WO2003003194A1 - Dispositif a circuit integre, dispositif de traitement de l'information, procede de gestion de memoire de support d'information, terminal mobile, dispositif a circuit integre a semi-conducteur, et procede de communication par terminal mobile - Google Patents
Dispositif a circuit integre, dispositif de traitement de l'information, procede de gestion de memoire de support d'information, terminal mobile, dispositif a circuit integre a semi-conducteur, et procede de communication par terminal mobile Download PDFInfo
- Publication number
- WO2003003194A1 WO2003003194A1 PCT/JP2002/006323 JP0206323W WO03003194A1 WO 2003003194 A1 WO2003003194 A1 WO 2003003194A1 JP 0206323 W JP0206323 W JP 0206323W WO 03003194 A1 WO03003194 A1 WO 03003194A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- access
- memory area
- directory
- integrated circuit
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/1425—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
- G06F12/1433—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a module or a part of a module
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/108—Remote banking, e.g. home banking
- G06Q20/1085—Remote banking, e.g. home banking involving automatic teller machines [ATMs]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3576—Multiple memory zones on card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4012—Verifying personal identification numbers [PIN]
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Definitions
- the present invention relates to an information storage medium having a memory area, an IC chip having a memory area, an information processing apparatus having an Ic chip having a memory area, a memory management method for an information storage medium, Information storage media used in information processing devices such as mobile phones and PDAs (Personal Digital Assistants), IC chips with memory areas, information processing devices with IC chips with memory areas, and information storage media. It concerns memory management methods.
- the present invention relates to an information storage medium having one or more applications allocated on a memory area, an IC chip having a memory area, an information processing apparatus having an IC chip having a memory area, and an information storage medium.
- the present invention relates to a memory management method, in particular, an information storage medium for controlling access rights to each application assigned to a memory area, an IC chip having a memory area, an information processing apparatus having an IC chip having a memory area, and information.
- the present invention relates to a memory management method for a storage medium.
- the present invention relates to a portable terminal equipped with an IC chip driven and driven by wireless communication with an external device, and an IC card used in association with the portable terminal.
- TECHNICAL FIELD The present invention relates to a mobile terminal equipped with an IC chip having a memory function, which is driven by being supplied with power, and a control method thereof, and an IC card having a memory function.
- the present invention relates to a mobile terminal in which one or more applications are assigned to a memory area on an IC chip and a control method thereof, and an IC card in which one or more applications are assigned to a memory area.
- a mobile terminal that controls access rights for each application allocated to a memory area on an IC chip, a method of controlling the mobile terminal, and each application allocated to a memory area It relates to an IC card that controls access rights every time.
- PIN refers to a character string represented by a combination of numbers from 0 to 9
- Password refers to general characters such as alphabets in addition to numbers.
- a password and a password are collectively referred to as a "password."
- a cash dispenser when using a cash card at a bank or other financial institution, use a cash dispenser to prompt the user to enter a PIN or password as a means of personal identification. After confirming that the correct PIN and password have been entered, the withdrawal operation is performed from a cash dispenser or the like.
- security code applications such as entering a security code at a safety box installed in a hotel or other accommodation facility, entering a password when logging in to a computer, or concealing information on an information terminal.
- security code applications such as entering a security code at a safety box installed in a hotel or other accommodation facility, entering a password when logging in to a computer, or concealing information on an information terminal.
- a storage medium such as a magnetic stripe provided on one bank cash card has only a storage area that can be used only for that bank. Therefore, the input of the password or the password as described above is merely an access to the single storage area. Therefore, the user needs to prepare a force for each purpose or application and use multiple cards properly.
- IC readers / writers installed at cash dispensers, entrances and exits of concert venues, and ticket gates at stations can access the IC readers held by users without contact.
- the user enters a password or passcode into the IC reader, and checks the entered password or password against the password or password stored on the IC card.
- IC card and IC card Confirmation or authentication processing is performed. If the identity verification or the authentication processing is successful, for example, the application stored in the IC card can be used.
- examples of the application held by the IC card include value information such as electronic money and electronic tickets.
- IC cards having a relatively large storage space have emerged and are becoming popular. Since a conventional cache card has only a single storage area, that is, a single application, it is necessary to carry a plurality of cards for each application or purpose.
- a plurality of applications can be stored simultaneously, so that one IC card can be used for a plurality of purposes.
- one IC card stores two or more applications, such as an electronic cashier for electronic payment and an electronic ticket to enter a specific concert venue, and stores one IC card. It can be applied to various uses.
- an IC card with a large-capacity memory function or an IC chip having a carrier and / or authentication function as a semiconductor chip
- a mobile terminal such as a mobile phone
- users can exchange electronic value information with external parties such as electronic payment.
- the magnetic stripe on the cache card manages the security of the entire card by having a single PIN or password.
- An object of the present invention is to provide an excellent information storage medium having a memory area, an IC chip having a memory area, an information processing apparatus having an IC chip having a memory area, and a memory management method for the information storage medium. Is to provide.
- a further object of the present invention is to provide an excellent information storage medium, an IC chip having a memory area, and a memory area, which can be mounted on an information processing device such as a mobile phone or a PDA (Personal Digital Assistant).
- An information processing apparatus having an integrated circuit chip and a memory management method for an information storage medium.
- a further object of the present invention is to provide an information processing medium having an excellent information storage medium, an IC chip having a memory area, and an IC chip having a memory area, to which one or more applications can be allocated on the memory area.
- An object of the present invention is to provide a memory management method for a device and an information storage medium.
- a further object of the present invention is to provide an excellent information storage medium, an IC chip having a memory area, and an IC chip having a memory area, which are capable of controlling an access right to each application allocated to the memory area.
- An object of the present invention is to provide a memory management method for an information processing apparatus having an information storage medium.
- a further object of the present invention is to provide an excellent information storage medium, an IC chip having a memory area, and an IC chip having a memory area, which can efficiently manage a plurality of applications allocated to the memory area.
- Information processing device, information storage medium An object of the present invention is to provide a memory management method for a body.
- the present invention has been made in consideration of the above problems, and a first aspect of the present invention is a memory management method for an integrated circuit device or an information storage device, wherein a memory allocation for allocating the memory area to each application is performed. Means or steps;
- the access permission / prohibition state management means or step sets an application in which an identification code is set to an access impossibility state by default, and responds to the fact that the authentication code input by the user matches the access permission state.
- a memory management method for an integrated circuit device or an information storage device is configured as, for example, an IC chip.
- a cartridge equipped with an IC chip and an antenna and configured as a credit card size dog is generally called an “IC card”.
- IC chips are used in mobile terminals such as mobile phones and PDAs, and in other information processing devices.
- an IC card is inserted into an information processing device for use.
- the IC chip or IC card can be used in functions related to value information such as prepaid electronic money and electronic tickets.
- the functions provided by the IC chip or IC card are also referred to as “applications”.
- the memory allocating means or step can manage the memory space of the IC card in a hierarchical structure by allocating the memory area to the application hierarchically using the directory. By putting related applications in the same directory, such as multiple applications used in a series of transactions, users can efficiently classify and organize applications. it can.
- the external device is equipped with a card reader so that the IC chip can use the wireless interface. -Can be accessed via The right to access the memory area such as an IC chip is controlled by matching the security code.
- a password may be entered on an information processing device with a built-in IC chip to release the lock, and then wirelessly connected to an external device to allow access to the memory area.
- the access right may be controlled based on a password input on the external device.
- the security code setting means or step may set a security code for controlling an access right to each application and directory.
- the access permission / prohibition state management means or step sets the application and the directory in which the password is set to the access disabled state by default, and responds to the fact that the verification code entered by the user matches.
- the corresponding application or directory can be set to the access permission state.
- the access permission / prohibition state management means or step in response to the security code input by the user matching the security code set in the directory, permits access to all applications and subdirectories under the directory. You may make it a state.
- a hierarchical structure is introduced in the memory space, and the directory is assigned to each application, thereby Applications can be managed efficiently in units.
- a security code is also set for a directory.
- access rights can be controlled more efficiently on a per-directory basis.
- a memory management method for an integrated circuit device or an information storage device includes a secret key setting for setting a secret key for authentication for each application and directory allocated to the memory area. It may further comprise means or steps.
- the access permission / prohibition state management means or step sets the application or directory in the access impossibility state to the access permission state through mutual authentication using a secret key with a predetermined certificate authority. You can also.
- the information processing apparatus may further include an access prohibiting unit or a step of returning the application and the directory in the access permitted state to the inaccessible state in response to the power supply to the integrated circuit device or the information storage device being cut off.
- all applications and directories are automatically set to an access-prohibited state in response to the power-off of the IC card. As such, it can be prevented from being misused by other malicious users.
- a maximum allowable input failure frequency setting means or step for setting the allowable input failure frequency may be further provided.
- the access permission state management means or step can set the application or directory in which the number of input failures reaches the maximum allowable number of inputs to the inaccessible state.
- system may further include an input failure frequency initialization means or step for clearing the input failure frequency stored in the input failure frequency holding means or step by an administrator who has undergone a mutual authentication process with a predetermined certificate authority.
- a semiconductor integrated circuit device having a memory area
- One or more applications the access rights of which are controlled by a security code, assigned to the memory area;
- a wire interface for wire communication with the semiconductor integrated circuit device, and a user input means for allowing a user to input a password or other data
- the security code input from the user input means is transferred to the semiconductor integrated circuit device through the wired interface, and is compared with the security code of each application allocated to the memory area.
- Access right control means for giving the user an access right for an application whose password is identical as a result of the comparison and collation by the collation means;
- the mobile terminal device referred to here is, for example, a mobile phone or a PDA (Personal Digital
- a semiconductor integrated circuit device refers to an IC chip or the like that realizes an access operation with an authentication function.
- the IC chip mounted on the portable terminal device includes a reader
- Wireless interface for wireless connection to external devices such as a PC / writer, and wired interface for internal connection to the built-in controller of the mobile terminal etc.
- the reader / writer In response to wireless connection with the reader / writer, it can be driven by radio waves arriving there.
- the IC chip mounted on the portable terminal device has a memory area.
- One or more applications are allocated on this memory area.
- the access right of each application is controlled by a security code such as a security code and a passcode.
- the applications mentioned here include value information such as electronic money and electronic tickets.
- the security code entered on the reader / writer can be input to the IC chip via the wireless interface.
- a security code input from a user input device such as a keyboard on a portable terminal device can be input to the IC chip via a wired interface. Then, the authentication codes input from the wireless interface or the wired interface are compared and collated, and the access right to the corresponding application is given by the matching.
- a security code of a desired application is input on a mobile terminal device, and then the mobile terminal is held over an external device such as a reader / writer.
- an external device such as a reader / writer.
- the application to be used on the external device as it is (for example, electronic payment). Therefore, the user can perform the collation processing by inputting the security code on his or her own portable terminal, not the user interface on an external device to which the operation is unfamiliar. That is, a password may be entered on an information processing device having a built-in IC chip to release the lock, and then wirelessly connected to an external device to allow access to the memory area.
- the access right may be controlled based on a password input on the external device.
- the access right control means may allow an external device to access the application to which the access right has been given by wireless communication via the wireless interface.
- the access right control means is connected via the wireless interface.
- the transaction termination processing may be performed. Therefore, since the access right of the application is not given as it is after use, it is impossible to use the application without permission, for example, if the mobile terminal device is lost or stolen. Disappears. Therefore, the user can avoid unauthorized use or plagiarism of the value information such as electronic money.
- the access right control means in response to a response to a command transmitted from the IC chip via the wireless interface not being received within a predetermined time, responding to an external device connected via the wireless interface Equipment and said
- the termination processing may be performed assuming that a series of transactions with the Ic chip has been completed normally or abnormally. Therefore, after the wireless connection to the external device is cut off, the application access right will not be kept as it is, so if the mobile terminal device is lost or stolen, the application will be used without permission. It will not be used. Therefore, the user can avoid unauthorized use or plagiarism of the value information such as electronic money.
- a portable terminal device includes: a security code registration unit for registering a security code in advance for each application; a program activation unit; and a security code corresponding to an application corresponding to the activated program.
- Password input means for inputting the password to the IC chip via the wired interface.
- the user selects a desired program via a menu screen displayed on the display or the like, and the corresponding program is called on the mobile terminal.
- a password for the corresponding application is input to the IC chip via the wired interface to give access rights. Therefore, the user can omit the operation of inputting the password of the application to be used, and the operability is improved.
- a mobile terminal equipped with an IC chip can display a dialog on the display or emit a warning sound to notify the user. Therefore, when the user wants to use the application by holding the portable terminal device over an external device such as a reader / writer, the user can surely remember that it is necessary to input the PIN code. The use of applications in various aspects of daily life is smooth. Further, a third aspect of the present invention is a communication method using a portable terminal device equipped with a semiconductor integrated circuit device having a memory area and communicating with an external device,
- the portable terminal device includes a wireless interface for the semiconductor integrated circuit device to wirelessly communicate with the external device, and a wired interface for wired communication with the semiconductor integrated circuit device in the portable terminal device.
- One or more applications whose access rights are controlled by a security code are assigned to the memory area
- a user input step of inputting a secret code from a user
- the semiconductor integrated circuit device mounted on the portable terminal device includes, for example, an IC chip, and a wireless interface for wirelessly connecting to an external device such as a reader / writer. It has a wired interface for internal connection with a controller on the mobile terminal device side, and can be driven by radio waves in response to wireless connection with a reader / writer.
- a semiconductor integrated circuit mounted on a portable terminal device has a relatively large memory area.
- One or more applications are allocated on this memory area.
- the access right of each application is controlled by a security code such as a password or password.
- the applications referred to here include value information such as electronic money and electronic tickets.
- the security code entered on the reader / writer can be input to the IC chip via the wireless interface.
- a security code input from a user input device such as a keyboard on a mobile terminal device can be input to an IC chip via a wired interface. Then, the authentication codes input from the wireless interface or the wired interface are compared and collated, and the access right to the corresponding application is given by the matching.
- a security code of a desired application is input on a mobile terminal device, and then the mobile terminal is held over an external device such as a reader / writer.
- the application can be used as it is on an external device (for example, electronic payment). Therefore, the user can input the security code on his or her own portable terminal that is familiar with the operation and receive the collation processing, not the user interface on an external device with which the operation is unfamiliar.
- access to the application to which the access right has been given from an external device through wireless communication via the wireless interface may be permitted.
- the access right control step in response to the detection of radio waves from the external device connected via the wireless interface not being detected, a series of transactions related to the application to which the access right has been granted is completed. , And the transaction end processing may be performed. Therefore, since the access right of the application is not given after use, the application is not used without permission, for example, when the portable terminal device is lost or stolen. Therefore, the user can avoid unauthorized use or plagiarism of the value information such as electronic money.
- the wireless communication from the IC chip is performed.
- a series of transactions between the external device connected via the wireless interface and the IC chip has been completed normally or abnormally in response to the response to the command transmitted via the interface not being received within a predetermined time.
- the termination process may be performed. Therefore, after the wireless connection to the external device is cut off, the application access right is not left as it is, so if the mobile terminal device is lost or stolen, the application will It will not be used without permission. Therefore, the user can avoid unauthorized use or plagiarism of the value information such as electronic money.
- the communication method for a portable terminal device is a method for registering a security code in advance for each application, a security code registration step, a program starting means, and a corresponding application according to the started program.
- a password code inputting step of inputting the password to the semiconductor integrated circuit device via the wired interface is a case, the user selects a desired program through a menu screen or the like displayed on the display, and the corresponding program is called on the mobile terminal. Then, in response to the activated program, a password for the corresponding application is input to the semiconductor integrated circuit device via the wired interface to give access right. In such a case, the user can omit the operation of inputting the password of the application to be used, and the operability is improved.
- the information processing apparatus may further include a step of notifying via the wired interface.
- the mobile terminal device can notify the user by causing a dialog to appear on the display or issuing a warning sound. Therefore, when the user wants to use the application by holding the mobile terminal over an external device such as a reader / writer, the user can surely remember that it is necessary to input a PIN code. The use of applications is facilitated in various aspects of life. Further objects, features, and advantages of the present invention will become apparent from more detailed description based on embodiments of the present invention described below and the accompanying drawings.
- FIG. 1 is a diagram schematically showing a hardware configuration of a portable terminal 10 according to an embodiment of the present invention.
- FIG. 2 is a diagram conceptually showing a wireless communication mechanism between the reader / writer and the IC chip 50 based on electromagnetic induction.
- FIG. 3 is a diagram in which a system composed of the reader / writer 101 and the IC chip 50 is modeled as a single transformer.
- FIG. 4 is a block diagram showing a functional configuration in the IC chip 50 built in the portable terminal 10 according to the first embodiment of the present invention.
- FIG. 5 is a diagram schematically showing a configuration example of a memory space in the memory 52 shown in FIG.
- FIG. 6 is a diagram schematically showing the data structure of the personal identification code definition area.
- Figure 7 shows the directory or application according to the password entered by the user.
- FIG. 4 is a flowchart showing a processing procedure for controlling an access right to a session.
- FIG. 8 is a flowchart showing a processing procedure for controlling access rights to a directory or an application using a secret key instead of a password input by a user.
- FIG. 9 is a flowchart showing a processing procedure for controlling access right to an application or a directory based on the number of password code input failures.
- FIG. 10 is a diagram schematically showing a mechanism for automatically turning off a memory area in an access permitted state by shutting off a power supply.
- FIG. 11 is a diagram showing a functional configuration in an IC chip 50 built in a portable terminal 10 according to the second embodiment of the present invention.
- Fig. 12 shows the security code input from the user input device 11 on the mobile terminal 10.
- 9 is a flowchart showing a processing procedure for permitting access to an application assigned to the memory 52 by the collation processing.
- FIG. 13 is a flowchart showing a processing procedure for controlling the access right of the application based on the detection result of the transmission radio wave from the external device 50.
- FIG. 14 is a flowchart showing a processing procedure for controlling the access right of the application by a response from the external device 100 to the transmission command from the IC chip 50.
- Fig. 15 shows the processing procedure for prompting the portable terminal to input a password in response to the wireless connection of the IC chip 50 to the external device 100 via the RF unit 51.
- 5 is a flowchart showing the process of FIG.
- FIG. 16 is a diagram schematically illustrating a hardware configuration of a portable terminal 10-2 according to the third embodiment of the present invention.
- FIG. 17 is a flowchart showing a processing procedure for omitting the input of a security code by starting the program.
- FIG. 1 schematically shows a hardware configuration of a portable terminal 10 according to an embodiment of the present invention.
- the mobile terminal 10 is, for example, an information processing terminal such as a mobile phone or a PDA (Personal Digital Assistant), which is configured to be small and lightweight and can be carried by the user.
- PDA Personal Digital Assistant
- the illustrated portable terminal 10 is driven by being supplied with power by wireless communication with an external device, is equipped with an IC chip 50 having a memory function, and comprehensively controls the operation in the portable terminal 10.
- a controller 11 a user input device 12 consisting of keys / buttons for the user to input various character strings and commands such as a password and a password, and a liquid crystal display for displaying the processing results on the screen (L
- a display device 13 such as a CD (liquid crystal display) is provided.
- peripheral devices and circuit components other than those illustrated may be provided in order to realize the original function of the mobile terminal 10.
- a credit card with an IC chip mounted with an antenna and a large size cartridge is generally called an “IC card”.
- the form in which the portable terminal 10 is equipped with the IC chip 50 is not unique.
- an IC in the form of a semiconductor chip may be incorporated together with a wireless antenna, or an IC chip configured as a card, that is, an IC card may be inserted into a card slot provided in the mobile terminal 10. You may use it.
- the IC chip or the IC card there are functions related to value information such as a prepaid electronic money manager and an electronic ticket.
- the functions provided by the IC chip or IC card are also referred to as “applications”.
- the controller 11 is configured by integrating a CPU (Central Processing Unit), a ROM (Read Only Memory), a RAM (Random Access Memory), and the like.
- the controller 11 controls various operations in the portable terminal 10 by executing a program 'code stored on the ROM.
- the IC chip 50 has a wireless interface 14 for wireless connection to the external device 100 and a wired interface 15 for wired connection to the controller 11 of the portable terminal 10. It has.
- the wireless interface 14 for example, the contact interface standard defined in ISO 7816, or ISO 14
- the wireless interface standard defined in 4 4 3 can be used.
- the connection method between the IC chip 50 and the external device 100 will be described later.
- the IC chip 50 employs, for example, a non-contact IC chip technology, and is driven by radio waves from an external device 100 received via a wireless interface X-face 14. In other words, when the user does not hold the portable terminal 100 over the external device 100, radio waves from the external device 100 do not reach, and the operation of the IC chip 50 is reduced. In this embodiment, the IC chip responds to the interruption of the radio wave.
- the IC chip 50 has a memory area. Notes like this The re-area is provided by miniaturization technology and the like.
- the memory area is composed of a semiconductor memory, a magnetic stripe, or another readable / writable storage medium.
- One or more applications are allocated on this memory area. Examples of applications mentioned here include value information such as electronic money and electronic tickets.
- a hierarchical structure is introduced in the memory space in the IC chip 50, and by allocating directories to each application, applications can be managed efficiently in units of directories. Details of this point will be described later.
- passwords such as passwords and passwords are set for each application. Access rights to the memory area are controlled. For example, the security code entered via the wireless interface 14 or the wired interface 15 is compared with the security code of each application, and the access right for the matching application is given. (See below).
- a hierarchical structure is introduced in the memory space, and a directory is assigned to each application.
- a secret code is also assigned to the directory. Can be set. Therefore, in addition to controlling access rights on a per-application basis, it is possible to control access rights efficiently on a per-directory basis. However, the details of controlling access rights will be described later.
- the external device 100 is a device that uses an application allocated to the memory area of the IC chip 50, and is, for example, a device for wirelessly connecting to the IC chip 50 by applying a contactless IC chip technology. Reader / Writer 101 is included.
- the external device 100 also includes a circuit component that performs arithmetic processing for a specific business, peripheral devices, a display device and an input device for performing interactive input with a user (none of which are shown). ) Is equipped.
- the external device 100 is, for example, an ATM (Automatic Teleler Machine) terminal in a bank.
- Devices that process electronic value information such as devices that use electronic money, such as end-uses, devices that use electronic tickets, such as gates at concert venues, ticket gates at train stations and airports, and safety boxes at accommodations It is equivalent to a device that performs identity verification, authentication, and proof processing as shown in Fig. 1.
- the user inputs a personal identification code from the user input device 12 on the mobile terminal 10 and releases the lock.
- the value input by the user is confirmed on the display device 13 and the personal identification code input to the IC chip 50 built in the mobile terminal 10 is transmitted via the wired interface 15. Get out.
- the security code set in each application or each directory on the memory area is compared with the password input by the user.
- the user is given access to the memory area allocated to the matching application or directory.
- the access right to the application is controlled based on the password input on the external device 100. You may make it.
- FIG. 2 conceptually illustrates the mechanism of wireless communication between the reader / writer 101 and the IC chip 50 based on electromagnetic induction.
- the reader / writer 101 has an antenna L RW composed of a loop coil, and generates a magnetic field around the antenna L RW by applying a current I RW to the antenna LBW .
- the IC chip 5 0 side, the electrical loop 'coil L e around the IC chip 5 ⁇ is Katachi ⁇ .
- the coil L c ends occur voltage induced by the magnetic field loop ⁇ antenna L e of the reader / Lai evening 1 0 1 side emits, IC chip connected to the loop 'coil L c end Input to terminal 50.
- the coupling between the antenna L RW on the reader / writer 101 and the loop coil C on the IC chip 50 varies depending on the mutual positional relationship, but the system forms one transformer. It can be modeled as shown in Fig. 3.
- the reader / writer 101 modulates the current I RW flowing through the antenna L KW to Voltage induced in the loop 'coil L e on the chip V.
- the reader / writer 101 can transmit data to the IC chip 50 overnight using the modulation.
- the password is used to obtain access rights to applications and directories, such as a password entered by the user on the external device 100 side, such as a password. Includes value information provided by applications such as.
- IC chip 5 0 single lifting the reader / Lai evening 1 0 function to change the load between depending on the de Isseki for returning the loop.
- the reader / writer 101 can receive the return data of the IC chip 50.
- the data received by the external device 100 from the IC chip 50 includes value information provided by abbreviation such as electronic money and electronic tickets.
- a hierarchical structure using a directory is introduced into a storage area in an IC chip 50 built in the portable terminal 10. Then, each application assigned to the memory area can be registered in a directory of a desired hierarchy. For example, by registering closely related applications, such as applications used for a series of transactions, in the same directory (and registering closely related subdirectories in the same directory), the memory area can be saved. The arrangement of applications and directories is tidy, and users can efficiently classify and organize applications.
- a password can also be set for each directory. For example, by inputting the corresponding security code to a certain directory, it is possible to grant access to all applications (and subdirectories) in the directory through verification and authentication processing. You. Therefore, for example, a single passcode input to the relevant directory can be used to gain access rights for all applications used in a series of transactions, thus improving access control and improving device efficiency. Usability is improved.
- FIG. 4 illustrates a functional configuration in an IC chip 50 built in the mobile terminal 10 according to the present embodiment.
- the IC chip 50 includes an RF unit 51 to which an antenna for performing wireless communication with the reader / writer 101 of the external device 100 is connected, for example, purchased ticket information. 52, which has a storage area allocated for each application such as bank and bank depositor information (electronic money management), a matching unit 53 that compares and matches PIN codes, and a wired interface 54
- the control unit 55 controls the components of the system in a comprehensive manner.
- the control unit 55 is configured by integrating a CPU (Central Processing Unit), a ROM (Read Only Memory), a RAM (Random Access Memory), and the like.
- the control unit 55 controls the operation in the IC chip 50 by executing the program code stored in the ROM. Further, the control unit 55 can communicate with the controller 11 of the portable terminal 10 via the wired interface 54.
- the memory 52 is used for allocating a storage area to one or more applications.
- the memory 52 may be a readable and writable storage medium, such as a magnetic stripe, in addition to a semiconductor memory, and is not limited to a specific device.
- a hierarchical structure using directories is introduced into the memory space of the memory 52. That is, each application assigned to the memory area can be registered in a directory of a desired hierarchy. For example, applications that are closely related, such as applications used for a series of transactions, can be registered in the same directory (and subdirectories that are closely related can be registered in the same directory).
- the application and directory allocated in the memory 52 have a password code definition area. Therefore, a password can be set for each application or for each directory. Also, memory 5 2 The access right to is performed on a per-application basis as well as on a per-directory basis. The detailed description of the hierarchical structure and the control of the hierarchical access right in the memory 52 and the password code definition area will be described later.
- the collating unit 53 compares the security code sent through the wired interface 54 with the security code set in the memory area allocated to each application or directory, and checks the matching memory area. Allow access. The memory area to which access is permitted becomes readable and writable from the reader / writer 101 via the RF unit 51.
- the password transmitted through the wired interface 54 is, in short, a password input by the user on the mobile terminal 10. That is, according to the present embodiment, the user does not input the security code on his or her own portable terminal 10 that is familiar with the operation, instead of the user interface on the external device 100 with which the operation is unfamiliar. Then, it can be subjected to the collation processing.
- FIG. 5 schematically shows a configuration example of a memory space in the memory 52 shown in FIG.
- directory 1 corresponding to the root directory includes application 1A and application 1B, and directory 2 corresponding to a subdirectory.
- the directory 2 and below contain the application 2A and the directories 3-1 and 3-1 corresponding to subdirectories.
- the directory 3-1 and below contain the application 3-1A and the application 3-1B, and the directory 3-1 and below contain the application 2-2A, the application 2-2B and the application 3-1B. Contains 3—2C.
- a password code definition area is provided for each application and directory allocated on the memory 52.
- Fig. 6 schematically shows the data structure of the password code definition area.
- the security code definition area includes a security code area, an input failure frequency storage area, a maximum allowable input failure frequency setting area, a security code use selection area, and an access permission flag. Been I have.
- the IC chip 50 When accessing each application or directory, the IC chip 50 prompts the user to enter a security code. For example, a warning sound is emitted on the mobile terminal 10 or a dialog is displayed on the display device 13 to prompt the user to input a personal identification code.
- the access permission flag in the security code definition area of the corresponding application or directory is set, and access to that area is permitted.
- the access permission flag is a flag for indicating an access permission / prohibition state of the corresponding application or directory, and the application or directory for which the access permission flag is set is in an access permission state.
- the access permission flag of the application or directory to which the security code is set is inaccessible by default, and the access permission flag is set after successful verification of the security code and authentication using the secret key. Change to access permission status. Also, if the access permission flag is set continuously, if the IC chip 50 or the portable terminal 10 is lost or stolen, the user may be damaged due to unauthorized use of the application or directory without permission. .
- the IC chip 50 according to the present embodiment has a mechanism for automatically disabling the access permission state, and details thereof will be described later.
- the record in the entry failure count storage area is updated. Then, when the number of input failures reaches the maximum allowable input failures set in the maximum allowable input failures setting area, access to the corresponding application or directory is prohibited.
- the number of failed attempts should be cleared once successful. In this way, a malicious user is prevented from looking at the PIN code in an exhilarating manner. Also, if the user erroneously reaches the maximum allowable number of input failures and fails to input the PIN code, only the administrator managing the IC chip 50 can clear the input failure count storage area. Good. For the authentication of the administrator, for example, authentication using a secret key as described later can be used. If a password is entered and access is permitted to the directory, access to all lower-level applications and directories can be permitted. For example, as shown in directory 2 in Fig. 5, a security code for the directory itself and a security code for the lower-level directory are separately arranged to control access rights only to applications belonging to directory 2. It is also possible to set a security code and a security code that controls the access rights of only directories 3-1 and 3-2 below the directory 2.
- a secret key can be set for each application or directory separately from the PIN code. Therefore, it can be used as an authentication means separately from personal authentication by inputting a personal identification code.
- FIG. 7 shows, in the form of a flowchart, a processing procedure for controlling an access right to a directory or an application in accordance with a password input by a user.
- step S1 When the user inputs a security code (step S1), the collating unit 53 accesses the security code definition area of the application or directory in the memory space and determines whether the security code matches (step S1). Step S2).
- the access permission flag in the security code definition area is set, and the access is permitted (step S3).
- a password input by the user on the user input device 12 of the mobile terminal 10 can be transmitted to the IC chip 50 via the wired interface 54.
- connect the IC chip 50 to the external device 100 It is also possible to transmit the data input using the user interface of the external device 100 to the IC chip via the wireless interface, that is, the RF unit 51, by holding the device over the interface 1.
- FIG. 8 shows, in the form of a flowchart, a processing procedure for controlling the access right to a directory or an application using a secret key instead of a password input by a user.
- an authentication process is performed with a predetermined certificate authority using a secret key set for a desired directory or application (step s iDo
- step S12 the access permission flag in the password code definition area is set to enable access (step S13).
- the access right control of the application and the directory is performed by using both the collation processing with the password input by the user as shown in FIG. 7 and the authentication processing using the secret key shown in FIG. You may do so.
- applications and directories can be protected from unauthorized or unauthorized use with a higher level of security.
- a malicious user could break the security barrier by scrutinizing the security code. (Especially when a security code with a small number of digits is used). For this reason, in the present embodiment, in the password code definition area, the maximum allowable number of input times is set, and the application or directory in which the number of input failures has reached the maximum allowable number of input times is set to an inaccessible state. Access control.
- FIG. 9 shows, in the form of a flowchart, a processing procedure for controlling the access right to an application or a directory based on the number of password code input failures.
- the collating unit 53 accesses the security code definition area of the application or directory in the memory space and determines whether the security code matches (step S21). S22). If the authentication code of the application or directory matches the password input by the user, the access permission flag in the password code definition area is set, and the corresponding application or directory is made accessible ( Step S23).
- step S24 if the password of the application or the directory does not match the password input by the user, the number of input failures in the password code definition area is updated (step S24).
- step S25 it is determined whether or not the updated number of input failures has reached the maximum allowable number of inputs set in the password code definition area (step S25) o
- step S26 If the number of input failures reaches the maximum allowable number of times of input, the setting of the access permission flag in the security code definition area is canceled and the corresponding application or directory is made accessible (step S26).
- the administrator managing the IC chip 50 can clear the input failure number storage area. Good.
- authentication using a secret key can be used.
- the access permission flag of each security code definition area is set. Clear all applications automatically And the directory is prohibited from being accessed. As a result, when the IC chip 50 is lost, it can be prevented from being illegally used by another malicious user while the access is permitted.
- FIG. 10 schematically illustrates a mechanism for automatically turning off a memory area in an access permitted state by shutting off a power supply.
- the illustrated mechanism can be realized when the storage area is configured by a storage medium of a type (volatile type) in which storage contents are held by power supply, such as a semiconductor memory.
- the access permission flags 201-1-1 to 201-n are provided in the security code definition area of the application or directory to which the memory area is assigned.
- a contact A and a contact B are provided in each of the access permission flags 2 0 1—1 to 2 0 1—n.
- Each end of the contact A and the contact B can be connected via switches SW1 and SW2 arranged in parallel.
- the access permission state can be set by opening both the contact A and the contact B, and the access inaccessible state can be set by short-circuiting.
- the number of access permission flag controllers 200-2-1-202-n is the same as the number of access permission flags (that is, the same as the total number of applications and directories allocated to the memory area). Provided.
- the voltage detector 203 detects the threshold voltage Vth in the process of lowering the power supply voltage from the initial voltage Vcc to ⁇ [V]. In response to the detection of the threshold voltage V th , the power supply voltage detector 203 short-circuits all the switches SW 1 in the respective access permission flags 201-1 to 20 l to n. . As a result, the contact A and the contact B in each access permission flag 201-1-1 to 210-n are short-circuited irrespective of the state of the other switch SW2. The state can be simultaneously changed to the inaccessible state.
- FIG. 11 illustrates a functional configuration in an IC chip 50 built in a portable terminal 10 according to the second embodiment of the present invention.
- the IC chip 50 is connected to the reader / liner 1 on the external device 100 side.
- RF section 51 to which an antenna that performs wireless communication is connected, and a memory that has a storage area allocated to each application such as purchased ticket information and bank depositor information (electronic money).
- a collating unit 53 for comparing and collating the personal identification code
- a wired interface 54 for controlling these components in a comprehensive manner.
- the control unit 55 includes a CPU (Central Processing Unit), a ROM (Read Only Memory),
- the control unit 5 5 executes the program code stored in the ROM to execute the IC chip.
- control unit 55 can communicate with the controller 11 of the portable terminal 10 via the wired interface 54.
- an area is allocated for each application.
- areas are allocated to the application A, the application B, and the application C on the memory 52.
- a password for personal identification or authentication processing is set for each application as needed.
- the area assigned to the application includes a security code area for storing a security code.
- the memory 52 is readable and writable, such as a semiconductor memory or a magnetic stripe. Any storage medium may be used, and is not limited to a specific device.
- the collation code transmitted through the wired interface 54 is collated by the collation unit 53 with the security code set in the memory area allocated to each application. Allows access to the matched memory area.
- the memory area to which access is permitted can be read and written from the reader / writer 101 via the RF section 51.
- the password transmitted through the wired interface 54 is, in short, a password input by the user on the mobile terminal 10. That is, according to the present embodiment, the user does not input the security code on his or her own portable terminal 10 that is familiar with the operation, instead of the user interface on the external device 100 with which the operation is unfamiliar. Then, it can be subjected to the collation processing.
- FIG. 12 is a flowchart showing a processing procedure for permitting access to the application allocated to the memory 52 by the verification processing of the authentication code input from the user input device 11 on the mobile terminal 10. The format is shown.
- the application access permission procedure will be described with reference to the flowchart shown in FIG.
- the user uses the user input device 11 on the portable terminal 10 to input a personal identification code (step S101).
- the PIN code thus input is transferred to the collating unit 53 in the IC chip 50 via the wired interface 52 (step S102).
- the verification unit 53 compares and compares the personal identification code set for each application allocated to the memory 52 with the personal identification code input via the user input device 12 (Step S). 10 3).
- step S104 the user is given an access right with respect to the application whose password is identical.
- the storage area allocated to the application to which the access right has been given can be accessed from the reader / writer 101 side by wireless communication.
- the collation unit 53 not only performs collation processing on the PIN code received via the wired interface 54 (that is, input by the user on the mobile terminal 10), but also performs collation processing. It is also possible to perform collation processing on a password received via the RF unit 51 (that is, input by the user on the external device 100).
- control unit 55 interprets this and notifies it via the wired interface 54.
- the control unit 55 waits for a command from the wired interface 54 after the normal or abnormal termination of the transaction, or turns off the power of the portable terminal 10 (that is, the reader / writer). (The signal from the 50th station is cut off and the energy is reduced.)
- the controller 11 of the portable terminal 10 equipped with the IC chip 50 sends the next command to the IC chip 50 after a predetermined time has elapsed, or FIG. 13 shows, in the form of a flowchart, a processing procedure for controlling an access right of an application based on a detection result of a radio wave transmitted from the external device 50.
- the access right control of the application will be described with reference to this flowchart.
- control unit 55 constantly checks whether or not radio waves are being received via the RF unit 51 (step S 1 1 1).
- control unit 55 performs a process of ending the transaction with the external device 100 (step S113). As a result, the access right to the application assigned to the external device 100 disappears.
- FIG. 14 shows, in the form of a flowchart, a processing procedure for controlling the access right of the application by a response from the external device 100 to the transmission command from the IC chip 50.
- the access right control of the application will be described with reference to this flowchart.
- control unit 55 When the control unit 55 sends a command to the external device 100 via the RF unit 51 (step S121), it checks whether a response to this is returned (step 1S2). 2).
- Step S123 If no response is received within a predetermined period of time after transmitting the command (step S123), a series of transactions between the IC chip 50 and the external device 100 is normally or abnormally terminated. It is determined that the transaction has been performed (Step S124), and the transaction with the external device 100 is terminated (Step S125).
- the application access right is not kept as it is, so if the mobile terminal is lost or stolen, for example, It will not be used without permission. Therefore, the user can avoid unauthorized use or plagiarism of the value information such as electronic money.
- the IC chip 50 performs wireless communication with the reader / writer 55 through the RF unit 41 before the password is input via the wired interface 54, and the external device 10 After sending and receiving data to and from 0, the control unit 55 detects that authentication using a security code is required when further sending and receiving data. This is notified to the controller 11 of the portable terminal 10 through 4.
- FIG. 15 is a flowchart showing a processing procedure for prompting the mobile terminal to input a password in response to the wireless connection of the IC chip 50 to the external device 100 via the RF unit 51.
- the format In the format
- the control unit 55 always checks whether or not the IC chip 50 has been wirelessly connected to the external device 100 via the RF unit 51 (step S1311).
- step S132 when the IC chip 50 is connected to the external device 100 via the RF unit 51 and supplied with power, the control unit 55 communicates with the portable terminal 10 via the wired interface 54. The controller 11 is informed that the password is required to access the memory 52 (step S132).
- the mobile terminal 10 In response to the notification, the mobile terminal 10 emits a warning sound or causes a dialog to appear on the display device 12 so that the user can use the desired application. Prompt for security code. (Step S133).
- the user when the user wants to use the application by holding the portable terminal over an external device such as a reader / writer or the like, the user can surely remember that it is necessary to input the PIN code.
- the use of the application is facilitated in each of the aspects.
- FIG. 16 schematically illustrates a hardware configuration of the mobile terminal 10-2 according to the third embodiment of the present invention.
- the illustrated mobile terminal 10-2 is driven by being supplied with power by wireless communication with an external device, is equipped with an IC chip 50 having a memory function, and controls the operation of the mobile terminal 10 in a comprehensive manner.
- a controller 11 a user input device 12 consisting of keys / buttons for the user to enter various character strings and commands such as a password and a password, and a liquid crystal display for displaying the processing results on the screen (LCD: Liquid Crystal Display).
- LCD Liquid Crystal Display
- the IC chip 5 ⁇ is a wireless interface 14 for wireless connection to the external device 100, and a wired interface 15 for wired connection to the controller 11 on the mobile terminal 10 side. It has.
- the wireless interface 14 for example, the contact interface standard defined in ISO 7816 16 or the wireless interface standard defined in ISO 144443 can be used. (Id.).
- the technology of a contactless IC card is applied, It is driven by radio waves from the external device 100 received via the interface.
- radio waves from the external device 100 do not reach, and the IC chip 50 is deenergized and enters the IC chip 50. Will lose their access rights.
- the IC chip 50 has a relatively large-capacity memory area. Such a memory area is provided by miniaturization technology and the like.
- the memory area is composed of a semiconductor memory, a magnetic stripe, or another readable / writable storage medium.
- One or more applications are allocated on this memory area. Examples of applications mentioned here include value information such as electronic money and electronic tickets.
- the access right is controlled for each application by a security code such as a security code and a password.
- a security code such as a security code and a password.
- the security code input via the wireless interface 14 or the wired interface 15 is compared with the security code of each application, and the access right for the matching application is given. .
- the mobile terminal 10-2 has a password storage area in the controller 11 in the mobile terminal shown in FIG. Therefore, by storing in advance the security code corresponding to the program in the controller 11 in this security code storage area, the security code corresponding to the called program can be stored in the IC via the wired interface. It can be sent to the chip 50 side. Therefore, the user does not need to sequentially input a password in order to use the same application stored in the IC chip 50, and the operability of the device is improved.
- Fig. 17 shows, in the form of a flowchart, a processing procedure for omitting the input of a security code by starting the program.
- a security code is registered in advance for each application (step S144).
- the registered password is stored in a predetermined password storage area in the controller 55.
- step S144 the controller 11 starts the selected program (step S144).
- the controller 11 reads the password corresponding to the application from the password storage area in accordance with the started program, and sends it to the IC chip 50 via the wired interface 15. Yes (Step S 1 4 4) o
- the security code set for each application allocated to the memory area is compared with the security code input via the wired interface 15 (Step S). 1 4 5).
- step S146 the user is given an access right with respect to the application whose password is the same.
- the storage area allocated to the application to which the access right has been given can be accessed by the reader / writer 101 by wireless communication.
- the user selects a desired program via a menu screen displayed on the display or the like, and the corresponding program is called on the mobile terminal. Then, in response to the activated program, a password for the corresponding application is input to the IC chip via the wired interface and the access right can be given. Therefore, the user can omit the operation of inputting the security code of the application to be used, thereby improving the operability of the device.
- the IC chip according to the present invention is used by being incorporated in a portable terminal such as a mobile phone or a PDA has been described as an example, but the gist of the present invention is not limited to this.
- the gist of the present invention is not limited to this.
- the effects of the present invention can be similarly exerted even when an IC chip is used by being built in the device of Eve.
- an excellent information storage medium and a memory area are provided, which can be mounted and used in an information processing device such as a mobile phone or a PDA (Personal Digital Assistant). It is possible to provide an IC chip, an information processing apparatus having an IC chip having a memory area, and a memory management method for an information storage medium.
- an excellent information storage medium and a memory area are provided, which have a memory area and can efficiently control an access right to each application allocated to the memory area.
- an information processing apparatus having an IC chip having a memory area, and a memory management method for an information storage medium.
- each application assigned to the memory area can be registered in a directory, and the memory area can be efficiently managed for each directory. it can.
- a security code can be set for each application and each directory, and the access right can be controlled for each application, or the access right can be controlled for each directory, as the case may be.
- all applications contained in the directory can be provided with an identity or authentication process that is as easy to use as the current IC chip.
- the identity verification or authentication processing by the IC chip according to the present invention can be used together with the authentication method using the secret key. As a result, value information such as electronic money can be handled with higher security.
- the ATM terminal can prompt the mobile terminal to input an appropriate password.
- the personal identification number is automatically called.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- General Engineering & Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Finance (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Databases & Information Systems (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Storage Device Security (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
- Credit Cards Or The Like (AREA)
Description
Claims
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/362,691 US7508946B2 (en) | 2001-06-27 | 2002-06-25 | Integrated circuit device, information processing apparatus, memory management method for information storage device, mobile terminal apparatus, semiconductor integrated circuit device, and communication method using mobile terminal apparatus |
EP02743715A EP1403761B1 (en) | 2001-06-27 | 2002-06-25 | Integrated circuit device, information processing device, information recording device memory management method, mobile terminal device, semiconductor integrated circuit device, and communication method using mobile terminal device |
AU2002346211A AU2002346211B2 (en) | 2001-06-27 | 2002-06-25 | Integrated circuit device, information processing device, information recording device memory management method, mobile terminal device, semiconductor integrated circuit device, and communication method using mobile terminal device |
DE60226978T DE60226978D1 (de) | 2001-06-27 | 2002-06-25 | Integrierte schaltungseinrichtung, informationsverarbeitungseinrichtung, informationsaufzeichnungseinrichtungsspeicher-verwaltungsverfahren, mobilendgeräteeinrichtung, integrierte halbleiterschaltungseinrichtung und kommunikationsverfahren mit tragbarem endgerät |
HK04105722A HK1065604A1 (en) | 2001-06-27 | 2004-08-03 | Integrated circuit device, information processing device, information recording device memory management method, mobile terminal device, semiconductorintegrated circuit device, and communication meth od using mobile terminal device |
US12/402,190 US7742604B2 (en) | 2001-06-27 | 2009-03-11 | Integrated circuit device, information processing apparatus, memory management method for information storage device, mobile terminal apparatus, semiconductor integrated circuit device, and communication method using mobile terminal apparatus |
US12/776,076 US9384618B2 (en) | 2001-06-27 | 2010-05-07 | Integrated circuit device, information processing apparatus, memory management method for information storage device, mobile terminal apparatus, semiconductor integrated circuit device, and communication method using mobile terminal apparatus |
US15/179,058 US10929565B2 (en) | 2001-06-27 | 2016-06-10 | Integrated circuit device, information processing apparatus, memory management method for information storage device, mobile terminal apparatus, semiconductor integrated circuit device, and communication method using mobile terminal apparatus |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2001194749A JP4207404B2 (ja) | 2001-06-27 | 2001-06-27 | 携帯端末及びその制御方法、並びに、icカード |
JP2001194748A JP4207403B2 (ja) | 2001-06-27 | 2001-06-27 | 情報記憶媒体、メモリ領域を備えたicチップ、メモリ領域を備えたicチップを有する情報処理装置、並びに、情報記憶媒体のメモリ管理方法 |
JP2001-194749 | 2001-06-27 | ||
JP2001-194748 | 2001-06-27 |
Related Child Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10362691 A-371-Of-International | 2002-06-25 | ||
US10/362,691 A-371-Of-International US7508946B2 (en) | 2001-06-27 | 2002-06-25 | Integrated circuit device, information processing apparatus, memory management method for information storage device, mobile terminal apparatus, semiconductor integrated circuit device, and communication method using mobile terminal apparatus |
US12/402,190 Division US7742604B2 (en) | 2001-06-27 | 2009-03-11 | Integrated circuit device, information processing apparatus, memory management method for information storage device, mobile terminal apparatus, semiconductor integrated circuit device, and communication method using mobile terminal apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003003194A1 true WO2003003194A1 (fr) | 2003-01-09 |
Family
ID=26617653
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2002/006323 WO2003003194A1 (fr) | 2001-06-27 | 2002-06-25 | Dispositif a circuit integre, dispositif de traitement de l'information, procede de gestion de memoire de support d'information, terminal mobile, dispositif a circuit integre a semi-conducteur, et procede de communication par terminal mobile |
Country Status (7)
Country | Link |
---|---|
US (4) | US7508946B2 (ja) |
EP (1) | EP1403761B1 (ja) |
CN (1) | CN100347667C (ja) |
AU (1) | AU2002346211B2 (ja) |
DE (1) | DE60226978D1 (ja) |
HK (1) | HK1065604A1 (ja) |
WO (1) | WO2003003194A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112784233A (zh) * | 2021-01-28 | 2021-05-11 | 北京三快在线科技有限公司 | 一种身份验证方法及装置 |
Families Citing this family (78)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3797195B2 (ja) * | 2001-10-31 | 2006-07-12 | ソニー株式会社 | 情報処理端末又はその制御方法 |
JP2004118327A (ja) * | 2002-09-24 | 2004-04-15 | Sony Corp | コンテンツ使用制御装置及びコンテンツ使用制御方法、並びにコンピュータ・プログラム |
US7215978B2 (en) * | 2002-10-09 | 2007-05-08 | Nec Corporation | Mobile terminal apparatus, mobile terminal settings changing system, method used therefor, and program thereof |
US20040093496A1 (en) * | 2002-11-04 | 2004-05-13 | Colnot Vincent Cedric | Method and apparatus to secure online transactions on the internet |
WO2004077706A1 (en) * | 2003-02-28 | 2004-09-10 | Philips Intellectual Property & Standards Gmbh | System for determining user preferences |
EP1607906A4 (en) * | 2003-03-25 | 2006-04-12 | Toyoki Sasakura | AUTHENTICATION CARD AND RADIO AUTHENTICATION SYSTEM FOR MUTUAL AUTHENTICATION WITH THE AUTHENTICATION CARD |
JP2004310257A (ja) * | 2003-04-03 | 2004-11-04 | Nec Corp | 非接触ic搭載携帯情報端末、取引情報転送方法、およびプログラム |
US7289533B2 (en) * | 2003-06-06 | 2007-10-30 | Quake Global, Inc. | Universal subscriber communicator module |
JP2005025337A (ja) * | 2003-06-30 | 2005-01-27 | Sony Corp | 機器登録システム、機器登録サーバ、機器登録方法、機器登録プログラム、記憶媒体、及び端末機器 |
JP4158032B2 (ja) * | 2003-09-08 | 2008-10-01 | 日本電気株式会社 | 携帯電話機および間欠受信と定期的に行う必要のある処理との同期方法 |
US20050167512A1 (en) * | 2003-12-15 | 2005-08-04 | Matsushita Electric Industrial Co., Ltd. | Secure device and information processing apparatus |
DE60315047D1 (de) * | 2003-12-19 | 2007-08-30 | Sgs Thomson Microelectronics | Halbleiterschaltung zur Begrenzung von Datenzugang |
JP4428055B2 (ja) * | 2004-01-06 | 2010-03-10 | ソニー株式会社 | データ通信装置及びデータ通信装置のメモリ管理方法 |
US9020854B2 (en) | 2004-03-08 | 2015-04-28 | Proxense, Llc | Linked account system using personal digital key (PDK-LAS) |
JP4315853B2 (ja) * | 2004-04-08 | 2009-08-19 | 富士通株式会社 | Icカード機能を有した携帯機器 |
WO2005114857A1 (en) * | 2004-05-21 | 2005-12-01 | Matsushita Electric Industrial Co., Ltd. | Wireless communications terminal, communications protocol switching method, communications protocol switching program, and integrated circuit of wireless communications terminal |
JP2005352908A (ja) | 2004-06-11 | 2005-12-22 | Ntt Docomo Inc | 移動通信端末及びデータアクセス制御方法 |
JP2005352907A (ja) * | 2004-06-11 | 2005-12-22 | Ntt Docomo Inc | 移動通信端末及びデータアクセス制御方法 |
US8499153B2 (en) * | 2004-06-24 | 2013-07-30 | Nokia Corporation | System and method of authenticating a user to a service provider |
JP4875618B2 (ja) * | 2004-08-13 | 2012-02-15 | テレコム・イタリア・エッセ・ピー・アー | 電子タグに記憶されたデータを安全に管理する方法およびシステム |
CN1700222B (zh) * | 2004-09-21 | 2011-10-05 | 陈澍 | 开放性多商户共享会员卡系统及其应用处理方法 |
GB2422918B (en) * | 2004-10-21 | 2009-03-25 | T Mobile Int Ag & Co Kg | Password protecting method for a mobile communication device, and a mobile communication device for the same |
WO2006069330A2 (en) | 2004-12-20 | 2006-06-29 | Proxense, Llc | Biometric personal data key (pdk) authentication |
KR100670005B1 (ko) * | 2005-02-23 | 2007-01-19 | 삼성전자주식회사 | 모바일 플랫폼을 위한 메모리의 무결성을 원격으로 확인하는 확인장치 및 그 시스템 그리고 무결성 확인 방법 |
DE602005010209D1 (de) * | 2005-04-04 | 2008-11-20 | Research In Motion Ltd | Vorrichtung und Verfahren zum Löschen von vertraulichen Daten |
US8024809B2 (en) * | 2005-04-04 | 2011-09-20 | Research In Motion Limited | System and method for deleting confidential information |
GB0511599D0 (en) * | 2005-06-07 | 2005-07-13 | Ecebs Group Ltd | ITSO FCV2 application monitor |
JP2007041921A (ja) * | 2005-08-04 | 2007-02-15 | Fujitsu Ltd | 非接触ic、情報処理装置、リーダライタおよび利用制限方法 |
EP1760619A1 (en) * | 2005-08-19 | 2007-03-07 | STMicroelectronics Ltd. | System for restricting data access |
JP4361894B2 (ja) * | 2005-09-15 | 2009-11-11 | 株式会社エヌ・ティ・ティ・ドコモ | 外部メモリ管理装置、及び外部メモリ管理方法 |
US7912439B2 (en) | 2005-11-25 | 2011-03-22 | Semiconductor Energy Laboratory Co., Ltd. | Semiconductor device and operating method thereof |
US7684781B2 (en) * | 2005-11-25 | 2010-03-23 | Semiconductor Energy Laboratory Co., Ltd | Semiconductor device |
US9113464B2 (en) | 2006-01-06 | 2015-08-18 | Proxense, Llc | Dynamic cell size variation via wireless link parameter adjustment |
US11206664B2 (en) | 2006-01-06 | 2021-12-21 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
DE102006005075A1 (de) | 2006-02-03 | 2007-08-16 | Giesecke & Devrient Gmbh | Tragbarer Datenträger |
JP4232985B2 (ja) * | 2006-03-31 | 2009-03-04 | 株式会社カシオ日立モバイルコミュニケーションズ | 携帯端末装置およびプログラム |
US7904718B2 (en) | 2006-05-05 | 2011-03-08 | Proxense, Llc | Personal digital key differentiation for secure transactions |
JP4915141B2 (ja) * | 2006-05-29 | 2012-04-11 | 富士通株式会社 | 携帯端末装置 |
US8118223B2 (en) | 2006-09-28 | 2012-02-21 | Visa U.S.A. Inc. | Smart sign mobile transit fare payment |
US20080203170A1 (en) * | 2007-02-28 | 2008-08-28 | Visa U.S.A. Inc. | Fraud prevention for transit fare collection |
US8386349B2 (en) | 2007-02-28 | 2013-02-26 | Visa U.S.A. Inc. | Verification of a portable consumer device in an offline environment |
US8523069B2 (en) | 2006-09-28 | 2013-09-03 | Visa U.S.A. Inc. | Mobile transit fare payment |
US8346639B2 (en) * | 2007-02-28 | 2013-01-01 | Visa U.S.A. Inc. | Authentication of a data card using a transit verification value |
US7527208B2 (en) | 2006-12-04 | 2009-05-05 | Visa U.S.A. Inc. | Bank issued contactless payment card used in transit fare collection |
US8738485B2 (en) | 2007-12-28 | 2014-05-27 | Visa U.S.A. Inc. | Contactless prepaid product for transit fare collection |
US9269221B2 (en) | 2006-11-13 | 2016-02-23 | John J. Gobbi | Configuration of interfaces for a location detection system and application |
JP2008244518A (ja) | 2007-03-23 | 2008-10-09 | Ricoh Co Ltd | 画像形成装置管理システム、画像形成装置、管理装置、端末装置、画像形成装置管理方法、画像形成プログラム |
JP4483891B2 (ja) * | 2007-04-02 | 2010-06-16 | フェリカネットワークス株式会社 | 情報処理端末、データ移動方法、およびプログラム |
US8083677B2 (en) * | 2007-09-24 | 2011-12-27 | Baxter International Inc. | Access disconnect detection using glucose |
EP2048594A1 (en) * | 2007-10-09 | 2009-04-15 | Vodafone Holding GmbH | Method for communication, communication device and secure processor |
WO2009062194A1 (en) * | 2007-11-09 | 2009-05-14 | Proxense, Llc | Proximity-sensor supporting multiple application services |
US8171528B1 (en) | 2007-12-06 | 2012-05-01 | Proxense, Llc | Hybrid device having a personal digital key and receiver-decoder circuit and methods of use |
CN101939963B (zh) * | 2007-12-07 | 2016-11-16 | 法国电信公司 | 用于控制在与移动终端相关联的安全模块上安装的应用的方法、相关联的安全模块、移动终端、和服务器 |
WO2009079666A1 (en) | 2007-12-19 | 2009-06-25 | Proxense, Llc | Security system and method for controlling access to computing resources |
JP4468437B2 (ja) * | 2007-12-27 | 2010-05-26 | フェリカネットワークス株式会社 | 情報処理装置、通信方法、及びプログラム |
US8458293B1 (en) * | 2008-01-17 | 2013-06-04 | Clearwire Ip Holdings Llc | Network access for non-network-enabled devices |
US8508336B2 (en) | 2008-02-14 | 2013-08-13 | Proxense, Llc | Proximity-based healthcare management system with automatic access to private information |
US8789753B1 (en) | 2008-03-28 | 2014-07-29 | Oracle International Corporation | Method for using and maintaining user data stored on a smart card |
WO2009126732A2 (en) | 2008-04-08 | 2009-10-15 | Proxense, Llc | Automated service-based order processing |
JP2009258860A (ja) * | 2008-04-14 | 2009-11-05 | Sony Corp | 情報処理装置および方法、記録媒体、プログラム、並びに情報処理システム |
US8947207B2 (en) | 2008-04-29 | 2015-02-03 | Quake Global, Inc. | Method and apparatus for a deployable radio-frequency identification portal system |
JP5500332B2 (ja) * | 2008-09-12 | 2014-05-21 | ソニー株式会社 | Icチップ、情報処理装置、ソフトウェアモジュール制御方法、情報処理システムおよび方法、並びにプログラム |
JP2010140467A (ja) * | 2008-11-13 | 2010-06-24 | Hitachi Ltd | 生体認証方法、生体認証システム、icカード、および端末 |
US8150314B2 (en) * | 2008-12-09 | 2012-04-03 | Keng Kuei Su | Remote antijamming transmission device and method for the same |
JP5454864B2 (ja) * | 2009-03-18 | 2014-03-26 | 株式会社東芝 | Icカードおよび携帯端末システム |
JP5449905B2 (ja) * | 2009-07-29 | 2014-03-19 | フェリカネットワークス株式会社 | 情報処理装置、プログラム、および情報処理システム |
US9418205B2 (en) | 2010-03-15 | 2016-08-16 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US9322974B1 (en) | 2010-07-15 | 2016-04-26 | Proxense, Llc. | Proximity-based system for object tracking |
US9265450B1 (en) | 2011-02-21 | 2016-02-23 | Proxense, Llc | Proximity-based system for object tracking and automatic application initialization |
US8313036B1 (en) * | 2011-09-16 | 2012-11-20 | Google Inc. | Secure application directory |
JP5541275B2 (ja) * | 2011-12-28 | 2014-07-09 | 富士通株式会社 | 情報処理装置および不正アクセス防止方法 |
WO2013138589A1 (en) * | 2012-03-16 | 2013-09-19 | L-1 Secure Credentialing, Inc. | Ipassport method and apparatus |
US9841492B2 (en) | 2013-02-25 | 2017-12-12 | Quake Global, Inc. | Ceiling-mounted RFID-enabled tracking |
JP6280571B2 (ja) | 2013-02-26 | 2018-02-14 | クエイク グローバル インコーポレイティッドQuake Global, Inc. | 自動識別リストバンドの方法及び装置 |
US9405898B2 (en) | 2013-05-10 | 2016-08-02 | Proxense, Llc | Secure element as a digital pocket |
US9538377B2 (en) * | 2014-08-22 | 2017-01-03 | Salesforce.Com, Inc. | Switching between restricted-access websites on mobile user devices |
WO2016194102A1 (ja) * | 2015-06-01 | 2016-12-08 | 株式会社日立製作所 | 計算機システム、計算機、及び方法 |
EP3435237B1 (en) * | 2016-03-23 | 2022-08-31 | Sony Group Corporation | Information processing device and information processing method |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS62231353A (ja) * | 1986-03-31 | 1987-10-09 | Toppan Moore Co Ltd | Icカ−ド |
JPS62231352A (ja) * | 1986-03-31 | 1987-10-09 | Toppan Moore Co Ltd | Icカ−ド |
JPH0193877A (ja) * | 1987-10-05 | 1989-04-12 | Fujitsu Ltd | Icカード |
JPH01217587A (ja) * | 1988-02-25 | 1989-08-31 | Hitachi Maxell Ltd | Icカード |
JPH0264888A (ja) * | 1988-08-31 | 1990-03-05 | Toshiba Corp | 携帯可能電子装置 |
JPH03141441A (ja) * | 1989-10-27 | 1991-06-17 | Hitachi Ltd | 情報処理装置 |
JPH04304718A (ja) * | 1991-04-02 | 1992-10-28 | Omron Corp | 非接触パスゲートシステムおよびゲート装置 |
JPH0573741A (ja) * | 1991-09-17 | 1993-03-26 | Nippon Signal Co Ltd:The | 自動改札機 |
JPH0660235A (ja) * | 1992-08-13 | 1994-03-04 | Matsushita Electric Ind Co Ltd | Icカード |
JPH06103425A (ja) * | 1992-09-18 | 1994-04-15 | Nippon Telegr & Teleph Corp <Ntt> | Icクレジットカードシステム |
JPH10340231A (ja) * | 1997-06-05 | 1998-12-22 | Kokusai Electric Co Ltd | Icカード |
JPH11161552A (ja) * | 1997-11-28 | 1999-06-18 | Fujitsu Ltd | 可換記憶媒体のデータ保護方法及び、これを適用した記憶装置 |
JP2000011101A (ja) * | 1998-06-19 | 2000-01-14 | Hitachi Ltd | Icカードおよび記録媒体 |
JP2000148567A (ja) * | 1998-09-02 | 2000-05-30 | Internatl Business Mach Corp <Ibm> | スマ―ト・カ―ドのメモリにデ―タ・オブジェクトを記憶する方法 |
JP2001067446A (ja) * | 1999-08-27 | 2001-03-16 | Toppan Printing Co Ltd | 非接触型icカード |
Family Cites Families (333)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US539658A (en) * | 1895-05-21 | Annealing furnaces | ||
JPS4832724B1 (ja) * | 1969-08-18 | 1973-10-08 | ||
JPS55105235A (en) * | 1979-08-15 | 1980-08-12 | Nippon Kogaku Kk <Nikon> | Motor drive unit of camera |
US4351216A (en) * | 1979-08-22 | 1982-09-28 | Hamm Russell O | Electronic pitch detection for musical instruments |
US4523087A (en) * | 1981-04-07 | 1985-06-11 | Benton William M | Transaction verification system using optical coupling data communication link |
US4654482A (en) | 1984-10-15 | 1987-03-31 | Deangelis Lawrence J | Home merchandise ordering telecommunications terminal |
US4829169A (en) * | 1985-07-01 | 1989-05-09 | Toppan Moore Company, Inc. | IC card having state marker for record access |
US4752677A (en) * | 1985-09-25 | 1988-06-21 | Casio Computer Co., Ltd. | Customer service system for use in IC card system |
US4849614A (en) * | 1985-12-27 | 1989-07-18 | Toppan Moore Company, Ltd. | Composite IC card |
US4874935A (en) * | 1986-03-10 | 1989-10-17 | Data Card Coprporation | Smart card apparatus and method of programming same |
JPS62251963A (ja) * | 1986-04-25 | 1987-11-02 | Casio Comput Co Ltd | Icカ−ドの認証方式 |
DE3780008T2 (de) * | 1986-05-16 | 1992-12-24 | American Telephone & Telegraph | Anlage fuer einen tragbaren datentraeger mit mehreren anwendungsdatenbestaenden. |
US5278763A (en) | 1986-05-16 | 1994-01-11 | Qudos Sa | Navigation aids |
US4816653A (en) * | 1986-05-16 | 1989-03-28 | American Telephone And Telegraph Company | Security file system for a portable data carrier |
JP2514954B2 (ja) * | 1987-03-13 | 1996-07-10 | 三菱電機株式会社 | Icカ−ド |
ES2064432T3 (es) * | 1988-02-20 | 1995-02-01 | Fujitsu Ltd | Tarjetas de circuito integrado. |
US4970666A (en) | 1988-03-30 | 1990-11-13 | Land Development Laboratory, Inc. | Computerized video imaging system for creating a realistic depiction of a simulated object in an actual environment |
US5161256A (en) | 1988-08-26 | 1992-11-03 | Kabushiki Kaisha Toshiba | Method and system for allocating file area in memory area of ic card |
KR920006304B1 (ko) | 1988-09-14 | 1992-08-03 | 마쓰시다 덴끼 산교오 가부시기가이샤 | 광디스크재생장치와 광디스크재생방법과 복합기록매체 |
US4982346A (en) | 1988-12-16 | 1991-01-01 | Expertel Communications Incorporated | Mall promotion network apparatus and method |
US5172338B1 (en) * | 1989-04-13 | 1997-07-08 | Sandisk Corp | Multi-state eeprom read and write circuits and techniques |
EP0935255A2 (en) * | 1989-04-13 | 1999-08-11 | SanDisk Corporation | Flash EEPROM system |
US5127099A (en) * | 1989-06-30 | 1992-06-30 | Icom, Inc. | Method and apparatus for securing access to a ladder logic programming and monitoring system |
US5161184A (en) * | 1989-08-09 | 1992-11-03 | Digital Telecommunications Systems, Inc. | Ring-back powered telephone with nonvolatile memory structure |
JPH0377287A (ja) | 1989-08-19 | 1991-04-02 | Mitsubishi Electric Corp | 着脱型気密接栓装置 |
JPH0750871Y2 (ja) | 1989-11-28 | 1995-11-15 | 横河電機株式会社 | 直流安定化電源の並列運転制御装置 |
US5341463A (en) | 1990-01-31 | 1994-08-23 | The United States Of America As Represented By The Secretary Of The Navy | Selective polygon map display method |
JP3147358B2 (ja) | 1990-02-23 | 2001-03-19 | ミノルタ株式会社 | 撮影地データを記録できるカメラ |
US5124915A (en) | 1990-05-29 | 1992-06-23 | Arthur Krenzel | Computer-aided data collection system for assisting in analyzing critical situations |
US5335072A (en) | 1990-05-30 | 1994-08-02 | Minolta Camera Kabushiki Kaisha | Photographic system capable of storing information on photographed image data |
US5761655A (en) * | 1990-06-06 | 1998-06-02 | Alphatronix, Inc. | Image file storage and retrieval system |
US5640151A (en) | 1990-06-15 | 1997-06-17 | Texas Instruments Incorporated | Communication system for communicating with tags |
JP2679889B2 (ja) * | 1990-07-19 | 1997-11-19 | 株式会社テック | 無線通信装置及びその装置の受信制御方式 |
US5905248A (en) | 1990-09-11 | 1999-05-18 | Metrologic Instruments, Inc. | System and method for carrying out information-related transactions using web documents embodying transaction enabling applets automatically launched and executed in response to reading URL-encoded symbols pointing thereto |
US5083638A (en) | 1990-09-18 | 1992-01-28 | Howard Schneider | Automated point-of-sale machine |
JPH04250436A (ja) | 1991-01-11 | 1992-09-07 | Pioneer Electron Corp | 撮像装置 |
GB9100732D0 (en) | 1991-01-14 | 1991-02-27 | Xerox Corp | A data access system |
FR2673476B1 (fr) * | 1991-01-18 | 1996-04-12 | Gemplus Card Int | Procede securise de chargement de plusieurs applications dans une carte a memoire a microprocesseur. |
US5340968A (en) | 1991-05-07 | 1994-08-23 | Nippondenso Company, Ltd. | Information storage medium with electronic and visual areas |
US5359363A (en) | 1991-05-13 | 1994-10-25 | Telerobotics International, Inc. | Omniview motionless camera surveillance system |
US5579535A (en) | 1991-07-01 | 1996-11-26 | Motorola, Inc. | Personal communication system providing supplemental information mode |
JP2644935B2 (ja) | 1991-07-25 | 1997-08-25 | 株式会社日立製作所 | 地形情報処理方法および装置 |
US5602564A (en) | 1991-11-14 | 1997-02-11 | Hitachi, Ltd. | Graphic data processing system |
DE4202761C2 (de) * | 1992-01-31 | 1995-10-05 | Hella Kg Hueck & Co | Schaltung zur Ansteuerung und Überwachung induktiver Lasten, insbesondere von Magnetventilen in einem Antiblockierregelsystem |
TW200624B (en) * | 1992-04-06 | 1993-02-21 | American Telephone & Telegraph | A universal authentication device for use over telephone lines |
US5306958A (en) * | 1992-05-06 | 1994-04-26 | Alliance Semiconductor Corporation | High-speed address transition detection circuit |
WO1993023835A1 (en) | 1992-05-08 | 1993-11-25 | Apple Computer, Inc. | Textured sphere and spherical environment map rendering using texture map double indirection |
US5491651A (en) | 1992-05-15 | 1996-02-13 | Key, Idea Development | Flexible wearable computer |
US5275354A (en) | 1992-07-13 | 1994-01-04 | Loral Vought Systems Corporation | Guidance and targeting system |
DE69320900T3 (de) | 1992-08-13 | 2007-04-26 | Matsushita Electric Industrial Co., Ltd., Kadoma | IC-Karte mit hierarchischer Dateienstruktur |
US5506644A (en) | 1992-08-18 | 1996-04-09 | Olympus Optical Co., Ltd. | Camera |
US5396558A (en) | 1992-09-18 | 1995-03-07 | Nippon Telegraph And Telephone Corporation | Method and apparatus for settlement of accounts by IC cards |
JP3284448B2 (ja) | 1992-11-04 | 2002-05-20 | 株式会社日立製作所 | カーソル形状設定方法 |
JPH06176216A (ja) | 1992-12-02 | 1994-06-24 | Hitachi Ltd | Icカード |
US6675386B1 (en) | 1996-09-04 | 2004-01-06 | Discovery Communications, Inc. | Apparatus for video access and control over computer network, including image correction |
US5444476A (en) | 1992-12-11 | 1995-08-22 | The Regents Of The University Of Michigan | System and method for teleinteraction |
US5815411A (en) | 1993-09-10 | 1998-09-29 | Criticom Corporation | Electro-optic vision system which exploits position and attitude |
US5799318A (en) | 1993-04-13 | 1998-08-25 | Firstfloor Software | Method and apparatus for collecting and displaying information from diverse computer resources |
US5517193A (en) | 1993-04-30 | 1996-05-14 | International Business Machines Corporation | Meteorological workstation |
GB2278196A (en) | 1993-05-18 | 1994-11-23 | William Michael Frederi Taylor | Information system using GPS |
US5373857A (en) | 1993-06-18 | 1994-12-20 | Forte Technologies, Inc. | Head tracking apparatus |
US5424524A (en) | 1993-06-24 | 1995-06-13 | Ruppert; Jonathan P. | Personal scanner/computer for displaying shopping lists and scanning barcodes to aid shoppers |
JP3053527B2 (ja) * | 1993-07-30 | 2000-06-19 | インターナショナル・ビジネス・マシーンズ・コーポレイション | パスワードを有効化する方法及び装置、パスワードを生成し且つ予備的に有効化する方法及び装置、認証コードを使用して資源のアクセスを制御する方法及び装置 |
US5649118A (en) | 1993-08-27 | 1997-07-15 | Lucent Technologies Inc. | Smart card with multiple charge accounts and product item tables designating the account to debit |
US6061064A (en) | 1993-08-31 | 2000-05-09 | Sun Microsystems, Inc. | System and method for providing and using a computer user interface with a view space having discrete portions |
US6037936A (en) | 1993-09-10 | 2000-03-14 | Criticom Corp. | Computer vision system with a graphic user interface and remote camera control |
US6064398A (en) | 1993-09-10 | 2000-05-16 | Geovector Corporation | Electro-optic vision systems |
US7301536B2 (en) | 1993-09-10 | 2007-11-27 | Geovector Corporation | Electro-optic vision systems |
US5659691A (en) | 1993-09-23 | 1997-08-19 | Virtual Universe Corporation | Virtual reality network with selective distribution and updating of data to reduce bandwidth requirements |
US5689641A (en) | 1993-10-01 | 1997-11-18 | Vicor, Inc. | Multimedia collaboration system arrangement for routing compressed AV signal through a participant site without decompressing the AV signal |
US5416730A (en) | 1993-11-19 | 1995-05-16 | Appcon Technologies, Inc. | Arm mounted computer |
JP3594980B2 (ja) | 1993-12-10 | 2004-12-02 | 株式会社東芝 | ファイル管理方式 |
US5578808A (en) | 1993-12-22 | 1996-11-26 | Datamark Services, Inc. | Data card that can be used for transactions involving separate card issuers |
WO1995019030A1 (en) | 1994-01-05 | 1995-07-13 | Pois, Inc. | Apparatus and method for a personal onboard information system |
BE1008029A3 (nl) | 1994-01-18 | 1995-12-12 | Philips Electronics Nv | Werkwijze voor het overdragen van signalen tussen communicatie stations. |
JP3176209B2 (ja) * | 1994-02-25 | 2001-06-11 | 富士通株式会社 | カード型記憶媒体およびカード型記憶媒体発行装置 |
US5699244A (en) | 1994-03-07 | 1997-12-16 | Monsanto Company | Hand-held GUI PDA with GPS/DGPS receiver for collecting agronomic and GPS position data |
US5497411A (en) * | 1994-03-14 | 1996-03-05 | Pellerin; Joseph C. E. | Telecommunications card-access system |
JP4044971B2 (ja) | 1994-03-17 | 2008-02-06 | 株式会社日立製作所 | イメージ情報を用いた検索方法 |
US5729731A (en) | 1994-03-18 | 1998-03-17 | Hitachi, Ltd. | Method of retrieving in a database through image information |
US20020004753A1 (en) | 1996-10-25 | 2002-01-10 | Thomas J. Perkowski | System and method for finding and serving consumer product related information to consumers using internet-based information servers and clients |
US5479351A (en) | 1994-04-22 | 1995-12-26 | Trimble Navigation Limited | Time-keeping system and method for synchronizing independent recordings of a live performance in post-recording editing |
DE69532126T2 (de) | 1994-05-19 | 2004-07-22 | Geospan Corp., Plymouth | Verfahren zum sammeln und verarbeiten visueller und räumlicher positionsinformation |
US5469363A (en) * | 1994-05-19 | 1995-11-21 | Saliga; Thomas V. | Electronic tag with source certification capability |
US6191807B1 (en) | 1994-05-27 | 2001-02-20 | Canon Kabushiki Kaisha | Communication apparatus and method for performing a file transfer operation |
US5848373A (en) | 1994-06-24 | 1998-12-08 | Delorme Publishing Company | Computer aided map location system |
US5948040A (en) | 1994-06-24 | 1999-09-07 | Delorme Publishing Co. | Travel reservation information and planning system |
US5778222A (en) * | 1994-06-27 | 1998-07-07 | International Business Machines Corporation | Method and system for managing access to objects |
US5655007A (en) * | 1994-10-13 | 1997-08-05 | Bell Atlantic Network Services, Inc. | Telephone based credit card protection |
US5528518A (en) | 1994-10-25 | 1996-06-18 | Laser Technology, Inc. | System and method for collecting data used to form a geographic information system database |
US5913078A (en) | 1994-11-01 | 1999-06-15 | Konica Corporation | Camera utilizing a satellite positioning system |
US6571279B1 (en) | 1997-12-05 | 2003-05-27 | Pinpoint Incorporated | Location enhanced information delivery system |
US5893037A (en) | 1994-12-09 | 1999-04-06 | Eastman Kodak Company | Combined electronic/silver-halide image capture system with cellular transmission capability |
DE69535394T2 (de) | 1994-12-28 | 2007-10-31 | Omron Corp. | Verkehrsinformationssystem |
US5648768A (en) | 1994-12-30 | 1997-07-15 | Mapsys, Inc. | System and method for identifying, tabulating and presenting information of interest along a travel route |
US5682475A (en) * | 1994-12-30 | 1997-10-28 | International Business Machines Corporation | Method and system for variable password access |
US6085177A (en) | 1995-01-11 | 2000-07-04 | Civic-Ddi, Llc | Systems for accessing the internet and geo-defined data and associated methods |
US5682525A (en) | 1995-01-11 | 1997-10-28 | Civix Corporation | System and methods for remotely accessing a selected group of items of interest from a database |
US5946678A (en) | 1995-01-11 | 1999-08-31 | Philips Electronics North America Corporation | User interface for document retrieval |
US5952959A (en) | 1995-01-25 | 1999-09-14 | American Technology Corporation | GPS relative position detection system |
US5642285A (en) | 1995-01-31 | 1997-06-24 | Trimble Navigation Limited | Outdoor movie camera GPS-position and time code data-logging for special effects production |
JPH08247778A (ja) | 1995-03-07 | 1996-09-27 | Aqueous Res:Kk | ナビゲーション用入力装置 |
US5729471A (en) | 1995-03-31 | 1998-03-17 | The Regents Of The University Of California | Machine dynamic selection of one video camera/image of a scene from multiple video cameras/images of the scene in accordance with a particular perspective on the scene, an object in the scene, or an event in the scene |
JPH08286257A (ja) | 1995-04-18 | 1996-11-01 | Konica Corp | カメラのデータ記録装置 |
WO1996034374A2 (en) | 1995-04-28 | 1996-10-31 | Philips Electronics N.V. | Wireless communication system for reliable communication between a group of apparatuses |
DE69527702T2 (de) * | 1995-04-28 | 2002-12-05 | St Microelectronics Srl | Methode und Schaltung zur Erkennung eines Zündfunkens in einer inneren Brennkraftmaschine |
US6671563B1 (en) | 1995-05-15 | 2003-12-30 | Alaris Medical Systems, Inc. | System and method for collecting data and managing patient care |
US5672820A (en) | 1995-05-16 | 1997-09-30 | Boeing North American, Inc. | Object location identification system for providing location data of an object being pointed at by a pointing device |
US5904727A (en) | 1995-05-17 | 1999-05-18 | Mobile Information Systems, Inc. | Graphical fleet management methods |
JPH0944592A (ja) | 1995-05-23 | 1997-02-14 | Olympus Optical Co Ltd | 情報再生システム |
US6073062A (en) * | 1995-05-31 | 2000-06-06 | Fujitsu Limited | Mobile terminal and moving body operation management system |
JPH11507777A (ja) | 1995-06-07 | 1999-07-06 | イー−コム・インコーポレーテッド | ハンドヘルドリモートコンピュータのコントロールと安全なインタラクティブリアルタイム通信のための方法 |
US5978773A (en) | 1995-06-20 | 1999-11-02 | Neomedia Technologies, Inc. | System and method for using an ordinary article of commerce to access a remote computer |
US5839094A (en) | 1995-06-30 | 1998-11-17 | Ada Technologies, Inc. | Portable data collection device with self identifying probe |
US5781914A (en) | 1995-06-30 | 1998-07-14 | Ricoh Company, Ltd. | Converting documents, with links to other electronic information, between hardcopy and electronic formats |
CA2180891C (en) | 1995-07-12 | 2010-01-12 | Junichi Rekimoto | Notification of updates in a three-dimensional virtual reality space sharing system |
JPH102950A (ja) | 1995-07-25 | 1998-01-06 | Rookasu:Kk | 位置決めシステム |
DK0757336T3 (da) | 1995-08-04 | 2001-03-19 | Belle Gate Invest B V | Data-Udvekslings-System omfattende bærbare databehandlingsenheder |
US5640002A (en) | 1995-08-15 | 1997-06-17 | Ruppert; Jonathan Paul | Portable RF ID tag and barcode reader |
GB9516762D0 (en) | 1995-08-16 | 1995-10-18 | Phelan Sean P | Computer system for identifying local resources |
US6249241B1 (en) | 1995-09-21 | 2001-06-19 | The United States Of America As Represented By The Secretary Of The Navy | Marine vessel traffic system |
JP3622094B2 (ja) | 1995-10-05 | 2005-02-23 | 株式会社日立製作所 | 地図更新支援装置および地図情報の編集方法 |
JPH09114851A (ja) | 1995-10-20 | 1997-05-02 | Fuji Xerox Co Ltd | 情報管理装置 |
US5737533A (en) | 1995-10-26 | 1998-04-07 | Wegener Internet Projects Bv | System for generating a virtual reality scene in response to a database search |
US5768640A (en) | 1995-10-27 | 1998-06-16 | Konica Corporation | Camera having an information recording function |
US6282362B1 (en) | 1995-11-07 | 2001-08-28 | Trimble Navigation Limited | Geographical position/image digital recording and display system |
US5799082A (en) | 1995-11-07 | 1998-08-25 | Trimble Navigation Limited | Secure authentication of images |
JP3658659B2 (ja) | 1995-11-15 | 2005-06-08 | カシオ計算機株式会社 | 画像処理装置 |
US6747692B2 (en) | 1997-03-28 | 2004-06-08 | Symbol Technologies, Inc. | Portable multipurpose recording terminal and portable network server |
US5831664A (en) | 1995-12-15 | 1998-11-03 | Mediaone Group, Inc. | Method and system for synchronizing data between at least one mobile interface device and an interactive terminal |
US5721679A (en) | 1995-12-18 | 1998-02-24 | Ag-Chem Equipment Co., Inc. | Heads-up display apparatus for computer-controlled agricultural product application equipment |
US5751576A (en) | 1995-12-18 | 1998-05-12 | Ag-Chem Equipment Co., Inc. | Animated map display method for computer-controlled agricultural product application equipment |
JP3743988B2 (ja) | 1995-12-22 | 2006-02-08 | ソニー株式会社 | 情報検索システムおよび方法、並びに情報端末 |
SG75807A1 (en) | 1996-01-11 | 2000-10-24 | Sony Corp | Signal transmitting method and apparatus |
US5852810A (en) | 1996-01-29 | 1998-12-22 | Student Housing Network | Geographic specific information search system and method |
US5644318A (en) | 1996-02-02 | 1997-07-01 | Trimble Navigation Limited | SATPS dynamic surveying from a moving platform |
US6750902B1 (en) | 1996-02-13 | 2004-06-15 | Fotonation Holdings Llc | Camera network communication device |
US5948031A (en) | 1996-02-23 | 1999-09-07 | Nec Technologies, Inc. | Vehicle passenger sensing system and method |
TW395121B (en) | 1996-02-26 | 2000-06-21 | Seiko Epson Corp | Personal wearing information display device and the display method using such device |
JP3231787B2 (ja) | 1996-03-05 | 2001-11-26 | 松下電器産業株式会社 | 位置情報検出システム |
US6577714B1 (en) | 1996-03-11 | 2003-06-10 | At&T Corp. | Map-based directory system |
US6650998B1 (en) | 1996-03-11 | 2003-11-18 | At&T Corp. | Information Search System for enabling a user of a user terminal to search a data source |
JP3360002B2 (ja) * | 1996-03-14 | 2002-12-24 | 沖電気工業株式会社 | 接触式・非接触式兼用icカード及び接触式・非接触式兼用icカードリーダライタ |
GB2311697B (en) | 1996-03-22 | 1999-07-28 | Matsushita Electric Ind Co Ltd | Wireless communication system and method and system for detection of position of radio mobile station |
US5910799A (en) | 1996-04-09 | 1999-06-08 | International Business Machines Corporation | Location motion sensitive user interface |
US5978804A (en) | 1996-04-11 | 1999-11-02 | Dietzman; Gregg R. | Natural products information system |
JPH1056609A (ja) | 1996-04-15 | 1998-02-24 | Canon Inc | 画像記録方法、通信方法、画像記録装置、通信装置及び媒体 |
US5781195A (en) | 1996-04-16 | 1998-07-14 | Microsoft Corporation | Method and system for rendering two-dimensional views of a three-dimensional surface |
JP3370526B2 (ja) | 1996-04-24 | 2003-01-27 | 富士通株式会社 | 移動通信システム並びに同移動通信システムに使用される移動端末及び情報センタ |
US6532021B1 (en) | 1996-04-30 | 2003-03-11 | Sun Microsystems, Inc. | Opaque screen visualizer |
JPH09297030A (ja) | 1996-05-02 | 1997-11-18 | Pioneer Electron Corp | 移動体位置算出方法及び装置並びに移動体位置補正方法及び装置 |
US5971589A (en) | 1996-05-06 | 1999-10-26 | Amadasoft America, Inc. | Apparatus and method for managing and distributing design and manufacturing information throughout a sheet metal production facility |
US5806005A (en) | 1996-05-10 | 1998-09-08 | Ricoh Company, Ltd. | Wireless image transfer from a digital still video camera to a networked computer |
US5819032A (en) | 1996-05-15 | 1998-10-06 | Microsoft Corporation | Electronic magazine which is distributed electronically from a publisher to multiple subscribers |
JPH09319835A (ja) * | 1996-05-28 | 1997-12-12 | Mitsubishi Electric Corp | Icカード |
JPH08305995A (ja) | 1996-06-11 | 1996-11-22 | Sony Corp | 通信システム及び表示方法 |
JPH09330336A (ja) | 1996-06-11 | 1997-12-22 | Sony Corp | 情報処理装置 |
JP3536535B2 (ja) | 1996-06-14 | 2004-06-14 | 松下電器産業株式会社 | ナビゲーション装置 |
EP1517283A3 (en) | 1996-06-19 | 2006-05-03 | Matsushita Electric Industrial Co., Ltd. | Road area extracting apparatus for extracting a road area from a block map, deformed map automatic generation system for generating a deformed map from road area data obtained by the road area extracting apparatus, map information providing system, geographical information providing system and geographical information describing method |
US5774876A (en) | 1996-06-26 | 1998-06-30 | Par Government Systems Corporation | Managing assets with active electronic tags |
DE69736622T2 (de) | 1996-07-03 | 2007-09-13 | Hitachi, Ltd. | System zur Bewegungserkennung |
US6532230B1 (en) | 1996-07-08 | 2003-03-11 | Altigen Communications, Inc. | Mixed-media communication apparatus and method |
US5787154A (en) * | 1996-07-12 | 1998-07-28 | At&T Corp | Universal authentication device for use over telephone lines |
US6098082A (en) | 1996-07-15 | 2000-08-01 | At&T Corp | Method for automatically providing a compressed rendition of a video program in a format suitable for electronic searching and retrieval |
US6543695B1 (en) | 1996-08-02 | 2003-04-08 | Symbol Technologies, Inc. | Housing for hand held scanner |
US6064749A (en) | 1996-08-02 | 2000-05-16 | Hirota; Gentaro | Hybrid tracking for augmented reality using both camera motion detection and landmark tracking |
KR100189536B1 (ko) | 1996-08-08 | 1999-06-01 | 윤종용 | 전세계 위성측위 시스템을 이용한 네비게이션장치의 이동체 위치 표시 장치_ |
US6202023B1 (en) | 1996-08-22 | 2001-03-13 | Go2 Systems, Inc. | Internet based geographic location referencing system and method |
US6396941B1 (en) | 1996-08-23 | 2002-05-28 | Bacus Research Laboratories, Inc. | Method and apparatus for internet, intranet, and local viewing of virtual microscope slides |
US6397184B1 (en) | 1996-08-29 | 2002-05-28 | Eastman Kodak Company | System and method for associating pre-recorded audio snippets with still photographic images |
US5768633A (en) | 1996-09-03 | 1998-06-16 | Eastman Kodak Company | Tradeshow photographic and data transmission system |
EP1016002A4 (en) | 1996-09-04 | 2000-11-15 | David A Goldberg | METHOD AND DEVICE FOR PRODUCING PERSONAL-SPECIFIC IMAGES IN A PUBLIC SPACE |
US5979757A (en) | 1996-09-05 | 1999-11-09 | Symbol Technologies, Inc. | Method and system for presenting item information using a portable data terminal |
US5765176A (en) | 1996-09-06 | 1998-06-09 | Xerox Corporation | Performing document image management tasks using an iconic image having embedded encoded information |
AU4253297A (en) | 1996-09-06 | 1998-03-26 | University Of Florida | Handheld portable digital geographic data manager |
US6185427B1 (en) | 1996-09-06 | 2001-02-06 | Snaptrack, Inc. | Distributed satellite position system processing and application network |
JP3599216B2 (ja) | 1996-09-30 | 2004-12-08 | マツダ株式会社 | ナビゲーション装置 |
JPH10105408A (ja) * | 1996-09-30 | 1998-04-24 | Toshiba Corp | 情報処理装置 |
JPH10117166A (ja) | 1996-10-08 | 1998-05-06 | Nec Ic Microcomput Syst Ltd | 移動体通信システム |
US5912650A (en) | 1996-10-16 | 1999-06-15 | Kaiser Electro-Optics, Inc. | Dichoptic display utilizing a single display device |
US5966135A (en) | 1996-10-30 | 1999-10-12 | Autodesk, Inc. | Vector-based geographic data |
US6367017B1 (en) * | 1996-11-07 | 2002-04-02 | Litronic Inc. | Apparatus and method for providing and authentication system |
WO1998020411A1 (en) | 1996-11-08 | 1998-05-14 | Neomedia Technologies, Inc. | Automatic access of electronic information through machine-readable codes on printed documents |
US6064967A (en) | 1996-11-08 | 2000-05-16 | Speicher; Gregory J. | Internet-audiotext electronic advertising system with inventory management |
JPH10143640A (ja) | 1996-11-15 | 1998-05-29 | Nippon Lsi Card Kk | 携帯コンピュータ及びそれを用いた情報管理システム並びにそれを用いた立体地図の作成方法 |
US6037991A (en) | 1996-11-26 | 2000-03-14 | Motorola, Inc. | Method and apparatus for communicating video information in a communication system |
JPH10161227A (ja) | 1996-12-02 | 1998-06-19 | Fuji Photo Film Co Ltd | カメラ及び撮影情報入力システム |
US6198394B1 (en) | 1996-12-05 | 2001-03-06 | Stephen C. Jacobsen | System for remote monitoring of personnel |
JP3474380B2 (ja) | 1996-12-12 | 2003-12-08 | 株式会社ザナヴィ・インフォマティクス | ナビゲーション装置および地図データベース装置 |
KR100317643B1 (ko) | 1996-12-25 | 2002-04-24 | 가시오 가즈오 | 이미지데이터처리시스템 |
JPH10207841A (ja) * | 1997-01-22 | 1998-08-07 | Mitsubishi Electric Corp | ペン入力パーソナル情報端末装置 |
CN1173225C (zh) | 1997-01-27 | 2004-10-27 | 富士写真胶片株式会社 | 记录全球定位系统装置的测位信息的摄像机 |
JPH10228374A (ja) | 1997-02-13 | 1998-08-25 | Nippon Telegr & Teleph Corp <Ntt> | 複製防止を施した計算機カード |
JP3906938B2 (ja) | 1997-02-18 | 2007-04-18 | 富士フイルム株式会社 | 画像再生方法及び画像データ管理方法 |
JPH10243325A (ja) | 1997-02-21 | 1998-09-11 | Minolta Co Ltd | 撮像装置 |
AUPO609897A0 (en) | 1997-04-09 | 1997-05-01 | Commonwealth Scientific And Industrial Research Organisation | Vital signs monitoring system |
US6075530A (en) | 1997-04-17 | 2000-06-13 | Maya Design Group | Computer system and method for analyzing information using one or more visualization frames |
US6148331A (en) | 1997-04-25 | 2000-11-14 | Parry; Rhys Evan | Destination website access and information gathering system |
US20010011276A1 (en) | 1997-05-07 | 2001-08-02 | Robert T. Durst Jr. | Scanner enhanced remote control unit and system for automatically linking to on-line resources |
US6067156A (en) * | 1997-05-16 | 2000-05-23 | Kaiser Optical Systems | Wavelength calibration and tracking methods and apparatus |
JP3788543B2 (ja) | 1997-05-20 | 2006-06-21 | 富士通株式会社 | 会議支援システム及び記録媒体 |
US6091956A (en) | 1997-06-12 | 2000-07-18 | Hollenberg; Dennis D. | Situation information system |
JP3611230B2 (ja) | 1997-06-12 | 2005-01-19 | 富士ゼロックス株式会社 | 情報処理方法 |
CZ290677B6 (cs) | 1997-06-16 | 2002-09-11 | Swisscom Mobile Ag | Čipová karta a způsob komunikace mezi externím zařízením na zpracování dat a čipovou kartou |
ATE212774T1 (de) * | 1997-06-16 | 2002-02-15 | Swisscom Mobile Ag | Mobilgerät, chipkarte und kommunikationsverfahren |
US6148261A (en) | 1997-06-20 | 2000-11-14 | American Calcar, Inc. | Personal communication system to send and receive voice data positioning information |
US6133853A (en) | 1998-07-30 | 2000-10-17 | American Calcar, Inc. | Personal communication and positioning system |
JPH1114384A (ja) | 1997-06-24 | 1999-01-22 | Mitsubishi Electric Corp | ナビゲーションシステム、ナビゲーションシステム用地点情報コード作成装置、および情報提供システムとその印刷媒体 |
US7233997B1 (en) * | 1997-06-26 | 2007-06-19 | British Telecommunications Plc | Data communications |
US6094625A (en) | 1997-07-03 | 2000-07-25 | Trimble Navigation Limited | Augmented vision for survey work and machine control |
JP3426919B2 (ja) | 1997-07-28 | 2003-07-14 | シャープ株式会社 | 図形作成装置 |
JPH1153378A (ja) | 1997-07-31 | 1999-02-26 | Honda Motor Co Ltd | 情報検索装置 |
US6208344B1 (en) | 1997-07-31 | 2001-03-27 | Ncr Corporation | System and process for manipulating and viewing hierarchical iconic containers |
JPH1185940A (ja) | 1997-09-03 | 1999-03-30 | Unitika Ltd | 無線通信端末及びそのセキュリティ方法 |
JP3781874B2 (ja) * | 1997-09-05 | 2006-05-31 | 富士通株式会社 | 画像指示による電子情報管理装置、秘密鍵管理装置及び方法、並びに、秘密鍵管理プログラムを記録した記録媒体 |
US6865715B2 (en) | 1997-09-08 | 2005-03-08 | Fujitsu Limited | Statistical method for extracting, and displaying keywords in forum/message board documents |
JP3601950B2 (ja) | 1997-09-16 | 2004-12-15 | 株式会社東芝 | 通信装置およびネットワーク情報提示方法 |
JP3317211B2 (ja) | 1997-09-24 | 2002-08-26 | 松下電器産業株式会社 | 地図編集装置 |
US6324402B1 (en) * | 1997-10-07 | 2001-11-27 | Nortel Dasa Network System Gmbh & Co. Kg | Integration scheme for a mobile telephone |
US6226744B1 (en) * | 1997-10-09 | 2001-05-01 | At&T Corp | Method and apparatus for authenticating users on a network using a smart card |
US5946687A (en) | 1997-10-10 | 1999-08-31 | Lucent Technologies Inc. | Geo-enabled personal information manager |
US6089453A (en) | 1997-10-10 | 2000-07-18 | Display Edge Technology, Ltd. | Article-information display system using electronically controlled tags |
US6047234A (en) | 1997-10-16 | 2000-04-04 | Navigation Technologies Corporation | System and method for updating, enhancing or refining a geographic database using feedback |
US6085148A (en) | 1997-10-22 | 2000-07-04 | Jamison; Scott R. | Automated touring information systems and methods |
US6016494A (en) | 1997-11-21 | 2000-01-18 | International Business Machines Corporation | Expanding web documents by merging with linked documents |
US6396537B1 (en) | 1997-11-24 | 2002-05-28 | Eastman Kodak Company | Photographic system for enabling interactive communication between a camera and an attraction site |
US6166744A (en) | 1997-11-26 | 2000-12-26 | Pathfinder Systems, Inc. | System for combining virtual images with real-world scenes |
US5990886A (en) | 1997-12-01 | 1999-11-23 | Microsoft Corporation | Graphically creating e-mail distribution lists with geographic area selector on map |
US6744471B1 (en) * | 1997-12-05 | 2004-06-01 | Olympus Optical Co., Ltd | Electronic camera that synthesizes two images taken under different exposures |
US6058428A (en) | 1997-12-05 | 2000-05-02 | Pictra, Inc. | Method and apparatus for transferring digital images on a network |
US5987125A (en) | 1997-12-15 | 1999-11-16 | Western Atlas International, Inc. | Method for communicating seismic data |
US6484946B2 (en) * | 1997-12-22 | 2002-11-26 | Hitachi, Ltd. | IC card information display device and IC card for use therewith |
US6535243B1 (en) | 1998-01-06 | 2003-03-18 | Hewlett- Packard Company | Wireless hand-held digital camera |
JP3574317B2 (ja) * | 1998-01-12 | 2004-10-06 | 株式会社デンソーウェーブ | 非接触式icカード制御システム及びicカード制御方法 |
US6742120B1 (en) * | 1998-02-03 | 2004-05-25 | Mondex International Limited | System and method for controlling access to computer code in an IC card |
US6980670B1 (en) * | 1998-02-09 | 2005-12-27 | Indivos Corporation | Biometric tokenless electronic rewards system and method |
US6122520A (en) | 1998-02-13 | 2000-09-19 | Xerox Corporation | System and method for obtaining and using location specific information |
US6175343B1 (en) | 1998-02-24 | 2001-01-16 | Anivision, Inc. | Method and apparatus for operating the overlay of computer-generated effects onto a live image |
FR2775814B1 (fr) | 1998-03-06 | 2001-01-19 | Rasterland Sa | Systeme de visualisation d'images tridimensionnelles realistes virtuelles en temps reel |
US6611196B2 (en) | 1998-03-20 | 2003-08-26 | Xerox Corporation | System and method for providing audio augmentation of a physical environment |
US6484196B1 (en) | 1998-03-20 | 2002-11-19 | Advanced Web Solutions | Internet messaging system and method for use in computer networks |
US6243678B1 (en) * | 1998-04-07 | 2001-06-05 | Lucent Technologies Inc. | Method and system for dynamic speech recognition using free-phone scoring |
JP3488629B2 (ja) | 1998-04-07 | 2004-01-19 | 富士通株式会社 | 放射電磁界耐性算出装置及び方法並びにプログラム記録媒体 |
US6625299B1 (en) | 1998-04-08 | 2003-09-23 | Jeffrey Meisner | Augmented reality technology |
US6115290A (en) * | 1998-04-29 | 2000-09-05 | Intel Corporation | Mechanism for resetting sense circuitry to a known state in a nonvolatile memory device |
US6101483A (en) | 1998-05-29 | 2000-08-08 | Symbol Technologies, Inc. | Personal shopping system portable terminal |
US6219694B1 (en) | 1998-05-29 | 2001-04-17 | Research In Motion Limited | System and method for pushing information from a host system to a mobile data communication device having a shared electronic address |
US6731612B1 (en) | 1998-06-29 | 2004-05-04 | Microsoft Corporation | Location-based web browsing |
JP4051510B2 (ja) | 1998-07-16 | 2008-02-27 | ソニー株式会社 | データ記憶装置およびデータ記憶方法 |
JP2000050123A (ja) | 1998-07-27 | 2000-02-18 | Sony Corp | 撮像装置、ナビゲーション装置、icカード及び静止画像の表示方法 |
US6408404B1 (en) | 1998-07-29 | 2002-06-18 | Northrop Grumman Corporation | System and method for ensuring and managing situation awareness |
US6098048A (en) | 1998-08-12 | 2000-08-01 | Vnu Marketing Information Services, Inc. | Automated data collection for consumer driving-activity survey |
US6732120B1 (en) | 1998-09-03 | 2004-05-04 | Geojet Information Solutions Inc. | System and method for processing and display of geographical data |
US6008727A (en) | 1998-09-10 | 1999-12-28 | Xerox Corporation | Selectively enabled electronic tags |
US6215498B1 (en) | 1998-09-10 | 2001-04-10 | Lionhearth Technologies, Inc. | Virtual command post |
US6745234B1 (en) | 1998-09-11 | 2004-06-01 | Digital:Convergence Corporation | Method and apparatus for accessing a remote location by scanning an optical code |
US6195093B1 (en) | 1998-09-14 | 2001-02-27 | Fuji Xerox Co., Ltd. | Systems and method for controlling a presentation using physical objects |
US6326946B1 (en) | 1998-09-17 | 2001-12-04 | Xerox Corporation | Operator icons for information collages |
US6005482A (en) | 1998-09-17 | 1999-12-21 | Xerox Corporation | Surface mounted information collage |
US6173239B1 (en) | 1998-09-30 | 2001-01-09 | Geo Vector Corporation | Apparatus and methods for presentation of information relating to objects being addressed |
US6385454B1 (en) | 1998-10-09 | 2002-05-07 | Microsoft Corporation | Apparatus and method for management of resources in cellular networks |
JP2000194726A (ja) | 1998-10-19 | 2000-07-14 | Sony Corp | 情報処理装置及び方法、情報処理システム並びに提供媒体 |
US6289378B1 (en) * | 1998-10-20 | 2001-09-11 | Triactive Technologies, L.L.C. | Web browser remote computer management system |
US6266442B1 (en) | 1998-10-23 | 2001-07-24 | Facet Technology Corp. | Method and apparatus for identifying objects depicted in a videostream |
US6327570B1 (en) | 1998-11-06 | 2001-12-04 | Dian Stevens | Personal business service system and method |
US6023241A (en) | 1998-11-13 | 2000-02-08 | Intel Corporation | Digital multimedia navigation player/recorder |
US6195651B1 (en) | 1998-11-19 | 2001-02-27 | Andersen Consulting Properties Bv | System, method and article of manufacture for a tuned user application experience |
US6466232B1 (en) | 1998-12-18 | 2002-10-15 | Tangis Corporation | Method and system for controlling presentation of information to a user based on the user's condition |
EP1017028A3 (en) | 1998-12-22 | 2003-05-07 | International Business Machines Corporation | Extended card file system |
US6370381B1 (en) | 1999-01-29 | 2002-04-09 | Siemens Transportation Systems, Inc. | Multiple channel communications system |
US6839560B1 (en) | 1999-02-25 | 2005-01-04 | Microsoft Corporation | Using a derived table of signal strength data to locate and track a user in a wireless network |
JP3423661B2 (ja) * | 1999-02-25 | 2003-07-07 | キヤノン株式会社 | 電子放出素子、電子源および画像形成装置の製造方法 |
US6317718B1 (en) | 1999-02-26 | 2001-11-13 | Accenture Properties (2) B.V. | System, method and article of manufacture for location-based filtering for shopping agent in the physical world |
JP2000280666A (ja) | 1999-03-31 | 2000-10-10 | Kyodo Printing Co Ltd | Icカードの製造方法 |
US6334056B1 (en) * | 1999-05-28 | 2001-12-25 | Qwest Communications Int'l., Inc. | Secure gateway processing for handheld device markup language (HDML) |
US7069571B1 (en) * | 1999-06-15 | 2006-06-27 | Wink Communications, Inc. | Automated retirement of interactive applications using retirement instructions for events and program states |
AU4128899A (en) | 1999-06-18 | 2001-01-09 | Swisscom Mobile Ag | Interchangeable battery pack for a mobile telephone |
US20020047798A1 (en) | 1999-06-25 | 2002-04-25 | Timothy James Platt | Image acquisition and retrieval system employing position data |
US6715086B1 (en) * | 1999-06-30 | 2004-03-30 | International Business Machines Corporation | Data processing system and method having time-span support for input device driver |
US6839751B1 (en) * | 1999-06-30 | 2005-01-04 | Hi/Fn, Inc. | Re-using information from data transactions for maintaining statistics in network monitoring |
US6321091B1 (en) | 1999-07-29 | 2001-11-20 | Bryan Holland | Portable locator system and method |
US7984303B1 (en) * | 2000-01-06 | 2011-07-19 | Super Talent Electronics, Inc. | Flash memory devices with security features |
US7873837B1 (en) * | 2000-01-06 | 2011-01-18 | Super Talent Electronics, Inc. | Data security for electronic data flash card |
US6525932B1 (en) * | 1999-08-18 | 2003-02-25 | Fujitsu Limited | Expansion unit and electronic apparatus |
WO2001016759A1 (en) * | 1999-08-31 | 2001-03-08 | Cryptec Systems, Inc. | Smart card memory management system and method |
JP3370978B2 (ja) | 1999-09-10 | 2003-01-27 | 株式会社ソニー・コンピュータエンタテインメント | エンタテインメント装置および情報処理装置 |
US6732915B1 (en) | 1999-09-10 | 2004-05-11 | Fuji Xerox Co., Ltd. | Systems and methods for controlling a presentation using physical objects |
US6411938B1 (en) * | 1999-09-14 | 2002-06-25 | Intuit, Inc. | Client-server online payroll processing |
US6629134B2 (en) | 1999-09-16 | 2003-09-30 | Xerox Corporation | Context sensitive web-based user support |
US6292874B1 (en) | 1999-10-19 | 2001-09-18 | Advanced Technology Materials, Inc. | Memory management method and apparatus for partitioning homogeneous memory and restricting access of installed applications to predetermined memory ranges |
AT409238B (de) * | 1999-11-05 | 2002-06-25 | Fronius Schweissmasch Prod | Festlegen und/oder feststellen von benutzerberechtigungen mittels eines transponders,einer fingerabdruckerkennung oder dergleichen |
JP2001167173A (ja) * | 1999-12-08 | 2001-06-22 | Sony Corp | 情報流通システム及び情報の管理方法 |
EP1237091A4 (en) * | 1999-12-10 | 2006-08-23 | Fujitsu Ltd | IDENTITY TESTING SYSTEM AND PORTABLE ELECTRONIC DEVICE, CONTAINING THE PERSONAL IDENTIFICATION FUNCTION USING PHYSICAL INFORMATION |
JP4341127B2 (ja) * | 1999-12-20 | 2009-10-07 | ソニー株式会社 | 情報処理装置、icカード及びリーダライタ |
US6609115B1 (en) * | 1999-12-30 | 2003-08-19 | Ge Medical Systems | Method and apparatus for limited online access to restricted documentation |
US6584454B1 (en) * | 1999-12-31 | 2003-06-24 | Ge Medical Technology Services, Inc. | Method and apparatus for community management in remote system servicing |
US7676640B2 (en) * | 2000-01-06 | 2010-03-09 | Super Talent Electronics, Inc. | Flash memory controller controlling various flash memory cells |
US7690030B1 (en) * | 2000-01-06 | 2010-03-30 | Super Talent Electronics, Inc. | Electronic data flash card with fingerprint verification capability |
US7249186B1 (en) * | 2000-01-20 | 2007-07-24 | Cisco Technology, Inc. | System and method for identifying a subscriber for connection to a communication network |
EP1128284A2 (en) | 2000-02-21 | 2001-08-29 | Hewlett-Packard Company, A Delaware Corporation | Associating image and location data |
US20010037468A1 (en) * | 2000-04-11 | 2001-11-01 | Gaddis M. Norton | Method and apparatus for creating unique image passwords |
US6934860B1 (en) * | 2000-05-08 | 2005-08-23 | Xerox Corporation | System, method and article of manufacture for knowledge-based password protection of computers and other systems |
JP4565703B2 (ja) * | 2000-05-16 | 2010-10-20 | グローリー株式会社 | データ記憶装置およびデータ記憶方法 |
WO2001092970A1 (en) * | 2000-05-30 | 2001-12-06 | Seiko Epson Corporation | Hand-held electronic device |
JP2001344213A (ja) * | 2000-05-31 | 2001-12-14 | Hitachi Ltd | 生体認証システム |
US7003481B2 (en) * | 2000-08-25 | 2006-02-21 | Flatrock Ii, Inc. | Method and apparatus for providing network dependent application services |
US20020042879A1 (en) * | 2000-10-10 | 2002-04-11 | Gould Terry A. | Electronic signature system |
JP2002123806A (ja) * | 2000-10-17 | 2002-04-26 | Fujitsu Ltd | Icカード、データ更新制御方法、データ/メッセージ復元制御方法、および制御プログラムを記録した記録媒体 |
US8103881B2 (en) * | 2000-11-06 | 2012-01-24 | Innovation Connection Corporation | System, method and apparatus for electronic ticketing |
US6981048B1 (en) * | 2000-11-22 | 2005-12-27 | Toshiba America Information Systems, Inc. | Keep-alive messaging when two applications are running |
US20020065919A1 (en) * | 2000-11-30 | 2002-05-30 | Taylor Ian Lance | Peer-to-peer caching network for user data |
US20030149601A1 (en) * | 2000-12-14 | 2003-08-07 | Cabral Anthony J. | Network billboard system and method thereof |
US7463738B2 (en) * | 2000-12-20 | 2008-12-09 | Nokia Corporation | Method for providing multimedia files and terminal therefor |
US7043640B2 (en) * | 2001-02-14 | 2006-05-09 | Pritchard James B | Apparatus and method for protecting a computer system |
JP3557181B2 (ja) * | 2001-05-14 | 2004-08-25 | 株式会社東芝 | Icカード発行システム |
US7908629B2 (en) | 2001-06-28 | 2011-03-15 | Intel Corporation | Location-based image sharing |
US7149957B2 (en) | 2001-11-19 | 2006-12-12 | Ricoh Company, Ltd. | Techniques for retrieving multimedia information using a paper-based interface |
US6796023B2 (en) * | 2002-07-08 | 2004-09-28 | Texas Instruments Incorporated | Method and apparatus for integrated circuit storage tube retention pin removal and insertion |
JP2004062402A (ja) * | 2002-07-26 | 2004-02-26 | Fujitsu Ltd | タイムアウト管理システム、タイムアウト管理サーバ、およびタイムアウト管理プログラム |
JP4682498B2 (ja) * | 2003-04-09 | 2011-05-11 | ソニー株式会社 | 通信装置及び通信装置のメモリ管理方法 |
US7526718B2 (en) | 2003-04-30 | 2009-04-28 | Hewlett-Packard Development Company, L.P. | Apparatus and method for recording “path-enhanced” multimedia |
US6913968B2 (en) | 2003-07-30 | 2005-07-05 | International Business Machines Corporation | Method and structure for vertical DRAM devices with self-aligned upper trench shaping |
JP2005196412A (ja) * | 2004-01-06 | 2005-07-21 | Sony Corp | データ通信装置及びデータ通信装置のメモリ管理方法 |
JP4428055B2 (ja) * | 2004-01-06 | 2010-03-10 | ソニー株式会社 | データ通信装置及びデータ通信装置のメモリ管理方法 |
US20050278278A1 (en) * | 2004-05-28 | 2005-12-15 | Petev Petio G | Class loading jar operation optimizations |
JP4371223B2 (ja) * | 2004-06-14 | 2009-11-25 | 日本電気株式会社 | 携帯電話機、ロック機能の設定及び解除方法、プログラム、及び情報記録媒体 |
WO2005124560A1 (ja) * | 2004-06-15 | 2005-12-29 | Sony Corporation | 情報管理装置及び情報管理方法 |
AU2006201428A1 (en) * | 2005-04-06 | 2006-10-26 | Activldentity, Inc. | Secure digital credential sharing arrangement |
EP2603892A4 (en) * | 2010-08-12 | 2015-09-02 | Mastercard International Inc | PAYMENT SYSTEM WITH MULTIPLE SALES CHANNELS FOR AUTHENTICATED TRANSACTIONS |
KR101520511B1 (ko) * | 2010-12-21 | 2015-05-15 | 한국전자통신연구원 | 개인식별번호를 이용한 사용자 인증 시스템, 사용자 단말 장치, 조회 장치, 인증 서버 및 그 사용자 인증 방법 |
WO2012112833A2 (en) * | 2011-02-17 | 2012-08-23 | Taasera, Inc. | System and method for application attestation |
US20160019548A1 (en) * | 2013-05-26 | 2016-01-21 | Joseph M. Gangi | Secure Electronic Identification Device |
US9477956B2 (en) * | 2014-12-17 | 2016-10-25 | Mastercard International Incorporated | Method to enable consumers to make purchases at E-commerce websites using their mobile number |
-
2002
- 2002-06-25 CN CNB028027795A patent/CN100347667C/zh not_active Expired - Fee Related
- 2002-06-25 EP EP02743715A patent/EP1403761B1/en not_active Expired - Lifetime
- 2002-06-25 AU AU2002346211A patent/AU2002346211B2/en not_active Ceased
- 2002-06-25 DE DE60226978T patent/DE60226978D1/de not_active Expired - Lifetime
- 2002-06-25 WO PCT/JP2002/006323 patent/WO2003003194A1/ja active IP Right Grant
- 2002-06-25 US US10/362,691 patent/US7508946B2/en not_active Expired - Lifetime
-
2004
- 2004-08-03 HK HK04105722A patent/HK1065604A1/xx not_active IP Right Cessation
-
2009
- 2009-03-11 US US12/402,190 patent/US7742604B2/en not_active Expired - Fee Related
-
2010
- 2010-05-07 US US12/776,076 patent/US9384618B2/en not_active Expired - Lifetime
-
2016
- 2016-06-10 US US15/179,058 patent/US10929565B2/en not_active Expired - Lifetime
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS62231353A (ja) * | 1986-03-31 | 1987-10-09 | Toppan Moore Co Ltd | Icカ−ド |
JPS62231352A (ja) * | 1986-03-31 | 1987-10-09 | Toppan Moore Co Ltd | Icカ−ド |
JPH0193877A (ja) * | 1987-10-05 | 1989-04-12 | Fujitsu Ltd | Icカード |
JPH01217587A (ja) * | 1988-02-25 | 1989-08-31 | Hitachi Maxell Ltd | Icカード |
JPH0264888A (ja) * | 1988-08-31 | 1990-03-05 | Toshiba Corp | 携帯可能電子装置 |
JPH03141441A (ja) * | 1989-10-27 | 1991-06-17 | Hitachi Ltd | 情報処理装置 |
JPH04304718A (ja) * | 1991-04-02 | 1992-10-28 | Omron Corp | 非接触パスゲートシステムおよびゲート装置 |
JPH0573741A (ja) * | 1991-09-17 | 1993-03-26 | Nippon Signal Co Ltd:The | 自動改札機 |
JPH0660235A (ja) * | 1992-08-13 | 1994-03-04 | Matsushita Electric Ind Co Ltd | Icカード |
JPH06103425A (ja) * | 1992-09-18 | 1994-04-15 | Nippon Telegr & Teleph Corp <Ntt> | Icクレジットカードシステム |
JPH10340231A (ja) * | 1997-06-05 | 1998-12-22 | Kokusai Electric Co Ltd | Icカード |
JPH11161552A (ja) * | 1997-11-28 | 1999-06-18 | Fujitsu Ltd | 可換記憶媒体のデータ保護方法及び、これを適用した記憶装置 |
JP2000011101A (ja) * | 1998-06-19 | 2000-01-14 | Hitachi Ltd | Icカードおよび記録媒体 |
JP2000148567A (ja) * | 1998-09-02 | 2000-05-30 | Internatl Business Mach Corp <Ibm> | スマ―ト・カ―ドのメモリにデ―タ・オブジェクトを記憶する方法 |
JP2001067446A (ja) * | 1999-08-27 | 2001-03-16 | Toppan Printing Co Ltd | 非接触型icカード |
Non-Patent Citations (1)
Title |
---|
See also references of EP1403761A4 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112784233A (zh) * | 2021-01-28 | 2021-05-11 | 北京三快在线科技有限公司 | 一种身份验证方法及装置 |
CN112784233B (zh) * | 2021-01-28 | 2022-11-04 | 北京三快在线科技有限公司 | 一种身份验证方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
US20160283730A1 (en) | 2016-09-29 |
US20100218262A1 (en) | 2010-08-26 |
AU2002346211B2 (en) | 2008-06-12 |
US20030174839A1 (en) | 2003-09-18 |
US7742604B2 (en) | 2010-06-22 |
EP1403761B1 (en) | 2008-06-04 |
US10929565B2 (en) | 2021-02-23 |
US9384618B2 (en) | 2016-07-05 |
US20090173787A1 (en) | 2009-07-09 |
HK1065604A1 (en) | 2005-02-25 |
CN1473293A (zh) | 2004-02-04 |
DE60226978D1 (de) | 2008-07-17 |
EP1403761A1 (en) | 2004-03-31 |
US7508946B2 (en) | 2009-03-24 |
CN100347667C (zh) | 2007-11-07 |
EP1403761A4 (en) | 2004-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2003003194A1 (fr) | Dispositif a circuit integre, dispositif de traitement de l'information, procede de gestion de memoire de support d'information, terminal mobile, dispositif a circuit integre a semi-conducteur, et procede de communication par terminal mobile | |
US10467832B2 (en) | Configurable digital badge holder | |
JP4682498B2 (ja) | 通信装置及び通信装置のメモリ管理方法 | |
US7240846B2 (en) | IC chip and information processing terminal | |
US20020174336A1 (en) | Information protection system and information protection method | |
JP4240851B2 (ja) | 暗証コード識別装置及び暗証コード識別方法 | |
WO2005066802A1 (ja) | データ通信装置及びデータ通信装置のメモリ管理方法 | |
JP4207403B2 (ja) | 情報記憶媒体、メモリ領域を備えたicチップ、メモリ領域を備えたicチップを有する情報処理装置、並びに、情報記憶媒体のメモリ管理方法 | |
AU2022279536A1 (en) | Detecting unauthorized usage | |
US7066385B2 (en) | Information processing terminal or control method therefor | |
WO2007093580A1 (en) | Smart card with identity checking | |
JP4207404B2 (ja) | 携帯端末及びその制御方法、並びに、icカード | |
JP4827392B2 (ja) | コンピュータの不正使用防止システム及びその方法 | |
JP5267639B2 (ja) | コンピュータの不正使用防止システム | |
CN101383014B (zh) | 信息处理系统和装置、读/写器、访问控制管理方法 | |
KR20100085534A (ko) | Rfid를 이용한 신용카드 시스템 및 이를 위한 rfid리더기 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AU CN SG US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002346211 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002743715 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10362691 Country of ref document: US |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 028027795 Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 2002743715 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 2002743715 Country of ref document: EP |