and taking pictures of the license plate of the car at the same time, it can automatically open the gate and leave the garage without using the exit gate to read the parking card when exiting the parking lot. However, in this system, various efforts such as receiving the parking card when entering the garage and showing the parking card at the cash register every time during shopping are required.

相對於此,藉由使用本實施例之位置特定認證技術,而變得未必需要於入庫時接受停車卡、或於購物時於收銀機處無需支付之工夫、或無需同時出示停車卡等,利用者可自入庫至出庫無意識地利用停車卡或支付。又,經營者亦變得無需於收銀機處之支付作業及停車卡之確認作業。In contrast, by using the location-specific authentication technology of this embodiment, it becomes unnecessary to accept a parking card when entering a warehouse, or to pay at the cash register when shopping, or to present the parking card at the same time. Visitors can unconsciously use the parking card or pay from the entry to the exit. In addition, the operator does not need to pay at the cash register and check the parking card.

例如,將位置測定裝置20預先設置於入庫、出庫閘機、各店鋪之收銀機。利用者事先經由管理伺服器系統30與經營者締結契約。經營者於利用者之入庫出庫時及收銀機處之結算時,使用位置測定裝置20進行利用者之個人移動終端10之位置測定、認證,請求利用費用,並且取消入庫出庫時之停車卡之授受。藉此,利用者與經營者均減少金錢或停車卡之授受或收銀機處之處理,故方便性提高。For example, the position measuring device 20 is preliminarily installed in the warehouse entry and exit gates, and the cash register of each store. The user concludes a contract with the operator via the management server system 30 in advance. The operator uses the location measuring device 20 to measure and authenticate the location of the user’s personal mobile terminal 10 at the time of the user’s warehousing and exit and the settlement at the cash register, requesting usage fees, and canceling the authorization and acceptance of the parking card when entering and leaving the warehouse. . In this way, both the user and the operator can reduce the granting and receiving of money or parking cards or the processing at the cash register, so the convenience is improved.

再者,於實施形態5中,亦可代替位置測定裝置20而於收銀機等僅設置Bluetooth進行代用。該情形時之構成可利用與上述實施形態2等相同者,省略詳細說明。 [實施例6] (事後支付系統整體)(公共汽車、出租車之支付)Furthermore, in the fifth embodiment, instead of the position measuring device 20, only Bluetooth may be installed in a cash register or the like to substitute. In this case, the same structure as in the second embodiment described above can be used, and the detailed description is omitted. [Example 6] (Overall post-payment system) (payment for buses and taxis)

於實施例6中,說明於公共汽車、出租車之支付中利用者不取出現金、信用卡或個人移動終端10便可利用之例。再者,關於與實施例1~5相同之點,省略說明,僅對不同之點進行說明。In the sixth embodiment, an example in which the user can use the payment in the bus or taxi without taking out cash, credit card or personal mobile terminal 10 is described. In addition, regarding the same points as in the first to fifth embodiments, the description is omitted, and only the different points will be described.

先前,公共汽車或出租車係於下車時必須利用現金、信用卡、IC卡或個人移動終端10等進行支付,但需要支付之工夫。因此,藉由使用本實施例之位置特定認證技術,能夠提高方便性。Previously, when getting off the bus or taxi, it was necessary to use cash, credit card, IC card or personal mobile terminal 10 to make payment, but payment was required. Therefore, by using the location specific authentication technology of this embodiment, the convenience can be improved.

例如,經營者預先將管理終端50設置於公共汽車之主要事業場等,且於公共汽車內之上下車場所預先設置位置特定裝置20。利用者於上車時通過位置特定裝置20,位置特定裝置20記錄利用開始場所。當利用者於下車時通過公共汽車內之閘機時,位置特定裝置20藉由進行位置特定、認證,而使攜帶個人移動終端10之利用者通過,亦記錄下車場所。經營者通過事業場之管理終端50將該資料通知給管理伺服器系統30。管理伺服器系統30可根據每個利用者之利用記錄及費用表向利用者事後請求公共汽車之利用費用。再者,亦可與通知公共汽車之上下之應用程式協作地根據GPS資訊等將其上下車時機通知給利用者。For example, the operator pre-installs the management terminal 50 in the main business field of the bus, etc., and pre-installs the position specifying device 20 in the boarding and disembarking places in the bus. When the user gets on the vehicle, the location specifying device 20 records the use start location. When the user passes through the gates in the bus when getting off the bus, the location specifying device 20 allows the user carrying the personal mobile terminal 10 to pass through by performing location identification and authentication, and also records the location of the bus. The operator notifies the information to the management server system 30 through the management terminal 50 of the business site. The management server system 30 can request the user for the use fee of the bus afterwards from the user based on the use record and fee schedule of each user. In addition, the user can also be notified of the timing of getting on and off the bus based on GPS information, etc., in cooperation with an application that notifies the bus up and down.

又,於出租車之情形時,經營者於車內之駕駛員座位設置管理終端50,且以能夠特定出車內之乘客座位之位置之方式設置位置特定裝置20。利用者於上車時通過位置特定裝置20,位置特定裝置20記錄利用開始場所、時間。於利用者下車時,駕駛員於出租車內進行請求,於有複數個利用者之情形時,可由欲被請求之利用者進行支付。駕駛員可使用管理終端50確認位置特定、認證結果,並自處於欲被請求之支付者之座位之個人移動終端10進行請求。In addition, in the case of a taxi, the operator installs the management terminal 50 in the driver's seat in the car, and installs the position specifying device 20 in a manner that can specify the position of the passenger seat in the car. When the user gets on the vehicle, the location specifying device 20 records the use start location and time. When the user gets off the car, the driver makes a request in the taxi, and when there are multiple users, the user who wants to be requested can pay. The driver can use the management terminal 50 to confirm the location identification and the authentication result, and make a request from the personal mobile terminal 10 in the seat of the payer to be requested.

再者,亦可代替位置測定裝置20而設置智慧型手機等進行代用。於該情形時,雖然無法進行高精度之位置測定本身,但可實現先前程度之精度之位置測定精度,由於使用本專利技術僅可進行本人認證,故亦可藉由使智慧型手機之畫面等顯示如結算、確定按鈕等之類者,且使利用者按壓而進行結算,亦可視情況於輸入4位數之數字等之後進行結算。In addition, instead of the position measuring device 20, a smartphone or the like may be installed instead. In this case, although the high-precision position measurement itself cannot be performed, the position measurement accuracy of the previous level of accuracy can be achieved. Since the use of this patented technology can only perform identity authentication, it can also be used by the screen of the smart phone. Displays such as settlement, confirmation buttons, etc., and allows the user to press it for settlement, and settlement may be performed after inputting a 4-digit number, etc., depending on the situation.

再者,支付請求金額係事先設定有費用表,可設為根據乘車距離或乘車時間而自動地請求,亦可於請求時設定特別費用處理等。 [實施例7] (事後支付系統整體)(利用智慧型手機支付停車場中之閘鎖(gate lock))In addition, the payment request amount is set in advance with a fee schedule, which can be set to be automatically requested according to the travel distance or travel time, or special fee processing can be set at the time of request. [Example 7] (Overall post-payment system) (Use smartphone to pay for gate locks in parking lots)

實施例7係對在停車場中之支付中利用者可不費支付工夫地加以利用之例進行說明。再者,關於與實施例1~6相同之點,省略說明,僅對不同之點進行說明。The seventh embodiment explains an example in which the user can use the payment in a parking lot without paying any effort. In addition, regarding the same points as in the first to sixth embodiments, the description will be omitted, and only the different points will be described.

先前,於停車場等中,利用者需要事先解除自己之車之鎖定、或於離開停車場時進行支付,而要花費工夫。因此,藉由使用本實施例之位置特定認證技術,能夠提高方便性。Previously, in parking lots and the like, users had to unlock their car in advance or pay when leaving the parking lot, which took time. Therefore, by using the location specific authentication technology of this embodiment, the convenience can be improved.

例如,將位置特定裝置20預先設置於各停車場空間之合適位置。利用者自車內使用個人移動終端10,自應用程式等申請自己之車之鎖定解除。位置特定裝置20可藉由對利用者之個人移動終端10進行位置特定、認證,而解除相應位置之利用者之車之鎖定。For example, the position specifying device 20 is pre-installed in a suitable position of each parking lot space. The user uses the personal mobile terminal 10 in his car to apply for unlocking of his car from an application. The location identification device 20 can unlock the user's car at the corresponding location by identifying and authenticating the location of the user's personal mobile terminal 10.

或者,將位置特定裝置20預先設置於停車場之出庫位置。於利用者乘坐於車內地離開停車場之情形時,位置特定裝置20藉由對利用者之個人移動終端10進行位置特定、認證而准許出庫,並抬起出庫場所之桿。Alternatively, the location specifying device 20 is preset at the exit location of the parking lot. When the user leaves the parking lot while riding in the vehicle, the location specifying device 20 allows the user to leave the warehouse by identifying and authenticating the location of the user's personal mobile terminal 10, and lifts the lever of the leaving place.

經營者可於事後請求由信用卡進行支付。 [實施例8] (事先支付系統整體)(活動(event)或電影院等之事先事後購入後之系統、滑雪纜車(ski lift)、乘船)The operator can request payment by credit card after the fact. [Example 8] (Pre-payment system as a whole) (Systems that are purchased in advance and afterwards such as events or movie theaters, ski lifts, and boat rides)

於實施例8中,對將事先購入之票券確認自動化之例進行說明。再者,關於與實施例1~7相同之點,省略說明,僅對不同之點進行說明。In Embodiment 8, an example of automating confirmation of tickets purchased in advance will be described. In addition, regarding the same points as in the first to seventh embodiments, the description is omitted, and only the different points will be described.

先前,於購入電影院或戶外音樂節(festival)等票券後,印刷該票券,又,由負責人確認該票券、或於進出場時機械地進行確認,為此容易花費工夫,其結果,產生隊伍,而花費時間。因此,藉由使用本實施例之位置特定認證技術,能夠提高方便性。Previously, after purchasing a ticket for a movie theater or an outdoor music festival (festival), the ticket was printed, and the ticket was confirmed by the person in charge, or the ticket was confirmed mechanically when entering and leaving the venue. This was easy to spend time and effort. , Generating teams, and taking time. Therefore, by using the location specific authentication technology of this embodiment, the convenience can be improved.

例如,將位置特定裝置20設置於電影院、遊樂園、活動會場、滑雪纜車之入場閘機、或船之上下場所等。如圖58般,利用者利用電影院、遊樂園、活動、滑雪公司或船航運公司等之網站、或代理店網站等,事先進行電影院、遊樂園、活動、滑雪纜車利用、乘船之預約,利用二維條碼將預約資訊轉移至所安裝之位置特定認證應用程式、或者於自經營者之預約應用程式進行預約之後自動地將預約資訊轉移至所安裝之位置特定認證應用程式。如圖59般,利用者藉由使用個人移動終端10於位置特定裝置20接受位置特定、認證,而一面通過,一面支付。再者,亦可事後支付事先由經營者所設定之費用。For example, the position specifying device 20 is installed in a movie theater, an amusement park, an event venue, an entrance gate of a ski lift, or a place above and below a ship. As shown in Figure 58, users use the websites of movie theaters, amusement parks, events, ski companies, shipping companies, etc., or agency websites, etc., to make advance reservations for movie theaters, amusement parks, events, ski lift use, and boat rides. The two-dimensional bar code transfers the appointment information to the installed location-specific authentication application, or automatically transfers the appointment information to the installed location-specific authentication application after making an appointment from the operator’s appointment application. As shown in FIG. 59, the user receives location identification and authentication at the location identification device 20 by using the personal mobile terminal 10, and pays while passing through. Furthermore, it is also possible to pay afterwards the fee set by the operator in advance.

又,於事先利用既有之網際網路或店鋪等之支付方法進行支付之後,利用二維條碼或個人移動終端10之位置資訊認證應用程式之自動啟動等方法,將該已支付之資訊轉移至該個人移動終端10之位置資訊認證應用程式。接收到資訊之個人移動終端10向管理伺服器系統30傳送該資訊。管理伺服器系統30將該資訊與經營公司進行對照。經營者用管理系統40進行對照確認而確認之後,產生自現在起被利用者准許之位置特定裝置20之場所或利用期間等,並將該資訊傳送至管理伺服器系統30。 [實施例9] (事先支付系統整體)(旅館)In addition, after the payment is made in advance using an existing payment method such as the Internet or a store, the payment information is transferred to the QR code or the automatic activation of the location information authentication application of the personal mobile terminal 10 The location information authentication application of the personal mobile terminal 10. The personal mobile terminal 10 that has received the information transmits the information to the management server system 30. The management server system 30 compares the information with the operating company. The operator uses the management system 40 to check and confirm, and then generates the location or use period of the location specifying device 20 approved by the user from now on, and transmits the information to the management server system 30. [Example 9] (Overall advance payment system) (hotel)

於實施例9中,對將事先進行旅館預約之房間之鎖自動地開鎖之例進行說明。再者,關於與實施例1~8相同之點省略說明,僅對不同之點進行說明。In Embodiment 9, an example of automatically unlocking the lock of a room reserved for a hotel in advance will be described. In addition, the description of the same points as in the first to eighth embodiments is omitted, and only the different points will be described.

先前,即便預約了旅館,當利用旅館時,亦需要登錄。即便自動化亦無法省略之該登錄必須藉由再次填入個人資訊或進行支付而進行本人確認。因此,藉由使用本實施例之位置特定認證技術,能夠提高方便性。Previously, even if you booked a hotel, you had to log in when using the hotel. The registration, which cannot be omitted even if it is automated, must be confirmed by filling in personal information again or making payment. Therefore, by using the location specific authentication technology of this embodiment, the convenience can be improved.

例如,作為經營者之旅館將位置特定裝置20設置於旅館之各客房入口,與上鎖系統協作。利用者利用旅館之網站或代理店網站等進行旅館之預約,並利用二維條碼將預約資訊轉移至所安裝之位置特定認證應用程式、或自旅館之預約應用程式於預約後自動地將預約資訊轉移至所安裝之位置特定認證應用程式。利用者藉由使用個人移動終端10接近設置於所預約之旅館之客房入口之位置特定裝置20,而藉由接受位置特定、認證而通過,並且於位置特定裝置20之場所及時間相符之情形時,由位置特定裝置20將門開鎖。支付既可於事先之預約時付款,亦可於利用結束後等之事後支付。該支付既可於本系統中利用,亦可利用其他支付系統。For example, a hotel as an operator installs the location specifying device 20 at the entrance of each guest room of the hotel to cooperate with the locking system. The user uses the hotel’s website or agency website to make a hotel reservation, and uses the QR code to transfer the reservation information to the installed location-specific authentication application, or from the hotel’s reservation application to automatically transfer the reservation information after the reservation. Transfer to the installed location-specific authentication application. The user uses the personal mobile terminal 10 to approach the location specifying device 20 installed at the entrance of the guest room of the reserved hotel, and passes by receiving location specification and authentication, and when the location and time of the location specifying device 20 match , The door is unlocked by the position specifying device 20. Payment can be made at the time of reservation in advance, or after the end of the use. The payment can be used in this system or other payment systems.

再者,位置資訊認證終端及管理終端50將已開鎖之資訊傳送至管理伺服器系統30。管理伺服器系統30通過經營者用管理系統40將該資訊通知給經營公司。Furthermore, the location information authentication terminal and the management terminal 50 send the unlocked information to the management server system 30. The management server system 30 notifies the management company of this information through the management system 40 for the manager.

藉此,亦可省去先前所需之將鑰匙寄存於服務台等之工夫。 [實施例10] (包含支付之系統)(將認證系統、位置特定裝置20設置於高級公寓、辦公室或會議室等之需要進出房間管理之出入場所、或車門)In this way, the labor of depositing the keys at the service counter that was previously required can also be eliminated. [Example 10] (Including payment systems) (Install the authentication system and location specific device 20 in high-end apartments, offices or conference rooms, etc., which require access to room management, or car doors)

於實施例10中,說明藉由對個人移動終端10進行認證而將所附隨之行為自動化之例。再者,關於與實施例1~9相同之點,省略說明,僅對不同之點進行說明。In Embodiment 10, an example of automating the accompanying behavior by authenticating the personal mobile terminal 10 is described. In addition, regarding the same points as in the first to 9th embodiments, the description will be omitted, and only the different points will be described.

先前,於進出房間管理等中,個人認證係觸碰IC卡或進行指紋認證等,花費工夫。因此,藉由使用本實施例之位置特定認證技術,能夠提高方便性。因此,藉由使用本實施例之位置特定認證技術,能夠提高方便性。Previously, in the management of room entry and exit, personal authentication was done by touching an IC card or performing fingerprint authentication, which took time. Therefore, by using the location specific authentication technology of this embodiment, the convenience can be improved. Therefore, by using the location specific authentication technology of this embodiment, the convenience can be improved.

例如,經營者預先將位置特定裝置20設置於高級公寓、辦公室或會議室等之需要進出房間管理之出入場所、或車門。又,經營者預先設定利用者可於哪個期間利用位置特定裝置20之哪個場所。利用者藉由使用個人移動終端10利用位置特定裝置20受到位置特定、認證,而變得能夠於被准許之場所、期間內進出房間。For example, the operator preliminarily installs the location specifying device 20 in a high-end apartment, an office, a conference room, etc., an entry and exit place that requires room management, or a car door. In addition, the operator sets in advance which place of the location specifying device 20 during which period the user can use. By using the personal mobile terminal 10 and using the location specifying device 20 to receive location identification and authentication, the user becomes able to enter and exit the room in the permitted place and period.

位置特定裝置20及管理終端50可經由管理伺服器系統30而將進出房間之資訊通知給經營者用管理系統40。藉此,例如,更快速地解除公寓之自動鎖(autolock)解除等、或節省工夫。又,可進行公司職員之考勤管理。又,可用作會議室預約等。又,可設定安全區域。再者,亦可設定能夠隨時間變更之安全區域。The location specifying device 20 and the management terminal 50 can notify the management system 40 for the operator of the information of entering and leaving the room via the management server system 30. In this way, for example, the automatic lock release of the apartment can be released more quickly, or time can be saved. In addition, the attendance management of company employees can be performed. Also, it can be used for conference room reservations. In addition, a safe area can be set. Furthermore, it is also possible to set a safe area that can be changed over time.

又,可不藉由觸碰車門、或取消於遠處解鎖之作業,而僅藉由靠近來開鎖。於該情形時,除了可變更與乘坐於駕駛員座位之使用者對應之後視鏡或座位之角度以外,還可變更應發送之解說等,可改善服務(hospitality)。尤其是可大幅度削減共享汽車(sharing car)等中之認證之工夫。In addition, it is possible to unlock the vehicle only by approaching instead of touching the door or canceling the operation of unlocking from a distance. In this case, in addition to changing the angle of the rearview mirror or the seat corresponding to the user sitting in the driver's seat, the commentary to be sent can also be changed, which can improve hospitality. In particular, it can significantly reduce the time required for certification in sharing cars.

進而,於以上之系統中,亦可將認證與位置特定分離。即,亦可構築僅進行位置特定而不進行認證之系統、或相反僅進行認證而不進行位置特定之系統。 [實施例11] (包含支付之認證系統)(認證系統、PC(Personal Computer,個人電腦)、ATM(Automated Teller Machine,自動櫃員機))Furthermore, in the above system, authentication and location identification can also be separated. That is, it is also possible to construct a system that only performs location identification without performing authentication, or conversely, a system that only performs authentication without performing location specifying. [Example 11] (Including payment authentication system) (Authentication system, PC (Personal Computer, personal computer), ATM (Automated Teller Machine, automatic teller machine))

於實施例11中,對藉由認證個人移動終端10而進一步簡化本人認證之例進行說明。再者,關於與實施例1~10相同之點,省略說明,僅對不同之點進行說明。In Embodiment 11, an example of further simplifying personal authentication by authenticating the personal mobile terminal 10 will be described. In addition, regarding the same points as those of the first to tenth embodiments, the description will be omitted, and only the different points will be described.

先前,於ATM等中,本人認證需要輸入密碼或進行靜脈認證等工夫。因此,藉由使用本實施例之位置特定認證技術,能夠提高方便性。Previously, in ATMs, etc., personal authentication required work such as entering a password or performing vein authentication. Therefore, by using the location specific authentication technology of this embodiment, the convenience can be improved.

例如,預先於PC或ATM等需要本人認證之裝置中設置位置特定裝置20。又,本人或經營者進行本人認證之後設定利用者可於位置特定裝置20之哪個場所、哪個期間內加以利用。利用者藉由使用個人移動終端10於位置特定裝置20接受位置特定、認證,而於被准許之場所、期間內接受本人認證,從而可僅藉由接近PC而登入、或可完成ATM之操作。於PC中可省去網上之購入等所需要之信用卡資訊之輸入等地進行購入、或於ATM中可提出錢。再者,於ATM中,亦可根據利用者變更發送之解說。For example, the location specifying device 20 is installed in a device that requires personal authentication such as a PC or ATM in advance. In addition, after the person or the operator has authenticated the person, it is set in which place and period of the location specifying device 20 the user can use it. The user receives location identification and authentication at the location identification device 20 using the personal mobile terminal 10, and accepts personal authentication at the permitted place and period, so that the user can log in by approaching the PC or complete ATM operations. In PC, you can save the input of credit card information required for online purchases, etc., to purchase, or to withdraw money in ATM. Furthermore, in ATM, the comment sent can be changed according to the user.

又,於先前之面部認證中,由於存在誤辨識等問題,故藉由單獨技術若為更多之人數則存在無法應對之情形,必須與電話號碼之輸入或IC卡之辨識等花費工夫之處理組合。相對於此,於本實施形態中,藉由與個人移動終端10組合,可不費工夫地實施面部認證,於入境審查或醫院等中之受理等中可不費工夫地加以利用。如此,面部認證技術或指紋認證技術等於一個終端中可與複數個保全措施(security)組合。 [實施例12] (僅位置特定)(自主行駛機器人(無人機(drone)等)、室內地圖、座位指定、(三角測量))In addition, in the previous facial authentication, due to the misrecognition and other problems, if a larger number of people can not be dealt with by a single technology, it must be handled with the input of the phone number or the identification of the IC card. combination. On the other hand, in the present embodiment, by combining with the personal mobile terminal 10, facial authentication can be performed without any effort, and it can be used without any effort for immigration inspection, acceptance in hospitals, etc. In this way, facial authentication technology or fingerprint authentication technology can be combined with multiple security measures (security) in one terminal. [Example 12] (Location specific only) (Autonomous driving robot (drone, etc.), indoor map, seat assignment, (triangulation))

於實施例12中,說明藉由對個人移動終端10進行認證而使附隨之行為自動化之例。再者,關於與實施例1~11相同之點,省略說明,僅對不同之點進行說明。In Embodiment 12, an example of automating the accompanying behavior by authenticating the personal mobile terminal 10 is described. In addition, regarding the same points as in the first to 11 embodiments, the description will be omitted, and only the different points will be described.

先前,無人機等自主行駛機器人為了特定出自己之位置,進行使用GPS來測定、或使用PDR等而進行推定,但精度不怎麼高。又,根據周圍之圖像進行三角測定而進行位置推定,但必須準備複數台相機,未必簡易。因此,藉由使用本實施例之位置特定技術,能夠提高方便性。因此,藉由使用本實施例之位置特定技術,能夠提高方便性。Previously, autonomous driving robots such as unmanned aerial vehicles used GPS to measure or use PDR in order to identify their position, but the accuracy was not very high. In addition, the position is estimated by triangulation based on the surrounding images, but multiple cameras must be prepared, which is not necessarily simple. Therefore, by using the location specifying technology of this embodiment, the convenience can be improved. Therefore, by using the location specifying technology of this embodiment, the convenience can be improved.

圖25表示將智慧型手機終端等設為BLE接收機且將複數個BLE發送機配置於3處之情形之例。例如,如圖25所示,於欲特定出位置之空間中,於複數處設置BLE發送機,而不限於3處,且於每一處設置複數台。藉由如此設置,而BLE接收機可於每一處接收複數台BLE發送機之電波。藉由將該電波之電波強度平均化,可獲得隨時間穩定之電波強度。因此,若以三維資訊知曉複數處之BLE發送機之設置位置,則可以3點測定之要領於平面上或空間上知曉BLE接收機自身之位置。Fig. 25 shows an example of a case where a smart phone terminal or the like is set as a BLE receiver and a plurality of BLE transmitters are arranged in three places. For example, as shown in Fig. 25, in the space where the location is to be specified, BLE transmitters are set at multiple locations, not limited to three, and multiple BLE transmitters are set at each location. With this setting, the BLE receiver can receive the radio waves of multiple BLE transmitters everywhere. By averaging the intensity of the electric wave, a stable electric wave intensity over time can be obtained. Therefore, if three-dimensional information is used to know the position of the BLE transmitter in a plurality of locations, the position of the BLE receiver itself can be known on the plane or in space by the method of 3-point measurement.

圖24表示將智慧型手機終端等設為BLE接收機且將複數個BLE發送機配置於2處之情形之例。或者,如圖24所示,將複數個BLE發送機設置於複數處,而不限於2處,藉由如圖27般選擇某2處之BLE發送機,針對BLE接收機之存在區域獲得如例如10 cm等變得足夠小般之強度差,而可特定出自身之位置。藉此,藉由安裝BLE接收機,可容易地特定出位置。FIG. 24 shows an example of a case where a smart phone terminal or the like is set as a BLE receiver and a plurality of BLE transmitters are arranged in two places. Or, as shown in Fig. 24, a plurality of BLE transmitters are set at plural places, not limited to two places. By selecting two BLE transmitters as shown in Fig. 27, the existence area of the BLE receiver is obtained as for example The strength difference is as small as 10 cm, etc., and its position can be specified. In this way, by installing the BLE receiver, the location can be easily specified.

如上所述,根據本發明之實施形態,於收銀機或驗票機處,利用者可不取出智慧型手機終端等地進行支付。尤其是,藉由對攜帶智慧型手機終端等地移動之人逐個高速地且高精度地進行捕捉、區分,以非觸碰之方式不費工夫地且安全地進行個人認證,可不觸碰地將認證所附隨之行為自動化。又,本發明之通常之且特定之態樣可使用系統、方法及電腦程式而安裝,或者可使用系統、方法及電腦程式之組合而實現。 [實施例13] (本人認證及位置測定)(活動入場)As described above, according to the embodiment of the present invention, at the cash register or the ticket inspection machine, the user can make payment without taking out the smartphone terminal or the like. In particular, by quickly and accurately capturing and distinguishing people moving in places such as smartphones, etc., personal authentication can be carried out in a non-touching manner, effortlessly and securely, and it is possible to perform personal authentication without touching The actions attached to the certification are automated. Moreover, the general and specific aspects of the present invention can be installed using the system, method, and computer program, or can be implemented using a combination of the system, method, and computer program. [Example 13] (Identification and location determination) (Entry to the event)

於實施例13中,說明藉由對個人移動終端10進行認證而將活動受理自動化之例。再者,關於與實施例1~12相同之點,省略說明,僅對不同點進行說明。In Embodiment 13, an example of automating event acceptance by authenticating the personal mobile terminal 10 is described. In addition, regarding the same points as in the first to 12 embodiments, the description is omitted, and only the different points will be described.

先前,研討會、展覽會或說明會等商業研討會、電影院、戲劇或音樂會等文化活動、或者遊樂園或棒球場等大型商業設施等中之入場花費時間。其係自印刷有參加者清單之紙找出並受理要花費時間、參加者為了顯示QR碼花費時間、撕下紙票券要花費時間、使入場閘機讀入QR碼或放入紙票券要花費時間,於準備方面對於參加者及主辦方而言必須騰出工夫或人員、時間。因此,藉由使用本實施例之本人認證技術或位置測定技術,能夠提高方便性。Previously, it took time for admission to commercial seminars such as seminars, exhibitions or briefings, cultural events such as movie theaters, theaters or concerts, or large commercial facilities such as amusement parks or baseball stadiums. It takes time to find and accept from the paper with the list of participants, time for participants to display the QR code, time to tear off the paper ticket, and the entrance gate to read the QR code or insert the paper ticket It takes time, and the participants and organizers must spare time, personnel, and time in preparation. Therefore, it is possible to improve convenience by using the person authentication technology or the location measurement technology of this embodiment.

例如,於商業研討會或文化活動之接待處預先設置BLE接收機附帶之平板等。於利用者之智慧型手機預先安裝活動參加用應用程式,於平板中預先安裝活動受理應用程式。若有BLE接收機,則能夠實現先前程度之精度之位置測定。不管是欲免費還是付費參加活動之參加者預先安裝參加者用應用程式,且預先完成活動參加登錄。藉此,可於當日參加活動時根據接近之參加者依序於該平板等中顯示姓名等。例如,僅藉由使利用者報出姓名,便可由受理負責人自所顯示之極少數之活動參加者之姓名中簡單地找出並完成受理。又,於藉由觸碰參加者姓名而進行受理處理之情形時,可僅繼續顯示未受理之參加者。藉此,與先前相比可更快速地完成受理,故可減少受理負責人之人數。或者,於免費之活動等無需結算功能或認證功能之情形時,亦可構成為藉由使參加者自身觸碰受理用之平板所顯示之自身之姓名等而刪除從而完成受理。於該情形時,設為視需要呼叫負責人等,可進一步減少受理負責人。For example, pre-install the tablet attached to the BLE receiver at the reception of a business seminar or cultural event. Pre-install the event participation application on the user’s smartphone, and pre-install the event acceptance application on the tablet. If there is a BLE receiver, the position measurement with the previous degree of accuracy can be achieved. Participants, regardless of whether they want to participate in the event for free or for a fee, pre-install the participant application and complete the event registration in advance. In this way, it is possible to sequentially display names and the like on the tablet etc. according to the approaching participants when participating in the event on that day. For example, just by asking the user to report the name, the person in charge of acceptance can simply find out and complete the acceptance from the few displayed names of event participants. In addition, when the acceptance process is performed by touching the name of the participant, only the unaccepted participants can continue to be displayed. As a result, acceptance can be completed more quickly than before, so the number of persons in charge of acceptance can be reduced. Or, in situations where the settlement function or authentication function is not required for free events, etc., it can also be configured to complete the acceptance by making the participant touch his or her name displayed on the tablet for acceptance. In this case, it is set to call the person in charge as necessary, which can further reduce the number of persons in charge.

再者,於收費之情形時,既可於當日參加之前進行結算,亦可登錄信用卡等而於當日參加之時點進行結算,亦可日後請求。In addition, in the case of charges, you can settle before the participation on the day, or you can log in to the credit card to make the payment at the time of the participation on the day, or you can request it later.

又,亦可於展覽會、大型文化活動或大型商業設施等預先設置位置測定裝置20。藉此,於如上所述之方法中,不管是免費還是收費均自動地實現參加者之本人認證及位置測定,故可以無人之方式應對。 [產業上之可利用性]In addition, the position measuring device 20 may be installed in advance in exhibitions, large-scale cultural events, large-scale commercial facilities, and the like. As a result, in the above-mentioned method, the identity authentication and location measurement of the participant are automatically realized regardless of whether it is free or paid, so it can be handled in an unmanned manner. [Industrial availability]

根據本發明之實施形態或實施例之位置特定系統、位置特定裝置、位置特定方法、位置特定程式及電腦可讀取之記錄媒體及記錄之機器,例如可較佳地用於在收銀機或驗票機處利用者可不取出智慧型手機終端等地進行支付之系統。The location specifying system, location specifying device, location specifying method, location specifying program, computer readable recording medium and recording machine according to the embodiment or embodiment of the present invention, for example, can be preferably used in cash register or inspection A system where users of ticket machines can make payments without taking out their smartphone terminals.

10:個人移動終端 11:個人終端側發送部 11A:個人終端側通信部 12:個人終端側控制部 13:個人終端側記憶部 14:個人終端側時刻部 15:個人終端側輸入輸出部 16:個人終端側運算部 20:位置特定裝置 20B:自動驗票機 21:位置特定側接收部 21A:位置特定側通信部 22:第一位置特定側接收部 22A:第一位置特定側接收部 22B:第一位置特定側接收部 23:第二位置特定側接收部 23A、23B:第二位置特定側接收部 24:區劃板 24A:區劃板 24B:區劃板 25:位置特定側運算部 26:位置特定側記憶部 27:位置特定側時刻部 28:位置特定側控制部 28A:第1顯示部 28B:第2顯示部 28C:讀寫器 28C1:天線 28C2:通信部 29:門板部 30:管理伺服器系統 31:伺服器側通信部 32:伺服器側運算部 33:伺服器側記憶部 40:經營者用管理系統 41:經營者側通信部 42:經營者側運算部 43:經營者側輸入輸出部 44:經營者側記憶部 50:管理終端 51:管理終端側通信部 52:管理終端側運算部 53:管理終端側輸入輸出部 54:管理終端側時刻部 55:管理終端側記憶部 60:金融機構 70:時刻配發伺服器 90:啟動信號發送機 100:位置特定系統 210:通過感測器部 400:位置特定系統 2101~2105:通過感測器 2111:BLE信標接收機 2112:BLE信標接收機 2113:BLE信標接收機 2114:BLE信標接收機 2115:BLE信標接收機 2116:BLE信標接收機 2117:BLE信標接收機 2118:BLE信標接收機 DA:通過判定區域 DA1:通過判定區域 DA2:通過判定區域 DB:通過判定區域 DB1:通過判定區域 DB2:通過判定區域 DH:高度 DH1:高度 USR:利用者 X:點 10: Personal mobile terminal 11: Personal terminal side sending department 11A: Personal terminal side communication department 12: Personal terminal side control unit 13: Personal terminal side memory 14: Personal terminal side time section 15: Personal terminal side input and output section 16: Personal terminal side computing unit 20: Location specific device 20B: Automatic ticket checking machine 21: Location specific side receiving part 21A: Location-specific communication department 22: First position specific side receiving part 22A: First position specific side receiving part 22B: First position specific side receiving part 23: Second location specific side receiving part 23A, 23B: Second position specific side receiving part 24: Zoning Board 24A: Zoning Board 24B: Zoning Board 25: Position specific side calculation unit 26: Location specific side memory 27: Position specific side time part 28: Position specific side control part 28A: The first display 28B: The second display 28C: Reader 28C1: Antenna 28C2: Ministry of Communications 29: Door panel 30: Management server system 31: Server side communication department 32: Server side computing unit 33: Server side memory 40: Management system for operators 41: Operator's Communication Department 42: Operator's side computing department 43: Operator side input and output department 44: Operator's side memory department 50: Management terminal 51: Management terminal side communication department 52: Management terminal side computing unit 53: Management terminal side input and output section 54: Management terminal side time department 55: Management terminal side memory 60: financial institutions 70: Distribute the server all the time 90: Start the signal transmitter 100: Location-specific system 210: Through the sensor section 400: Location-specific system 2101~2105: Through the sensor 2111: BLE beacon receiver 2112: BLE beacon receiver 2113: BLE beacon receiver 2114: BLE beacon receiver 2115: BLE beacon receiver 2116: BLE beacon receiver 2117: BLE beacon receiver 2118: BLE beacon receiver DA: Pass the judgment area DA1: Pass the judgment area DA2: Pass the judgment area DB: Pass the judgment area DB1: Pass the judgment area DB2: pass the judgment area DH: height DH1: height USR: User X: dot

圖1係表示測定BLE發送機與接收機之距離之情況之概念圖。 圖2係表示與BLE發送機隔開相同距離之BLE1~4之電波強度之時間變化的曲線圖。 圖3係表示使用BLE信標之位置特定方法之一例之模式圖。 圖4係表示使用BLE信標之以短時間之三角測量方法之模式圖。 圖5係表示將智慧型手機終端等設為BLE發送機且於2處配置BLE接收機之例之概念圖。 圖6係表示於圖5之例中根據BLE接收機之電波強度差所求出之發送機之存在區域之例的概念圖。 圖7係表示將智慧型手機終端等設為BLE發送機且於3處配置BLE接收機之例之概念圖。 圖8係表示於圖7之例中根據BLE接收機之電波強度差所求出之發送機之存在區域之例的概念圖。 圖9係表示與BLE發送機相距一定距離之1個BLE接收機之電波強度之柱狀圖。 圖10係表示與BLE發送機相距不同距離之2個BLE接收機之電波強度差之柱狀圖。 圖11係表示實施形態1之位置特定系統之模式圖。 圖12係表示將與BLE發送機相距不同距離之4個BLE接收機配置於2處且於各處將電波強度平均化所得者之差的柱狀圖。 圖13係表示將BLE發送機與複數個BLE接收機配置於3處之例之模式圖。 圖14係表示於圖13中根據將複數個BLE接收機之電波強度平均化所得者之差而求出之BLE發送機之存在區域之例的模式圖。 圖15係表示藉由限定BLE發送機之存在區域而進行BLE發送機之位置特定之例的模式圖。 圖16係表示於使用者之通過路徑上設置有兩處通過判定區域之例之模式圖。 圖17係表示設置有規定圖16之使用者之通過路徑之閘機之例的模式圖。 圖18係實施形態1之位置特定系統之功能方塊圖。 圖19係位置特定系統之方塊圖。 圖20係表示實施形態2之位置特定系統之模式圖。 圖21係表示於圖20之配置例中根據BLE發送機之電波強度差所求出之BLE接收機之存在區域的模式圖。 圖22係表示於實施形態2中將智慧型手機終端等設為BLE接收機且將BLE發送機配置於3處之例之模式圖。 圖23係表示於圖22之配置例中根據BLE發送機之電波強度差所求出之BLE接收機之存在區域之例的模式圖。 圖24係表示實施形態3之位置特定系統之模式圖。 圖25係表示將智慧型手機終端等設為BLE接收機且將複數個BLE發送機配置於3處之例之模式圖。 圖26係表示於圖25之配置例中根據將BLE發送機之電波強度平均化所得者之差而求出之BLE接收機之存在區域之例的模式圖。 圖27係表示限定BLE接收機之存在區域而進行BLE發送機之位置特定之例的模式圖。 圖28係表示於使用者之通過路徑上設置有兩處通過判定區域之例之模式圖。 圖29係表示認證之3個要素之模式圖。 圖30係表示發送經加密之時間並進行認證之情況之模式圖。 圖31係實施形態4之認證系統之功能方塊圖。 圖32係表示實施例1之事後支付系統之概略圖。 圖33係表示圖32之事後支付系統之事後支付程序之流程圖。 圖34係事後支付系統之詳細之構成圖。 圖35A係表示位置特定裝置之外觀構成例之立體圖,圖35B係表示變化例之位置特定裝置之外觀構成例之立體圖。 圖36A係位置特定裝置之俯視圖,圖36B係圖36A之XXXVIB-XXXVIB線處之剖視圖。 圖37係表示位置特定裝置之位置特定側控制部之方塊圖。 圖38係表示對使用經營者用管理終端之事後支付系統之登錄處理之流程的流程圖。 圖39係表示事後支付系統中之對使用個人移動終端之本系統之登錄處理之流程的流程圖。 圖40係表示自事後支付系統之個人移動終端申請經營者服務之處理之流程的流程圖。 圖41係表示用以利用事後支付系統之管理伺服器系統監視維持授信狀況之變化之處理之流程的流程圖。 圖42係表示事後支付系統之利用者利用位置特定裝置時之處理之流程的流程圖。 圖43係表示位置特定程序之流程圖。 圖44係表示利用位置特定裝置進行個人移動終端之位置特定時之位置特定裝置之處理流程的流程圖。 圖45係表示利用位置特定裝置進行個人移動終端之位置特定時之電波強度計算之處理流程的流程圖。 圖46係表示利用位置特定裝置進行個人移動終端之位置特定時之電波強度計算之處理流程的流程圖。 圖47係表示根據BLE接收機之電波強度求出基準值之處理之流程的流程圖。 圖48係表示利用位置特定裝置進行個人移動終端之位置特定之處理之流程的流程圖。 圖49係表示加密、解密時之個人移動終端之處理流程之流程圖。 圖50係表示加密、解密時之個人移動終端之處理流程之流程圖。 圖51係表示加密、解密時之位置特定裝置之認證處理之流程的流程圖。 圖52係表示加密、解密時之位置特定裝置之認證處理之流程的流程圖。 圖53係表示加密、解密時之位置特定裝置之認證處理之流程的流程圖。 圖54係表示加密、解密時之位置特定裝置之認證處理之流程的流程圖。 圖55係表示加密、解密時之位置特定裝置之認證冒充否認之處理流程之流程圖。 圖56係表示選擇驗票機進行實驗之情形時之情況之照片。 圖57係表示選擇驗票機進行實驗之情形時之情況之照片。 圖58係表示位置特定認證系統之概略圖。 圖59係表示位置特定認證系統之概略圖。Figure 1 is a conceptual diagram showing how to measure the distance between a BLE transmitter and a receiver. Fig. 2 is a graph showing the time change of the radio wave intensity of BLE1~4 separated from the BLE transmitter at the same distance. Figure 3 is a schematic diagram showing an example of a location specifying method using BLE beacons. Figure 4 is a schematic diagram showing a short-time triangulation method using BLE beacons. Fig. 5 is a conceptual diagram showing an example in which a smart phone terminal, etc. is set as a BLE transmitter and BLE receivers are arranged in two places. FIG. 6 is a conceptual diagram showing an example of the existence area of the transmitter obtained from the difference in radio wave intensity of the BLE receiver in the example of FIG. 5. Fig. 7 is a conceptual diagram showing an example in which a smart phone terminal, etc. is set as a BLE transmitter and BLE receivers are arranged in three places. FIG. 8 is a conceptual diagram showing an example of the existence area of the transmitter obtained from the difference in radio wave intensity of the BLE receiver in the example of FIG. 7. Figure 9 is a bar graph showing the radio wave intensity of a BLE receiver at a certain distance from the BLE transmitter. Figure 10 is a bar graph showing the difference in radio wave intensity between two BLE receivers at different distances from the BLE transmitter. Fig. 11 is a schematic diagram showing the position specifying system of the first embodiment. Fig. 12 is a histogram showing the difference between the four BLE receivers at different distances from the BLE transmitter, which are arranged in two places and the radio wave intensity is averaged in each place. Fig. 13 is a schematic diagram showing an example in which a BLE transmitter and a plurality of BLE receivers are arranged in three places. FIG. 14 is a schematic diagram showing an example of the existence area of a BLE transmitter obtained in FIG. 13 based on the difference obtained by averaging the radio wave intensities of a plurality of BLE receivers. FIG. 15 is a schematic diagram showing an example of specifying the location of the BLE transmitter by limiting the existence area of the BLE transmitter. Fig. 16 is a schematic diagram showing an example in which two passing judgment areas are provided on the passing path of the user. FIG. 17 is a schematic diagram showing an example in which a gate that defines the passage path of the user in FIG. 16 is provided. Figure 18 is a functional block diagram of the location specifying system of the first embodiment. Figure 19 is a block diagram of the location specific system. Fig. 20 is a schematic diagram showing the position specifying system of the second embodiment. Fig. 21 is a schematic diagram showing the existence area of the BLE receiver calculated from the difference in the radio wave intensity of the BLE transmitter in the configuration example of Fig. 20. Fig. 22 is a schematic diagram showing an example in which a smart phone terminal or the like is used as a BLE receiver and the BLE transmitter is arranged in three places in the second embodiment. FIG. 23 is a schematic diagram showing an example of the existence area of the BLE receiver obtained from the difference in the radio wave intensity of the BLE transmitter in the configuration example of FIG. 22. Fig. 24 is a schematic diagram showing the position specifying system of the third embodiment. FIG. 25 is a schematic diagram showing an example in which a smart phone terminal or the like is set as a BLE receiver and a plurality of BLE transmitters are arranged in three places. Fig. 26 is a schematic diagram showing an example of the existence area of the BLE receiver obtained from the difference between the averaging of the radio wave intensity of the BLE transmitter in the configuration example of Fig. 25. FIG. 27 is a schematic diagram showing an example of specifying the location of the BLE transmitter by limiting the existence area of the BLE receiver. Fig. 28 is a schematic diagram showing an example in which two passing judgment areas are provided on the passing path of the user. Figure 29 is a schematic diagram showing the three elements of authentication. Fig. 30 is a schematic diagram showing the case where the encrypted time is sent and authenticated. Figure 31 is a functional block diagram of the authentication system of the fourth embodiment. Fig. 32 is a schematic diagram showing the post-payment system of the first embodiment. Fig. 33 is a flowchart showing the post-payment procedure of the post-payment system of Fig. 32. Figure 34 is a detailed configuration diagram of the post-payment system. FIG. 35A is a perspective view showing an example of the external configuration of the position specifying device, and FIG. 35B is a perspective view showing an example of the external configuration of the position specifying device of a modified example. Fig. 36A is a top view of the position specifying device, and Fig. 36B is a cross-sectional view taken along the line XXXVIB-XXXVIB of Fig. 36A. Fig. 37 is a block diagram showing the position specifying side control part of the position specifying device. FIG. 38 is a flowchart showing the flow of the registration process of the post-payment system using the management terminal for the business operator. Fig. 39 is a flowchart showing the log-in processing flow of this system using a personal mobile terminal in the post-payment system. Fig. 40 is a flow chart showing the processing flow of the personal mobile terminal of the post-payment system applying for operator services. Fig. 41 is a flow chart showing the process of using the management server system of the post-payment system to monitor and maintain changes in the credit status. Fig. 42 is a flowchart showing the flow of processing when the user of the post-payment system uses the location specifying device. Fig. 43 is a flowchart showing the location specifying program. FIG. 44 is a flowchart showing the processing flow of the location specifying device when the location specifying device is used for the location specifying of the personal mobile terminal. FIG. 45 is a flowchart showing the processing flow of calculating the radio wave intensity when the location specifying device of the personal mobile terminal is used. FIG. 46 is a flowchart showing the processing flow of calculating the radio wave intensity when the location specifying device of the personal mobile terminal is used. Fig. 47 is a flowchart showing the flow of processing for obtaining the reference value based on the radio wave intensity of the BLE receiver. FIG. 48 is a flowchart showing the flow of the location-specific processing of the personal mobile terminal using the location specifying device. Fig. 49 is a flowchart showing the processing flow of the personal mobile terminal during encryption and decryption. Figure 50 is a flowchart showing the processing flow of the personal mobile terminal during encryption and decryption. FIG. 51 is a flowchart showing the flow of authentication processing of the location specifying device during encryption and decryption. Fig. 52 is a flowchart showing the flow of authentication processing of the location specifying device during encryption and decryption. FIG. 53 is a flowchart showing the flow of authentication processing of the location specifying device during encryption and decryption. Fig. 54 is a flowchart showing the flow of authentication processing of the location specifying device during encryption and decryption. Fig. 55 is a flowchart showing the processing flow of authentication and impersonation denial of the location-specific device during encryption and decryption. Figure 56 is a photograph showing the situation when the ticket inspection machine is selected for experiment. Figure 57 is a photo showing the situation when the ticket inspection machine is selected for experiment. Fig. 58 is a schematic diagram showing the location identification authentication system. Fig. 59 is a schematic diagram showing the location identification authentication system.

10:個人移動終端 10: Personal mobile terminal

11:個人終端側發送部 11: Personal terminal side sending department

12:個人終端側控制部 12: Personal terminal side control unit

20:位置特定裝置 20: Location specific device

21:位置特定側接收部 21: Location specific side receiving part

22:第一位置特定側接收部 22: First position specific side receiving part

22A:第一位置特定側接收部 22A: First position specific side receiving part

22B:第一位置特定側接收部 22B: First position specific side receiving part

23:第二位置特定側接收部 23: Second location specific side receiving part

23A、23B:第二位置特定側接收部 23A, 23B: Second position specific side receiving part

25:位置特定側運算部 25: Position specific side calculation unit

100:位置特定系統 100: Location-specific system

Claims (21)

一種位置特定系統,其係具備成為特定出位置之對象之由個人攜帶之個人移動終端、及特定出上述個人移動終端之位置之位置特定裝置者,且 上述個人移動終端具備: 個人終端側發送部,其係用以對上述位置特定裝置發送用於位置之特定之位置特定信號;及 個人終端側控制部,其控制上述個人終端側發送部;且 上述位置特定裝置具備: 複數個第一位置特定側接收部及複數個第二位置特定側接收部,其等係用以接收上述個人終端側發送部所發送之位置特定信號,上述複數個第一位置特定側接收部配置於與上述個人移動終端隔開第一距離之第一位置,上述複數個第二位置特定側接收部配置於與上述第一位置不同之第二位置且為與上述個人移動終端隔開較上述第一距離長之第二距離之位置;以及 位置特定側運算部,其係用以基於由上述複數個第一位置特定側接收部及第二位置特定側接收部分別接收到之位置特定信號之強度差,特定出上述個人移動終端之位置。A location specifying system is provided with a personal mobile terminal carried by an individual that becomes the object of specifying a location, and a location specifying device that specifies the location of the aforementioned personal mobile terminal, and The above personal mobile terminal has: The personal terminal-side sending unit, which is used to send a location-specific location-specific signal to the above-mentioned location-specific device; and The personal terminal side control unit, which controls the personal terminal side sending unit; and The above-mentioned location-specific devices have: A plurality of first position specifying side receiving sections and a plurality of second position specifying side receiving sections are used to receive the position specifying signal sent by the personal terminal side transmitting section, and the plurality of first position specifying side receiving sections are arranged At a first position separated from the personal mobile terminal by a first distance, the plurality of second position specifying side receiving portions are arranged in a second position different from the first position and are separated from the personal mobile terminal than the first position The position of the second distance which is a long distance; and The location specifying side computing unit is used for specifying the location of the personal mobile terminal based on the difference in the strength of the location specifying signals received by the plurality of first location specifying side receiving units and the second location specifying side receiving units. 如請求項1之位置特定系統,其中 上述位置特定側運算部計算如下條件式而特定出上述個人移動終端之位置,上述條件式係比較由上述複數個第一位置特定側接收部所接收之位置特定信號之電波強度與由上述複數個第二位置特定側接收部所接收之位置特定信號之電波強度的差、和預先設定之閾值之大小。Such as the location-specific system of claim 1, where The position specifying side calculating unit calculates the following conditional expression to specify the position of the personal mobile terminal. The conditional expression compares the radio wave strength of the position specifying signal received by the plurality of first position specifying side receiving units with The magnitude of the difference between the radio wave intensity of the position specifying signal received by the second position specifying side receiving unit and the preset threshold. 如請求項1或2之位置特定系統,其中 上述位置特定側運算部計算如下條件式而特定出上述個人移動終端之位置,上述條件式係比較由上述複數個第一位置特定側接收部所接收之位置特定信號之電波強度之平均值與由上述複數個第二位置特定側接收部所接收之位置特定信號之電波強度之平均值的差、和預先設定之閾值之大小。Such as the location-specific system of claim 1 or 2, where The position specifying side computing unit calculates the following conditional expression to specify the location of the personal mobile terminal. The conditional expression compares the average value of the radio wave intensity of the location specifying signals received by the plurality of first location specifying side receiving units with The magnitude of the difference between the average value of the radio wave intensity of the position specifying signal received by the plurality of second position specifying side receiving units and the preset threshold value. 如請求項1至3中任一項之位置特定系統,其中 上述個人終端側控制部以如下方式進行控制,即,檢測出上述個人移動終端在一定距離以內接近上述位置特定裝置之後,由上述個人終端側發送部對上述位置特定裝置發送位置特定信號。Such as the location-specific system of any one of claims 1 to 3, where The personal terminal side control unit performs control such that after detecting that the personal mobile terminal is approaching the location specifying device within a certain distance, the personal terminal side transmitting unit transmits a location specifying signal to the location specifying device. 如請求項4之位置特定系統,其中 進而具備啟動信號發送機,該啟動信號發送機設置於與上述位置特定裝置相距一定距離以上之位置,且用以朝向上述個人移動終端發送使上述個人終端側發送部向上述位置特定裝置發送位置特定信號之發送動作啟動的啟動信號。Such as the location-specific system of claim 4, where Furthermore, it is provided with an activation signal transmitter installed at a position more than a certain distance away from the position specifying device, and configured to send to the personal mobile terminal for the personal terminal-side sending unit to send the location specifying device to the position specifying device The start signal for the start of the signal sending action. 如請求項1至5中任一項之位置特定系統,其中 上述個人終端側發送部與上述位置特定側接收部可雙向通信, 上述位置特定側運算部藉由上述位置特定側接收部與上述個人終端側發送部進行通信而進行上述個人移動終端之認證。Such as the location-specific system of any one of claims 1 to 5, where The personal terminal side transmitting unit and the location specifying side receiving unit can communicate bidirectionally, The location specifying side computing unit performs the authentication of the personal mobile terminal by the communication between the location specifying side receiving unit and the personal terminal side transmitting unit. 如請求項6之位置特定系統,其中 上述個人移動終端進而具備用以保持預先被賦予之固有之識別資訊之個人終端側記憶部, 上述個人終端側控制部於上述個人終端側發送部與上述位置特定側接收部進行通信時,能夠發行上述個人終端側記憶部所保持之固有之識別資訊、及每個該識別資訊所固有之僅可使用一次之一次性密碼, 上述位置特定側運算部對由上述位置特定側接收部自上述個人終端側發送部接收到之上述識別資訊及一次性密碼進行認證。Such as the location-specific system of claim 6, where The above-mentioned personal mobile terminal is further provided with a personal terminal-side memory unit for holding inherent identification information given in advance, When the personal terminal side control unit communicates with the location specifying side receiving unit, the personal terminal side control unit can issue the unique identification information held by the personal terminal side memory unit and the unique identification information unique to each identification information. One-time password that can be used once, The location specifying side computing unit authenticates the identification information and the one-time password received from the personal terminal side transmitting unit by the location specifying side receiving unit. 如請求項7之位置特定系統,其中 上述個人移動終端進而具備用以產生與時刻相關之資訊之個人終端側時刻部, 上述個人終端側記憶部保持有於上述個人移動終端與位置特定裝置之間預先交換之被賦予至該個人移動終端之識別資訊所固有之公共密鑰、及 用於產生上述一次性密碼之既定函數,且 上述位置特定裝置進而具備: 位置特定側記憶部,其係用以將被賦予至上述個人移動終端之識別資訊與每個該識別資訊所固有之公共密鑰建立關連地保持;及 位置特定側時刻部,其係用以產生與時刻相關之資訊;且 上述個人移動終端於將上述識別資訊及一次性密碼傳送至上述位置特定裝置時,由上述個人終端側時刻部獲取與上述個人終端側控制部發行上述一次性密碼時之發行時刻相關之資訊,並將其應用於上述個人終端側記憶部中所保持之既定函數,進一步以上述個人終端側記憶部所保持之公共密鑰進行加密後,發行上述一次性密碼;且 上述位置特定側運算部係, 由上述位置特定側時刻部獲取以上述位置特定側接收部自上述個人終端側發送部接收上述識別資訊及一次性密碼時之接收時刻,並且 根據所接收到之上述識別資訊,由上述位置特定側記憶部搜尋與該識別資訊對應之公共密鑰,使用所獲得之公共密鑰將上述一次性密碼解密,而獲取經函數化之與發行時刻相關之資訊, 將於一接收時刻所獲取之與發行時刻相關之資訊和與上述一接收時刻相關之資訊的差量與 於另一接收時刻所獲取之與發行時刻相關之資訊和與上述另一接收時刻相關之資訊的差量進行比較, 若其差為既定時間內,則對上述個人移動終端進行認證, 若並非既定時間內,則不對上述個人移動終端進行認證。Such as the location-specific system of claim 7, where The aforementioned personal mobile terminal further includes a personal terminal-side time unit for generating information related to time, The personal terminal-side storage unit holds the public key inherent in the identification information assigned to the personal mobile terminal that is exchanged in advance between the personal mobile terminal and the location specifying device, and The established function used to generate the above one-time password, and The aforementioned location specific device further includes: The location-specific side memory part is used to associate the identification information assigned to the personal mobile terminal with the public key inherent in each identification information; and The time section on the location-specific side, which is used to generate information related to the time; and When the personal mobile terminal transmits the identification information and the one-time password to the location specifying device, the personal terminal-side time unit obtains information related to the time of issuance when the personal terminal-side control unit issues the one-time password, and Apply it to the predetermined function held in the personal terminal side storage unit, and further encrypt it with the public key held in the personal terminal side storage unit, and then issue the one-time password; and The above-mentioned position-specific side computing unit system, The receiving time when the location specifying side receiving unit receives the identification information and the one-time password from the personal terminal side transmitting unit by the location specifying side time unit is acquired by the location specifying side time unit, and According to the received identification information, the location specifying side memory section searches for the public key corresponding to the identification information, uses the obtained public key to decrypt the one-time password, and obtains the functionalized and issued time Related information, The difference between the information related to the issuing time and the information related to the above one receiving time obtained at a receiving time and Compare the difference between the information related to the issuing time and the information related to the above-mentioned another receiving time acquired at another receiving time, If the difference is within a predetermined time, the above personal mobile terminal is authenticated, If it is not within the predetermined time, the above-mentioned personal mobile terminal will not be authenticated. 如請求項8之位置特定系統,其中 上述位置特定側運算部將於上述一接收時刻所獲取之與發行時刻相關之資訊和與上述一接收時刻相關之資訊的差量作為認證基準資訊保存於上述位置特定側記憶部, 藉由將於另一接收時刻所獲取之與發行時刻相關之資訊和與上述另一接收時刻相關之資訊的差量與於上述位置特定側記憶部中所保存之認證基準資訊進行比較,而進行上述個人移動終端之認證。Such as the location-specific system of claim 8, where The location specifying side computing unit stores the difference between the information related to the issuing time acquired at the one receiving time and the information related to the one receiving time as authentication reference information in the location specifying side storage unit, It is performed by comparing the difference between the information related to the issuing time and the information related to the other receiving time obtained at another receiving time with the authentication reference information stored in the memory section of the location specifying side. Authentication of the above-mentioned personal mobile terminal. 如請求項9之位置特定系統,其中 經過一定時間後刪除上述位置特定側記憶部中所保存之認證基準資訊。Such as the location-specific system of claim 9, where After a certain period of time has elapsed, the authentication reference information stored in the memory section on the location specifying side is deleted. 如請求項6至10中任一項之位置特定系統,其中 上述位置特定側運算部於已認證上述個人移動終端之情形時,進行結算。Such as the location-specific system of any one of claims 6 to 10, where The location specifying side computing unit performs settlement when the personal mobile terminal has been authenticated. 如請求項1至11任一項之位置特定系統,其中 上述位置特定裝置進而具備位置特定側控制部,該位置特定側控制部係用以根據由上述位置特定側運算部所測定出之上述個人移動終端之位置,控制對攜帶上述個人移動終端之個人之移動進行限制之動作。Such as the location-specific system of any one of claims 1 to 11, where The location specifying device further includes a location specifying side control unit for controlling the position of the personal mobile terminal determined by the location specifying side computing unit to control the transfer to the individual carrying the personal mobile terminal. Move to restrict the action. 如請求項12之位置特定系統,其中 上述位置特定裝置為具有對攜帶個人移動終端之個人之通過進行限制之開閉式門板部的閘機, 上述位置特定側控制部控制上述門板部之開閉。Such as the location-specific system of claim 12, where The above-mentioned location specifying device is a gate with an opening and closing door panel that restricts the passage of individuals carrying personal mobile terminals, The position specifying side control section controls the opening and closing of the door panel section. 如請求項1至13任一項之位置特定系統,其中 上述個人終端側發送部與位置特定側接收部之通信之方式為BLE、RFID或Wi-Fi。Such as the location-specific system of any one of claims 1 to 13, where The communication method between the sending unit on the personal terminal side and the receiving unit on the location specifying side is BLE, RFID or Wi-Fi. 如請求項1至14任一項之位置特定系統,其中 上述個人移動終端作為公共交通工具之車票發揮功能,上述位置特定裝置對攜帶上述個人移動終端之個人之車票進行認證與結算。Such as the location-specific system of any one of claims 1 to 14, where The personal mobile terminal functions as a ticket for public transportation, and the location specifying device authenticates and settles the ticket of the individual carrying the personal mobile terminal. 一種位置特定系統,其係具備成為特定出位置之對象之由個人攜帶之個人移動終端、及特定出上述個人移動終端之位置之位置特定裝置者;且 上述個人移動終端具備: 個人終端側發送部,其係用以對於上述位置特定裝置進行雙向通信; 個人終端側控制部,其係用以控制上述個人終端側發送部; 個人終端側記憶部,其係用以保持預先被賦予之固有之識別資訊、於上述個人移動終端與位置特定裝置之間預先交換之被賦予至該個人移動終端之識別資訊所固有之公共密鑰、及用於產生上述一次性密碼之既定函數;以及 個人終端側時刻部,其係用以產生與時刻相關之資訊; 上述位置特定裝置具備: 位置特定側接收部,其係用以與上述個人終端側發送部進行雙向通信; 上述位置特定側運算部,其係用以藉由上述位置特定側接收部與上述個人終端側發送部進行通信,而進行上述個人移動終端之認證; 位置特定側記憶部,其係用以將被賦予至上述個人移動終端之識別資訊與每個該識別資訊所固有之公共密鑰建立關連地保持;及 位置特定側時刻部,其係用以產生與時刻相關之資訊;且 上述個人終端側控制部於上述個人終端側發送部與上述位置特定側接收部進行通信時,可發行上述個人終端側記憶部所保持之固有之識別資訊及每個該識別資訊所固有之僅可使用一次之一次性密碼, 上述位置特定側運算部對上述位置特定側接收部自上述個人終端側發送部所接收到之上述識別資訊及一次性密碼進行認證; 上述個人移動終端於將上述識別資訊及一次性密碼傳送至上述位置特定裝置時,利用上述個人終端側時刻部獲取與上述個人終端側控制部發行上述一次性密碼時之發行時刻相關之資訊,並將其應用於上述個人終端側記憶部所保持之既定函數,進一步以上述個人終端側記憶部所保持之公共密鑰進行加密後,發行上述一次性密碼; 上述位置特定側運算部由上述位置特定側時刻部獲取上述位置特定側接收部自上述個人終端側發送部接收上述識別資訊及一次性密碼時之接收時刻,並且 根據所接收到之上述識別資訊,由上述位置特定側記憶部搜尋與該識別資訊對應之公共密鑰,使用所獲得之公共密鑰將上述一次性密碼解密,而獲取經函數化之與發行時刻相關之資訊, 將於一接收時刻所獲取之與發行時刻相關之資訊和與上述一接收時刻相關之資訊的差量與 於另一接收時刻所獲取之與發行時刻相關之資訊和與上述另一接收時刻相關之資訊的差量進行比較, 若其差為既定時間內,則對上述個人移動終端進行認證, 若並非既定時間內,則不對上述個人移動終端進行認證。A location specifying system, which is provided with a personal mobile terminal carried by an individual that becomes an object of specifying a location, and a location specifying device that specifies the location of the aforementioned personal mobile terminal; and The above personal mobile terminal has: The personal terminal side sending unit, which is used to perform two-way communication with the above-mentioned location specifying device; The personal terminal side control unit, which is used to control the personal terminal side sending unit; The personal terminal side memory is used to hold the inherent identification information assigned in advance, and the public key inherent in the identification information assigned to the personal mobile terminal exchanged in advance between the personal mobile terminal and the location specifying device , And the established function used to generate the above one-time password; and The personal terminal side time part, which is used to generate information related to the time; The above-mentioned location-specific devices have: The location-specific receiving unit, which is used for two-way communication with the personal terminal-side sending unit; The location specifying side computing unit is used to perform the authentication of the personal mobile terminal by communicating with the personal terminal side transmitting unit through the location specifying side receiving unit; The location-specific side memory part is used to associate the identification information assigned to the personal mobile terminal with the public key inherent in each identification information; and The time section on the location-specific side, which is used to generate information related to the time; and When the personal terminal-side control unit communicates with the location-specific receiver unit, the personal terminal-side control unit can issue unique identification information held by the personal terminal-side memory unit and the unique identification information unique to each identification information. One-time one-time password, The location specifying side computing unit authenticates the identification information and the one-time password received by the location specifying side receiving unit from the personal terminal side sending unit; When the personal mobile terminal transmits the identification information and the one-time password to the location specifying device, it uses the personal terminal-side time unit to obtain information related to the time of issuance when the personal terminal-side control unit issues the one-time password, and Apply it to the predetermined function held in the personal terminal side storage unit, and further encrypt it with the public key held in the personal terminal side storage unit, and then issue the one-time password; The location specifying side computing unit obtains the receiving time when the location specifying side receiving unit receives the identification information and the one-time password from the personal terminal side transmitting unit from the location specifying side time unit, and According to the received identification information, the location specifying side memory section searches for the public key corresponding to the identification information, uses the obtained public key to decrypt the one-time password, and obtains the functionalized and issued time Related information, The difference between the information related to the issuing time and the information related to the above one receiving time obtained at a receiving time and Compare the difference between the information related to the issuing time and the information related to the above-mentioned another receiving time acquired at another receiving time, If the difference is within a predetermined time, the above personal mobile terminal is authenticated, If it is not within the predetermined time, the above-mentioned personal mobile terminal will not be authenticated. 一種位置特定裝置,其係特定出成為特定出位置之對象之由個人攜帶之個人移動終端之位置者,且具備: 複數個第一位置特定側接收部及複數個第二位置特定側接收部,其等係用以接收由上述個人移動終端自個人終端側發送部發送至上述位置特定裝置之用於位置之特定之位置特定信號,上述複數個第一位置特定側接收部配置於與上述個人移動終端隔開第一距離之第一位置,上述複數個第二位置特定側接收部配置於與上述第一位置不同之第二位置且為與上述個人移動終端隔開較上述第一距離更長之第二距離之位置;以及 位置特定側運算部,其係用以基於由上述複數個第一位置特定側接收部及第二位置特定側接收部分別接收到之位置特定信號之強度差,特定出上述個人移動終端之位置。A location specifying device that specifies the location of a personal mobile terminal carried by an individual that becomes the object of the specified location, and has: A plurality of first position-specific receiving units and a plurality of second position-specific receiving units are used to receive the position-specific information sent by the personal mobile terminal from the personal terminal-side sending unit to the position specifying device For a position identification signal, the plurality of first position identification side receivers are arranged at a first position separated from the personal mobile terminal by a first distance, and the plurality of second position identification side receivers are arranged at a position different from the first position The second position is a position separated from the personal mobile terminal by a second distance longer than the first distance; and The location specifying side computing unit is used for specifying the location of the personal mobile terminal based on the difference in the strength of the location specifying signals received by the plurality of first location specifying side receiving units and the second location specifying side receiving units. 一種位置特定方法,其係於具備成為特定出位置之對象之由個人攜帶之個人移動終端、及特定出上述個人移動終端之位置之位置特定裝置之位置特定系統中,特定出上述個人移動終端之位置者,且包括如下步驟: 上述個人移動終端檢測出攜帶個人移動終端之個人在一定距離以內接近上述位置特定裝置,且個人終端側控制部啟動個人終端側發送部; 上述個人移動終端自個人終端側發送部對上述位置特定裝置發送用於位置之特定之位置特定信號; 上述位置特定裝置分別由複數個第一位置特定側接收部及複數個第二位置特定側接收部接收上述個人終端側發送部所發送之位置特定信號,上述複數個第一位置特定側接收部配置於與上述個人移動終端隔開第一距離之第一位置,上述複數個第二位置特定側接收部配置於與上述第一位置不同之第二位置且為與上述個人移動終端隔開較上述第一距離長之第二距離之位置;以及 位置特定側運算部基於由上述複數個第一位置特定側接收部及第二位置特定側接收部分別接收到之位置特定信號之強度差,特定出上述個人移動終端之位置。A location specifying method, which is in a location specifying system equipped with a personal mobile terminal carried by an individual as the object of specifying a location, and a location specifying device that specifies the location of the personal mobile terminal. Positioners, and include the following steps: The personal mobile terminal detects that the person carrying the personal mobile terminal approaches the location specifying device within a certain distance, and the personal terminal-side control unit activates the personal terminal-side sending unit; The personal mobile terminal sends a location specifying signal for location specification to the location specifying device from the personal terminal side sending unit; The position specifying device includes a plurality of first position specifying side receiving units and a plurality of second position specifying side receiving units respectively receiving the position specifying signal sent by the personal terminal side transmitting unit, and the plurality of first position specifying side receiving units are arranged At a first position separated from the personal mobile terminal by a first distance, the plurality of second position specifying side receiving portions are arranged in a second position different from the first position and are separated from the personal mobile terminal than the first position The position of the second distance which is a long distance; and The location specifying side computing unit specifies the location of the personal mobile terminal based on the difference in the strength of the location specifying signals respectively received by the plurality of first location specifying side receiving units and the second location specifying side receiving units. 如請求項18之位置特定方法,其中 於上述個人終端側發送部發送位置特定信號之步驟之前,進而包括如下步驟: 上述個人終端側發送部對上述位置特定側接收部傳送個人終端側記憶部所保持之固有之識別資訊及每個該識別資訊所固有之僅可使用一次之一次性密碼;以及 上述位置特定側運算部基於上述識別資訊及一次性密碼進行上述個人移動終端之認證;且 上述個人移動終端將上述識別資訊及一次性密碼傳送至上述位置測定機之步驟係 由個人終端側時刻部獲取與上述個人終端側控制部發行上述一次性密碼時之發行時刻相關之資訊,並將其應用於上述個人終端側記憶部所保持之既定函數,進而以上述個人終端側記憶部所保持之公共密鑰進行加密後,發行上述一次性密碼; 上述位置特定側運算部基於上述識別資訊及一次性密碼進行上述個人移動終端之認證之步驟係 上述位置特定側運算部由位置測定側時刻部獲取上述位置測定側通信部自上述個人終端側發送部接收上述識別資訊及一次性密碼時之接收時刻,並且 根據所接收到之上述識別資訊,自上述位置測定側記憶部搜尋與該識別資訊對應之公共密鑰,使用所獲得之公共密鑰將上述一次性密碼解密,而獲取經函數化之與發行時刻相關之資訊, 將於一接收時刻所獲取之與發行時刻相關之資訊和與上述一接收時刻相關之資訊之差量與 於另一接收時刻所獲取之與發行時刻相關之資訊和與上述另一接收時刻相關之資訊之差量進行比較, 若其差為既定時間內,則對上述個人移動終端進行認證, 若並非既定時間內,則不對上述個人移動終端進行認證。 For example, the location specifying method of claim 18, before the step of sending the location specifying signal by the personal terminal-side sending unit, further includes the following steps: the personal terminal-side sending unit transmits the personal terminal-side memory unit to the location specifying-side receiving unit The retained identification information and the one-time password that is unique to each identification information that can only be used once; and the location-specific side computing unit authenticates the personal mobile terminal based on the identification information and the one-time password; and The step for the mobile terminal to transmit the identification information and the one-time password to the position measuring machine is that the personal terminal-side time unit acquires information related to the time of issuance when the personal terminal-side control unit issues the one-time password, and applies it The predetermined function held in the personal terminal-side storage unit is further encrypted with the public key held in the personal terminal-side storage unit to issue the one-time password; the location specifying-side computing unit is based on the identification information and the one-time The step of using the password to authenticate the personal mobile terminal is that the position specifying side computing unit obtains the position measuring side time unit from the position measuring side time unit when the position measuring side communication unit receives the identification information and the one-time password from the personal terminal side transmitting unit, And according to the received identification information, the public key corresponding to the identification information is searched from the location measurement side memory, and the public key is used to decrypt the one-time password, and the functionalized and issued Time-related information, the difference between the information related to the issuing time obtained at one receiving time and the information related to the above-mentioned one receiving time and the information related to the issuing time obtained at another receiving time and the above-mentioned other The difference between the information related to the receiving time is compared, and if the difference is within a predetermined time, the personal mobile terminal is authenticated, and if it is not within the predetermined time, the personal mobile terminal is not authenticated. 一種位置特定程式,其係於具備成為特定出位置之對象之由個人攜帶之個人移動終端及特定出上述個人移動終端之位置之位置特定裝置的位置特定系統中,特定出上述個人移動終端之位置者,且其用以使電腦執行如下功能: 上述個人移動終端檢測出攜帶個人移動終端之個人在一定距離以內接近上述位置特定裝置之後,個人終端側控制部啟動個人終端側發送部; 上述個人移動終端自個人終端側發送部對上述位置特定裝置發送用於位置之特定之位置特定信號; 上述位置特定裝置分別由複數個第一位置特定側接收部及複數個第二位置特定側接收部接收上述個人終端側發送部所發送之位置特定信號,上述複數個第一位置特定側接收部配置於與上述個人移動終端隔開第一距離之第一位置,上述複數個第二位置特定側接收部配置於與上述第一位置不同之第二位置且為與上述個人移動終端隔開較上述第一距離長之第二距離之位置;以及 位置特定側運算部基於由上述複數個第一位置特定側接收部及第二位置特定側接收部分別接收到之位置特定信號之強度差,特定出上述個人移動終端之位置。 A location specifying program that specifies the location of the personal mobile terminal in a location specifying system equipped with a personal mobile terminal carried by an individual and a location specifying device that specifies the location of the personal mobile terminal. After the personal mobile terminal detects that the person carrying the personal mobile terminal approaches the location specifying device within a certain distance, the personal terminal-side control unit activates the personal terminal-side sending unit; the personal mobile terminal The terminal transmits a location specifying signal for location specification from the personal terminal side transmitting unit to the location specifying device; the location specifying device is received by a plurality of first location specifying side receiving portions and a plurality of second location specifying side receiving portions, respectively The position specifying signal transmitted by the personal terminal side transmitting unit, the plurality of first position specifying side receiving units are arranged at a first position separated from the personal mobile terminal by a first distance, and the plurality of second position specifying side receiving units are arranged At a second location that is different from the first location and is a location separated from the personal mobile terminal by a second distance longer than the first distance; and the location specifying side computing unit is based on the reception by the plurality of first location specifying sides The difference in the strength of the position-specific signal received by the receiver and the second position-specific receiver respectively identifies the position of the personal mobile terminal. 一種電腦可讀取之記錄媒體或記錄之機器,其記錄有如請求項20之程式。A computer-readable recording medium or recording machine, which records the program as in claim 20.
TW108137070A 2018-10-15 2019-10-15 Location-specific systems, location-specific devices, location-specific methods, location-specific programs, and computer-readable recording media TWI748262B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2018194488 2018-10-15
JP2018-194488 2018-10-15

Publications (2)

Publication Number Publication Date
TW202030494A true TW202030494A (en) 2020-08-16
TWI748262B TWI748262B (en) 2021-12-01

Family

ID=80784503

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108137070A TWI748262B (en) 2018-10-15 2019-10-15 Location-specific systems, location-specific devices, location-specific methods, location-specific programs, and computer-readable recording media

Country Status (1)

Country Link
TW (1) TWI748262B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI726810B (en) * 2020-09-10 2021-05-01 財團法人車輛研究測試中心 Obstacle tracking system and method combined with image data
CN112991568A (en) * 2021-02-08 2021-06-18 南昌市合迅科技有限公司 Attendance data acquisition method and system based on Beidou positioning
TWI809485B (en) * 2020-12-22 2023-07-21 美商英特爾股份有限公司 Mobility-as-a-service system, apparatus and method, and machine-readable medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7308276B2 (en) * 2002-06-04 2007-12-11 Symbol Technologies, Inc. Method for locating mobile units based on received signal strength ratio
JP2005165976A (en) * 2003-12-05 2005-06-23 Toshiba Solutions Corp Service provision system, method, program, and merchandise sales system
KR100638248B1 (en) * 2005-08-17 2006-10-25 (주)래디안트 Method and system for determining position of mobile communication device using ratio metric
JP5493478B2 (en) * 2009-06-03 2014-05-14 セイコーエプソン株式会社 Authentication system and authentication method
JP5002065B1 (en) * 2011-02-28 2012-08-15 三菱電機インフォメーションシステムズ株式会社 Authentication system, authentication method of authentication system, positioning device, and positioning program
KR102434560B1 (en) * 2016-12-28 2022-08-19 파나소닉 인텔렉츄얼 프로퍼티 코포레이션 오브 아메리카 A communication method using a radio terminal apparatus, a communication method using a radio base station apparatus, a radio terminal apparatus, and a radio base station apparatus

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI726810B (en) * 2020-09-10 2021-05-01 財團法人車輛研究測試中心 Obstacle tracking system and method combined with image data
TWI809485B (en) * 2020-12-22 2023-07-21 美商英特爾股份有限公司 Mobility-as-a-service system, apparatus and method, and machine-readable medium
CN112991568A (en) * 2021-02-08 2021-06-18 南昌市合迅科技有限公司 Attendance data acquisition method and system based on Beidou positioning

Also Published As

Publication number Publication date
TWI748262B (en) 2021-12-01

Similar Documents

Publication Publication Date Title
JP6751863B1 (en) Location identification system, location identification device, location identification method, location identification program, computer-readable recording medium, and recording equipment
US11539522B2 (en) Methods and apparatus for authorizing and providing of services
US10074222B2 (en) Secure short-distance-based communication and validation system for zone-based validation
EP2991041B1 (en) Secure short-distance-based communication and access control system
US9589402B2 (en) Restricted area access control system
US10009745B2 (en) Validation in secure short-distance-based communication and enforcement system according to visual objects
RU2695413C2 (en) Biometric solution, providing possibility of payment for passage and access to system in high-speed mode
US9922294B2 (en) Secure short-distance-based communication and enforcement system
TWI748262B (en) Location-specific systems, location-specific devices, location-specific methods, location-specific programs, and computer-readable recording media
US20160055689A1 (en) Secure short-distance-based communication and access control system
US20200410799A1 (en) Radio frequency antenna and system for presence sensing and monitoring
US11462095B2 (en) Facility control methods and apparatus
JP2008269556A (en) Personal authentication system
US11411735B2 (en) Methods and apparatus for authorizing and providing of distributed goods or services
US11546728B2 (en) Methods and apparatus for presence sensing reporting
JP2018206355A (en) Mobile device and reader for facilitating transaction
US20240126850A1 (en) Authentication system, authentication method and program
WO2019060738A1 (en) Encrypted reverse biometric token validation
US20230092733A1 (en) Method and System for Payment Device-Based Access
JP7345067B2 (en) Authentication systems, authentication methods, and programs
WO2022269683A1 (en) Authentication system, authentication method, and program